987 research outputs found
Computerâassisted learning as an alternative to didactic lectures: A study of teaching the physics of diagnostic imaging
A computerâassisted learning (CAL) package entitled Physics of Diagnostic Imaging was developed in 1995 to replace five hours of didactic lectures at the University of Glasgow Faculty of Veterinary Medicine, and has been available as an additional learning resource for students in the other five UK veterinary schools for over three years. The package was reviewed by peer experts and the reaction of the students to its use gauged by postâtask questionnaire administration, informal discussions and observation. To assess the effect of integration into the curriculum, analyses of fourthâyear degree examination results over a sixâyear period were carried out. Analyses of studentsâ examination results for preâ and postâCAL delivery of the diagnostic imaging course showed that performance in the CALâbased course was significantly higher than in other subjects. This confirmed that the courseware can be used to replace didactic lectures as part of a rich learning environment supported by other resources. Initial student resistance to lecture replacement with CAL occurred, but has lessened as the use of the package has become established in the curriculum
Networking vendor strategy and competition and their impact on enterprise network design and implementation
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; in conjunction with the Leaders for Manufacturing Program at MIT, 2006.Includes bibliographical references (leaves 93-99).While a significant amount of literature exists that discuss platform strategies used by general IT vendors, less of it has to do with corporate networking technology vendors specifically. However, many of the same strategic principles that are used to analyze general IT vendors can also be used to analyze networking vendors. This paper extends the platform model that was developed by Michael Cusumano and Annabel Gawer to networking vendors, outlining the unique strategic aspects that the networking market possesses. The paper then reviews the strategy of the first dominant corporate datacom vendor, IBM, how it achieved its dominance, and how it lost it. The paper then discusses the strategies of various vendors who attempted to replace IBM as the dominant networking platform vendor and how they failed to do so. Finally, the paper discusses Cisco Systems, a vendor who did manage to achieve a level of dominance that parallels IBM's, and how that company has utilized its strategy to achieve and maintain its current dominance. Finally, Cisco's current strategic challenges are discussed. The impact of the strategies of the various vendors on the evolution of corporate networking is also discussed.by Ray Fung.S.M.M.B.A
Is There a Market for Work Group Servers? Evaluating Market Level Demand Elasticities Using Micro and Macro Models
This paper contains an empirical analysis demand for "work-group" (or low-end) servers. Servers are at thecentre of many US and EU anti-trust debates, including the Hewlett-Packard/Compaq merger and investigationsinto the activities of Microsoft. One question in these policy decisions is whether a high share of work serversindicates anything about shortrun market power. To investigate price elasticities we use model-level panel dataon transaction prices, sales and characteristics of practically every server in the world. We contrast estimatesfrom the traditional "macro" approaches that aggregate across brands and modern "micro" approaches that usebrand-level information (including both "distance metric" and logit based approaches). We find that the macroapproaches lead to overestimates of consumer price sensitivity. Our preferred micro-based estimates of themarket level elasticity of demand for work group servers are around 0.3 to 0.6 (compared to 1 to 1.3 in themacro estimates). Even at the higher range of the estimates, however, we find that demand elasticities aresufficiently low to imply a distinct "anti-trust" market for work group servers and their operating systems. It isunsurprising that firms with large shares of work group servers have come under some antitrust scrutiny.demand elasticities, network servers, computers, anti-trust
The role in enabling government to organize and operate itself in a more efficient and cost effective manner by using the information technology
This paper illustrates the value of interoperability in the delivery of Government e-services: Governmentto- Government, business-to-Government and citizen-to-Government. It describes the many issues involved in achieving successful interoperability programsâtogether with the tools, technologies and standards that help make this possible.The information technology, the delivery of Government e-services, successful interoperability programs
Virtual Machines and Networks - Installation, Performance Study, Advantages and Virtualization Options
The interest in virtualization has been growing rapidly in the IT industry
because of inherent benefits like better resource utilization and ease of
system manageability. The experimentation and use of virtualization as well as
the simultaneous deployment of virtual software are increasingly getting
popular and in use by educational institutions for research and teaching. This
paper stresses on the potential advantages associated with virtualization and
the use of virtual machines for scenarios, which cannot be easily implemented
and/or studied in a traditional academic network environment, but need to be
explored and experimented by students to meet the raising needs and
knowledge-base demanded by the IT industry. In this context, we discuss various
aspects of virtualization - starting from the working principle of virtual
machines, installation procedure for a virtual guest operating system on a
physical host operating system, virtualization options and a performance study
measuring the throughput obtained on a network of virtual machines and physical
host machines. In addition, the paper extensively evaluates the use of virtual
machines and virtual networks in an academic environment and also specifically
discusses sample projects on network security, which may not be feasible enough
to be conducted in a physical network of personal computers; but could be
conducted only using virtual machines
CD-ROM networking in libraries : an investigation
There is a growing awareness of the advantages of the
applications of CD-ROM networking in libraries. The
databases can be effectively shared among
multi-users simultaneously or within the library or the
organisation or several libraries.
The CD-ROM technology is discussed to provide basic
understanding of the technology. This will further
improve the understanding of CD-ROM networking. The
CD-ROM networking technology is thoroughly discussed to
provide an in-depth information of the technology. The
cabling system; network topologies; CD-ROM network
software; network operating system; case studies of its
application in various libraries etc. are investigated
The Corporate Digital Divide: Determinants of Internet Adoption
technological change, diffusion, Internet, adoption
Risk Assessment of the Project to Migrate to the Free Office Suite Under Linux "End-User" Group
The penetration and performance of free software is raising issues regarding its true capacities and, particularly, the desirability of choosing it. It is from this perspective that the Linux Migration Project was launched within the Sous-secrĂ©tariat Ă lâinforoute gouvernementale et aux resources informationnelles (SSIGRI). The project, supported by a CIRANO research team, seeks to assess the risks involved in the migration project and to identify the conditions for success. This report describes an assessment of the risk exposure of one of the groups participating in the project: end users. Principal results The risk assessment that was conducted enabled the following observations to be made: The project risk exposure is medium to high. Three objectives, and more particularly the first, are vulnerable to a relatively high level of risk: Operational continuity for the user, Interactional continuity for users, and Technical support. Two risk factors were undervalued in this project because of the very nature of the project: Mismatch between the functionalities of the free office suite/functionalities targeted by the organization; Degree of interdependence with non-project units/persons. This factor is important as a result of the context in which the project is being carried out, particularly the absence of a shared interoperability framework. A review of these risk factors could result in a new positioning on the risk exposure map for four of the five objectives, in particular for the two objectives that are related to the two undervalued factors.
- âŠ