Browse Definitions:
Definition

community computing

Community computing is a resource-sharing model in which users are provided with free or low-cost computer and Internet access. Promoted as a way to help to bridge the digital divide , community computing enables disadvantaged people to have reliable computer access and learn computer skills. The newly-learned skills, in turn, afford people more opportunities to improve their lives in a range of areas, such as furthering their education and finding employment.

In India, and other developing countries, community technology centers ( CTC s) are often kiosks where villagers go and pay a small fee to use a computer. However, CTCs have become common in the developed nations as well. Community computing programs are active in the United States, in Canada, in Europe, and in New Zealand, among other world areas. Public-use computers in libraries are an example of community computing, although, as a rule access there is more limited than it is in a dedicated facility.

According to a recent report from the Annie E. Casey Foundation (an advocacy group for disadvantaged children and families), in the United States, 84% of all households with children in low-income inner city neighborhoods do not have computers. Some leading technology companies, such as Hewlett-Packard ( HP ), donate equipment and training resources to CTCs. As a component of its e-inclusion strategy, HP partners with non-profit organizations to establish and equip centers in needy communities. According to HP, such e-inclusion initiatives can benefit the enterprise as much as it does the community served by improving public relations and stimulating new markets.

This was last updated in January 2006

Continue Reading About community computing

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close