Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Networks | 11 |
Database Management Systems | 11 |
Higher Education | 11 |
Access to Information | 5 |
Computer Software | 4 |
Information Technology | 4 |
Computer Security | 3 |
Databases | 3 |
Educational Technology | 3 |
Foreign Countries | 3 |
Information Management | 3 |
More ▼ |
Source
CAUSE/EFFECT | 1 |
Campus Technology | 1 |
EDUCAUSE Quarterly | 1 |
Information Systems Education… | 1 |
Information Technology and… | 1 |
International Association for… | 1 |
Online Submission | 1 |
Proceedings of the ASIS… | 1 |
Author
Baker, Elizabeth | 1 |
Bourdeau, J. | 1 |
Coles, Elizabeth | 1 |
Fayollat, James | 1 |
Hallisey, Joanne | 1 |
Hoover, Sam | 1 |
Larson, Ray R. | 1 |
Liu, Shijie | 1 |
Millea, Megan | 1 |
Reinicke, Bryan | 1 |
Ren, Zhanying | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 7 |
Speeches/Meeting Papers | 2 |
Collected Works - Proceedings | 1 |
Computer Programs | 1 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 5 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Media Staff | 1 |
Practitioners | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Hoover, Sam – EDUCAUSE Quarterly, 2009
Clemson University implemented Condor architecture on the Blackboard learning management system (LMS) application servers in order to gain higher throughput when processing Blackboard course archives. Condor has typically been used for high-throughput research computing, not applied to non-research problems involving long processing times. This…
Descriptors: Chalkboards, Courseware, Database Management Systems, Information Management
Schaffer, Greg – Campus Technology, 2007
Managing resource usage and data delivery with virtualization devices is a staple of many of today's data infrastructures. By breaking the traditional direct physical access and inserting an abstraction layer, what one sees is what he/she gets, but the mechanics of delivery may be quite different. The reason for the increase in virtualization…
Descriptors: Higher Education, Computer Networks, Information Technology, Methods
Bourdeau, J.; And Others – 1994
Students, teachers, and authors need to access multimedia documents over heterogeneous networks. The efficient handling of time-dependent multimedia information such as audio and video in distributed systems requires considerable network and computing resources. The term Quality of Service (QoS) refers collectively to the specifications of these…
Descriptors: Access to Information, Computer Networks, Database Management Systems, Distance Education
Millea, Megan – 1996
Silverplatter's Electronic Reference Library (ERL) provides wide area network access to its databases using TCP/IP communications and client-server architecture. ERL has two main components: The ERL clients (retrieval interface) and the ERL server (search engines). ERL clients provide patrons with seamless access to multiple databases on multiple…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Software
Hallisey, Joanne – CAUSE/EFFECT, 1998
Reengineering efforts, vendor consolidation, and rising costs prompted the Massachusetts Institute of Technology to convert its computer resale store to an online catalog that allows students, faculty, and staff to purchase equipment and software through a World Wide Web interface. The transition has been greeted with a mixed reaction. The next…
Descriptors: Computer Networks, Computer Peripherals, Computer Software, Database Management Systems
Sng, Dennis Cheng-Hong – 1990
The University of Illinois at Urbana-Champaign (UIUC) has a large campus computer network serving a community of about 20,000 users. With such a large network, it is inevitable that there are a wide variety of technologies co-existing in a multi-vendor environment. Effective network monitoring tools can help monitor traffic and link usage, as well…
Descriptors: Computer Networks, Computer Software, Computer System Design, Data Collection

Fayollat, James; Coles, Elizabeth – Information Technology and Libraries, 1987
Describes an integrated online library system developed at the University of California at Los Angeles (UCLA) which incorporates a number of database management features that enhance efficiency, for record retrieval and display. Design features related to record storage and retrieval and the design of linked files are described in detail.…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Database Management Systems
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks
Larson, Ray R. – Proceedings of the ASIS Mid-Year Meeting, 1994
Describes collaboration between the University of California at Berkeley and four other universities to develop interoperable servers containing each participant's Computer Science Technical Reports and to make them available over the Internet using standard protocols. The proposed library architecture, approaches to indexing and retrieval, and…
Descriptors: Academic Libraries, Access to Information, Automatic Indexing, Computer Networks
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers