63,274 research outputs found

    Latin American perspectives to internationalize undergraduate information technology education

    Get PDF
    The computing education community expects modern curricular guidelines for information technology (IT) undergraduate degree programs by 2017. The authors of this work focus on eliciting and analyzing Latin American academic and industry perspectives on IT undergraduate education. The objective is to ensure that the IT curricular framework in the IT2017 report articulates the relationship between academic preparation and the work environment of IT graduates in light of current technological and educational trends in Latin America and elsewhere. Activities focus on soliciting and analyzing survey data collected from institutions and consortia in IT education and IT professional and educational societies in Latin America; these activities also include garnering the expertise of the authors. Findings show that IT degree programs are making progress in bridging the academic-industry gap, but more work remains

    Latin American perspectives and the IT2017 curricular guidelines

    Get PDF
    The term information technology has many meanings for various stakeholders and continues to evolve. This discussion presents an overview of the developing curricular guidelines for rigorous, high quality, bachelor\u27s degree programs in information technology (IT), called IT2017. Panel participants will focus on Latin American academic and industry perspectives on IT undergraduate education. Discussion will seek to ascertain commonalities and differences between the current draft IT2017 report and perspectives from Latino/a professional and academic communities. It also addresses ways in which this endeavor contrasts with current practices in Latin America industry and academia

    Kansas V. Nebraska & Colorado: Keeping Equity Afloat in the Republican River Dispute

    Get PDF
    This commentary previews an upcoming Supreme Court case, Kansas v. Nebraska & Colorado. The Supreme Court will have the opportunity to resolve a decades-old conflict over water rights in the Republican River which flows through Colorado, Nebraska, and Kansas. In this case of original jurisdiction, the Court will determine both whether Nebraska violated a 60-year old compact concerning water rights, and what the appropriate remedy should be for that violation

    Engineering Change in Mexico: The Adoption of Computer Technology at Grupo ICA (1965-1971)

    Get PDF
    This article documents the adoption of computer technology by a civil engineering services and construction company in Mexico at the time that it became the first Mexican multinational enterprise. Computerization took place independently of cross border growth. The challenges, failures and successes of computerization attest to the transformation in the use of computer applications from the mechanization of routine procedures to the creative use of these applications. In line with company policy, the latter lead to the establishment of the computer centre as a standalone, profit generating business unit. However, this policy responded to ‘laissez faire’ and fiscal (i.e. minimizing tax payments) rather than strategic considerations. To little surprise computer services never grew to be a significant income stream.Computer centers, History, Data processing, Computer integrated engineering, Mexico

    Leave No Charter Behind: An Authorizer Guide to the Use of Growth Data

    Get PDF
    The purpose of this brief is to guide the reader in the effective use of data for measuring student academic growth. It explores the use of different measurement models in school accountability systems. While targeted to the authorizers of charter schools, the brief is helpful to anyone who evaluates the performance of a portfolio of schools

    The Story of ‘Hoffman Plastic Compounds v. NLRB’: Labor Rights Without Remedies for Undocumented Immigrants

    Get PDF
    In Hoffman Plastic Compounds v. NLRB, 535 U.S. 137 (2002), the United States Supreme Court held that undocumented workers are not entitled to remedies for violations of their rights to unionize under the National Labor Relations Act. The majority of the Court viewed enforcement of immigration policy prohibiting employment of undocumented workers as more important than protecting the labor rights of both undocumented workers and their U.S. citizen co-workers who join their efforts to improve working conditions. The chapter explores the origins of the case in a minimum-wage factory in Los Angeles, the surprising turn of events when the illegally fired worker blurted out on the witness stand that he was not a U.S. citizen, how the lawyer for the employer portrayed his client as being unaware of the worker\u27s undocumented status when the employee he had stated on the job application that he was not authorized to work in the U.S., and the closely-divided decisions at every level of judicial review in which judges disagreed strenuously how to reconcile immigration and labor policy. The chapter also explores the impact of the case on a wide variety of state and federal employment cases in which employers have argued that undocumented workers are unprotected by law

    Security in Pervasive Computing: Current Status and Open Issues

    Get PDF
    Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thousands of pervasive devices are able to arbitrarily join and leave a network, creating a nomadic environment known as a pervasive ad hoc network. However, mobile devices have vulnerabilities, and some are proving to be challenging. Security in pervasive computing is the most critical challenge. Security is needed to ensure exact and accurate confidentiality, integrity, authentication, and access control, to name a few. Security for mobile devices, though still in its infancy, has drawn the attention of various researchers. As pervasive devices become incorporated in our day-to-day lives, security will increasingly becoming a common concern for all users - - though for most it will be an afterthought, like many other computing functions. The usability and expansion of pervasive computing applications depends greatly on the security and reliability provided by the applications. At this critical juncture, security research is growing. This paper examines the recent trends and forward thinking investigation in several fields of security, along with a brief history of previous accomplishments in the corresponding areas. Some open issues have been discussed for further investigation

    Information technology in educational management as an emerging discipline

    Get PDF
    This chapter introduces the application of computerized management information systems in schools and presents a brief history of the dynamic area of Information Technology in Educational Management (ITEM). Subsequently, the background of this special issue and a framework for its contents are portrayed. Finally, an overview is presented of the contents of the special issue

    Public Libraries and the Internet 2006

    Get PDF
    Examines the capability of public libraries to provide and sustain public access Internet services and resources that meet community needs, including serving as the first choice for content, resources, services, and technology infrastructure
    • …
    corecore