NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Peer reviewed Peer reviewed
Direct linkDirect link
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Weiss, Andrew M. – MultiMedia Schools, 1996
Running multimedia on a network, often difficult because of the memory and processing power required, is becoming easier thanks to new protocols and products. Those developing network design criteria may wish to consider making use of Fast Ethernet, Asynchronous Transfer Method (ATM), switches, "fat pipes", additional network…
Descriptors: Computer Networks, Computer System Design, Computer Uses in Education, Design Preferences
Peer reviewed Peer reviewed
Prevelakis, Vassilis; Keromytis, Angelos – Internet Research, 2003
Proposes the use of a special purpose drop-in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Discusses features and advantages of the system and demonstrates how Sieve was used in various application areas such as at…
Descriptors: Computer Networks, Computer Security, Computer Software Development, Computer System Design
Webster, James – Telecommunications, 1995
Discusses changes and improvements in the integrated services digital network (ISDN) that have caused ISDN to reemerge as a viable, cost-effective technology for use in home and office workstations. Reviews changes in demand, standards, availability, ease of use, and cost, and displays a diagram of a typical ISDN terminal adapter setup. (JMV)
Descriptors: Computer Networks, Computer System Design, Computer Terminals, Cost Effectiveness