NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Americans with Disabilities…1
Equal Access1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 57 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Sarthak Punj; Poorvi Kejriwal; S. P. Raja – International Journal of Learning and Change, 2024
Technology is advancing and metaverse is gaining popularity. The magic of metaverse is beyond our imagination. In simple terms, the metaverse refers to a virtual shared space that exists online, where people can interact, socialise, work, and play using digital avatars, just like they do in the real world. It is a combination of virtual reality,…
Descriptors: Computer Simulation, Computer Mediated Communication, Health Services, Social Media
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ogawa, Nobuyuki; Shimizu, Akira – International Association for Development of the Information Society, 2017
This paper describes our concrete efforts to improve the functions of the computer rooms in the Information Processing Center from among several organisational strategies which can assume a large role in the next-generation education, while examining the practice of active learning by the faculty in all classes using ICT equipment. We implemented…
Descriptors: Educational Technology, Technology Uses in Education, Information Processing, Equipment
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2011
Setting up a wireless network is easy enough. Place a few access points in strategic areas, then watch the network traffic fly! That approach may hold up reasonably well for a few dozen users, but there's no way it would support a schoolwide 1-to-1 program. Once students take to it with their wireless devices, "they're going to kill it,"…
Descriptors: Computer Networks, Telecommunications, Reliability, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
Valdés Aguirre, Benjamín; Ramírez Uresti, Jorge A.; du Boulay, Benedict – International Journal of Artificial Intelligence in Education, 2016
Sharing user information between systems is an area of interest for every field involving personalization. Recommender Systems are more advanced in this aspect than Intelligent Tutoring Systems (ITSs) and Intelligent Learning Environments (ILEs). A reason for this is that the user models of Intelligent Tutoring Systems and Intelligent Learning…
Descriptors: Intelligent Tutoring Systems, Models, Open Source Technology, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Takashi Nagai; Mizue Kayama; Kazunori Itoh – Interactive Technology and Smart Education, 2014
Purpose: The purpose of this study is to explore a support system for beginners in drawing in a networked environment. Learners can receive advice and assessments from art experts without time and/or place constraints by using the proposed system. The authors investigate the possibilities of online supporting drawing learning. Two key factors are…
Descriptors: Art Education, Freehand Drawing, Computer Graphics, Computer Assisted Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Chaputula, Aubrey Harvey – Program: Electronic Library and Information Systems, 2012
Purpose: The purpose of this research is to look at the state, adoption and use of ICTs by students and academic staff at Mzuzu University. Design/methodology/approach: The research used a survey method whose study population included students, academic and library staff. Data for the study were collected using an interview guide and…
Descriptors: Foreign Countries, College Students, College Faculty, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Infante, Cristian; Hidalgo, Pedro; Nussbaum, Miguel; Alarcon, Rosa; Gottlieb, Andres – Computers & Education, 2009
Exchange is a collaborative learning application, originally developed for wirelessly interconnected Pocket PCs, that provides support for students and a teacher performing a face-to-face computer supported collaborative learning (CSCL) activity in a Single Input/Single Display (SISD) mode. We extend the application to support a single display…
Descriptors: Cooperative Learning, Technology Integration, Synchronous Communication, Computer Peripherals
Diaz, Russell – Campus Technology, 2009
In 2006, when the author joined the staff at Dominican College (New York), he discovered that the network, computers, and IT contracts were in sorry shape. He also found that this kind of condition is common in small colleges. Such a state of affairs is usually brought about by the unrelenting demands placed on small IT staffs. IT staffers at…
Descriptors: School Business Relationship, Small Colleges, Information Technology, Computer Networks
Branzburg, Jeffrey – Technology & Learning, 2007
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
Descriptors: Computer Security, Internet, Computer Peripherals, Telecommunications
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Kemppainen, Jyri; Tedre, Matti; Sutinen, Erkki – Journal of Information Technology Education: Research, 2012
Information technology (IT) professionals face markedly different kinds of challenges in developing countries from the ones in developed countries. Based on the research literature and our fourteen years of fieldwork in Iringa, Tanzania, we have identified eight groups of technical characteristics of IT work that significantly affect the work of…
Descriptors: Foreign Countries, Developing Nations, Engineering Education, Work Environment
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Douglas L. – Tech Directions, 2004
This article de-mystifies network patch cable secrets so that people can connect their computers and transfer those pesky files--without screaming at the cables. It describes a network cabling activity that can offer students a great hands-on opportunity for working with the tools, techniques, and media used in computer networking. Since the…
Descriptors: Educational Technology, Computer Networks, Computer Peripherals, Technology Education
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4