NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)11
Education Level
Higher Education11
Postsecondary Education6
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 11 results Save | Export
Ravage, Barbara – Campus Technology, 2012
Colleges and universities are running out of closet space. With the amount of data predicted to grow 800 percent by 2016, higher education faces a desperate race to develop strategies to store and manage the tidal wave of information. Unfortunately, many IT departments, particularly those in the public sector, have flatlining budgets--and no money…
Descriptors: Educational Finance, Financial Support, Computer Storage Devices, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
Wagner, William P.; Pant, Vik – Journal of Information Systems Education, 2010
One of the areas where demand has remained strong for MIS students is in the area of database management. Since the early days, this topic has been a mainstay in the MIS curriculum. Students of database management today typically learn about relational databases, SQL, normalization, and how to design and implement various kinds of database…
Descriptors: College Instruction, Computer Science Education, Information Technology, Business Administration Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Khanna, Pankaj; Basak, P. C. – Turkish Online Journal of Distance Education, 2011
It is proposed to establish an Integrated Distance Education System in India by designing modern technology based information communication network, connecting all its ODL (Open and Distance Learning) institutions to the headquarters of the ODL system in India. The principle roles to be performed by such a system have been discussed; according to…
Descriptors: Foreign Countries, Distance Education, Educational Technology, Cost Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
Schaffer, Greg – Campus Technology, 2007
Managing resource usage and data delivery with virtualization devices is a staple of many of today's data infrastructures. By breaking the traditional direct physical access and inserting an abstraction layer, what one sees is what he/she gets, but the mechanics of delivery may be quite different. The reason for the increase in virtualization…
Descriptors: Higher Education, Computer Networks, Information Technology, Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Allam, Yosef; Tomasko, David L.; Trott, Bruce; Schlosser, Phil; Yang, Yong; Wilson, Tiffany M.; Merrill, John – Chemical Engineering Education, 2008
A micromanufacturing lab-on-a-chip project with a nanotechnology component was introduced as an alternate laboratory in the required first-year engineering curriculum at The Ohio State University. Nanotechnology is introduced in related reading and laboratory tours as well as laboratory activities including a quarter-length design, build, and test…
Descriptors: Science Laboratories, Computer Storage Devices, Biomedicine, Engineering Education
Briggs, Linda L. – Campus Technology, 2006
"I saved my presentation in my personal drive on the server last night, but now I can't find it. It just seems to be gone. Can you get it back?" "It looks like the mail server is corrupted. When was the last backup?" These sorts of questions, whether from faculty, students, or IT staff, can be an IT nightmare, or they can set…
Descriptors: Computer Peripherals, Client Server Architecture, Information Technology, Higher Education
Lum, Lydia – Diverse: Issues in Higher Education, 2006
All over the country, college faculty and administrators are plugging themselves into one of the newest--and hottest--technologies in an effort to better connect with students: podcasting. National studies show that more than 80 percent of college students own at least one device that can download and play recordings, and proponents of podcasting…
Descriptors: Instructional Effectiveness, Intermode Differences, Instructional Material Evaluation, Technology Uses in Education
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
St. George, Art – EDUCAUSE Review, 2007
Today, at the end of 2007, there are evident consolidations in wireless, storage, and virtualization and the path forward seems clearer now than previously. Trends from last year continue strongly, particularly Web 2.0 and the shift to user-driven environments and Internet sites where significant data and video processing is available to those…
Descriptors: Internet, Educational Trends, Information Technology, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration