NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 976 to 990 of 4,561 results Save | Export
Peer reviewed Peer reviewed
Breeding, Marshall – Library Software Review, 1996
Provides a list of companies that offer commercial library software and describes the systems and tools they offer. Integrated library systems, networking systems, bibliographic software, and other library applications are included. (LRW)
Descriptors: Bibliographic Records, Computer Networks, Computer Software, Integrated Library Systems
Peer reviewed Peer reviewed
Breeding, Marshall – Library Software Review, 1997
Provides an update to the list of companies that offer commercial library software and describes the systems and tools they offer. Integrated library systems, networking systems, bibliographic software, and other library applications are included. (LRW)
Descriptors: Bibliographic Records, Computer Networks, Computer Software, Integrated Library Systems
Peer reviewed Peer reviewed
Caster, Joanna – Computers and Composition, 1997
Notes that, although networked writing classrooms are more egalitarian than non-networked classrooms, networks cannot prevent discrimination. Social identity theory, from social psychology, suggests that instructors must be careful when focusing courses on divisive social issues; the presentation of these issues can break down into binary…
Descriptors: Classroom Environment, Computer Networks, Higher Education, Social Discrimination
Peer reviewed Peer reviewed
Scheuermann, Larry; Taylor, Gary – Internet Research, 1997
Discusses netiquette, which refers to etiquette on computer networks. Highlights include ethical or moral issues as well as standards of politeness; specific examples and suggestions; netiquette rules for advertising; influence of online service providers, including acceptable use policies; influence of employers; and influence of governments.…
Descriptors: Advertising, Computer Networks, Ethics, Government Role
Peer reviewed Peer reviewed
Carliner, Saul – Journal of Business and Technical Communication, 2000
Explores the design choices for Network Earth, a museum exhibit that introduced the general public to computer networks and related issues (and was designed by a team with no formal training). Notes that although the design process and general goals were similar to those at other sites studied and in the literature, certain practices differed…
Descriptors: Business Education, Communication Research, Computer Networks, Cultural Differences
Olsen, Florence – Chronicle of Higher Education, 2001
Describes how universities are weighing changes to or termination of their modem pools, which allow off-campus faculty, staff, and students to have access to the campus network or the Internet. (EV)
Descriptors: Colleges, Computer Networks, Computer Uses in Education, Modems
Peer reviewed Peer reviewed
Trichina, Elena – Machine-Mediated Learning, 1996
Describes a visual tutoring system for programming distributive-memory multiprocessor networks. Highlights include difficulties of parallel programming, and three instructional modes in the system, including a hypertext-like lecture, a question-answer mode, and an expert aid mode. (Author/LRW)
Descriptors: Computer Networks, Expert Systems, Hypermedia, Instructional Design
Weiss, Andrew M. – MultiMedia Schools, 1996
Running multimedia on a network, often difficult because of the memory and processing power required, is becoming easier thanks to new protocols and products. Those developing network design criteria may wish to consider making use of Fast Ethernet, Asynchronous Transfer Method (ATM), switches, "fat pipes", additional network…
Descriptors: Computer Networks, Computer System Design, Computer Uses in Education, Design Preferences
Ekhaml, Leticia – School Library Media Activities Monthly, 2001
Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Electronic Mail
Breeding, Marshall – Computers in Libraries, 2005
This brief article gives a description of the Open Croquet Project and its applications. The project's Web site describes Croquet as a "combination of computer software and network architecture that supports deep collaboration and resource sharing among large numbers of users within the context of a large-scale distributed information system." One…
Descriptors: Computer System Design, Computer Interfaces, Computer Software, Computer Networks
Mills, Lane B. – School Administrator, 2004
School district networks are particularly difficult to protect given the diverse types of users, software, equipment and connections that most school districts provide. Vulnerabilities to the security of school district's technology infrastructure can relate to users, data, software, hardware and transmission. This article discusses different…
Descriptors: Educational Technology, School Districts, Computer Security, Privacy
Peer reviewed Peer reviewed
Ozkan, Betul C.; Gunay, Vedat – T.H.E. Journal, 2004
Emerging technologies are quickly becoming part of daily learning and teaching endeavors in academia. Due to the access to certain high-tech tools educators must learn how to integrate these tools in educational settings. However, many also encounter problems and weaknesses in the same high-tech environment that uses and delivers information…
Descriptors: Viruses, Computer Security, Higher Education, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Papastephanou, Marianna – Studies in Higher Education, 2005
Recent emphases on prospects for difference-sensitive virtual communities rely implicity or explicity on some optimist accounts of cyberspace and globalization. It is expected that hybridity, diaspora and fluidity, marking new understandings of spatiality and temporality in a globalized postmodern era, will create new forms of belonging that will…
Descriptors: Global Approach, Higher Education, Postmodernism, Computer Networks
Tennant, Roy – Library Journal, 2005
In the article, the author talks about the benefits of grid networks. In speaking of grid networks the author is referring to both networks of computers and networks of humans connected together in a grid topology. Examples are provided of how grid networks are beneficial today and the ways in which they have been used.
Descriptors: Electronic Libraries, Internet, Library Automation, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Feld, Harold – EDUCAUSE Review, 2005
With increasing frequency, communities are seeing the arrival of a new class of noncommercial broadband providers: community wireless networks (CWNs). Utilizing the same wireless technologies that many colleges and universities have used to create wireless networks on campus, CWNs are creating broadband access for free or at costs well below…
Descriptors: Telecommunications, Computer Networks, Computer Mediated Communication, Higher Education
Pages: 1  |  ...  |  62  |  63  |  64  |  65  |  66  |  67  |  68  |  69  |  70  |  ...  |  305