NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 556 to 570 of 4,568 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Cho, Inho – ProQuest LLC, 2008
This research examines post-adoption behavior (discontinuance versus continuance) with the context of Intranet use. Multiple theories are used as theoretical frameworks to extend information communication technology research to the case of post-adoption behavior. Three research questions and six sets of hypotheses are formulated to distinguish…
Descriptors: Use Studies, Users (Information), User Satisfaction (Information), Social Influences
Young, Jeffrey R. – Chronicle of Higher Education, 2008
The author discusses the gossip Web site Juicy Campus. Although many students express concern that potential employers who see the cite may decline to hire individuals after reading gossip-filled allegations, or that their social lives are in tatters over the mean-spirited, anonymous messages posted about them, because the site has no affiliation…
Descriptors: Publicity, Interpersonal Communication, Internet, Web Sites
McDavis, Roderick J. – Chronicle of Higher Education, 2008
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Descriptors: Higher Education, Information Technology, Computer Security, Risk
Alberta Education, 2009
Alberta's education system is a leader in the use of technology in teaching and learning. New information technologies create options for how teachers teach, how students learn, and how classrooms look and operate. This document chronicles the history of computer technology in Alberta from 1975-2009. The information is arranged in a tabulated…
Descriptors: Computers, Foreign Countries, Educational Technology, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
O'Donnell, Tom – EDUCAUSE Quarterly, 2009
A decade ago, people wanting to practice "green computing" recycled their printer paper, turned their personal desktop systems off from time to time, and tried their best to donate old equipment to a nonprofit instead of throwing it away. A campus IT department can shave a few watts off just about any IT process--the real trick is planning and…
Descriptors: Energy Conservation, Computer Centers, Energy Management, Facility Improvement
Peer reviewed Peer reviewed
Direct linkDirect link
Walling, Donovan R. – TechTrends: Linking Research and Practice to Improve Learning, 2009
When students engage with technology to produce media, impetus and inspiration often come from the work of others. In today's new media environment in which students blur the line between school-based technologies and personal devices and engagement, educators find themselves standing on a railroad track facing a speeding high-tech train. If…
Descriptors: Production Techniques, Computer Networks, Social Networks, Films
Diaz, Russell – Campus Technology, 2009
In 2006, when the author joined the staff at Dominican College (New York), he discovered that the network, computers, and IT contracts were in sorry shape. He also found that this kind of condition is common in small colleges. Such a state of affairs is usually brought about by the unrelenting demands placed on small IT staffs. IT staffers at…
Descriptors: School Business Relationship, Small Colleges, Information Technology, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Platt, Richard G.; Carper, William B.; McCool, Michael – Journal of Information Systems Education, 2010
In early 2004, the Hilton Hotels Corporation (HHC) required that all of its hotels (both owned and franchised) install high-speed Internet access (HSIA) in all of their rooms by June 2004. This case focuses on how one of its franchise properties located on the northern gulf coast of Florida (the Hilton Sandestin Beach Golf Resort &…
Descriptors: Information Technology, Internet, Case Studies, Access to Information
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Azeta, A. A. – Turkish Online Journal of Distance Education, 2008
This paper describes an architectural framework and a prototype implementation of a web-based multi-channel e-Learning application that allows students, lecturers and the research communities to collaborate irrespective of the communication device a user is carrying. The application was developed based on the concept of "right once run on any…
Descriptors: Electronic Learning, Handheld Devices, Telecommunications, Laptop Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Dietze, Stefan; Gugliotta, Alessio; Domingue, John – International Journal of Distance Education Technologies, 2009
Current E-Learning technologies primarily follow a data and metadata-centric paradigm by providing the learner with composite content containing the learning resources and the learning process description, usually based on specific metadata standards such as ADL SCORM or IMS Learning Design. Due to the design-time binding of learning resources,…
Descriptors: Electronic Learning, Learning Processes, Educational Technology, Metadata
Peer reviewed Peer reviewed
Direct linkDirect link
Hoover, Sam – EDUCAUSE Quarterly, 2009
Clemson University implemented Condor architecture on the Blackboard learning management system (LMS) application servers in order to gain higher throughput when processing Blackboard course archives. Condor has typically been used for high-throughput research computing, not applied to non-research problems involving long processing times. This…
Descriptors: Chalkboards, Courseware, Database Management Systems, Information Management
Sutherland, Michael; Clark, Jason – Computers in Libraries, 2009
Montana State University (MSU) Libraries (where the authors serve as web services librarian and digital initiatives librarian, respectively) is perhaps unique because it has no current periodicals room due to lack of space. As a result, finding current journals for research is difficult for its patrons, who do not always know how or where to…
Descriptors: Journal Articles, Academic Libraries, Electronic Libraries, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Kezar, Adrianna; Lester, Jaime – Change: The Magazine of Higher Learning, 2009
This article starts by presenting five scenarios, each represents a significant type of grassroots change that is occurring at colleges and universities across the country. Those who are instigating these changes have little formal authority. The authors recently conducted a study to document and better understand these kinds of changes and the…
Descriptors: Higher Education, Educational Change, Social Networks, Social Change
Derringer, Pam – Technology & Learning, 2009
Despite the last few years' growth in awareness of open-source software in schools and the potential savings it represents, its widespread adoption is still hampered. Randy Orwin, technology director of the Bainbridge Island School District in Washington State and a strong open-source advocate, cautions that installing an open-source…
Descriptors: School Districts, Barriers, Costs, Educational Trends
Pages: 1  |  ...  |  34  |  35  |  36  |  37  |  38  |  39  |  40  |  41  |  42  |  ...  |  305