NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 31 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
K. Kavitha; V. P. Joshith – Journal of Pedagogical Research, 2024
Artificial intelligence (AI) technologies continue to revolutionize various sectors, including their incorporation into education, particularly in K-12 science education, which has become evidently significant. This paper presents a bibliometric analysis and systematic review that examines the incorporation of AI technologies in K-12 science…
Descriptors: Artificial Intelligence, Science Education, Elementary School Science, Secondary School Science
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Turkle, Sherry – Continuing Higher Education Review, 2011
The author has been a witness to the birth of the personal computer culture, with its intense one-on-one relationships with machines, and then to the development of the networked culture, with people using the computer to communicate with each other. In her most recent work on the revolutions in social networking and sociable robotics, she sees a…
Descriptors: Intimacy, Computer Networks, Social Networks, Computers
Ireh, Maduakolam – School Business Affairs, 2010
School districts need adequate financial resources to purchase hardware and software, wire their buildings to network computers and other information and communication devices, and connect to the Internet to provide students, teachers, and other school personnel with adequate access to technology. Computers and other peripherals, particularly,…
Descriptors: Purchasing, Computer Software, Educational Technology, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Fletcher, Geoffrey H. – T.H.E. Journal, 2010
This article features the new Framework of Essential Skills of the K-12 CTO of the Consortium for School Networking (CoSN). This latest, version 2.0 iteration of the skills framework builds upon work the organization did earlier this decade. This time CoSN, a professional association for district technology leaders, reached out to a variety of…
Descriptors: Professional Associations, Educational Environment, Computer Networks, Skill Development
Yousif, Wael K. – ProQuest LLC, 2010
This causal and correlational study was designed to extend the Technology Acceptance Model (TAM) and to test its applicability to Valencia Community College (VCC) Engineering and Technology students as the target user group when investigating the factors influencing their decision to adopt and to utilize VMware as the target technology. In…
Descriptors: Employment Level, Self Efficacy, Academic Achievement, Intention
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Duhainy, Robert – ProQuest LLC, 2010
The use of radio frequency identification (RFID) technology is increasingly common. Its use for specific applications has been mandated by a number of major retailers, as well as by the U.S. government; however, core RFID technologies and networks lack consistent approaches to maximize the efficiency and security of RFID applications. The purpose…
Descriptors: Patients, Social Change, Internet, Technology
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Peer reviewed Peer reviewed
Jia, Peijun – Community & Junior College Libraries, 2003
Discusses how useful desktop conferencing has become in library services. Describes how real-time conference tools are convenient, efficient, cost-effective, and beneficial for those who are not able to come to the library. Presents a guide to current guide for conference tools for PC and Mac OS. (ontains 8 references.)(AUTH/MZ)
Descriptors: Community Colleges, Computer Centers, Computer Networks, Computers
Eisenberg, Mike – Library Journal, 2008
The Web 2.0 "buzz" starts with new technologies such as virtual worlds, cell phones and handheld devices that offer 24/7 web access, tagging, social networks, and blogs and brings together various web capabilities in unique combinations. Web 2.0, however, is about much more than the technology--it is about a change in focus to participation, user…
Descriptors: Information Science Education, Information Needs, Libraries, Information Science
Helfer, Joe – Searcher, 1997
Analyzes whether push technology is a threat or opportunity for online searchers. Outlines key functions of push technology products and defines key technology terms. Illustrates how the role of the online searcher changes with push technology. (AEF)
Descriptors: Computer Networks, Computer Software Evaluation, Information Networks, Information Technology
President's Council of Advisors on Science and Technology, Washington, DC. – 1992
This report offers advice on the strengths and weaknesses of the High Performance Computing and Communications (HPCC) initiative, one of five presidential initiatives launched in 1992 and coordinated by the Federal Coordinating Council for Science, Engineering, and Technology. The HPCC program has the following objectives: (1) to extend U.S.…
Descriptors: Advisory Committees, Appropriate Technology, Computer Networks, Industry
Peer reviewed Peer reviewed
Direct linkDirect link
Panettieri, Joseph C. – T.H.E. Journal, 2006
The wireless bandwagon is rolling across Mississippi, picking up a fresh load of converts and turning calamity into opportunity. Traditional wired school networks, many of which unraveled during Hurricane Katrina, are giving way to advanced wireless mesh networks that frequently include voice-over-IP (VoIP) capabilities. Vendor funding is helping…
Descriptors: Computer Networks, Internet, Telecommunications, Computer Mediated Communication
Peled, Abraham – Scientific American, 1987
Discusses some of the future trends in the use of the computer in our society, suggesting that computing is now entering a new phase in which it will grow exponentially more powerful, flexible, and sophisticated in the next decade. Describes some of the latest breakthroughs in computer hardware and software technology. (TW)
Descriptors: Artificial Intelligence, Computer Graphics, Computer Networks, Computer Software
Previous Page | Next Page ยป
Pages: 1  |  2  |  3