NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 226 to 240 of 1,220 results Save | Export
Young, Jeffrey R. – Chronicle of Higher Education, 2009
Jokes about "Dark Angel" and "Blackborg" surfaced almost immediately after Blackboard Inc. announced its plan to buy course-management software competitor Angel Learning, the author reports. Angel had lured away dozens of Blackboard clients in recent years with a friendly, approachable corporate culture that stood in sharp contrast to Blackboard's…
Descriptors: Chalkboards, Online Vendors, Online Systems, Consumer Economics
Raths, David – Campus Technology, 2011
Many university officials recognize the need to upgrade their older analog video surveillance systems. In a 2010 survey by "Campus Safety" magazine, half of university respondents expressed dissatisfaction with the quality and coverage of their current video surveillance systems. Among the limitations of analog closed-circuit television…
Descriptors: Video Technology, Internet, Computer Uses in Education, Technology Planning
Peer reviewed Peer reviewed
Direct linkDirect link
Lamothe, Alain R. – Journal of Electronic Resources Librarianship, 2011
The purpose of this paper is to report the results of a quantitative analysis exploring the interaction and relationship between the online database and electronic journal collections at the J. N. Desmarais Library of Laurentian University. A very strong relationship exists between the number of searches and the size of the online database…
Descriptors: Interaction, Electronic Journals, Databases, Online Searching
Douglas, Volney L. R. – ProQuest LLC, 2010
National communications systems (NCS) are critical elements of a government's infrastructure. Limited improvements to the non-functional requirements (NFR) of NCS have caused issues during national emergencies such as 9/11 and Hurricane Katrina. The literature indicates that these issues result from a deficiency in understanding the roles NFRs and…
Descriptors: Case Studies, Definitions, Models, Interviews
Peer reviewed Peer reviewed
Direct linkDirect link
Li, Ying; Marion, Scott; Perie, Marianne; Gong, Brian – Peabody Journal of Education, 2010
Increasing numbers of schools and districts have expressed interest in interim assessment systems to prepare for summative assessments and to improve teaching and learning. However, with so many commercial interim assessments available, schools and districts are struggling to determine which interim assessment is most appropriate to their needs.…
Descriptors: Evaluation, Educational Improvement, Vendors, Leaders
Peer reviewed Peer reviewed
Direct linkDirect link
Hodgins, Dave – Journal of Web Librarianship, 2010
The explosion of Web 2.0 into libraries has left many smaller academic libraries (and other libraries with limited computing resources or support) to work in the cloud using free Web applications. The use of commercial Web hosting is an innovative approach to the problem of inadequate local resources. While the idea of insourcing IT will seem…
Descriptors: Computers, Academic Libraries, Internet, Word Processing
Xin, Mingdi – ProQuest LLC, 2009
The enterprise software market is seeing the rise of a new business model--selling Software-as-a-Service (SaaS), in which a standard piece of software is owned and managed remotely by the vendor and delivered as a service over the Internet. Despite the hype, questions remain regarding the rise of this new service model and how it would impact the…
Descriptors: Motivation, Internet, Vendors, Strategic Planning
Tong, Qi (Helen) – Computers in Libraries, 2009
The U.S. Geological Survey (USGS) Library, where the author serves as the digital services librarian, is increasingly challenged to make it easier for users to find information from many heterogeneous information sources. Information is scattered throughout different software applications (i.e., library catalog, federated search engine, link…
Descriptors: Search Engines, Engines, Information Sources, Internet
Doorey, Nancy A. – Council of Chief State School Officers, 2011
The work reported in this paper reflects a collaborative effort of many individuals representing multiple organizations. It began during a session at the October 2008 meeting of TILSA when a representative of a member state asked the group if any of their programs had experienced unexpected fluctuations in the annual state assessment scores, and…
Descriptors: Testing, Sampling, Expertise, Testing Programs
Liu, Tung-Hsuan – ProQuest LLC, 2012
In the early years of online retailing, having an online presence and low prices were believed to be key drivers of success. More recently, electronic service quality has become essential as an online marketing strategy. Online stores provide higher service quality to create online customer loyalty, improve customer satisfaction, and keep a…
Descriptors: Online Systems, Purchasing, Intention, Retailing
Kemeny, M. Elizabeth – ProQuest LLC, 2010
Using the conceptual model of social structure and personality framework (House, 1981) as a theoretical guide, this cross sectional mixed-method design examined how organizational structure and culture relate to practices for training direct care workers in 328 aging and disability network service provider organizations in Pennsylvania. To…
Descriptors: Social Structure, Staff Development, Personality, Organizational Culture
Huang, Peng – ProQuest LLC, 2010
Innovation ecosystem strategy is often adopted by platform technology owners to seek complementary innovation from resources located outside the firm to exploit indirect network effect. In this dissertation I aim to address the issues that are related to the formation and business value of platform innovation ecosystems in the enterprise software…
Descriptors: Industry, Intellectual Property, Innovation, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Singh, Anand – ProQuest LLC, 2009
manaOptimizing risk to information to protect the enterprise as well as to satisfy government and industry mandates is a core function of most information security departments. Risk management is the discipline that is focused on assessing, mitigating, monitoring and optimizing risks to information. Risk assessments and analyses are critical…
Descriptors: Risk Management, Risk, Engineering, Vendors
Howard, Jennifer – Chronicle of Higher Education, 2009
The publishers' hall at the recent Association of College and Research Libraries conference, held in Seattle in mid-March, was a study in give-and-take: how much publishers such as Elsevier and Oxford University Press will give in this lousy economy, and how much budget-strapped librarians can take. Libraries are some of the biggest customers for…
Descriptors: Research Libraries, Academic Libraries, Library Administration, Library Associations
Pages: 1  |  ...  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  19  |  20  |  ...  |  82