NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Americans with Disabilities…1
Equal Access1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 31 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Sarthak Punj; Poorvi Kejriwal; S. P. Raja – International Journal of Learning and Change, 2024
Technology is advancing and metaverse is gaining popularity. The magic of metaverse is beyond our imagination. In simple terms, the metaverse refers to a virtual shared space that exists online, where people can interact, socialise, work, and play using digital avatars, just like they do in the real world. It is a combination of virtual reality,…
Descriptors: Computer Simulation, Computer Mediated Communication, Health Services, Social Media
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ogawa, Nobuyuki; Shimizu, Akira – International Association for Development of the Information Society, 2017
This paper describes our concrete efforts to improve the functions of the computer rooms in the Information Processing Center from among several organisational strategies which can assume a large role in the next-generation education, while examining the practice of active learning by the faculty in all classes using ICT equipment. We implemented…
Descriptors: Educational Technology, Technology Uses in Education, Information Processing, Equipment
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2011
Setting up a wireless network is easy enough. Place a few access points in strategic areas, then watch the network traffic fly! That approach may hold up reasonably well for a few dozen users, but there's no way it would support a schoolwide 1-to-1 program. Once students take to it with their wireless devices, "they're going to kill it,"…
Descriptors: Computer Networks, Telecommunications, Reliability, Handheld Devices
Diaz, Russell – Campus Technology, 2009
In 2006, when the author joined the staff at Dominican College (New York), he discovered that the network, computers, and IT contracts were in sorry shape. He also found that this kind of condition is common in small colleges. Such a state of affairs is usually brought about by the unrelenting demands placed on small IT staffs. IT staffers at…
Descriptors: School Business Relationship, Small Colleges, Information Technology, Computer Networks
Branzburg, Jeffrey – Technology & Learning, 2007
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
Descriptors: Computer Security, Internet, Computer Peripherals, Telecommunications
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Douglas L. – Tech Directions, 2004
This article de-mystifies network patch cable secrets so that people can connect their computers and transfer those pesky files--without screaming at the cables. It describes a network cabling activity that can offer students a great hands-on opportunity for working with the tools, techniques, and media used in computer networking. Since the…
Descriptors: Educational Technology, Computer Networks, Computer Peripherals, Technology Education
Callihan, Steven E. – Internet World, 1996
Offers advice for choosing an Internet provider: consider the amount of time, effort, and expertise one has, coupled with the complexity of the Web page, which impact price and choice of provider; and question providers about server speed, ports, architecture, traffic levels, fee structures, and registration of domain names. Lists 33 Web presence…
Descriptors: Computer Networks, Computer Peripherals, Costs, Guidelines
Peer reviewed Peer reviewed
Direct linkDirect link
Gonzalez-Castano, F. J.; Garcia-Reinoso, J.; Gil-Castineira, F.; Costa-Montenegro, E.; Pousada-Carballo, J. M. – Computers and Education, 2005
In this paper, we propose an auxiliary "location network", to support user-independent context-awareness in educational data networks; for example, to help visitors in a museum. We assume that, in such scenarios, there exist "service servers" that need to be aware of user location in real-time. Specifically, we propose the implementation of a…
Descriptors: Computer Networks, Information Technology, Telecommunications, Users (Information)
Snyder, Robin – Association of Small Computer Users in Education (ASCUE), 2004
Having more than one screen of usable space can enhance productivity, both inside and outside of the classroom. So can using one keyboard, screen, and mouse with multiple computers. This paper (and session) will cover the author's use of multiple monitor and KVM (keyboard, video, and mouse) technologies both inside and outside the classroom, with…
Descriptors: Computer Networks, Educational Technology, Computer Uses in Education, Keyboarding (Data Entry)
Farmer, Lesley S. J. – Technology Connection, 1995
Examines major network structures and provides criteria for selecting the best layout. Describes daisy-chain, star, bus, tree, ring, and token ring topologies. Discusses factors to consider when connecting computers, including user needs, printing demands, modem and file sharing, user grouping, the physical plant, and connective equipment. (AEF)
Descriptors: Computer Networks, Computer Peripherals, Computer Printers, Computer System Design
Perone, Karen – Computers in Libraries, 1996
Provides an introduction to CD-ROM networking. Highlights include LAN (local area network) architectures for CD-ROM networks, peer-to-peer networks, shared file and dedicated file servers, commercial software/vendor solutions, problems, multiple hardware platforms, and multimedia. Six figures illustrate network architectures and a sidebar contains…
Descriptors: Computer Networks, Computer Peripherals, Guidelines, Information Technology
Buchanan, Larry – MultiMedia Schools, 1998
Discusses modem speed, factors affecting performance; phone-line limitations; new options: Interactive Services Digital Network (ISDN) and Digital Subscriber Link (DSL); satellite delivery; cable modems; and choosing the right solution. (PEN)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Peripherals, Computers
Previous Page | Next Page ยป
Pages: 1  |  2  |  3