NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Oliver, Astrid; Dahlquist, Janet; Tankersley, Jan; Emrich, Beth – Journal of Access Services, 2010
This article discusses the processes that occurred when the Library, Controller's Office, and Information Technology Department agreed to create an interface between the Library's Innovative Interfaces patron database and campus administrative software, Banner, using file transfer protocol, in an effort to streamline the Library's accounts…
Descriptors: Database Management Systems, Information Technology, Computer System Design, Computer Interfaces
Peer reviewed Peer reviewed
Direct linkDirect link
Deitering, Anne-Marie; Bridgewater, Rachel – Journal of Web Librarianship, 2007
This article details the development of the Library Instruction Wiki (http://instructionwiki.org): an effort to develop a web-based, knowledge-sharing resource. Though some library instruction is specific to a given institution or class, much of what instruction librarians teach is similar. Library instructors have repeatedly expressed the desire…
Descriptors: Knowledge Management, Information Technology, Educational Technology, Library Instruction
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Peer reviewed Peer reviewed
Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Peer reviewed Peer reviewed
Riddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Saffady, William – 1999
This book is divided into two parts; the first part (chapters 1-4) discusses fundamental aspects of computing and related technologies, and the second part (chapters 5-8) covers library automation, systems, and services. The chapters are as follows: (1) Computer Hardware, including the central processor, input peripherals, output peripherals, and…
Descriptors: Cataloging, Computer Peripherals, Computer Software, Computer System Design
Bucher, Katherine Toth – 1998
This book is a practical, easy-to-use reference source written to help school library media specialists cope with and enjoy technology. Along with explaining technology, the book suggests ways to set up technology, use it, manage it, troubleshoot it, and introduce it to students, teachers, and staff. The book is intended for librarians and…
Descriptors: Computer Literacy, Computer System Design, Computer Uses in Education, Distance Education
Cleveland, Gary – 1991
The development of information technologies such as public access catalogs and online databases has greatly enhanced access to information. The lack of automation in the area of document delivery, however, has created a large disparity between the speed with which citations are found and the provision of primary documents. This imbalance can…
Descriptors: Academic Libraries, Computer Networks, Computer Software Development, Computer System Design