NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Kirsch, Jonathan – ProQuest LLC, 2010
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Descriptors: Computer Networks, Computer System Design, Computer Software, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Helfer, Joe – Searcher, 1997
Analyzes whether push technology is a threat or opportunity for online searchers. Outlines key functions of push technology products and defines key technology terms. Illustrates how the role of the online searcher changes with push technology. (AEF)
Descriptors: Computer Networks, Computer Software Evaluation, Information Networks, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Narasimhan, V. Lakshmi; Zhao, Shuxin; Liang, Hailong; Zhang, Shuangyi – Journal of Information Technology Education, 2006
This paper presents an interactive educational environment for use over both "in situ" and distance-based modalities of teaching. Several technological issues relating to the design and development of the distributed virtual learning environment have also been raised. The PROVIDE framework proposed in this paper is a seamless distributed…
Descriptors: Distance Education, Educational Environment, Teaching Methods, Online Systems
Ezekiel, Aaron B. – 1995
At the University of New Mexico, stakeholders from the Computer and Information Resources and Technology (CIRT) department, Financial Systems, the Health Sciences Center, and the General Libraries, were involved in deciding on the goals of a project to replace Telnet with a suite of network middleware and productivity software on campus computer…
Descriptors: Automation, Computer Centers, Computer Interfaces, Computer Networks
New York State Education Dept., Albany. – 1991
This manual is intended to provide directors of funded programs and teachers with an awareness of a wide range of technology services, programs, and applications for improving the quality and effectiveness of instructional support services in New York State schools. The first of nine chapters contains two papers: "Technology Support for…
Descriptors: Computer Networks, Computer Software Evaluation, Computer Software Selection, Educational Improvement