NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)13
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 60 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Serapiglia, Anthony – Information Systems Education Journal, 2014
The following Teaching Case is designed to expose students to three scenarios related to data stored on hard drives, techniques that could be used to retrieve deleted or corrupted data, and a method for a more thorough deletion of data from a hard drive. These issues are often overlooked in current IT curriculum and in our age of digital clutter…
Descriptors: Information Security, Information Storage, Computer Science Education, Class Activities
Waters, John K. – Education Digest: Essential Readings Condensed for Quick Review, 2011
The vulnerability and inefficiency of backing up data on-site is prompting school districts to switch to more secure, less troublesome cloud-based options. District auditors are pushing for a better way to back up their data than the on-site, tape-based system that had been used for years. About three years ago, Hendrick School District in…
Descriptors: Information Storage, School Districts, Computer Storage Devices, Internet
Ravage, Barbara – Campus Technology, 2012
Colleges and universities are running out of closet space. With the amount of data predicted to grow 800 percent by 2016, higher education faces a desperate race to develop strategies to store and manage the tidal wave of information. Unfortunately, many IT departments, particularly those in the public sector, have flatlining budgets--and no money…
Descriptors: Educational Finance, Financial Support, Computer Storage Devices, Information Storage
Hastings, Robin – Computers in Libraries, 2012
Backups are a modern fact of life. Every organization that has any kind of computing technology (and that is all of them these days) needs to back up its data in case of technological or user errors. Traditionally, large-scale backups have been done via an internal or external tape drive that takes magnetic tapes (minicassettes, essentially) and…
Descriptors: Internet, Computer Storage Devices, Information Storage, Computer Software Evaluation
Schrader, Andrew – School Business Affairs, 2011
On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…
Descriptors: Electronic Mail, School Districts, Information Technology, Computer Security
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Monnens, Devin; Vowell, Zach; Ruggill, Judd Ethan; McAllister, Ken S.; Armstrong, Andrew – American Journal of Play, 2009
Over the last four decades, electronic games have profoundly changed the way people play, learn, and connect with each other. Despite the tremendous impact of electronic games, however, until recently, relatively few programs existed to preserve them for future generations of players and researchers. Recognizing the need to save the original…
Descriptors: Technology Uses in Education, Video Games, Preservation, Play
Peer reviewed Peer reviewed
Direct linkDirect link
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
Buck, Stephanie – Computers in Libraries, 2009
As news outlets create headlines such as "A Cloud & A Prayer," "The Cloud Is the Computer," and "Leveraging Clouds to Make You More Efficient," many readers have been left with cloud confusion. Many definitions exist for cloud computing, and a uniform definition is hard to find. In its most basic form, cloud…
Descriptors: Computers, Libraries, Information Technology, Information Scientists
Branzburg, Jeffrey – Technology & Learning, 2004
In this article, the author gives tips on how to back up files to avoid losing work. Some of the methods he suggests include: (1) Floppy Disks; (2) Other Removable Media; (3) External Hard Drives; (4) Online; and (5) Backup Tape. He discusses manually backing up files in addition to using software to do so.
Descriptors: Computer Storage Devices, Information Storage
Urrows, Henry; Urrows, Elizabeth – Optical Information Systems, 1988
Describes capabilities of Digi-Data's high-capacity computer storage tape drive, Gigastore, and FileTek's Storage Machine/1. Optical digital disk (ODD) leaders' reactions, opinions, and new products are reported. A directory of 13 ODD sources is included. (MES)
Descriptors: Computer Storage Devices, Information Storage, Optical Disks
Esque, Timm J. – Performance & Instruction, 1996
Discussion of human memory, computer memory, and the storage of information focuses on a metaphor that can account for memory without storage and can set the stage for systemic research around a more comprehensive, understandable theory. (Author/LRW)
Descriptors: Computer Storage Devices, Information Storage, Memory, Metaphors
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Boja, Catalin – Journal of Applied Quantitative Methods, 2006
There are described methods used to minimize data files dimension. There are defined indicators for measuring size of files and databases. The storage optimization process is based on selecting from a multitude of data storage models the one that satisfies the propose problem objective, maximization or minimization of the optimum criterion that is…
Descriptors: Databases, Data, Information Science, Information Storage
Briggs, Linda L. – Campus Technology, 2006
"I saved my presentation in my personal drive on the server last night, but now I can't find it. It just seems to be gone. Can you get it back?" "It looks like the mail server is corrupted. When was the last backup?" These sorts of questions, whether from faculty, students, or IT staff, can be an IT nightmare, or they can set…
Descriptors: Computer Peripherals, Client Server Architecture, Information Technology, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Berdinka, Matthew J. – Tech Directions, 2005
Technology that once involved a scary, mysterious machine the size of a small house now fits on desktops and commonly appears in offices, schools, and homes. Computers allow for processing, storing and transmitting data between two or more people virtually anywhere in the world. They also allow users to save documents, presentations, photos and…
Descriptors: Computer Storage Devices, Technological Advancement, Data Processing, Information Storage
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4