49 research outputs found

    AN EVALUATION OF THE BENEFITS AND DIFFICULTIES FACING GHANAIAN SMES IN IMPLEMENTING CLOUD COMPUTING

    Get PDF
    ABSTRACT The advantages and challenges of cloud computing services adoption by Small and Medium Size Enterprises (SMEs) in the Kumasi Metropolis are examined in this paper. SMEs in Ghana lack adequate information technology skills for record keeping and information management, marketing and processing. It will be beneficial for SMEs in Ghana to use cloud conjugating for enable productivity, dependability, cost savings, and corporate cooperation. Although, the benefits of cloud computing are enormous, due to a number of obstacles, the widespread implementation of cloud computing among SMEs is slow and discouraging. The impact of the use of cloud computing on the performance of the organization has also been thoroughly explored in this study. Using a combination of methods. the study gathered quantitative data using questionnaires. whereas interview guides were used to gather qualitative data. In assessing the effects of the use of cloud computing on the firm\u27s performance, a simple linear regression was used to ascertain the correlation between them. The findings establish that cloud computing has a major influence on business performance. Data were gathered in the Kumasi Metropolitan Area

    Columbia Chronicle (11/11/1996)

    Get PDF
    Student newspaper from November 11, 1996 entitled The Chronicle of Columbia College Chicago. This issue is 16 pages and is listed as Volume XXX, Number 8. Cover story: From Kuwait to Columbia Editor in Chief: John Henry Biedermanhttps://digitalcommons.colum.edu/cadc_chronicle/1362/thumbnail.jp

    Hackers: a case-study of the social shaping of computing

    Get PDF
    The study is an examination of hacking, placing the act in the context of theories of technological change. The account of hacking is used to substantiate those theories that emphasise the societal shaping of technology over the notion of technological determinism. The evolution of hacking is traced, showing how it reflects changing trends in the nature of information: the most vivid of these is the conceptualisation of information known as 'cyberspace'. Instead of simply cataloguing the impact of technical changes within computing, and the effects they have had upon information, the study shows how technical change takes place in a process of negotiation and conflict between groups.The two main groups analysed are those of the Computer Underground (CU) and the Computer Security Industry (CSI). The experiences and views of both groups are recounted in what constitute internalist and externalist accounts of hacking and its significance. The internalist account is the evidence provided by hackers themselves. It addresses such issues as what motivates the act of hacking; whether there is an identifiable hacking culture; and why it is almost an exclusively male activity. The externalist account contains the perceptions of hacking held by those outside the activity.The state of computing's security measures and its vulnerability to hacking is described, and evidence is provided of the extent to which hacking gives rise to technical knowledge that could be of potential use in the fixing of security weaknesses. The division within the CSI between those broadly cooperative with hackers and those largely hostile to them is examined, and the reasons why hacking knowledge is not generally utilised are explored. Hackers are prevented from gaining legitimacy within computing in a process referred to as 'closure'. Examples include hackers being stigmatised through the use of analogies that compare their computing activities to conventional crimes such as burglary and tresspass.Stigmatisation is carried out by the CSI who use it in a process of professional boundary formation to distinguish themselves from hackers. It is also used by other authority figures such as Members of Parliament whose involvement in the process of closure takes the form of the anti-hacking legislation they have passed, an analysis of which concludes this study

    Volume 2013 - Issue 1 - Winter, 2013

    Get PDF
    https://scholar.rose-hulman.edu/rose_echoes/1085/thumbnail.jp

    Washington University Record, June 10, 1999

    Get PDF
    https://digitalcommons.wustl.edu/record/1831/thumbnail.jp

    The Status Of Computer-Based Preparatory Programs For School Administrators

    Full text link
    Departments of Educational Administration (DsEA) within Colleges of Education have been the traditional training institutions for men and women seeking to become school administrators. Since the early years when one teacher in a school also assumed the cursory role of head teacher to handle the few administrative tasks that needed to be done, the tasks of educational administration have changed and developed over the decades. DsEA have responded to the changes and new developments with appropriate courses to enable administrators to execute their many varied and complex tasks; Computers, especially microcomputers, have rapidly impacted school instruction and management. As a result, the school administrator needs new knowledge and skills to make the best use of computers in the schools. The purpose of this study was to answer the question: Given the rapid growth of computer use and the corresponding demands on educational administrators and given the traditional reliance on DsEA to prepare school leaders, what are DsEA presently doing to provide the training and information necessary for school administrators to respond to the imact of computers in schools?;A survey instrument was developed to seek an answer to this question. It included topics that school administrators need to know for the efficient use and management of computers. The forty-five DsEA affiliated with the Universtity Council for Educational Administration (UCEA) were asked to respond to the survey; The resulting data from the survey indicated that forty-three percent of the respondents are presently offering at least one course whose primary focus is computers in education. Some of the titles were: Microcomputers in Education , Administrative Applications for Microcomputers , and Computer-Based Education. Eight percent of the respondents indicated they included computer topics in other departmental courses not readily identified as computer-based and eight percent required computer-based courses to be taken with the College of Education in a department such as the Department of Educational Technology; As a result of the study, recommendations were offered for DsEA that are seeking to develop computer-based education courses for administrators

    The IPTS Report No. 38, October 1999

    Get PDF

    Effects of 1:1 Computing by SES on Student Motivation, Engagement, and Literacy Achievement

    Get PDF
    The purpose of this dissertation was to investigate the effectiveness of the combination of 1:1 computing with collaborative instructional strategies. In the first and second hypotheses, exposure to a 1:1 computing environment in a literacy classroom (participation versus no participation) and SES (participating versus not participating) were the independent variables. The dependent variable for Hypothesis 1 was positive student motivation. The dependent variable for Hypothesis 2 was positive student engagement. Hypothesis 1 revealed that the interaction between the independent variables was significant. In the two groups participating in the 1:1 Program, the students not participating in the free and reduced lunch program, in general, demonstrated a statistically higher positive student motivation compared with the students participating in the free and reduced lunch program. In addition, in the two groups participating in the free and reduced lunch program, the students not participating in the 1:1 Program, in general, demonstrated a statistically higher positive student motivation compared with the students participating in the 1:1 Program. There were no statistically significant interaction or main effect results for the second hypothesis, participation in 1:1 computing and SES on positive student engagement. The third hypothesis determined if any predictive effects of student efficacy, 1:1 technology participation, and gender predicted literacy achievement as measured by the MAP assessment. It was discovered that SES was a significant predictor of literacy achievement. This study took place in three junior highs in Northwest Arkansas. Much of the related literature show significant findings in the ability of 1:1 computing environments to increase student achievement. The related literature also showed significance in the effects of poverty on learning
    corecore