NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2007
The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…
Descriptors: Internet, Educational Technology, Computers, Electronic Equipment
Pitler, Howard; Flynn, Kathleen; Gaddy, Barbara – Learning Point Associates / North Central Regional Educational Laboratory (NCREL), 2004
Research indicates that thoughtful technology use can positively influence learning process inside and outside the classroom, and one-to-one computing has been gaining popularity. Although some view such initiatives as passing, others look at the mounting research and see opportunities to reshape the nature of instruction and learning. This brief…
Descriptors: Elementary Secondary Education, Access to Computers, Academic Standards, Instructional Materials