NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 736 to 750 of 4,569 results Save | Export
Nickerson, Gord – Computers in Libraries, 1992
Discussion of computer-mediated communication focuses on the development of the BITNET computer network. The use of BITNET for interactive messaging, batch file transfer, and electronic mail is described; server programs are explained; and possible future developments of BITNET are discussed. (seven references) (LRW)
Descriptors: Computer Networks, Computer Software, Electronic Mail, Futures (of Society)
Sparks, Susan M. – Nursing and Health Care, 1994
Discusses E.T.Net, an online computer conferencing network that links developers and users of interactive technology in health science education. Describes the individual conferences including those for nursing care, computer-assisted instruction, hardware, and shareware. Provides information about accessing the network. (JOW)
Descriptors: Allied Health Occupations Education, Computer Networks, Tables (Data), Teleconferencing
Peer reviewed Peer reviewed
Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Peer reviewed Peer reviewed
Bertot, John Carlo – Library Trends, 2001
This article offers a number of statistics and performance measures that libraries may find useful in determining the overall quality of their network-based services; identifies a number of service quality criteria; and provides a framework to assist librarians in selecting statistics and performance measures based on service quality criteria.…
Descriptors: Computer Networks, Criteria, Library Services, Library Statistics
Peer reviewed Peer reviewed
Walery, Darrell – T.H.E. Journal, 2005
This article provides a quick start guide to provide educators with the basic points to consider before installing a wireless network in the school. Since many school districts have already implemented wireless networks, there is a lot of information available online to assist in the process.
Descriptors: Telecommunications, Electronic Equipment, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Futhey, Tracy – EDUCAUSE Review, 2005
In this column, the author discusses the four key questions related to the National LambdaRail (NLR) networking technology. NLR uses Dense Wave Division Multiplexing (DWDM) to enable multiple networks to coexist on a national fiber footprint, and is owned and operated not by carriers, but by the research and education community. The NLR Board…
Descriptors: Computer Networks, Information Technology, Program Descriptions, Research Universities
Cervone, Frank – Computers in Libraries, 2005
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Descriptors: Computer Security, Libraries, Computer Networks, Access to Information
Miller, Steven E.; Seiberling, Chris – Technology & Learning, 2004
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Descriptors: Computer Security, Systems Analysis, Troubleshooting, Computer Networks
Trotter, Andrew – Education Week, 2006
This article deals with federal E-rate program's support of school leaders' Blackberry habit. The Federal Communications Commission (FCC) has cleared the way to allow money from the $2.25 billion program of subsidies for school technology to apply to e-mail service for mobile, wireless devices, such as the BlackBerry, which are increasingly…
Descriptors: Internet, Electronic Mail, Telecommunications, Computer Networks
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Schaffer, Greg – Campus Technology, 2007
Managing resource usage and data delivery with virtualization devices is a staple of many of today's data infrastructures. By breaking the traditional direct physical access and inserting an abstraction layer, what one sees is what he/she gets, but the mechanics of delivery may be quite different. The reason for the increase in virtualization…
Descriptors: Higher Education, Computer Networks, Information Technology, Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Kemppainen, Jyri; Tedre, Matti; Sutinen, Erkki – Journal of Information Technology Education: Research, 2012
Information technology (IT) professionals face markedly different kinds of challenges in developing countries from the ones in developed countries. Based on the research literature and our fourteen years of fieldwork in Iringa, Tanzania, we have identified eight groups of technical characteristics of IT work that significantly affect the work of…
Descriptors: Foreign Countries, Developing Nations, Engineering Education, Work Environment
Liu, Yipeng – ProQuest LLC, 2009
Network externalities or alternatively termed network effects are pervasive in computer software markets. While software vendors consider pricing strategies, they must also take into account the impact of network externalities on their sales. My main interest in this research is to describe a firm's strategies and behaviors in the presence of…
Descriptors: Information Technology, Competition, Computer Software, Cost Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Ovadia, Steven – Behavioral & Social Sciences Librarian, 2009
Twitter (www.twitter.com) has become kind of a popular culture punch line. It's often used as a shorthand to represent how self-obsessed and self-involved the American culture has become, and while Twitter does lend itself to a kind of needless sharing, it also has some potentially useful features. Twitter is a microblogging service that allows…
Descriptors: Feedback (Response), Research Tools, Popular Culture, Outreach Programs
Valenza, Joyce Kasman; Johnson, Doug – School Library Journal, 2009
The library, as we once knew it, may no longer be relevant. And, yet, this is undoubtedly the most exciting time in history to be a librarian. The future of the school library as a relevant and viable institution is largely dependent on librarians and how quickly they respond to change. They worry about their field and their practice. They worry…
Descriptors: Intellectual Freedom, Intellectual Property, Computers, School Libraries
Pages: 1  |  ...  |  46  |  47  |  48  |  49  |  50  |  51  |  52  |  53  |  54  |  ...  |  305