Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 12 |
Descriptor
Source
Author
Farmer, Lesley S. J. | 2 |
Abbott, Robert | 1 |
Alarcon, Rosa | 1 |
Beckham, Bonnie | 1 |
Bhunia, Swarup | 1 |
Bittleston, Richard | 1 |
Branzburg, Jeffrey | 1 |
Brienne, Deborah | 1 |
Broderick, Bill | 1 |
Brown, Douglas L. | 1 |
Buchanan, Larry | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 5 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Grade 2 | 1 |
Audience
Practitioners | 4 |
Teachers | 2 |
Administrators | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sarthak Punj; Poorvi Kejriwal; S. P. Raja – International Journal of Learning and Change, 2024
Technology is advancing and metaverse is gaining popularity. The magic of metaverse is beyond our imagination. In simple terms, the metaverse refers to a virtual shared space that exists online, where people can interact, socialise, work, and play using digital avatars, just like they do in the real world. It is a combination of virtual reality,…
Descriptors: Computer Simulation, Computer Mediated Communication, Health Services, Social Media
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Schaffhauser, Dian – T.H.E. Journal, 2011
Setting up a wireless network is easy enough. Place a few access points in strategic areas, then watch the network traffic fly! That approach may hold up reasonably well for a few dozen users, but there's no way it would support a schoolwide 1-to-1 program. Once students take to it with their wireless devices, "they're going to kill it,"…
Descriptors: Computer Networks, Telecommunications, Reliability, Handheld Devices
Valdés Aguirre, Benjamín; Ramírez Uresti, Jorge A.; du Boulay, Benedict – International Journal of Artificial Intelligence in Education, 2016
Sharing user information between systems is an area of interest for every field involving personalization. Recommender Systems are more advanced in this aspect than Intelligent Tutoring Systems (ITSs) and Intelligent Learning Environments (ILEs). A reason for this is that the user models of Intelligent Tutoring Systems and Intelligent Learning…
Descriptors: Intelligent Tutoring Systems, Models, Open Source Technology, Computers
Takashi Nagai; Mizue Kayama; Kazunori Itoh – Interactive Technology and Smart Education, 2014
Purpose: The purpose of this study is to explore a support system for beginners in drawing in a networked environment. Learners can receive advice and assessments from art experts without time and/or place constraints by using the proposed system. The authors investigate the possibilities of online supporting drawing learning. Two key factors are…
Descriptors: Art Education, Freehand Drawing, Computer Graphics, Computer Assisted Instruction
Chaputula, Aubrey Harvey – Program: Electronic Library and Information Systems, 2012
Purpose: The purpose of this research is to look at the state, adoption and use of ICTs by students and academic staff at Mzuzu University. Design/methodology/approach: The research used a survey method whose study population included students, academic and library staff. Data for the study were collected using an interview guide and…
Descriptors: Foreign Countries, College Students, College Faculty, Computer Uses in Education
Infante, Cristian; Hidalgo, Pedro; Nussbaum, Miguel; Alarcon, Rosa; Gottlieb, Andres – Computers & Education, 2009
Exchange is a collaborative learning application, originally developed for wirelessly interconnected Pocket PCs, that provides support for students and a teacher performing a face-to-face computer supported collaborative learning (CSCL) activity in a Single Input/Single Display (SISD) mode. We extend the application to support a single display…
Descriptors: Cooperative Learning, Technology Integration, Synchronous Communication, Computer Peripherals
Diaz, Russell – Campus Technology, 2009
In 2006, when the author joined the staff at Dominican College (New York), he discovered that the network, computers, and IT contracts were in sorry shape. He also found that this kind of condition is common in small colleges. Such a state of affairs is usually brought about by the unrelenting demands placed on small IT staffs. IT staffers at…
Descriptors: School Business Relationship, Small Colleges, Information Technology, Computer Networks
Branzburg, Jeffrey – Technology & Learning, 2007
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
Descriptors: Computer Security, Internet, Computer Peripherals, Telecommunications
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security
Kemppainen, Jyri; Tedre, Matti; Sutinen, Erkki – Journal of Information Technology Education: Research, 2012
Information technology (IT) professionals face markedly different kinds of challenges in developing countries from the ones in developed countries. Based on the research literature and our fourteen years of fieldwork in Iringa, Tanzania, we have identified eight groups of technical characteristics of IT work that significantly affect the work of…
Descriptors: Foreign Countries, Developing Nations, Engineering Education, Work Environment
Brown, Douglas L. – Tech Directions, 2004
This article de-mystifies network patch cable secrets so that people can connect their computers and transfer those pesky files--without screaming at the cables. It describes a network cabling activity that can offer students a great hands-on opportunity for working with the tools, techniques, and media used in computer networking. Since the…
Descriptors: Educational Technology, Computer Networks, Computer Peripherals, Technology Education
Callihan, Steven E. – Internet World, 1996
Offers advice for choosing an Internet provider: consider the amount of time, effort, and expertise one has, coupled with the complexity of the Web page, which impact price and choice of provider; and question providers about server speed, ports, architecture, traffic levels, fee structures, and registration of domain names. Lists 33 Web presence…
Descriptors: Computer Networks, Computer Peripherals, Costs, Guidelines
Gonzalez-Castano, F. J.; Garcia-Reinoso, J.; Gil-Castineira, F.; Costa-Montenegro, E.; Pousada-Carballo, J. M. – Computers and Education, 2005
In this paper, we propose an auxiliary "location network", to support user-independent context-awareness in educational data networks; for example, to help visitors in a museum. We assume that, in such scenarios, there exist "service servers" that need to be aware of user location in real-time. Specifically, we propose the implementation of a…
Descriptors: Computer Networks, Information Technology, Telecommunications, Users (Information)