NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 766 to 780 of 4,561 results Save | Export
Peer reviewed Peer reviewed
Alm, Andy – Convergence, 1992
Describes computer networks and conferences dedicated to environmental education and activism. Gives the electronic and surface mail addresses of contacts for the Association for Progressive Communications in 12 countries. (SK)
Descriptors: Computer Networks, Electronic Mail, Environmental Education, Organizations (Groups)
Henry, Charles – Wilson Library Bulletin, 1993
Analyzes metaphors currently being used to describe the NREN (National Research and Education Network) and concludes that they largely ignore the true cognitive implications of the network. Topics addressed include stated goals of the NREN; educational and economic factors influencing the NREN; and the transformational potential of the NREN for…
Descriptors: Computer Networks, Economic Factors, Educational Trends, Information Networks
Nickerson, Gord – Computers in Libraries, 1992
Discussion of computer-mediated communication focuses on the development of the BITNET computer network. The use of BITNET for interactive messaging, batch file transfer, and electronic mail is described; server programs are explained; and possible future developments of BITNET are discussed. (seven references) (LRW)
Descriptors: Computer Networks, Computer Software, Electronic Mail, Futures (of Society)
Sparks, Susan M. – Nursing and Health Care, 1994
Discusses E.T.Net, an online computer conferencing network that links developers and users of interactive technology in health science education. Describes the individual conferences including those for nursing care, computer-assisted instruction, hardware, and shareware. Provides information about accessing the network. (JOW)
Descriptors: Allied Health Occupations Education, Computer Networks, Tables (Data), Teleconferencing
Peer reviewed Peer reviewed
Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Peer reviewed Peer reviewed
Bertot, John Carlo – Library Trends, 2001
This article offers a number of statistics and performance measures that libraries may find useful in determining the overall quality of their network-based services; identifies a number of service quality criteria; and provides a framework to assist librarians in selecting statistics and performance measures based on service quality criteria.…
Descriptors: Computer Networks, Criteria, Library Services, Library Statistics
Peer reviewed Peer reviewed
Walery, Darrell – T.H.E. Journal, 2005
This article provides a quick start guide to provide educators with the basic points to consider before installing a wireless network in the school. Since many school districts have already implemented wireless networks, there is a lot of information available online to assist in the process.
Descriptors: Telecommunications, Electronic Equipment, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Futhey, Tracy – EDUCAUSE Review, 2005
In this column, the author discusses the four key questions related to the National LambdaRail (NLR) networking technology. NLR uses Dense Wave Division Multiplexing (DWDM) to enable multiple networks to coexist on a national fiber footprint, and is owned and operated not by carriers, but by the research and education community. The NLR Board…
Descriptors: Computer Networks, Information Technology, Program Descriptions, Research Universities
Cervone, Frank – Computers in Libraries, 2005
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Descriptors: Computer Security, Libraries, Computer Networks, Access to Information
Miller, Steven E.; Seiberling, Chris – Technology & Learning, 2004
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Descriptors: Computer Security, Systems Analysis, Troubleshooting, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kurubacak, Gulsun – Journal of Educational Technology, 2007
This paper discusses culture, as a source of conflict than of synergy, and how it affects the use of new media to build digital citizenships. It also argues that the cultural dimensions of Geert Hofsteded, who demonstrates that there are national and regional cultural groupings that affect behavior of organizations, are very persistent across…
Descriptors: Global Approach, Cultural Differences, Cultural Influences, Intercultural Communication
Kurubacak, Gulsun – Online Submission, 2007
This paper discusses culture, as a source of conflict than of synergy, how affects the use of new media to build digital citizenships. It also argues that the cultural dimensions of Geert Hofstede, who demonstrates that there are national and regional cultural groupings that affect the behavior of organizations, are very persistent across time.…
Descriptors: Cultural Differences, Intercultural Communication, Instruction, Cultural Awareness
Tunckan, Ergun – Online Submission, 2007
The Open Education Faculty Students Centers have been offering many services to students in Turkey since 1982. Building up bridges between students and faculties, student centers have had technological improvements since 1998 and thereafter quality of services have been increased and services given to students at the student center have been…
Descriptors: Open Education, Open Universities, Foreign Countries, Computer Networks
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Ramaswami, Rama – Campus Technology, 2009
As President Obama said in advance remarks about the American Graduation Initiative: "[T]he hard truth is that some of the jobs that have been lost in the auto industry and elsewhere won't be coming back. And that only underscores the importance of generating new businesses and industries to replace the ones we've lost, and of preparing our…
Descriptors: Business, Education Work Relationship, Job Training, School Business Relationship
Pages: 1  |  ...  |  48  |  49  |  50  |  51  |  52  |  53  |  54  |  55  |  56  |  ...  |  305