Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 15 |
Descriptor
Computer System Design | 17 |
Data | 17 |
Information Technology | 17 |
Computer Software | 8 |
Computer Uses in Education | 7 |
Databases | 5 |
Programming | 5 |
Computer Networks | 4 |
Computer Security | 4 |
Data Analysis | 4 |
Information Management | 4 |
More ▼ |
Source
Author
Adler, Prudence | 1 |
Bennett, Cedric | 1 |
Boxwell, Stephen A. | 1 |
Chan, Lawrence | 1 |
Chow, Meyrick | 1 |
Day, David J. | 1 |
Drachsler, Hendrik | 1 |
Duval, Erik | 1 |
Fore, Julie A. | 1 |
Friedlander, Amy | 1 |
Grayson, Katherine | 1 |
More ▼ |
Publication Type
Journal Articles | 11 |
Reports - Descriptive | 8 |
Dissertations/Theses -… | 5 |
Reports - Evaluative | 3 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 7 |
Elementary Secondary Education | 5 |
Audience
Media Staff | 1 |
Practitioners | 1 |
Location
Pennsylvania | 2 |
Australia | 1 |
European Union | 1 |
Georgia | 1 |
Illinois | 1 |
Indiana | 1 |
Massachusetts | 1 |
New Mexico | 1 |
United Kingdom | 1 |
Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Loh, Matthew – ProQuest LLC, 2013
The scalability of CMOS technology has driven computation into a diverse range of applications across the power consumption, performance and size spectra. Communication is a necessary adjunct to computation, and whether this is to push data from node-to-node in a high-performance computing cluster or from the receiver of wireless link to a neural…
Descriptors: Power Technology, Scaling, Computer Science, Computation
Boxwell, Stephen A. – ProQuest LLC, 2011
Treebanks are a necessary prerequisite for many NLP tasks, including, but not limited to, semantic role labeling. For many languages, however, treebanks are either nonexistent or too small to be useful. Time-critical applications may require rapid deployment of natural language software for a new critical language--much faster than the development…
Descriptors: Natural Language Processing, Training, Programming, Computer System Design
Talukdar, Partha Pratim – ProQuest LLC, 2010
The variety and complexity of potentially-related data resources available for querying--webpages, databases, data warehouses--has been growing ever more rapidly. There is a growing need to pose integrative queries "across" multiple such sources, exploiting foreign keys and other means of interlinking data to merge information from diverse…
Descriptors: Information Needs, Databases, Data, Data Analysis
Verbert, Katrien; Manouselis, Nikos; Drachsler, Hendrik; Duval, Erik – Educational Technology & Society, 2012
In various research areas, the availability of open datasets is considered as key for research and application purposes. These datasets are used as benchmarks to develop new algorithms and to compare them to other algorithms in given settings. Finding such available datasets for experimentation can be a challenging task in technology enhanced…
Descriptors: Foreign Countries, Computer Uses in Education, Information Technology, Open Source Technology
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Mowafi, Yaser Abdallah – ProQuest LLC, 2009
Existing research on context and context awareness has broadly focused on the technical aspects of context acquisition and interpretation of users' surroundings, also called physical or sensor-based context. Such an approach has lacked from reconciling the perception of real-world context exhibited by humans, also known as user context, and…
Descriptors: Decision Support Systems, Computer System Design, Computer Mediated Communication, Data
Grayson, Katherine – Campus Technology, 2010
Ever since the first customer relationship management (CRM) tools found their way onto North American campuses around 2002, higher education administrators have cringed at the mention of the word "customer," preferring to substitute "constituent" for the more sales-driven term. Yet, with competition for qualified candidates…
Descriptors: Outreach Programs, Student Personnel Services, School Holding Power, Learner Engagement
Yares, Ali Chava Kaufman – ProQuest LLC, 2010
Information is everywhere and finding the best method to manage it is a problem that all types of organizations have to deal with. Schools use Student Information Systems (SIS) to manage Student Data, Financial Information, Development, Human Resources, Admission, Financial Aid, Enrollment, Scheduling, and Health Information. A survey of 107…
Descriptors: Private Schools, Education, Information Systems, Databases
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
Chow, Meyrick; Chan, Lawrence – Computers & Education, 2010
Information technology (IT) has the potential to improve the clinical learning environment. The extent to which IT enhances or detracts from healthcare professionals' role performance can be expected to affect both student learning and patient outcomes. This study evaluated nursing students' satisfaction with a novel compartmental Picture…
Descriptors: Nursing Students, Nursing Education, Visualization, Biomedicine
Waters, John K. – T.H.E. Journal, 2008
Data integration is one of the single most challenging tasks any district can face. Fortunately for school districts throughout the country with data scattered in disparate systems, an open specification known as the Schools Interoperability Framework (SIF) is mitigating that challenge. SIF has emerged as a cornerstone of K-12 data warehousing,…
Descriptors: Elementary Secondary Education, Computer Software, School Districts, Educational Cooperation
King, Michael A. – Journal of Information Technology Education, 2009
Business intelligence derived from data warehousing and data mining has become one of the most strategic management tools today, providing organizations with long-term competitive advantages. Business school curriculums and popular database textbooks cover data warehousing, but the examples and problem sets typically are small and unrealistic. The…
Descriptors: Strategic Planning, Problem Sets, Corporations, Statistics

Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Hacker, Thomas J.; Wheeler, Bradley C. – EDUCAUSE Quarterly, 2007
The commoditization of low-cost hardware has enabled even modest-sized laboratories and research projects to own their own "supercomputers." The authors argue that this local solution undermines rather than amplifies the research potential of scholars. CIOs, provosts, and research technologists should consider carefully an overall…
Descriptors: Laboratories, Computers, Information Technology, Technology Planning
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Previous Page | Next Page ยป
Pages: 1 | 2