NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Researchers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jake Carlson – Journal of Research Administration, 2023
Many funding agencies require researchers to include a data management plan with their grant applications explaining how they intend to make the data generated from the research publicly accessible. University administration and campus service providers could potentially leverage the content of data management plans to facilitate compliance and…
Descriptors: Data, Information Management, Grantsmanship, Research Administration
Isaac, James; Velez, Erin; Roberson, Amanda Janice – Institute for Higher Education Policy, 2023
Students, families, colleges, and lawmakers need clearer information on postsecondary outcomes to make informed decisions. By leveraging data available at institutions and federal agencies, a nationwide student-level data network (SLDN) would close information gaps that persist in our higher education landscape to answer critical questions about…
Descriptors: College Students, Data, Information Networks, Program Design
Moore, Colleen – Education Insights Center, 2020
The Education Insights Center produced a series of reports culminating in recommendations for the structure and governance of a preschool through higher education and into the workforce (known as a P20W data system). This brief follows up on that series, with a focus on data quality; the brief was informed by the author's experience using…
Descriptors: Governance, Preschool Education, Elementary Secondary Education, Higher Education
Wirth, Niklaus – Scientific American, 1984
Built-in data structures are the registers and memory words where binary values are stored; hard-wired algorithms are the fixed rules, embodied in electronic logic circuits, by which stored data are interpreted as instructions to be executed. Various topics related to these two basic elements of every computer program are discussed. (JN)
Descriptors: Algorithms, Computer Science, Computer Software, Data
Fife, Jonathan D. – 1974
Today, with development of computerized data banks, there is an increased quantity of stored information that has relevance to problems far beyond the scope of the original study for which the data were developed. The purpose of this paper is to highlight some of the major data available and their sources. It is hoped that by describing some of…
Descriptors: Data, Databases, Higher Education, Information Centers
Peer reviewed Peer reviewed
Stafford, Susan G. – Environmental Monitoring and Assessment, 1993
Describes the Forest Science Data Bank that contains 2,400 data sets from over 350 existing ecological studies. Database features described include involvement of the scientific community; database documentation; data quality assurance; security; data access and retrieval; and data import/export flexibility. Appendices present the Quantitative…
Descriptors: Data, Databases, Ecology, Environmental Education
Peer reviewed Peer reviewed
Direct linkDirect link
Hacker, Thomas J.; Wheeler, Bradley C. – EDUCAUSE Quarterly, 2007
The commoditization of low-cost hardware has enabled even modest-sized laboratories and research projects to own their own "supercomputers." The authors argue that this local solution undermines rather than amplifies the research potential of scholars. CIOs, provosts, and research technologists should consider carefully an overall…
Descriptors: Laboratories, Computers, Information Technology, Technology Planning
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers