Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Networks | 16 |
Guidelines | 16 |
Information Technology | 16 |
Higher Education | 7 |
Information Networks | 4 |
Telecommunications | 4 |
Computer Software | 3 |
Computer System Design | 3 |
Government Role | 3 |
Information Systems | 3 |
Policy Formation | 3 |
More ▼ |
Source
Author
Adams, Ian | 1 |
Bender, David R. | 1 |
Callihan, Steven E. | 1 |
Chretien, Wendy | 1 |
Cohn, John M. | 1 |
Fiels, Keith Michael | 1 |
Gallagher, Michael | 1 |
Grochow, Jerrold M. | 1 |
Hawkins, Brian L. | 1 |
Johnson, Kenneth T. | 1 |
Kelsey, Ann L. | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Audience
Practitioners | 2 |
Media Staff | 1 |
Teachers | 1 |
Location
Congo | 1 |
Texas (Dallas) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Gallagher, Michael – Discourse: Studies in the Cultural Politics of Education, 2020
This paper concerns children's relations with the geological aspects of digital media technologies. Using ideas from media theory, I develop a new conceptual framework for childhood studies research on digital media that goes beyond the dominant focus on children's use of technology. I argue that studies of use would benefit from being linked up…
Descriptors: Geology, Information Technology, Climate, Local Issues
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Grochow, Jerrold M. – EDUCAUSE, 2014
Just as maintaining a healthy infrastructure of water delivery and roads is essential to the functioning of cities and towns, maintaining a healthy infrastructure of information technology is essential to the functioning of universities. Deterioration in IT infrastructure can lead to deterioration in research, teaching, and administration. Given…
Descriptors: Information Technology, Guidelines, Universities, Information Systems
Yang, Samuel C.; Winter, Peter – International Journal of Information and Learning Technology, 2015
Purpose: Mobile data traffic globally is increasing rapidly in both enterprise and consumer segments. The purpose of this paper is to identify a new network architecture and opportunity that support ubiquitous mobile work for higher-education institutions. Design/methodology/approach: It reviews existing literature and enabling technologies and…
Descriptors: Higher Education, Decision Making, Cost Effectiveness, Faculty Mobility
Chretien, Wendy – Campus Technology, 2007
The word "architect" calls to mind a designer of buildings. An architect's job is to develop a structure to fit the client's needs, some of which are conflicting (or seem to be). When it comes to designing a campus network, IT infrastructure architects have a similar function. Like a building architect, an IT architect must develop a…
Descriptors: Information Technology, Educational Facilities Design, Technology Planning, Computer Networks
Callihan, Steven E. – Internet World, 1996
Offers advice for choosing an Internet provider: consider the amount of time, effort, and expertise one has, coupled with the complexity of the Web page, which impact price and choice of provider; and question providers about server speed, ports, architecture, traffic levels, fee structures, and registration of domain names. Lists 33 Web presence…
Descriptors: Computer Networks, Computer Peripherals, Costs, Guidelines
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security
CAUSE/EFFECT, 1988
Guidelines, jointly developed and endorsed by CAUSE and EDUCOM--two key organizations in the field of higher education information technology--are presented. They were created to provide institutions and regional accrediting associations with evaluation guidelines for information technology resources to use as a reference when developing their own…
Descriptors: Accreditation (Institutions), Computer Networks, Computer Software, Computers
Hawkins, Brian L. – Academic Computing, 1989
Describes the development and current status of a campus-wide computer network at Brown University. Topics discussed include the principles that guided network development; services available through the network; current structure of the network; and university support for the network. (CLB)
Descriptors: Centralization, Computer Networks, Databases, Decentralization
Perone, Karen – Computers in Libraries, 1996
Provides an introduction to CD-ROM networking. Highlights include LAN (local area network) architectures for CD-ROM networks, peer-to-peer networks, shared file and dedicated file servers, commercial software/vendor solutions, problems, multiple hardware platforms, and multimedia. Six figures illustrate network architectures and a sidebar contains…
Descriptors: Computer Networks, Computer Peripherals, Guidelines, Information Technology
Adams, Ian – Information Management & Technology, 1997
Presents seven guidelines for launching a company intranet: (1) don't promise what can't be delivered; (2) be clear about who owns what; (3) be demand-led; (4) invest time in practical demonstrations; (5) avoid jargon; (6) have adequate resources to support colleagues; and (7) make intranet benefits relevant to colleagues. (AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Corporations, Guidelines
Bender, David R.; Morton-Schwalb, Sandy – 1993
Although it has been widely recognized that the United States has moved into the Information Age, the federal government has been slow to establish a single mechanism to coordinate the many facets of the Information Age. The Special Libraries Association (SLA) proposes the establishment of a National Academy of Information to ensure government and…
Descriptors: Access to Information, Computer Networks, Delivery Systems, Federal Government
Kranich, Nancy C. – Library Journal, 1993
Discussion of the proposed National Information Infrastructure (NII) focuses on the need for the NII to assist educational institutions, libraries, governments, and nonprofit organizations in carrying out their responsibilities for public access to information. New communications technologies are discussed; the role of librarians is examined; and…
Descriptors: Access to Information, Computer Networks, Futures (of Society), Government Role

Alberta Dept. of Education, Barrhead. Alberta Distance Learning Centre. – 1991
Due to its sparse, rural population and long distances, Alberta province (Canada) has been providing education at a distance since 1923 for students in grades 1 through 12 and adults who wish to complete their high school education through correspondence. This handbook is published as a resource for Alberta schools that offer distance learning…
Descriptors: Administrator Role, Adult Education, Computer Managed Instruction, Computer Networks
Cohn, John M.; Kelsey, Ann L.; Fiels, Keith Michael – 1997
This manual is written for any library planning to introduce a new or replacement automated system. It focuses on planning for an integrated system that computerizes a multiplicity of library functions using one common database. This second edition contains a new section on the preparation of a technology strategic plan, a section on developing…
Descriptors: Bibliographic Databases, Cataloging, Computer Networks, Consultants
Previous Page | Next Page ยป
Pages: 1 | 2