NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)14
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 107 results Save | Export
Sheng, Bo – ProQuest LLC, 2010
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
Descriptors: Influence of Technology, Time, Efficiency, Information Technology
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Tirgari, Vesal – ProQuest LLC, 2010
The phenomenological study explored the lived experiences and perceptions of a purposive sample of 20 IT professionals (managers, engineers, administrators, and analysts) in the state of Virginia, Texas, and Washington DC. The focus of this research study was to learn the perceptions of IT professionals who are or once were in a decision-making…
Descriptors: Information Technology, Professional Personnel, Attitudes, Phenomenology
Peer reviewed Peer reviewed
Direct linkDirect link
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Schaffer, Greg – Campus Technology, 2007
Managing resource usage and data delivery with virtualization devices is a staple of many of today's data infrastructures. By breaking the traditional direct physical access and inserting an abstraction layer, what one sees is what he/she gets, but the mechanics of delivery may be quite different. The reason for the increase in virtualization…
Descriptors: Higher Education, Computer Networks, Information Technology, Methods
O'Hanlon, Charlene – Campus Technology, 2007
Traditionally, the high-performance computing (HPC) systems used to conduct research at universities have amounted to silos of technology scattered across the campus and falling under the purview of the researchers themselves. This article reports that a growing number of universities are now taking over the management of those systems and…
Descriptors: Computers, Researchers, Information Management, Research Universities
Peer reviewed Peer reviewed
Direct linkDirect link
Hughes, Joy R.; Beer, Robert – EDUCAUSE Quarterly, 2007
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Descriptors: Check Lists, Higher Education, Certification, Guidance
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
CAUSE, Boulder, CO. – 1991
Seven papers from the 1990 CAUSE conference's Track IV, Policy and Standards are presented. Topics addressed in this track include data administration, computing access, involvement of constituencies in policy making and enforcement, and institutional standards for departmental systems. Papers and their authors are as follows: "Evolution of a…
Descriptors: Case Studies, College Administration, Computer Networks, Documentation
CAUSE, Boulder, CO. – 1991
Six papers from the 1990 CAUSE conference's Track V, Managing Telecommunications and Networking are presented. Topics address such subjects as network funding, support services, access to networks, improvement of instruction through networks, and image transmission. Papers and their authors are as follows: "What's New in…
Descriptors: Access to Computers, College Administration, Computer Networks, Dormitories
Peer reviewed Peer reviewed
Direct linkDirect link
Fortino, Giancarlo; Russo, Wilma; Palau, Carlos E. – Interactive Technology and Smart Education, 2006
In this paper we present a CDN-based system, namely the COMODIN system, which is a media on-demand platform for synchronous cooperative work which supports an explicitly-formed cooperative group of distributed users with the following integrated functionalities: request of an archived multimedia session, sharing of its playback, and collaboration…
Descriptors: Cooperative Learning, Synchronous Communication, Video Technology, Information Technology
Conway, James E. – CAUSE/EFFECT, 1995
The Harvard University (Massachusetts) central computing and development offices collaborated to develop a prototype client/server fund-raising system that allows personnel to easily and quickly access and share prospect information. Its successful development is attributed to use of some traditional project management principles and practices.…
Descriptors: Access to Information, College Administration, Computer Networks, Donors
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8