NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 46 to 60 of 463 results Save | Export
Schrader, Andrew – School Business Affairs, 2011
On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…
Descriptors: Electronic Mail, School Districts, Information Technology, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Mitchell, Erik – Journal of Web Librarianship, 2011
In mid-April, Amazon EC2 services had a small problem. Apparently, a large swath of its cloud computing environment had such substantial trouble that a number of customers had server issues. A number of high-profile sites, including Reddit, Evite, and Foursquare, went down when Amazon experienced issues in their US East 1a region (Justinb 2011).…
Descriptors: Human Factors Engineering, Computer System Design, Online Systems, Gateway Systems
Pacharintanakul, Peera – ProQuest LLC, 2010
As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…
Descriptors: Computer System Design, Internet, Efficiency, Computer Security
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Peer reviewed Peer reviewed
Direct linkDirect link
Tambouris, Efthimios; Zotou, Maria; Kalampokis, Evangelos; Tarabanis, Konstantinos – International Journal of Training and Development, 2012
Enterprise architecture (EA) implementation refers to a set of activities ultimately aiming to align business objectives with information technology infrastructure in an organization. EA implementation is a multidisciplinary, complicated and endless process, hence, calls for adequate education and training programs that will build highly skilled…
Descriptors: Foreign Countries, Business Administration, Program Content, Educational Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Huang, Albert – Journal of Educational Technology Systems, 2012
Information technology (IT) is an essential part of modern education. The roles and contributions of technology to education have been thoroughly documented in academic and professional literature. Despite the benefits, the use of educational technology systems (ETS) also creates a significant impact on the environment, primarily due to energy…
Descriptors: Energy Conservation, Educational Technology, Systems Development, Sustainable Development
Kim, Jaewook – ProQuest LLC, 2011
One of the most critical steps to integrating heterogeneous e-Business applications using different XML schemas is schema matching, which is known to be costly and error-prone. Many automatic schema matching approaches have been proposed, but the challenge is still daunting because of the complexity of schemas and immaturity of technologies in…
Descriptors: Information Technology, Information Retrieval, Programming Languages, Programming
Flaherty, William – School Business Affairs, 2011
Spotsylvania County Public Schools (SCPS) in Virginia uses a document-imaging solution that leverages the features of a multifunction printer (MFP). An MFP is a printer, scanner, fax machine, and copier all rolled into one. It can scan a document and email it all in one easy step. Software is available that allows the MFP to scan bubble sheets and…
Descriptors: Computer System Design, Databases, Computer Uses in Education, School Districts
Sung, Ji Eun – ProQuest LLC, 2012
New products continue to launch quickly but many of them are converged products. The "new product" is not a completely new thing to consumers and the basic features stay the same. As a result, the added functions or fancy design can't explain why consumers adopt the new media. Past studies have examined perceptions of innovations or user…
Descriptors: Program Effectiveness, Innovation, Context Effect, Intention
Jonnalagadda, Siddhartha – ProQuest LLC, 2011
In the current millennium, extensive use of computers and the internet caused an exponential increase in information. Few research areas are as important as information extraction, which primarily involves extracting concepts and the relations between them from free text. Limitations in the size of training data, lack of lexicons and lack of…
Descriptors: Sentences, Semantics, Biomedicine, Information Retrieval
Flaherty, William – School Business Affairs, 2011
Technology is a critical component in the success of any high-functioning school district, thus it is important that education leaders should examine it closely. Simply put, the purpose of a technology audit is to assess the effectiveness of the technology for administrative or instructional use. Rogers Public Schools in Rogers, Arkansas, recently…
Descriptors: Educational Technology, Technology Integration, Scoring Rubrics, Surveys
Shaw, Bilal A. – ProQuest LLC, 2010
Quantum error-correcting codes have been the cornerstone of research in quantum information science (QIS) for more than a decade. Without their conception, quantum computers would be a footnote in the history of science. When researchers embraced the idea that we live in a world where the effects of a noisy environment cannot completely be…
Descriptors: Information Science, Programming, Information Theory, Computer Science
Pearring, John – American School & University, 2012
The education sector remains abuzz with cost-cutting expectations despite pressures to increase services. Automation of costly manual tasks could save funds for many of these institutions, specifically in data protection. The IT departments of schools and universities can take advantage of a proven cost-savings opportunity in data protection that…
Descriptors: Educational Technology, Automation, Technological Advancement, Computer Security
Joyner, Donald Thomas – ProQuest LLC, 2011
The granting of credit is a necessary risk of doing business. If companies only accepted cash, sales would be negatively impacted. In a perfect world, all consumers would pay their bills when they become due. However, the fact is that some consumers do default on debt. Companies are willing to accept default risk because the value of defaults does…
Descriptors: Brain, Computation, Debt (Financial), Comparative Analysis
Fredette, Michelle – Campus Technology, 2011
In April, Asia officially ran out of Internet Protocol (IP) version 4 addresses--the computer equivalent of running out of telephone numbers. Over the next couple of years, the rest of the world will also run dry. Yet, unlike the Y2K bug that had some people convinced the sky would fall, this particular problem is generating little more than tired…
Descriptors: Internet, Educational Technology, Information Technology, Performance Technology
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  31