NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 178 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Berson, Michael J.; Berson, Ilene R. – Social Education, 2020
The reality is that digital archives are fragile. Many people appreciate how information technology has revolutionized their lives but have spent little time reflecting on the historical significance of the migration from a print-based to a digital society. In the 100th year of the National Council for the Social Studies (NCSS), it seems timely to…
Descriptors: History, Memory, Obsolescence, Technology
Emmanuel Wansi – ProQuest LLC, 2023
Shortages within the cybersecurity workforce are not new; fluctuations in supply and demand, fiscal and monetary constraints, and technological advances have influenced changes within the cybersecurity workforce nationally and globally. Cloud computing and the Internet of Things (IoT) impact many different cybersecurity roles within different…
Descriptors: Evaluation, Internet, Computer Security, Information Security
Altiparmak, Nihat – ProQuest LLC, 2013
Massive amount of data is generated everyday through sensors, Internet transactions, social networks, video, and all other digital sources available. Many organizations store this data to enable breakthrough discoveries and innovation in science, engineering, medicine, and commerce. Such massive scale of data poses new research problems called big…
Descriptors: Information Storage, Data, Computer Storage Devices, Information Retrieval
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Serapiglia, Anthony – Information Systems Education Journal, 2014
The following Teaching Case is designed to expose students to three scenarios related to data stored on hard drives, techniques that could be used to retrieve deleted or corrupted data, and a method for a more thorough deletion of data from a hard drive. These issues are often overlooked in current IT curriculum and in our age of digital clutter…
Descriptors: Information Security, Information Storage, Computer Science Education, Class Activities
Waters, John K. – Education Digest: Essential Readings Condensed for Quick Review, 2011
The vulnerability and inefficiency of backing up data on-site is prompting school districts to switch to more secure, less troublesome cloud-based options. District auditors are pushing for a better way to back up their data than the on-site, tape-based system that had been used for years. About three years ago, Hendrick School District in…
Descriptors: Information Storage, School Districts, Computer Storage Devices, Internet
Ravage, Barbara – Campus Technology, 2012
Colleges and universities are running out of closet space. With the amount of data predicted to grow 800 percent by 2016, higher education faces a desperate race to develop strategies to store and manage the tidal wave of information. Unfortunately, many IT departments, particularly those in the public sector, have flatlining budgets--and no money…
Descriptors: Educational Finance, Financial Support, Computer Storage Devices, Information Storage
Stamas, Paul J. – ProQuest LLC, 2013
This case study research followed the two-year transition of a medium-sized manufacturing firm towards a service-oriented enterprise. A service-oriented enterprise is an emerging architecture of the firm that leverages the paradigm of services computing to integrate the capabilities of the firm with the complementary competencies of business…
Descriptors: Manufacturing, Organizational Change, Internet, Information Storage
Hastings, Robin – Computers in Libraries, 2012
Backups are a modern fact of life. Every organization that has any kind of computing technology (and that is all of them these days) needs to back up its data in case of technological or user errors. Traditionally, large-scale backups have been done via an internal or external tape drive that takes magnetic tapes (minicassettes, essentially) and…
Descriptors: Internet, Computer Storage Devices, Information Storage, Computer Software Evaluation
Schrader, Andrew – School Business Affairs, 2011
On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…
Descriptors: Electronic Mail, School Districts, Information Technology, Computer Security
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Duncan, S. M. – ProQuest LLC, 2009
Since the term "learning object" was first published, there has been either an explicit or implicit expectation of reuse. There has also been a lot of speculation about why learning objects are, or are not, reused. This study quantitatively examined the actual amount and type of learning object use, to include reuse, modification, and translation,…
Descriptors: Educational Resources, Open Source Technology, Computer Software, Computer Uses in Education
El-Bathy, Naser Ibrahim – ProQuest LLC, 2010
The study of this dissertation provides a solution to a very specific problem instance in the area of data mining, data warehousing, and service-oriented architecture in publishing and newspaper industries. The research question focuses on the integration of data mining and data warehousing. The research problem focuses on the development of…
Descriptors: Research Problems, Information Retrieval, Artificial Intelligence, Computer Science
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Monnens, Devin; Vowell, Zach; Ruggill, Judd Ethan; McAllister, Ken S.; Armstrong, Andrew – American Journal of Play, 2009
Over the last four decades, electronic games have profoundly changed the way people play, learn, and connect with each other. Despite the tremendous impact of electronic games, however, until recently, relatively few programs existed to preserve them for future generations of players and researchers. Recognizing the need to save the original…
Descriptors: Technology Uses in Education, Video Games, Preservation, Play
Peer reviewed Peer reviewed
Direct linkDirect link
Li, Qing; Zhao, Jianmin; Zhu, Xinzhong – International Journal of Distance Education Technologies, 2009
Supporting efficient data access in the mobile learning environment is becoming a hot research problem in recent years, and the problem becomes tougher when the clients are using light-weight mobile devices such as cell phones whose limited storage space prevents the clients from holding a large cache. A practical solution is to store the cache…
Descriptors: Electronic Learning, Research Problems, Statistical Data, Statistical Inference
Peer reviewed Peer reviewed
Direct linkDirect link
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12