987 research outputs found

    Computer‐assisted learning as an alternative to didactic lectures: A study of teaching the physics of diagnostic imaging

    Get PDF
    A computer‐assisted learning (CAL) package entitled Physics of Diagnostic Imaging was developed in 1995 to replace five hours of didactic lectures at the University of Glasgow Faculty of Veterinary Medicine, and has been available as an additional learning resource for students in the other five UK veterinary schools for over three years. The package was reviewed by peer experts and the reaction of the students to its use gauged by post‐task questionnaire administration, informal discussions and observation. To assess the effect of integration into the curriculum, analyses of fourth‐year degree examination results over a six‐year period were carried out. Analyses of students’ examination results for pre‐ and post‐CAL delivery of the diagnostic imaging course showed that performance in the CAL‐based course was significantly higher than in other subjects. This confirmed that the courseware can be used to replace didactic lectures as part of a rich learning environment supported by other resources. Initial student resistance to lecture replacement with CAL occurred, but has lessened as the use of the package has become established in the curriculum

    Networking vendor strategy and competition and their impact on enterprise network design and implementation

    Get PDF
    Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; in conjunction with the Leaders for Manufacturing Program at MIT, 2006.Includes bibliographical references (leaves 93-99).While a significant amount of literature exists that discuss platform strategies used by general IT vendors, less of it has to do with corporate networking technology vendors specifically. However, many of the same strategic principles that are used to analyze general IT vendors can also be used to analyze networking vendors. This paper extends the platform model that was developed by Michael Cusumano and Annabel Gawer to networking vendors, outlining the unique strategic aspects that the networking market possesses. The paper then reviews the strategy of the first dominant corporate datacom vendor, IBM, how it achieved its dominance, and how it lost it. The paper then discusses the strategies of various vendors who attempted to replace IBM as the dominant networking platform vendor and how they failed to do so. Finally, the paper discusses Cisco Systems, a vendor who did manage to achieve a level of dominance that parallels IBM's, and how that company has utilized its strategy to achieve and maintain its current dominance. Finally, Cisco's current strategic challenges are discussed. The impact of the strategies of the various vendors on the evolution of corporate networking is also discussed.by Ray Fung.S.M.M.B.A

    Is There a Market for Work Group Servers? Evaluating Market Level Demand Elasticities Using Micro and Macro Models

    Get PDF
    This paper contains an empirical analysis demand for "work-group" (or low-end) servers. Servers are at thecentre of many US and EU anti-trust debates, including the Hewlett-Packard/Compaq merger and investigationsinto the activities of Microsoft. One question in these policy decisions is whether a high share of work serversindicates anything about shortrun market power. To investigate price elasticities we use model-level panel dataon transaction prices, sales and characteristics of practically every server in the world. We contrast estimatesfrom the traditional "macro" approaches that aggregate across brands and modern "micro" approaches that usebrand-level information (including both "distance metric" and logit based approaches). We find that the macroapproaches lead to overestimates of consumer price sensitivity. Our preferred micro-based estimates of themarket level elasticity of demand for work group servers are around 0.3 to 0.6 (compared to 1 to 1.3 in themacro estimates). Even at the higher range of the estimates, however, we find that demand elasticities aresufficiently low to imply a distinct "anti-trust" market for work group servers and their operating systems. It isunsurprising that firms with large shares of work group servers have come under some antitrust scrutiny.demand elasticities, network servers, computers, anti-trust

    The role in enabling government to organize and operate itself in a more efficient and cost effective manner by using the information technology

    Get PDF
    This paper illustrates the value of interoperability in the delivery of Government e-services: Governmentto- Government, business-to-Government and citizen-to-Government. It describes the many issues involved in achieving successful interoperability programs—together with the tools, technologies and standards that help make this possible.The information technology, the delivery of Government e-services, successful interoperability programs

    Virtual Machines and Networks - Installation, Performance Study, Advantages and Virtualization Options

    Full text link
    The interest in virtualization has been growing rapidly in the IT industry because of inherent benefits like better resource utilization and ease of system manageability. The experimentation and use of virtualization as well as the simultaneous deployment of virtual software are increasingly getting popular and in use by educational institutions for research and teaching. This paper stresses on the potential advantages associated with virtualization and the use of virtual machines for scenarios, which cannot be easily implemented and/or studied in a traditional academic network environment, but need to be explored and experimented by students to meet the raising needs and knowledge-base demanded by the IT industry. In this context, we discuss various aspects of virtualization - starting from the working principle of virtual machines, installation procedure for a virtual guest operating system on a physical host operating system, virtualization options and a performance study measuring the throughput obtained on a network of virtual machines and physical host machines. In addition, the paper extensively evaluates the use of virtual machines and virtual networks in an academic environment and also specifically discusses sample projects on network security, which may not be feasible enough to be conducted in a physical network of personal computers; but could be conducted only using virtual machines

    CD-ROM networking in libraries : an investigation

    Get PDF
    There is a growing awareness of the advantages of the applications of CD-ROM networking in libraries. The databases can be effectively shared among multi-users simultaneously or within the library or the organisation or several libraries. The CD-ROM technology is discussed to provide basic understanding of the technology. This will further improve the understanding of CD-ROM networking. The CD-ROM networking technology is thoroughly discussed to provide an in-depth information of the technology. The cabling system; network topologies; CD-ROM network software; network operating system; case studies of its application in various libraries etc. are investigated

    Directory-Enabled Networking Design Reference

    Full text link

    The Corporate Digital Divide: Determinants of Internet Adoption

    Get PDF
    technological change, diffusion, Internet, adoption

    Risk Assessment of the Project to Migrate to the Free Office Suite Under Linux "End-User" Group

    Get PDF
    The penetration and performance of free software is raising issues regarding its true capacities and, particularly, the desirability of choosing it. It is from this perspective that the Linux Migration Project was launched within the Sous-secrĂ©tariat Ă  l’inforoute gouvernementale et aux resources informationnelles (SSIGRI). The project, supported by a CIRANO research team, seeks to assess the risks involved in the migration project and to identify the conditions for success. This report describes an assessment of the risk exposure of one of the groups participating in the project: end users. Principal results The risk assessment that was conducted enabled the following observations to be made: The project risk exposure is medium to high. Three objectives, and more particularly the first, are vulnerable to a relatively high level of risk: Operational continuity for the user, Interactional continuity for users, and Technical support. Two risk factors were undervalued in this project because of the very nature of the project: Mismatch between the functionalities of the free office suite/functionalities targeted by the organization; Degree of interdependence with non-project units/persons. This factor is important as a result of the context in which the project is being carried out, particularly the absence of a shared interoperability framework. A review of these risk factors could result in a new positioning on the risk exposure map for four of the five objectives, in particular for the two objectives that are related to the two undervalued factors.
    • 

    corecore