NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 196 to 210 of 463 results Save | Export
Baloglu, Arzu – Online Submission, 2007
Distance learning is appealing to small business owners, employees, municipalities, state establishments, non-governmental organizations. Distance-learning are ideal for people who have a full-time job or other commitments, who can't take time off to study full time. This might be a professional who needs to update his knowledge or skills, or a…
Descriptors: Distance Education, Instructional Materials, Virtual Universities, Computer System Design
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Peer reviewed Peer reviewed
PDF on ERIC Download full text
vultur, Sidonia Otilia; Marincas, Delia Adriana – Journal of Applied Quantitative Methods, 2007
In this paper, an evaluation of web sites regarded like projects is discussed. We give an overview of the Web Assessment Index (WAI), by presenting a web sites of Romanian Faculties of Economics case study. The WAI contains five categories: accessibility, access speed, navigability, content and reliability. We analyzed and presented a detailed…
Descriptors: Web Sites, Internet, Foreign Countries, Computer Software Evaluation
Peer reviewed Peer reviewed
Augsburger, Wayne; McNary, Larry – CD-ROM Professional, 1992
Suggests a process for evaluating and planning integrated optical jukebox storage systems. Considerations regarding architecture and system performance are summarized, and a modeling program for tailoring system response to specific applications is presented. Five robotics algorithms are examined to illustrate different hardware configurations.…
Descriptors: Algorithms, Computer System Design, Information Systems, Information Technology
Birt, Carina – Information Management & Technology, 1998
Addresses the growth of signatures in document management. Describes the three basic types of electronic signature technology: image signatures, digital signatures, and digitized biometric signatures. Discusses legal and regulatory acceptability and bringing signatures into document management. (AEF)
Descriptors: Automation, Computer System Design, Information Management, Information Technology
Peer reviewed Peer reviewed
Lamont, Melissa – Journal of Academic Librarianship, 1997
Geographic information systems (GIS) are commonly misconceived as expensive and complicated map makers. Although GISs do create maps, they manipulate, organize, and display information, and aid in data documentation and accessibility. Managing GIS services involves not just hardware and software issues but managing digital data. (Author/AEF)
Descriptors: Access to Information, Computer System Design, Information Management, Information Services
Peer reviewed Peer reviewed
Direct linkDirect link
Haberman, Bruria; Yehezkel, Cecile – Journal of Information Technology Education, 2008
The rapid evolvement of the computing domain has posed challenges in attempting to bridge the gap between school and the contemporary world of computing, which is related to content, learning culture, and professional norms. We believe that the interaction of high-school students who major in computer science or software engineering with leading…
Descriptors: Enrichment Activities, Formative Evaluation, Program Effectiveness, Computer System Design
Peer reviewed Peer reviewed
Direct linkDirect link
King, Michael A. – Journal of Information Technology Education, 2009
Business intelligence derived from data warehousing and data mining has become one of the most strategic management tools today, providing organizations with long-term competitive advantages. Business school curriculums and popular database textbooks cover data warehousing, but the examples and problem sets typically are small and unrealistic. The…
Descriptors: Strategic Planning, Problem Sets, Corporations, Statistics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wessa, Patrick – Electronic Journal of e-Learning, 2009
This paper discusses the implementation of a new e-learning environment that supports non-rote learning of exploratory and inductive statistics within the pedagogical paradigm of social constructivism. The e-learning system is based on a new computational framework that allows us to create an electronic research environment where students are…
Descriptors: Electronic Learning, Feedback (Response), Constructivism (Learning), Learning Strategies
Peer reviewed Peer reviewed
Direct linkDirect link
Deitering, Anne-Marie; Bridgewater, Rachel – Journal of Web Librarianship, 2007
This article details the development of the Library Instruction Wiki (http://instructionwiki.org): an effort to develop a web-based, knowledge-sharing resource. Though some library instruction is specific to a given institution or class, much of what instruction librarians teach is similar. Library instructors have repeatedly expressed the desire…
Descriptors: Knowledge Management, Information Technology, Educational Technology, Library Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Philip, George C. – Journal of Information Technology Education, 2007
This paper identifies several areas of database modeling and design that have been problematic for students and even are likely to confuse faculty. Major contributing factors are the lack of clarity and inaccuracies that persist in the presentation of some basic database concepts in textbooks. The paper analyzes the problems and discusses ways to…
Descriptors: Database Design, Databases, Teaching Methods, Misconceptions
Senn, Gary J.; Smyth, Thomas J. C. – 1995
Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…
Descriptors: Computer Interfaces, Computer Security, Computer Software Evaluation, Computer System Design
Thibeault, Nancy E. – 1997
This paper evaluates four tools for creating World Wide Web pages that interface with Microsoft Access databases: DB Gateway, Internet Database Assistant (IDBA), Microsoft Internet Database Connector (IDC), and Cold Fusion. The system requirements and features of each tool are discussed. A sample application, "The Virtual Help Desk"…
Descriptors: Computer Software Evaluation, Computer System Design, Databases, Design Requirements
Peer reviewed Peer reviewed
Roth, Steven F.; Chuah, Mei C.; Kerpedjiev, Stephan; Kolojejchick, John A.; Lucas, Peter – Human-Computer Interaction, 1997
Presents an information visualization workspace in which users are able to explore data presented in diverse but coordinated formats using related systems called Visage, SAGE, and selective dynamic manipulation (SDM). Discusses four dimensions for analyzing user interfaces that reveal the combination of design approaches needed for visualizations…
Descriptors: Computer Interfaces, Computer Oriented Programs, Computer System Design, Data Analysis
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Pages: 1  |  ...  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  ...  |  31