NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)1
Since 2006 (last 20 years)14
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 50 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ogbah, Enovwor Laura – International Journal of Information and Communication Technology Education, 2014
This study is an assessment of Information Provision Services of Libraries in the 21st century in some selected academic libraries in Delta State. A descriptive survey was adopted in carrying out the research. The questionnaire was the instrument for data collection of which 62 were retrieved. Based on the findings of the study, it was recommended…
Descriptors: Academic Libraries, Questionnaires, Foreign Countries, Librarians
Peer reviewed Peer reviewed
Direct linkDirect link
Park, Young C. – Journal of International Education Research, 2014
The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…
Descriptors: Electronic Learning, Educational Technology, Handheld Devices, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Valdés Aguirre, Benjamín; Ramírez Uresti, Jorge A.; du Boulay, Benedict – International Journal of Artificial Intelligence in Education, 2016
Sharing user information between systems is an area of interest for every field involving personalization. Recommender Systems are more advanced in this aspect than Intelligent Tutoring Systems (ITSs) and Intelligent Learning Environments (ILEs). A reason for this is that the user models of Intelligent Tutoring Systems and Intelligent Learning…
Descriptors: Intelligent Tutoring Systems, Models, Open Source Technology, Computers
Reifers, Andrew – ProQuest LLC, 2010
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Descriptors: Visualization, Administrators, Computer Networks, Information Technology
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Johnson, Doug – Learning & Leading with Technology, 2010
Web-based applications offer teachers, students, and school districts a convenient way to accomplish a wide range of tasks, from accounting to word processing, for free. Cloud computing has the potential to offer staff and students better services at a lower cost than the technology deployment models they're using now. Saving money and improving…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Peer reviewed Peer reviewed
Direct linkDirect link
Calamari, Cal – Teacher Librarian, 2009
As educational and research needs have changed, libraries have changed as well. They must meet ever-increasing demand for access to online media, subscriptions to archives, video, audio, and other content. The way a user/patron accesses this information has also changed. Gone are the days of a few hardwired desktops or computer carts. While…
Descriptors: Library Personnel, Research Needs, Academic Libraries, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Diffin, Jennifer; Chirombo, Fanuel; Nangle, Dennis; de Jong, Mark – Journal of Web Librarianship, 2010
This article explains how the document management team (circulation and interlibrary loan) at the University of Maryland University College implemented Microsoft's SharePoint product to create a central hub for online collaboration, communication, and storage. Enhancing the team's efficiency, organization, and cooperation was the primary goal.…
Descriptors: Distance Education, Cooperation, Educational Technology, Library Services
Peer reviewed Peer reviewed
Direct linkDirect link
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Peer reviewed Peer reviewed
Direct linkDirect link
Wheeler, Brad; Waggener, Shelton – EDUCAUSE Review, 2009
The concept of today's cloud computing may date back to 1961, when John McCarthy, retired Stanford professor and Turing Award winner, delivered a speech at MIT's Centennial. In that speech, he predicted that in the future, computing would become a "public utility." Yet for colleges and universities, the recent growth of pervasive, very high speed…
Descriptors: Higher Education, Internet, Computer Software, Computers
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Malinconico, S. Michael – Library Journal, 1992
Describes some of the new roles and challenges librarians face with the development of new information technologies such as computer networks and document delivery systems. It is argued that librarians will increasingly fill the role of information intermediary as patrons take advantage of end-user systems. (12 references) (LAE)
Descriptors: Change Strategies, Computer Networks, Information Technology, Library Role
Peer reviewed Peer reviewed
Holmes-Wong, Deborah – Reference Librarian, 1999
Discussion of library reference services and the conflict between richness (complexity) of services and the reach (number of users that can be served) focuses on information technology that is used in electronic commerce and available on the Internet. Discusses changing roles of libraries and networked information environments. (Author/LRW)
Descriptors: Computer Networks, Information Networks, Information Technology, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Gonzalez-Castano, F. J.; Garcia-Reinoso, J.; Gil-Castineira, F.; Costa-Montenegro, E.; Pousada-Carballo, J. M. – Computers and Education, 2005
In this paper, we propose an auxiliary "location network", to support user-independent context-awareness in educational data networks; for example, to help visitors in a museum. We assume that, in such scenarios, there exist "service servers" that need to be aware of user location in real-time. Specifically, we propose the implementation of a…
Descriptors: Computer Networks, Information Technology, Telecommunications, Users (Information)
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4