NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Susan – Journal of Access Services, 2015
Libraries have become increasingly interested in studying the use of spaces within their buildings. Traditional methods for tracking library building use, such as gate counts, provide little information on what patrons do once they are in the library; therefore, new methods for studying space usage are being developed. Particularly promising are…
Descriptors: Libraries, Observation, Telecommunications, Handheld Devices
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software
QUADE, E.S. – 1967
THREE METHODS OF COST-EFFECTIVENESS ARE DISCUSSED--USE OF COMPUTERS, MATHEMATICS, AND EXPERTISE. THE USE OF EXPERTISE IS EMPHASIZED. THE DISCUSSION ON EXPERTISE JUDGMENT IS BASED ON PAPERS BY O. HELMER, WHICH ILLUSTRATE THE DELPHI METHOD OR CYBERNETIC ARBITRATION. ALTHOUGH COMPUTER AND MATHEMATICAL ANALYSIS (PARTICULARLY GAME THEORY) ARE BECOMING…
Descriptors: Automation, Computer Oriented Programs, Cost Effectiveness, Cybernetics