NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)6
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 22 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2011
Setting up a wireless network is easy enough. Place a few access points in strategic areas, then watch the network traffic fly! That approach may hold up reasonably well for a few dozen users, but there's no way it would support a schoolwide 1-to-1 program. Once students take to it with their wireless devices, "they're going to kill it,"…
Descriptors: Computer Networks, Telecommunications, Reliability, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
Chaputula, Aubrey Harvey – Program: Electronic Library and Information Systems, 2012
Purpose: The purpose of this research is to look at the state, adoption and use of ICTs by students and academic staff at Mzuzu University. Design/methodology/approach: The research used a survey method whose study population included students, academic and library staff. Data for the study were collected using an interview guide and…
Descriptors: Foreign Countries, College Students, College Faculty, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Infante, Cristian; Hidalgo, Pedro; Nussbaum, Miguel; Alarcon, Rosa; Gottlieb, Andres – Computers & Education, 2009
Exchange is a collaborative learning application, originally developed for wirelessly interconnected Pocket PCs, that provides support for students and a teacher performing a face-to-face computer supported collaborative learning (CSCL) activity in a Single Input/Single Display (SISD) mode. We extend the application to support a single display…
Descriptors: Cooperative Learning, Technology Integration, Synchronous Communication, Computer Peripherals
Branzburg, Jeffrey – Technology & Learning, 2007
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
Descriptors: Computer Security, Internet, Computer Peripherals, Telecommunications
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Gonzalez-Castano, F. J.; Garcia-Reinoso, J.; Gil-Castineira, F.; Costa-Montenegro, E.; Pousada-Carballo, J. M. – Computers and Education, 2005
In this paper, we propose an auxiliary "location network", to support user-independent context-awareness in educational data networks; for example, to help visitors in a museum. We assume that, in such scenarios, there exist "service servers" that need to be aware of user location in real-time. Specifically, we propose the implementation of a…
Descriptors: Computer Networks, Information Technology, Telecommunications, Users (Information)
Roth, Cliff – NewMedia, 1996
Describes the use of ISDN (Integrated Services Digital Networks) in homes, home offices, and offices as a way of transmitting data in audio and video form. Explains how ISDN works and reviews computer equipment needed to change existing telephone service into ISDN service. A chart presents product information for ISDN modems. (JMV)
Descriptors: Computer Networks, Computer Peripherals, Computer Software, Electronic Equipment
Machovec, George S. – Online Libraries and Microcomputers, 1993
Discusses factors to consider when estimating the number of public access terminals (PACs) or workstations needed in public and academic libraries for online catalogs, including building size and layout, physical facilities, resources available through the system, peripheral equipment, graphical user interfaces, remote users, system capacity, and…
Descriptors: Academic Libraries, Computer Networks, Computer Peripherals, Higher Education
Weiser, Mark – Scientific American, 1991
Described are some of the ways in which computers can enter invisibly into people's lives. The social issues that embodied virtuality will engender are discussed. The hardware and software, connected by wires, radio waves, and infrared that will allow this to occur are described. (KR)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Negroponte, Nicholas P. – Scientific American, 1991
Creative applications of computer networks are discussed. Products and services of the future that come from imaginative applications of both channel and computing capacity are described. The topics of entertainment, transactions, and electronic personal surrogates are included. (KR)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Gore, Al – Scientific American, 1991
Technologies that enhance the ability to create and understand information have led to changes in the traditional legal concepts of property, ownership, originality, privacy, and intellectual freedom. The importance of government addressing such issues and investing in development of a high-capacity computer network is discussed. (KR)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Cerf, Vinton G. – Scientific American, 1991
The demands placed on the networks transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery are described. What is needed to support this increased flow, the structures already in place, and what must be built are topics of discussion. (KR)
Descriptors: Communications Satellites, Computer Networks, Computer Oriented Programs, Computer Peripherals
Tesler, Lawrence G. – Scientific American, 1991
The changes in the relationship between the computer and user from that of an isolated productivity tool to than of an active collaborator in the acquisition, use, and creation of information, as well as a facilitator of human interaction are discussed. The four paradigms of computing are compared. (KR)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Dertouzos, Michael L. – Scientific American, 1991
The infrastructure created by fusing computing and communications technologies is described. The effect of this infrastructure on the economy and society of the United States is discussed. The importance of knowing the value and role of information is emphasized. (KR)
Descriptors: Computer Assisted Instruction, Computer Assisted Manufacturing, Computer Networks, Computer Oriented Programs
Flanagan, Patrick – Telecommunications, 1996
Synthesizes opinions of experts regarding technologies deemed most likely to enter the telecommunications mainstream by 1998, including: (1) the Java programming language; (2) voice- over frame relay; (3) virtual local area networks (LANs); (4) cable modems; (5) gigabit LANs; (6) Internet appliances; (7) personal satellite phones; (8) intranets;…
Descriptors: Communications Satellites, Computer Networks, Computer Peripherals, Data Processing
Previous Page | Next Page ยป
Pages: 1  |  2