NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 21 results Save | Export
Beecher, Henry – Wilson Library Bulletin, 1989
Presents a basic orientation to the functions and capabilities of disk operating systems (DOS), aimed at the nontechnically oriented user of IBM personal computers and compatible microcomputers. Areas discussed include booting up, the use of floppy and hard disks, file storage and manipulation, and directories. Further readings are provided. (CLB)
Descriptors: Computer System Design, Floppy Disks, Information Storage, Microcomputers
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Palmer, Roger C. – 1988
Designed to help explain library automation to the librarian or student, this handbook presents a case to be solved, i.e., the creation of a book acquisition system for a special library; the steps to be taken to solve the problem; and a users' manual for the system to be provided to the client. The handbook is divided into three major sections:…
Descriptors: Computer Software, Computer System Design, Database Management Systems, Guidelines
Peer reviewed Peer reviewed
Valauskas, Edward J. – Information Technology and Libraries, 1988
Describes an automation project at the Merriam Center Library in which Apple Macintoshes were introduced as library workstations. The implementation process, staff involvement and reactions, and current configurations and applications of the workstations are discussed. An appendix provides a comparison of current microcomputer based workstations…
Descriptors: Comparative Analysis, Computer System Design, Equipment Evaluation, Library Automation
Peer reviewed Peer reviewed
Breeding, Michael – Library Hi Tech, 1997
Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…
Descriptors: Computer Networks, Computer Security, Computer System Design, Internet
Peer reviewed Peer reviewed
Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Peer reviewed Peer reviewed
Martin, Ron G. – Library Hi Tech, 1989
Describes guidelines for an online public access catalog (OPAC) workstation that will support the terminal, printer, and other peripherals. Workstation dimensions, lighting, wire management, printer and paper, acoustical treatment, seating, storage for books and coats, wastebasket, and interior decoration are addressed. Flexibility and simplicity…
Descriptors: Academic Libraries, Computer Peripherals, Computer System Design, Design Requirements
Peer reviewed Peer reviewed
Jaffe, Lee David; Watkins, Steven G. – CD-ROM Professional, 1992
Presents selection and design considerations to help libraries make informed decisions about hardware configurations of CD-ROM systems. Highlights include CD-ROM configurations, including single drive workstations, daisychains, and jukeboxes; network configurations, including remote access; microcomputer features; CD-ROM drive selection; and…
Descriptors: Access to Information, Computer Networks, Computer System Design, Cost Effectiveness
Peer reviewed Peer reviewed
Cantor, Scott – Library Hi Tech, 1997
DCE (Distributed Computing Environment) is a collection of services, tools, and libraries for building the infrastructure necessary for distributed computing within an enterprise. This articles discusses the Open Software Foundation (OSF); the components of DCE, including the Directory and Security Services, the Distributed Time Service, and the…
Descriptors: Computer Networks, Computer System Design, Information Networks, Information Services
Peer reviewed Peer reviewed
Riddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Clark, Phillip M. – Library Administration & Management, 1989
Describes some of the available software and hardware tools that can be used to develop a decision support system implemented on microcomputers. Activities that should be supported by software are discussed, including data entry, data coding, finding and combining data, and data compatibility. Hardware considerations include speed, storage…
Descriptors: Computer System Design, Data Processing, Database Design, Database Management Systems
Saffady, William – 1999
This book is divided into two parts; the first part (chapters 1-4) discusses fundamental aspects of computing and related technologies, and the second part (chapters 5-8) covers library automation, systems, and services. The chapters are as follows: (1) Computer Hardware, including the central processor, input peripherals, output peripherals, and…
Descriptors: Cataloging, Computer Peripherals, Computer Software, Computer System Design
Meghabghab, Dania Bilal – 1997
Although the general automation process can be applied to most libraries, small libraries and media centers require a customized approach. Using a systematic approach, this guide covers each step and aspect of automation in a small library setting, and combines the principles of automation with field- tested activities. After discussing needs…
Descriptors: Computer Networks, Computer System Design, Elementary Secondary Education, Learning Resources Centers
Peer reviewed Peer reviewed
Micco, Mary; Smith, Irma – Library Software Review, 1987
Proposes a framework for the design of a full function workstation for information retrieval based on study of information seeking behavior. A large amount of local storage of the CD-ROM jukebox variety and full networking capability to both local and external databases are identified as requirements of the prototype. (MES)
Descriptors: Access to Information, Computer Networks, Computer System Design, Information Dissemination
Lancaster, F. W., Ed. – 1987
The papers in this proceedings consider ways in which user friendly interface design may be used to make online systems in public and academic libraries easier to use, and thus more attractive to potential users. A short introduction by F. W. Lancaster is followed by nine papers: (1) "Linking the Unlinkable" (Michael Gorman); (2)…
Descriptors: Academic Libraries, Computer System Design, Higher Education, Information Retrieval
Previous Page | Next Page ยป
Pages: 1  |  2