NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Branzburg, Jeffrey – Technology & Learning, 2007
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
Descriptors: Computer Security, Internet, Computer Peripherals, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2007
According to the National Safety Council, 63 million computers became obsolete in 2005 alone, and it is estimated that the total number in storage in 2007 numbers upwards of 500 million computers (Earth 911, 2007). This article describes the steps that one should take before disposing of an obsolete computer. First and foremost, all personal…
Descriptors: Conservation (Environment), Computers, Computer Security, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Rajala, Judith B. – T.H.E. Journal, 2004
A computer virus is a program--a piece of executable code--that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having…
Descriptors: Computer Security, Computer Software, Computer Mediated Communication, Internet