NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)3
Location
Indiana1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 17 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Oliver, Astrid; Dahlquist, Janet; Tankersley, Jan; Emrich, Beth – Journal of Access Services, 2010
This article discusses the processes that occurred when the Library, Controller's Office, and Information Technology Department agreed to create an interface between the Library's Innovative Interfaces patron database and campus administrative software, Banner, using file transfer protocol, in an effort to streamline the Library's accounts…
Descriptors: Database Management Systems, Information Technology, Computer System Design, Computer Interfaces
Gabbard, Ralph B.; Kaiser, Anthony; Kaunelis, David – Computers in Libraries, 2007
The reference desk at Indiana State University's (ISU) library offers an excellent view of student work areas on the first floor. From this vantage point, the reference librarians noticed students, especially in the evening and on weekends, huddled together in small groups, with one student at the keyboard of a laptop or desktop computer. The…
Descriptors: Learning Activities, Information Technology, Reference Services, Space Utilization
Peer reviewed Peer reviewed
Direct linkDirect link
Deitering, Anne-Marie; Bridgewater, Rachel – Journal of Web Librarianship, 2007
This article details the development of the Library Instruction Wiki (http://instructionwiki.org): an effort to develop a web-based, knowledge-sharing resource. Though some library instruction is specific to a given institution or class, much of what instruction librarians teach is similar. Library instructors have repeatedly expressed the desire…
Descriptors: Knowledge Management, Information Technology, Educational Technology, Library Instruction
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Brandt, D. Scott – 2002
The purpose of this book is to introduce innovative educational concepts and techniques to help librarians and other information professionals create technology learning courses, sessions, workshops, and modules. The book applies the concepts of instructional systems design (ISD) to designing courses, or parts of courses, for instruction on…
Descriptors: Computer Assisted Instruction, Computer Oriented Programs, Information Literacy, Information Technology
Peer reviewed Peer reviewed
Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Peer reviewed Peer reviewed
Webb, T. D.; Zhang, Bin – Library Hi Tech, 1997
The appearance of revolutionary information technologies must elicit equivalent responses from the library profession. Creating local online databases--information dropshipping--is an activity that public and academic libraries can implement. Through technology, libraries can create a new domain on the production side of knowledge and information.…
Descriptors: Academic Libraries, Change, Database Design, Information Industry
Peer reviewed Peer reviewed
Wang, Chih – Electronic Library, 1987
Summarizes the history, categorization, and issues related to electronic publishing and discusses its possible impact on print publishing and the future of libraries. A study that will be conducted to examine that impact is described, including the research questions, null hypotheses, research design, data collection, schedule, and budget. (CLB)
Descriptors: Electronic Publishing, Information Dissemination, Information Technology, Library Materials
Peer reviewed Peer reviewed
Riddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Saffady, William – 1999
This book is divided into two parts; the first part (chapters 1-4) discusses fundamental aspects of computing and related technologies, and the second part (chapters 5-8) covers library automation, systems, and services. The chapters are as follows: (1) Computer Hardware, including the central processor, input peripherals, output peripherals, and…
Descriptors: Cataloging, Computer Peripherals, Computer Software, Computer System Design
Collins, Boyd; Fabiano, Emily; Langschied, Linda; Toyama, Ryoko; Wilson, Myoung Chung – 1999
The scholarly communication center is a comprehensive, technologically rich facility that provides users with access to technology, communications networks, information, and library materials within and beyond the library walls. Relating the experiences of planning the Scholarly Recallication Center at the New Brunswick campus of Rutgers, the…
Descriptors: Academic Libraries, Building Design, Construction Management, Construction Needs
Mates, Barbara T. – 2000
This book seeks to guide information providers in establishing accessible World Wide Web sites and acquiring the hardware and software needed by people with disabilities, focusing on access to the Internet using large print, voice, and Braille. The book also covers how to acquire the funds for adaptive technology, what type of equipment to choose,…
Descriptors: Access to Information, Accessibility (for Disabled), Assistive Devices (for Disabled), Disabilities
Naidu, Som, Ed. – 2003
This book explores the creative opportunities offered by information and communications technology (ICT), and provides an authoritative survey of the ways in which ICT is currently transforming core teaching functions. The contributed chapters in this book are organizes around these core processes of learning and teaching: subject matter…
Descriptors: Computer Mediated Communication, Computer Uses in Education, Educational Development, Educational Practices
Peer reviewed Peer reviewed
Direct linkDirect link
Pearson, Waynn – Journal of Access Services, 2003
The renovated Cerritos Public Library is a unique blending of traditional and hightech features. One of the key principles in its planning and design was to enable a range of convenient access services. This article summarizes the process of building this library and how it has been received by users. (Contains 5 figures.)
Descriptors: Access to Information, Public Libraries, Library Administration, Library Automation
Cohn, John M.; Kelsey, Ann L.; Fiels, Keith Michael – 1997
This manual is written for any library planning to introduce a new or replacement automated system. It focuses on planning for an integrated system that computerizes a multiplicity of library functions using one common database. This second edition contains a new section on the preparation of a technology strategic plan, a section on developing…
Descriptors: Bibliographic Databases, Cataloging, Computer Networks, Consultants
Previous Page | Next Page ยป
Pages: 1  |  2