Publication Date
| In 2026 | 0 |
| Since 2025 | 5 |
| Since 2022 (last 5 years) | 25 |
| Since 2017 (last 10 years) | 53 |
| Since 2007 (last 20 years) | 241 |
Descriptor
| Computer Networks | 941 |
| Information Technology | 941 |
| Higher Education | 348 |
| Telecommunications | 256 |
| Information Networks | 244 |
| Technological Advancement | 198 |
| Internet | 193 |
| Foreign Countries | 175 |
| Educational Technology | 174 |
| Computer Uses in Education | 169 |
| Access to Information | 133 |
| More ▼ | |
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 93 |
| Administrators | 54 |
| Policymakers | 27 |
| Media Staff | 18 |
| Teachers | 12 |
| Researchers | 6 |
| Students | 6 |
| Community | 2 |
Location
| United States | 28 |
| Canada | 21 |
| United Kingdom | 17 |
| Australia | 11 |
| New York | 11 |
| California | 9 |
| Ohio | 9 |
| Indiana | 8 |
| Spain | 7 |
| Finland | 6 |
| Florida | 6 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| ACT Assessment | 1 |
| Fast Response Survey System | 1 |
| Peabody Individual… | 1 |
| Program for International… | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Agee, Anne; Rowe, Theresa; Woo, Melissa; Woods, David – EDUCAUSE Quarterly, 2010
A 2006 ECAR study defined cyberinfrastructure as the coordinated aggregate of "hardware, software, communications, services, facilities, and personnel that enable researchers to conduct advanced computational, collaborative, and data-intensive research." While cyberinfrastructure was initially seen as support for scientific and…
Descriptors: Research Needs, Research and Development, Research Universities, Computer Uses in Education
Odagiri, Kazuya; Yaegashi, Rihito; Tadauchi, Masaharu; Ishii, Naohiro – Interactive Technology and Smart Education, 2007
Purpose: The purpose of this paper is to propose and examine the new user support in university network. Design/methodology/approach: The new user support is realized by use of DACS (Destination Addressing Control System) Scheme which manages a whole network system through communication control on a client computer. This DACS Scheme has been…
Descriptors: Library Networks, Universities, Information Technology, Computers
Lawrence, Peg – Computers in Libraries, 2009
In these days of distance learners, virtual libraries, and electronic information, no library can be without some way of providing remote access to affiliated users, whether they are distance students, online students, or local students and faculty members working from home. Libraries subscribe to any number of electronic resources and journals,…
Descriptors: Electronic Publishing, Electronic Equipment, Electronic Libraries, Information Technology
Moller, Klaus – Campus-Wide Information Systems, 2007
Purpose: Grid computing has often been heralded as the next logical step after the worldwide web. Users of grids can access dynamic resources such as computer storage and use the computing resources of computers under the umbrella of a virtual organisation. Although grid computing is often compared to the worldwide web, it is vastly more complex…
Descriptors: Computer Security, Computer Networks, Foreign Countries, Internet
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Khanna, Pankaj; Basak, P. C. – Turkish Online Journal of Distance Education, 2011
It is proposed to establish an Integrated Distance Education System in India by designing modern technology based information communication network, connecting all its ODL (Open and Distance Learning) institutions to the headquarters of the ODL system in India. The principle roles to be performed by such a system have been discussed; according to…
Descriptors: Foreign Countries, Distance Education, Educational Technology, Cost Effectiveness
Kuhn, Robert M.; Brookes, Kimberly H.; Bellos, Nephellie – EDUCAUSE Quarterly, 2008
Discussions with a central IT organization about integration with existing systems on campus, support costs for the new implementation, and total cost of ownership frequently become adversarial. Simmons College, a small college in Boston with an enrollment of approximately 1,900 undergraduate and 2,800 graduate students, reframed these issues in…
Descriptors: Small Colleges, Educational Technology, Information Technology, School Policy
Wheeler, Brad; Waggener, Shelton – EDUCAUSE Review, 2009
The concept of today's cloud computing may date back to 1961, when John McCarthy, retired Stanford professor and Turing Award winner, delivered a speech at MIT's Centennial. In that speech, he predicted that in the future, computing would become a "public utility." Yet for colleges and universities, the recent growth of pervasive, very high speed…
Descriptors: Higher Education, Internet, Computer Software, Computers
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
Oxley, Alan – EDUCAUSE Quarterly, 2008
How do IT managers protect their staff from working excessively long hours? To begin addressing the problem of overworked staff, IT managers should educate themselves about legal regulations governing time spent at work. Failure to meet such requirements can expose a university to potentially expensive and embarrassing lawsuits. In this article,…
Descriptors: Legal Problems, Information Technology, Working Hours, Computer Networks
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Dumitrascu, Eugen; Popa, Marius – Journal of Applied Quantitative Methods, 2007
In this paper, we present the characteristic features of distributed applications. We also enumerate the modalities of optimizing them and the factors that influence the quality of distributed applications, as well as the way they are affected by the optimization processes. Moreover, we enumerate the quality characteristics of distributed…
Descriptors: Computer Oriented Programs, Computer Networks, Improvement, Computer Software
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Johnson, L.; Smith, R.; Levine, A.; Haywood, K. – New Media Consortium, 2010
The "Horizon Report" series is the most visible outcome of the New Media Consortium's Horizon Project, an ongoing research effort established in 2002 that identifies and describes emerging technologies likely to have a large impact on teaching, learning, research, or creative expression within education around the globe. This volume, the "2010…
Descriptors: Advisory Committees, Elementary Secondary Education, Creative Activities, Global Approach
Federal Communications Commission, 2010
In early 2009, Congress directed the Federal Communications Commission (FCC) to develop a National Broadband Plan to ensure every American has "access to broadband capability." Congress also required that this plan include a detailed strategy for achieving affordability and maximizing use of broadband to advance "consumer welfare, civic…
Descriptors: Telecommunications, Computer Networks, Information Technology, Federal Programs

Peer reviewed
Direct link
