Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
Author
Publication Type
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yang, Samuel C.; Winter, Peter – International Journal of Information and Learning Technology, 2015
Purpose: Mobile data traffic globally is increasing rapidly in both enterprise and consumer segments. The purpose of this paper is to identify a new network architecture and opportunity that support ubiquitous mobile work for higher-education institutions. Design/methodology/approach: It reviews existing literature and enabling technologies and…
Descriptors: Higher Education, Decision Making, Cost Effectiveness, Faculty Mobility
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Chretien, Wendy – Campus Technology, 2007
The word "architect" calls to mind a designer of buildings. An architect's job is to develop a structure to fit the client's needs, some of which are conflicting (or seem to be). When it comes to designing a campus network, IT infrastructure architects have a similar function. Like a building architect, an IT architect must develop a…
Descriptors: Information Technology, Educational Facilities Design, Technology Planning, Computer Networks
Turner, Judith Axler – Chronicle of Higher Education, 1988
Many suggestions by two researchers at Rand Corporation, who published a paper on etiquette for news networks, have been incorporated into bulletin-board conventions, but with new users coming online all the time socialization is slow. Some suggestions for e-mail users are provided. (MLW)
Descriptors: Bulletin Boards, Communications, Computer Networks, Electronic Mail
Updegrove, Daniel A. – Educational Technology, 1991
Discusses current trends in the use of electronic mail (e-mail) in education. National and international academic networks are described, including BITNET and NSFNET; uses of electronic mail for faculty, administrators, and students are examined; and guidelines for using e-mail are offered. (seven references) (LRW)
Descriptors: Computer Networks, Educational Technology, Educational Trends, Electronic Mail
CAUSE/EFFECT, 1988
Guidelines, jointly developed and endorsed by CAUSE and EDUCOM--two key organizations in the field of higher education information technology--are presented. They were created to provide institutions and regional accrediting associations with evaluation guidelines for information technology resources to use as a reference when developing their own…
Descriptors: Accreditation (Institutions), Computer Networks, Computer Software, Computers
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security
Moyers, Michael A.; Langschied, Linda, Ed. – 1991
This manual from the PC Working Group of Rutgers University Libraries is designed to help computer users to use electronic mail through computer networks effectively. There are two sections: MAIL commands, and VAX commands. The MAIL commands section includes step by step instructions for addressing, sending files, reading files, replying,…
Descriptors: Academic Libraries, Computer Networks, Computer Software, Electronic Mail
Hawkins, Brian L. – Academic Computing, 1989
Describes the development and current status of a campus-wide computer network at Brown University. Topics discussed include the principles that guided network development; services available through the network; current structure of the network; and university support for the network. (CLB)
Descriptors: Centralization, Computer Networks, Databases, Decentralization
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education

Vine, Rita – Canadian Library Journal, 1988
Describes the implementation of an electronic mail system at the University of Calgary Libraries, and reports the results of a survey that examined user satisfaction with the system and usage patterns by library staff. Suggestions for the successful implementation of electronic mail systems are offered. (CLB)
Descriptors: Academic Libraries, Computer Networks, Electronic Mail, Foreign Countries
Monahan, Brian D.; Dharm, Matthew – Educational Technology, 1995
Presents a practical guide to use of the Internet. Topics discussed include getting connected; the UNIX operating system; electronic mail; FTP (File Transfer Protocol); Finger; Telnet; Archie; Veronica; Gopher; teacher education; the Yanoff List; and expansion of the Internet. (three references) (LRW)
Descriptors: Business, Computer Mediated Communication, Computer Networks, Electronic Mail
Graves, William H. – EDUCOM Review, 1994
Presents guidelines for a National Learning Infrastructure Initiative based on higher education's experience in national networking and telecommunications, including a systemic approach to instructional technology; precompetitive, object-oriented technologies and standards; prototypes that exhibit educational advantages; and leadership for change.…
Descriptors: Competition, Computer Networks, Educational Opportunities, Educational Technology

Demas, Samuel; And Others – Library Resources & Technical Services, 1995
Presents guidelines for identifying, evaluating, and selecting Internet resources based on a conceptual model and organizational framework of a collection development policy formulated at Cornell University's library. Topics include collection development in an electronic library and a taxonomy of Internet resources. (Author/LRW)
Descriptors: Academic Libraries, Classification, Computer Networks, Electronic Libraries

Friedman, Lydia; And Others – Special Libraries, 1994
Describes the Basic Health Sciences Library Network (BHSL), a multistate interlibrary loan network that operates without direct charges to its 460 member libraries or federal or state funding. Loan activity for 1992 resulted in collective savings of $592,672. The BHSL model can be applied to any group using a common locator tool. (Contains 17…
Descriptors: Computer Networks, Costs, Governance, Guidelines
Previous Page | Next Page ยป
Pages: 1 | 2