NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 61 to 75 of 571 results Save | Export
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
Windhausen, John, Jr. – EDUCAUSE, 2008
This white paper proposes bringing the federal government, state governments, and the private sector together as part of a new approach to making high-speed Internet services available across the country. It proposes the creation of a new federal Universal Broadband Fund (UBF) that, together with matching funds from the states and the private…
Descriptors: Private Sector, Telecommunications, Public Sector, Partnerships in Education
Sylvia, Margaret – Computers in Libraries, 1996
Saint Mary's University Academic Library (Texas) established remote access to its computer network. Discusses access issues including network protocols and support; multitasking; CD-ROMs; printing capabilities; connection methods; and keyboards. Describes choices of operating systems and software: J&L Chatterbox, bulletin board systems, and…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Printers
Riggen, Gary – CAUSE/EFFECT, 1989
A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)
Descriptors: Access to Information, Computer Networks, Higher Education, Information Networks
Machovec, George S. – Online Libraries and Microcomputers, 1995
Describes the Government Information Locator Service (GILS), designed to help the public identify and acquire federal government information as part of the evolving National Information Infrastructure. Highlights include background information; use of GILS through the Internet; and agency-based information services, including the Government…
Descriptors: Access to Information, Computer Networks, Computer System Design, Federal Government
McCulley, P. Michael – Online, 1995
Examines The Internet Adapter (TIA), an Internet protocol that allows computers to be directly on the Internet and access graphics over standard telephone lines using high-speed modems. Compares TIA's system requirements, performance, and costs to other Internet connections. Sidebars describe connections other than TIA and how to find information…
Descriptors: Access to Information, Comparative Analysis, Computer Graphics, Computer Networks
Peer reviewed Peer reviewed
McCombs, Gillian M. – Library Resources and Technical Services, 1994
Discusses implications of using the Internet for library technical services. Topics addressed include creative uses of the Internet; three basic applications on the Internet, i.e., electronic mail, remote log-in to another computer, and file transfer; electronic processing of information; electronic access to information; and electronic processing…
Descriptors: Access to Information, Computer Networks, Creativity, Electronic Mail
Peer reviewed Peer reviewed
Gaunt, Marianne I. – Information Technology and Libraries, 1994
Describes the development and activities of the Center for Electronic Texts in the Humanities, established by Princeton University and Rutgers University to provide a national focus for the development, dissemination, and use of electronic texts in the humanities. Sidebars explain the Text Encoding Initiative and Standard Generalized Markup…
Descriptors: Access to Information, Computer Networks, Electronic Publishing, Higher Education
Machovec, George S. – Online Libraries and Microcomputers, 1993
Describes VERONICA (Very Easy Rodent-Oriented Net-Wide Index to Computerized Archives), an Internet navigation tool developed at the University of Nevada as an index and access tool to gopher servers on the network. Highlights include connecting to VERONICA; availability of VERONICA server software; and difficulties. (Contains three references.)…
Descriptors: Access to Information, Computer Networks, Computer Software, Computer Software Development
Peer reviewed Peer reviewed
Rothstein, Russell I.; McKnight, Lee – T.H.E. Journal, 1995
Discusses connecting K-12 schools to the National Information Infrastructure. Presents four technology models and the estimated costs for each. Examines programs that could help reduce hardware, training, support, and retrofitting costs, and estimates potential savings. (JKP)
Descriptors: Access to Information, Computer Networks, Cost Estimates, Elementary Secondary Education
Peer reviewed Peer reviewed
Hazari, Sunil – Journal of Computing in Higher Education, 1994
A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…
Descriptors: Access to Information, Computer Networks, Computer Software, Higher Education
Peer reviewed Peer reviewed
Pesachowitz, Alvin – Government Information Quarterly, 1992
Reports on a conference sponsored by the Environmental Protection Agency (EPA) that addressed issues surrounding public access to government information, particularly in electronic format. Case studies of successful public access programs are described, and the National Research and Education Network (NREN) and other networks are discussed. (two…
Descriptors: Access to Information, Case Studies, Computer Networks, Conferences
Bush, George; And Others – Bulletin of the American Society for Information Science, 1992
Follow-up on the 1991 White House Conference on Library and Information Services (WHCLIS) presents President Bush's message to the U.S. Congress on the conference, together with a discussion of WHCLIS resolutions relevant to the concerns of the American Society for Information Science (ASIS). Major concerns are identified as networking,…
Descriptors: Access to Information, Computer Networks, Copyrights, Information Services
Nickerson, Gord – Computers in Libraries, 1992
Continues a description of the Usenet computer network that began in the previous issue. The effective use of Usenet is discussed, including how to screen out unwanted information, the most helpful newsgroups to access, and setting up news reader software. Ideas for library outreach services via Usenet are also suggested. (LRW)
Descriptors: Access to Information, Computer Networks, Computer Software, Electronic Mail
Peer reviewed Peer reviewed
Morgan, Eric Lease – Public-Access Computer Systems Review, 1994
Provides an overview of the Internet's World-Wide Web (Web), a hypertext system. Highlights include the client/server model; Uniform Resource Locator; examples of software; Web servers versus Gopher servers; HyperText Markup Language (HTML); converting files; Common Gateway Interface; organizing Web information; and the role of librarians in…
Descriptors: Access to Information, Computer Networks, Data Conversion, Gateway Systems
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  39