NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 706 to 720 of 4,569 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security
St. Jean, Michael – Learning & Leading with Technology, 2008
With no specific state or federal mandates to districts to maintain comprehensive technology infrastructure, how do districts, in the face of mounting financial pressures, continue to build and maintain their networks, integrate their systems, and expand their resources in a way that is reasonably "budget-proof?" In this article, the…
Descriptors: Computer Uses in Education, Educational Technology, Technology Integration, Urban Schools
Peer reviewed Peer reviewed
Direct linkDirect link
Blackbourn, J. M.; Fillingim, Jennifer G.; McCelland, Susan; Elrod, G. Franklin; Medley, Meagan B.; Kritsonis, Mary Alice; Ray, Jan – Journal of Instructional Psychology, 2008
This study examines the use of wireless laptop technology to support the application of problem-based learning (PBL) in a special education methods course. This field based course used a progressive disclosure process in weekly seminars to address issues posed in a case study. Eight scenarios, all related to the case, were presented to upper level…
Descriptors: Preservice Teachers, Methods Courses, Teacher Education, Group Discussion
Tedford, Jennifer – Principal Leadership, 2008
How many beginning teachers struggle to create new lessons despite the fact that experienced teachers have already designed effective lessons for the same content? Shulman (1987) used the term "collective amnesia" to describe the failure of school leaders to design professional development that included the collection of its best…
Descriptors: Lesson Plans, Course Content, Norms, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Agee, Anne Scrivener; Yang, Catherine – EDUCAUSE Review, 2009
This article presents the top-ten IT-related issues in terms of strategic importance to the institution, as revealed by the tenth annual EDUCAUSE Current Issues Survey. These IT-related issues include: (1) Funding IT; (2) Administrative/ERP Information Systems; (3) Security; (4) Infrastructure/Cyberinfrastructure; (5) Teaching and Learning with…
Descriptors: Higher Education, Information Technology, Integrated Learning Systems, Financial Support
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fan, Andy – International Journal of Education and Development using Information and Communication Technology, 2010
The Portuguese came to Macau in the 16th century, Macao has become part of China again since 1999. Under the strong economic growth in recent years, the Macao government has invested substantial human, material and financial resources for the implementation of IT in education in Macau since 2001. This paper reviewed the development of IT in…
Descriptors: Information Technology, Technology Integration, Foreign Countries, Economic Progress
Sullivan, Christopher – 1989
Electronic mail is one of several telecommunications technologies that have become potent factors in modern organizational communication. The introduction of such sophisticated microelectronic technology into an organization can have a strong impact on the patterns of communication within that organization. This is the case for the Florida House…
Descriptors: Computer Networks, Electronic Mail, Online Systems, Organizational Communication
Wack, John P.; Carnahan, Lisa J. – 1989
This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…
Descriptors: Computer Networks, Computer Software, Contingency Management, Guidelines
Finn, Gregory G. – 1987
This report discusses some of the problems and limitations in existing internetwork design for the connection of packet-switching networks of different technologies and presents an algorithm that has been shown to be suitable for internetworks of unbounded size. Using a new form of address and a flat routing mechanism called Cartesian routing,…
Descriptors: Algorithms, Computer Networks, Computer System Design, Models
Parker, Donald C. – Executive Educator, 1987
Describes an electronic mail system used by the Horseheads (New York) Central School Distict's eight schools and central office that saves time and enhances productivity. This software calls up information from the district's computer network and sends it to other users' special files--electronic "mailboxes" set aside for messages and…
Descriptors: Computer Networks, Efficiency, Electronic Mail, Elementary Secondary Education
Peer reviewed Peer reviewed
Huang, Albert H. – Journal of Education for Business, 1997
Online training through computer networks allows the provision of emotional support, privacy, objective performance evaluation, and resource sharing. Trainers must learn new presentation and advising skills. Trainees need to be self-motivated and computer literate. (SK)
Descriptors: Computer Assisted Instruction, Computer Networks, Internet, Online Systems
Olsen, Florence – Chronicle of Higher Education, 2003
Describes how California's Peralta Community Colleges District decided to hire an outside company to manage its computer networks, but that problems cause it to now want a technology boss on its own staff. (EV)
Descriptors: Computer Networks, Computer Uses in Education, Information Technology, Problems
Stamps, David – Training, 1997
Information technology is not enough without knowledge management. People who oversee and support knowledge management are essential. The move to knowledge management systems may eclipse training and development unless trainers help people learn about learning and about sharing their knowledge. (JOW)
Descriptors: Adult Education, Computer Networks, Information Technology, Organizational Development
Wodarz, Nan – School Business Affairs, 1997
The data contained on desktop computer systems and networks pose security issues for virtually every district. Sensitive information can be protected by educating users, altering the physical layout, using password protection, designating access levels, backing up data, reformatting floppy disks, using antivirus software, and installing encryption…
Descriptors: Computer Networks, Computer Security, Elementary Secondary Education, Internet
Nilsson, Fredrik – American School & University, 2002
Discusses affordable and practical security solutions, such as networked video systems, that are available to meet schools' needs for highly functional, low-cost surveillance. (EV)
Descriptors: Computer Networks, Crime Prevention, School Safety, Schools
Pages: 1  |  ...  |  44  |  45  |  46  |  47  |  48  |  49  |  50  |  51  |  52  |  ...  |  305