NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 14,011 to 14,025 of 28,057 results Save | Export
Peer reviewed Peer reviewed
Warger, Thomas – Educause Quarterly, 2002
Discusses how, despite many obstacles, open-source software has the potential to strongly influence the future of software development and support in the academic world. (EV)
Descriptors: Computer Software Development, Higher Education, Programming
Peer reviewed Peer reviewed
Palmore, Teddy B. – TechTrends, 1989
Presents a history of computer viruses, explains various types of viruses and how they affect software or computer operating systems, and describes examples of specific viruses. Available vaccines are explained, and precautions for protecting programs and disks are given. (nine references) (LRW)
Descriptors: Computer Software, Floppy Disks, Microcomputers, Programing
Peer reviewed Peer reviewed
Metzler, Douglas P.; And Others – Information Processing and Management, 1990
Describes the Constituent Object Parser (COP), a domain independent syntactic parser developed for use in information retrieval and similar applications. The syntactic structure of natural language entities is discussed, and the mechanisms by which COP handles the problems of conjunctions, ellipsis, and discontinuous constituents are explained.…
Descriptors: Computer Software, Conjunctions, Information Retrieval, Syntax
Peer reviewed Peer reviewed
Eyman, David H. – Library Software Review, 1988
Discusses reasons for learning to program in BASIC, various versions of BASIC, BASIC compilers, and adherence to proposed standards. Brief reviews of six BASIC software packages are included. (12 references) (MES)
Descriptors: Computer Software, Microcomputers, Programing, Programing Languages
Peer reviewed Peer reviewed
Schramm, Robert M.; And Others – Office Systems Research Journal, 1995
Discusses current laws that can be applied to software piracy and methods to prevent piracy in organizations. Specifically looks at copyright and patent law. (JOW)
Descriptors: Computer Software, Copyrights, Legal Responsibility, Legislation
Peer reviewed Peer reviewed
Smith, Roger A. – Technology Teacher, 1992
Presents a model for the purchase of computer-aided design (CAD) software: collect general information, observe CAD in use, arrange onsite demonstrations, select CAD software and hardware, and choose a vendor. (JOW)
Descriptors: Computer Assisted Design, Computer Software, Purchasing
Peer reviewed Peer reviewed
Shear, Victor – CD-ROM Professional, 1992
Discusses the need for security and metering features for CD-ROM products. Topics covered include user productivity issues, pricing problems, integrated information resources, advantages of CD-ROM distribution systems, unauthorized use, content encryption, and multiple simultaneous meters. (MES)
Descriptors: Computer Software, Costs, Optical Data Disks
Peer reviewed Peer reviewed
Soares, Luiz Fernando G.; And Others – Information Services and Use, 1993
Presents a layered architecture for hypermedia systems that uses the MHEG (Multimedia and Hypermedia Information Coding Expert Group) proposal to provide the desired independence between hypermedia applications' conceptual models and storage strategies for hypermedia objects. An overview of the MHEG standard proposal is provided. (Contains 16…
Descriptors: Computer Software Development, Hypermedia, Models, Standards
Desmarais, Norman – Computers in Libraries, 1991
Reviews current developments in multimedia computing for both the business and consumer markets, including interactive multimedia players; compact disc-interactive (CD-I), including levels of audio quality, various video specifications and visual effects, and software; digital video interactive (DVI); and multimedia personal computers. (LRW)
Descriptors: Computer Software, Microcomputers, Optical Data Disks
Milshtein, Amy – College Planning & Management, 1999
Explains how Stanford University custom designed its own building maintenance and administration software package: the Housing Operations Maintenance Enterprise Resource (HOMER). Describes how HOMER relieved facility maintenance staff from some archaic systems, and its development and functionality. (GR)
Descriptors: Computer Software Development, Dormitories, Higher Education
Peer reviewed Peer reviewed
Duval, Beverly K.; Main, Linda – Library Software Review, 1997
Explains how to incorporate sound and video into Web pages with special software and HTML tags. Topics include creating sound files; sound formats; video technology; video formats; referencing sound and video files in HTML pages; embedding sounds and videos; players, plug-ins, and viewers; sound and video files from the Web; and streaming. (LRW)
Descriptors: Acoustics, Computer Software, World Wide Web
Peer reviewed Peer reviewed
Wu, Ing-Long – Journal of Educational and Behavioral Statistics, 2001
Presents two binary programming models with a special network structure that can be explored computationally for simultaneous test construction. Uses an efficient special purpose network algorithm to solve these models. An empirical study illustrates the approach. (SLD)
Descriptors: Algorithms, Computer Software, Networks, Test Construction
Kollie, Ellen – College Planning & Management, 1999
Describes the use of digital ortho photography in the master planning process conducted at the University of Alabama that made planning easy and quick to do. What the benefits are in going digital for master planning are highlighted as is a description of what hardware and software are needed. (GR)
Descriptors: Computer Software, Higher Education, Master Plans
Wodarz, Nan – School Business Affairs, 2001
Describes new features, system specifications, upgrading procedures, and package options (including costs) for Office XP. (PKP)
Descriptors: Computer Software Reviews, Elementary Secondary Education
Peer reviewed Peer reviewed
Martin, Kelly – T.H.E. Journal, 2004
It used to be that Internet threats were aimed at disabling their targets. The most common payload of yesterday's viruses, worms and other malicious code either caused system instability or, perhaps, deleted certain files. In many cases, these threats announced their arrival by flashing messages on the computer screen or causing some other…
Descriptors: Computer Security, Computer Software, Privacy, Internet
Pages: 1  |  ...  |  931  |  932  |  933  |  934  |  935  |  936  |  937  |  938  |  939  |  ...  |  1871