Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Networks | 133 |
Higher Education | 133 |
Databases | 112 |
Academic Libraries | 48 |
Information Networks | 42 |
Access to Information | 37 |
Online Systems | 34 |
Information Technology | 31 |
Computer Software | 26 |
Library Automation | 26 |
Electronic Mail | 24 |
More ▼ |
Source
Author
Cutright, Patricia J. | 2 |
Diaz, Karen R. | 2 |
Koren, Judy | 2 |
Abels, Eileen G. | 1 |
Adams, Kate | 1 |
Akeroyd, John | 1 |
Alberico, Ralph | 1 |
Algermissen, Virginia | 1 |
Archer, Elizabeth | 1 |
Arms, William Y | 1 |
Baker, Elizabeth | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 7 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Location
United Kingdom | 4 |
Australia | 3 |
Netherlands | 2 |
Ohio | 2 |
Pennsylvania | 2 |
Singapore | 2 |
South Africa | 2 |
United States | 2 |
Arizona | 1 |
Arkansas | 1 |
Asia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Archer, Elizabeth; Barnes, Glen – International Review of Research in Open and Distributed Learning, 2017
During this age of data proliferation, heavy reliance is placed on data visualisation to support users in making sense of vast quantities of information. Informational Dashboards have become the must have accoutrement for Higher Education institutions with various stakeholders jostling for development priority. Due to the time pressure and user…
Descriptors: Computer Networks, Data, Visual Aids, Databases
Hoover, Sam – EDUCAUSE Quarterly, 2009
Clemson University implemented Condor architecture on the Blackboard learning management system (LMS) application servers in order to gain higher throughput when processing Blackboard course archives. Condor has typically been used for high-throughput research computing, not applied to non-research problems involving long processing times. This…
Descriptors: Chalkboards, Courseware, Database Management Systems, Information Management
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks
Schaffer, Greg – Campus Technology, 2007
Managing resource usage and data delivery with virtualization devices is a staple of many of today's data infrastructures. By breaking the traditional direct physical access and inserting an abstraction layer, what one sees is what he/she gets, but the mechanics of delivery may be quite different. The reason for the increase in virtualization…
Descriptors: Higher Education, Computer Networks, Information Technology, Methods
Millea, Megan – 1996
Silverplatter's Electronic Reference Library (ERL) provides wide area network access to its databases using TCP/IP communications and client-server architecture. ERL has two main components: The ERL clients (retrieval interface) and the ERL server (search engines). ERL clients provide patrons with seamless access to multiple databases on multiple…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Software

Marshall, Eliot – Science, 1989
Describes the formation of the supercomputer system which reaches from Seattle to South Florida. Explains the major obstacles of international protocols, billing, priority routing, and security. (RT)
Descriptors: Communications, Computer Networks, Computers, Database Producers

Fayollat, James; Coles, Elizabeth – Information Technology and Libraries, 1987
Describes an integrated online library system developed at the University of California at Los Angeles (UCLA) which incorporates a number of database management features that enhance efficiency, for record retrieval and display. Design features related to record storage and retrieval and the design of linked files are described in detail.…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Database Management Systems
Drake, Miriam A. – Online, 1987
Describes Library 2000 at the Georgia Institute of Technology, which provides remote electronic access to a catalog of more then 350,000 books and documents, as well as access to the indexes to four extensive periodical databases. (MES)
Descriptors: Academic Libraries, Computer Networks, Databases, Futures (of Society)
Northwest Regional Educational Lab., Portland, OR. – 1998
The fifth session of IT@EDU98 consisted of four papers and was chaired by Nguyen Thanh Son (University of Technology, Ho Chi Minh City, Vietnam). "Distance Education at University of Hawaii" (David Lassner) investigates the technologies in use at the University of Hawaii, including: SkyBridge; HITS (Hawaii Interactive Television System);…
Descriptors: Computer Networks, Databases, Distance Education, Educational Technology
Machovec, George S. – Online Libraries and Microcomputers, 1997
Discusses computer user authentication and authorization issues when libraries need to let valid users access databases and information services without making the process too difficult for either party. Common solutions are explained, including filtering, passwords, and kerberos (cryptographic authentication scheme for secure use over public…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Databases
Ryland, Jane – CAUSE/EFFECT, 1989
An overview of responses from a number of higher education associations (ACE, EDUCOM and NASULGC, and Cornell University) to the controversial issues that have arisen from the 1988 Internet "worm" are presented. Preliminary results from a CAUSE survey of higher education institutions are discussed. (Author/MLW)
Descriptors: Computer Networks, Computer Software, Databases, Ethics
CAUSE/EFFECT, 1988
Guidelines, jointly developed and endorsed by CAUSE and EDUCOM--two key organizations in the field of higher education information technology--are presented. They were created to provide institutions and regional accrediting associations with evaluation guidelines for information technology resources to use as a reference when developing their own…
Descriptors: Accreditation (Institutions), Computer Networks, Computer Software, Computers
Buckland, Michael K.; And Others – Proceedings of the ASIS Annual Meeting, 1995
Examines the transition from traditional single database retrieval to the emerging networked resources retrieval, and presents research and experimental solutions developed at the University of California, Berkeley. Highlights include recall and relevance, network navigation, vocabulary, and extending retrieval records. (LRW)
Descriptors: Computer Networks, Databases, Higher Education, Information Networks