NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 151 to 165 of 547 results Save | Export
Bologna, Jack, Comp. – 1989
This bibliography lists 14 books, 154 journal articles, 34 newspaper articles, and 3 research papers published during 1988-1989 on the subject of computer viruses, software protection and 'cures', virus hackers, and other related issues. Some of the sources listed include Computers and Security, Computer Security Digest, PC Week, Time, the New…
Descriptors: Books, Computer Networks, Computer Software, Computers
Peer reviewed Peer reviewed
Isaacs, Geoff – Journal of Computer Assisted Learning, 1989
Describes implementation, support, and evaluation of computer assisted learning (CAL) projects at three universities: Project Athena at Massachusetts Institute of Technology; the Andrew network at Carnegie Mellon University; and a project at Stanford University. Topics discussed include work stations, microcomputers, computer networks, graphics,…
Descriptors: Computer Assisted Instruction, Computer Graphics, Computer Networks, Computer Software
Peer reviewed Peer reviewed
Wallmannsberger, Josef – Electronic Library, 1994
Discusses the World Wide Web (W3) and its relevance to a philosophy of science. Topics include PORIDGE, an electronically mediated encyclopedia of postmodern knowledge; hypertext mark-up language; W3 as a medium for information ecologies; the relationship between W3 and the user; social manufacture of knowledge; and W3 as a model. (29 references)…
Descriptors: Computer Networks, Computer Software, Encyclopedias, Hypermedia
Harris, Judi – Computing Teacher, 1994
Explains client software tools that simplify two information access procedures on the Internet, i.e., file transfer and file access. The use of "Fetch" to explore and access file transfer protocol archives, and "TurboGopher," to explore and access Gopher servers, are described. (Contains two references.) (LRW)
Descriptors: Access to Information, Computer Networks, Computer Software, File Transfer Protocol
Peer reviewed Peer reviewed
Rugg, Tom – CD-ROM Professional, 1993
Describes the hardware, operating systems, and expenses involved with linking personal computers in low-cost, small- to medium-sized LANs (local area networks) that permit users to share CD-ROM resources. Purchasing and installing Ethernet hardware, the use of starter kits, assembling individual components, and LANtastic and NetWare Lite network…
Descriptors: Computer Networks, Computer Software, Costs, Local Area Networks
Peer reviewed Peer reviewed
Breeding, Marshall – Library Software Review, 1996
Provides a list of companies that offer commercial library software and describes the systems and tools they offer. Integrated library systems, networking systems, bibliographic software, and other library applications are included. (LRW)
Descriptors: Bibliographic Records, Computer Networks, Computer Software, Integrated Library Systems
Peer reviewed Peer reviewed
Breeding, Marshall – Library Software Review, 1997
Provides an update to the list of companies that offer commercial library software and describes the systems and tools they offer. Integrated library systems, networking systems, bibliographic software, and other library applications are included. (LRW)
Descriptors: Bibliographic Records, Computer Networks, Computer Software, Integrated Library Systems
Breeding, Marshall – Computers in Libraries, 2005
This brief article gives a description of the Open Croquet Project and its applications. The project's Web site describes Croquet as a "combination of computer software and network architecture that supports deep collaboration and resource sharing among large numbers of users within the context of a large-scale distributed information system." One…
Descriptors: Computer System Design, Computer Interfaces, Computer Software, Computer Networks
Peer reviewed Peer reviewed
Ozkan, Betul C.; Gunay, Vedat – T.H.E. Journal, 2004
Emerging technologies are quickly becoming part of daily learning and teaching endeavors in academia. Due to the access to certain high-tech tools educators must learn how to integrate these tools in educational settings. However, many also encounter problems and weaknesses in the same high-tech environment that uses and delivers information…
Descriptors: Viruses, Computer Security, Higher Education, Computer Networks
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Ferrer, Daniel Fidel; Mead, Mary – Computers in Libraries, 2003
Describes spyware, discusses how it gets on a computer. Explains how spyware can be useful for parents, employers, and libraries. Discusses how spyware is more often used for others' gain or for surveillance without notification, how it can go undetected, and how libraries can help keep computers and patrons protected from remote installation of…
Descriptors: Computer Networks, Computer Security, Computer Software, Libraries
Bailey, Charles W., Jr. – Online, 1991
Describes the development and operation of an electronic serial, "The Public-Access Computer Systems Review." Its evolution from the Public-Access Computer Systems Forum--a computer conference on BITNET run by the University of Houston libraries--is explained, and two sidebars describe other conferences and electronic serials available…
Descriptors: Academic Libraries, Computer Networks, Computer Software, Electronic Journals
Besser, Howard – Database, 1995
Outlines some of the major considerations in developing an image database system with an emphasis on continuous tone images and network-accessible multiuser databases. Topics include: definition/description of a digital image; matching technology to use; documentation/standards; access; image quality; software systems; scanners; and sources of…
Descriptors: Computer Networks, Computer Software, Database Design, Databases
Sturr, Natalie Oakes – Computers in Libraries, 1995
Describes libraries' use of the Internet to provide information on their local collections and explains how to provide searchable indexes through the use of WAIS (Wide Area Information Server) software. Highlights include Waisindex; file formats; Waissearch; and accessing WAIS indexes via a gopher, WAIS, or WWW (World Wide Web) server. (LRW)
Descriptors: Access to Information, Computer Networks, Computer Software, Indexing
Nickerson, Gord – Computers in Libraries, 1992
Discussion of software tools for accessing information on the Internet focuses on the WorldWideWeb (WWW) system, which was developed at the European Particle Physics Laboratory (CERN) in Switzerland to build a worldwide network of hypertext links using available networking technology. Its potential for use with multimedia documents is also…
Descriptors: Computer Networks, Computer Software, Foreign Countries, Hypermedia
Pages: 1  |  ...  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  ...  |  37