Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 7 |
Descriptor
Client Server Architecture | 7 |
Computer Security | 7 |
Information Technology | 7 |
Computer Software | 6 |
Information Management | 3 |
Internet | 3 |
Programming | 3 |
Automation | 2 |
Barriers | 2 |
Business | 2 |
Business Administration… | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
Campus Technology | 1 |
European Journal of… | 1 |
Information Systems Education… | 1 |
International Association for… | 1 |
Journal of Information… | 1 |
Author
Bonneau, Thomas | 1 |
Chow, Chi Yin | 1 |
Hong, Soongoo | 1 |
Kam, Hwee-Joo | 1 |
Katerattanakul, Pairin | 1 |
Lee, James J. | 1 |
Marchant, Robert L. | 1 |
Panettieri, Joseph C. | 1 |
Sextos, Anastasios G. | 1 |
Sundareswaran, Smitha | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 2 |
Collected Works - Proceedings | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 1 |
Audience
Location
Greece | 2 |
Alaska | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
California | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sundareswaran, Smitha – ProQuest LLC, 2014
Much like its meteorological counterpart, "Cloud Computing" is an amorphous agglomeration of entities. It is amorphous in that the exact layout of the servers, the load balancers and their functions are neither known nor fixed. Its an agglomerate in that multiple service providers and vendors often coordinate to form a multitenant system…
Descriptors: Information Storage, Internet, Information Management, Adoption (Ideas)
Marchant, Robert L.; Bonneau, Thomas – Information Systems Education Journal, 2013
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
Descriptors: Computer Networks, Computer Security, Client Server Architecture, Computer Interfaces
Chow, Chi Yin – ProQuest LLC, 2010
Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…
Descriptors: Reaction Time, Privacy, Geographic Information Systems, Geographic Location
Sextos, Anastasios G. – European Journal of Engineering Education, 2014
This paper presents the structure of an undergraduate course entitled "programming techniques and the use of specialised software in structural engineering" which is offered to the fifth (final) year students of the Civil Engineering Department of Aristotle University Thessaloniki in Greece. The aim of this course is to demonstrate the…
Descriptors: Foreign Countries, Undergraduate Students, Undergraduate Study, Civil Engineering
Katerattanakul, Pairin; Kam, Hwee-Joo; Lee, James J.; Hong, Soongoo – Journal of Information Systems Education, 2009
The MetaFrame system migration project at WorldPharma, while driven by merger and acquisition, had faced complexities caused by both technical challenges and organizational issues in the climate of uncertainties. However, WorldPharma still insisted on instigating this post-merger system migration project. This project served to (1) consolidate the…
Descriptors: Case Method (Teaching Technique), Business Administration Education, Class Activities, Computer Science Education
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers