Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 13 |
Descriptor
Source
Campus Technology | 3 |
EDUCAUSE Quarterly | 3 |
Educational Technology | 2 |
Technology & Learning | 2 |
British Journal of… | 1 |
Journal of Educational… | 1 |
School Business Affairs | 1 |
T.H.E. Journal | 1 |
Author
Bennett, Cedric | 1 |
Daniel, Ben | 1 |
Dexter, Sara | 1 |
Hacker, Thomas J. | 1 |
Haughton, Noela A. | 1 |
Keil, Virginia L. | 1 |
Lahiri, Minakshi | 1 |
Mills, Lane B. | 1 |
Moseley, James L. | 1 |
Ramaswami, Rama | 1 |
Ravage, Barbara | 1 |
More ▼ |
Publication Type
Journal Articles | 14 |
Reports - Descriptive | 10 |
Reports - Evaluative | 2 |
Reports - Research | 2 |
Information Analyses | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 6 |
Elementary Secondary Education | 5 |
Elementary Education | 1 |
Audience
Location
Arizona | 1 |
Belgium | 1 |
Indiana | 1 |
New Mexico | 1 |
Ohio | 1 |
Washington | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Daniel, Ben – Educational Technology, 2017
The increasing availability of digital data in higher education provides an extraordinary resource for researchers to undertake educational research, targeted at understanding challenges facing the sector. Big data can stimulate new ways to transform processes relating to learning and teaching, and helps identify useful data, sources of evidence…
Descriptors: Higher Education, Educational Research, Information Utilization, Data
Ravage, Barbara – Campus Technology, 2012
Colleges and universities are running out of closet space. With the amount of data predicted to grow 800 percent by 2016, higher education faces a desperate race to develop strategies to store and manage the tidal wave of information. Unfortunately, many IT departments, particularly those in the public sector, have flatlining budgets--and no money…
Descriptors: Educational Finance, Financial Support, Computer Storage Devices, Information Storage
Waters, John K. – Campus Technology, 2012
Colleges and universities are swimming in an ever-widening sea of data. Human beings and machines together generate about 2.5 "quintillion" (10[superscript 18]) bytes every day, according to IBM's latest estimate. The sources of all that data are dizzyingly diverse: e-mail, blogs, click streams, security cameras, weather sensors, social networks,…
Descriptors: Electronic Publishing, Data, Information Utilization, Information Management
Lahiri, Minakshi; Moseley, James L. – Educational Technology, 2013
"Cloud computing" is currently the "buzzword" in the Information Technology field. Cloud computing facilitates convenient access to information and software resources as well as easy storage and sharing of files and data, without the end users being aware of the details of the computing technology behind the process. This…
Descriptors: Technology Uses in Education, Technology Planning, Information Technology, Information Management
Vanderlinde, Ruben; Dexter, Sara; van Braak, Johan – British Journal of Educational Technology, 2012
Schools are more and more encouraged to write a school-based information and communication technology (ICT) policy plan. In such a plan, a school describes its expectations, goals, content and actions related to the future role of ICT in teaching and learning. Although this is encouraged by researchers and policy makers, the literature on ICT…
Descriptors: Foreign Countries, Educational Technology, Decision Making, Data
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Mills, Lane B. – Technology & Learning, 2008
These days, "data-driven decision making" is on every school district's buzzword bingo game board. Accountability pressures and lean budgets make translating data into information a major focus of school systems that are trying to improve district outcomes in all areas. As such, data warehousing has become an essential district tool. Historically…
Descriptors: Accountability, Data, Decision Making, Information Storage
Keil, Virginia L.; Haughton, Noela A. – Journal of Educational Computing Research, 2009
The College of Education Assessment Infrastructure Survey was developed and administered to 1011 institutions over a 12-month period ending April 2007. The survey examined the capacity of university-based teacher preparation programs to respond to the growing and increasingly complex data management requirements that accompanies assessment and…
Descriptors: Accountability, Teacher Education Programs, Schools of Education, Institutional Evaluation
Weiss, Meredith – EDUCAUSE Quarterly, 2008
Interaction design is a user-centered approach to development in which users and their goals are the driving force behind a project's design. Interaction design principles are fundamental to the design and implementation of effective websites, but they are not sufficient. This article argues that, to reach its full potential, a website should also…
Descriptors: Computer Software, Marketing, Interaction, Web Sites
Ramaswami, Rama – T.H.E. Journal, 2008
As technology grows more pervasive in education, the data recovery issues that school systems encounter are becoming increasingly problematic, as districts work to accommodate a range of concerns that do not encumber commercial businesses. State and federal laws often require schools to report on student populations and educational progress…
Descriptors: Elementary Secondary Education, Educational Technology, Computer Uses in Education, Technology Integration
Hacker, Thomas J.; Wheeler, Bradley C. – EDUCAUSE Quarterly, 2007
The commoditization of low-cost hardware has enabled even modest-sized laboratories and research projects to own their own "supercomputers." The authors argue that this local solution undermines rather than amplifies the research potential of scholars. CIOs, provosts, and research technologists should consider carefully an overall…
Descriptors: Laboratories, Computers, Information Technology, Technology Planning
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Technology & Learning, 2005
In recent years, the widespread availability of networks and the flexibility of Web browsers have shifted the industry from a client-server model to a Web-based one. In the client-server model of computing, clients run applications locally, with the servers managing storage, printing functions, and network traffic. Because every client is…
Descriptors: Computers, Computer System Design, Internet, Computer Uses in Education