Publication Date
| In 2026 | 0 |
| Since 2025 | 5 |
| Since 2022 (last 5 years) | 25 |
| Since 2017 (last 10 years) | 53 |
| Since 2007 (last 20 years) | 241 |
Descriptor
| Computer Networks | 941 |
| Information Technology | 941 |
| Higher Education | 348 |
| Telecommunications | 256 |
| Information Networks | 244 |
| Technological Advancement | 198 |
| Internet | 193 |
| Foreign Countries | 175 |
| Educational Technology | 174 |
| Computer Uses in Education | 169 |
| Access to Information | 133 |
| More ▼ | |
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 93 |
| Administrators | 54 |
| Policymakers | 27 |
| Media Staff | 18 |
| Teachers | 12 |
| Researchers | 6 |
| Students | 6 |
| Community | 2 |
Location
| United States | 28 |
| Canada | 21 |
| United Kingdom | 17 |
| Australia | 11 |
| New York | 11 |
| California | 9 |
| Ohio | 9 |
| Indiana | 8 |
| Spain | 7 |
| Finland | 6 |
| Florida | 6 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| ACT Assessment | 1 |
| Fast Response Survey System | 1 |
| Peabody Individual… | 1 |
| Program for International… | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Mohammadi, Hadi – ProQuest LLC, 2014
Use of the Patch Vulnerability Management (PVM) process should be seriously considered for any networked computing system. The PVM process prevents the operating system (OS) and software applications from being attacked due to security vulnerabilities, which lead to system failures and critical data leakage. The purpose of this research is to…
Descriptors: Computer Networks, Computer Software, Computer Security, Prevention
Unintended Consequences: New Materialist Perspectives on Library Technologies and the Digital Record
Manoff, Marlene – portal: Libraries and the Academy, 2013
Digital technology has irrevocably altered the nature of the archive. Drawing on materialist critiques and the evolving field of media archaeology, this essay explores new strategies for understanding the implications of computer networks in libraries. Although a significant portion of the contemporary literature within Library and Information…
Descriptors: Computer Networks, Libraries, Information Technology, Archives
Sukwong, Orathai – ProQuest LLC, 2013
Virtualization enables the ability to consolidate multiple servers on a single physical machine, increasing the infrastructure utilization. Maximizing the ratio of server virtual machines (VMs) to physical machines, namely the consolidation ratio, becomes an important goal toward infrastructure cost saving in a cloud. However, the consolidation…
Descriptors: Information Storage, Scheduling, Internet, Client Server Architecture
Yang, Samuel C.; Winter, Peter – International Journal of Information and Learning Technology, 2015
Purpose: Mobile data traffic globally is increasing rapidly in both enterprise and consumer segments. The purpose of this paper is to identify a new network architecture and opportunity that support ubiquitous mobile work for higher-education institutions. Design/methodology/approach: It reviews existing literature and enabling technologies and…
Descriptors: Higher Education, Decision Making, Cost Effectiveness, Faculty Mobility
Liu, Yucong – ProQuest LLC, 2012
Information Technology (IT) business value research is suggested as fundamental to the contribution of the IS discipline. The IS research community has accumulated a critical mass of IT business value studies, but only limited or mixed results have been found on the direct relationship between IT and firm performance. Extant studies mostly focus…
Descriptors: Information Technology, Business Administration, Computer Networks, Innovation
Chaudhry, Hina – ProQuest LLC, 2013
This study is a part of the smart grid initiative providing electric vehicle charging infrastructure. It is a refueling structure, an energy generating photovoltaic system and charge point electric vehicle charging station. The system will utilize advanced design and technology allowing electricity to flow from the site's normal electric service…
Descriptors: Energy, Motor Vehicles, Computer System Design, Information Technology
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
Gendreau, Audrey – ProQuest LLC, 2014
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…
Descriptors: Computer Simulation, Computer Networks, Costs, Risk
Craig, Scotty D. – Advanced Distributed Learning Initiative, 2021
The dynamic and high-stakes nature of education and training requires reliance on evidence-based practices and policies to make decisions about technology adoption and implementation. In the report, "Science of Learning and Readiness (SoLaR) Recommendation Report: Science of Learning Practices for Distributed Online Environments"…
Descriptors: Science Education, Learning Readiness, Evidence Based Practice, Check Lists
Alsmirat, Mohammad Abdullah – ProQuest LLC, 2013
Video streaming has recently grown dramatically in popularity over the Internet, Cable TV, and wire-less networks. Because of the resource demanding nature of video streaming applications, maximizing resource utilization in any video streaming system is a key factor to increase the scalability and decrease the cost of the system. Resources to…
Descriptors: Video Technology, Internet, Equipment Utilization, Time
Debiec, Piotr; Materka, Andrzej – International Journal of Information and Learning Technology, 2015
Purpose: This paper presents an IT system -- Student Connectivity Module (SCM) -- designed to support administration of student exchange between universities in different countries, developed under the EU seventh Framework Program. The purpose of this paper is to share the acquired knowledge on existing difficulties in mobility management, propose…
Descriptors: Information Technology, Student Mobility, International Educational Exchange, Universities
Ogbah, Enovwor Laura – International Journal of Information and Communication Technology Education, 2014
This study is an assessment of Information Provision Services of Libraries in the 21st century in some selected academic libraries in Delta State. A descriptive survey was adopted in carrying out the research. The questionnaire was the instrument for data collection of which 62 were retrieved. Based on the findings of the study, it was recommended…
Descriptors: Academic Libraries, Questionnaires, Foreign Countries, Librarians
Blakely, Benjamin A. – ProQuest LLC, 2012
The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…
Descriptors: Computer Security, Information Technology, Crime, Crime Prevention
Johnson, Nathan R. – Journal of Technical Writing and Communication, 2014
This article describes protocological rhetoric as a conceptual tool for exploring and changing institutions. Protocological rhetoric is an extension of two lines of thought: Porter, Sullivan, Blythe, Grabill, and Miles's institutional critique and Science & Technology Studies's (STS) concept of information infrastructure. As a result,…
Descriptors: Rhetoric, Case Studies, Educational Change, Change Strategies
Yu, Han – ProQuest LLC, 2012
In this dissertation, several control problems are studied that arise when passive or dissipative systems are interconnected and controlled over a communication network. Since communication networks can impact the systems' stability and performance, there is a need to extend the results on control of passive or dissipative systems to networked…
Descriptors: Information Systems, Information Technology, Network Analysis, Computer Networks

Direct link
Peer reviewed
