NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Tappert, Charles C.; Agerwala, Tilak – Association Supporting Computer Users in Education, 2019
This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life cycle. The emerging information technologies of current interest -- Artificial Intelligence and related areas, Collective Human-Computer Intelligence,…
Descriptors: Graduate Study, Information Technology, Artificial Intelligence, Quantum Mechanics
Pazdrowski, Tomasz – ProQuest LLC, 2013
Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…
Descriptors: Innovation, Resistance to Change, Internet, Adoption (Ideas)
Villano, Matt – Campus Technology, 2010
If a school is seeking to incorporate more collaborative approaches to teaching and learning, the design of the learning environment--whether it's a classroom or a more informal space--can be a critical factor in making this transformative move. Technology, in particular, can play a pivotal role in enabling students to work effectively in teams…
Descriptors: Cooperative Learning, Teacher Collaboration, Educational Facilities Improvement, Educational Facilities Planning
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Panettieri, Joseph C. – T.H.E. Journal, 2006
The wireless bandwagon is rolling across Mississippi, picking up a fresh load of converts and turning calamity into opportunity. Traditional wired school networks, many of which unraveled during Hurricane Katrina, are giving way to advanced wireless mesh networks that frequently include voice-over-IP (VoIP) capabilities. Vendor funding is helping…
Descriptors: Computer Networks, Internet, Telecommunications, Computer Mediated Communication
Swanson, Josephine A.; Mead, June P.; Haugan, Heidi L. – 1998
A New York State Cornell Cooperative Extension project for children, youth, and families is implementing electronic connectivity or Internet access to support the development of computer literacy among staff and program participants and to promote positive program outcomes in communities at risk. Reducing Risks and Increasing Capacity (RRIC) is a…
Descriptors: Community Programs, Computer Literacy, Computer Mediated Communication, Computer Networks