NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Wen, H. Joseph; Yen, David C.; Lin, Binshan – Internet Research, 1998
Explains how intranets facilitate documentation availability within a company at substantial cost savings. Topics include intranet document management systems (IDMS); publication costs for printed materials; hardware and software specifications; performance; and security. (Author/LRW)
Descriptors: Computer Security, Computer Selection, Computer Software, Corporations
Hall, Don; Kelly, Pat – Learning & Leading with Technology, 2005
Increasingly, teachers rely on computer software and networks to both enhance curriculum management and provide engaging learning opportunities in instruction. New software is enabling more frequent formative assessments to better focus day-to-day lessons on the unique needs of individual learners. Administrators use increasingly complex data…
Descriptors: Database Management Systems, Computer Software, Academic Standards, Academic Achievement
Peer reviewed Peer reviewed
Gonzalez, Pedro – Microform and Imaging Review, 1999
Discusses the digital-image storage system at the Archivo General de Indias (Seville) that was developed to conserve original documents and to provide optimal access by researchers. Highlights include image quality, storage medium, computer equipment, remote access, security problems, problems of intellectual property and document ownership,…
Descriptors: Access to Information, Administration, Automation, Computer Security
Peer reviewed Peer reviewed
Beckett, George – Library Software Review, 1994
Describes a new software program called "Everywhere Access" that provides remote access to libraries' networked personal computers and that is suitable for use with the Internet. Highlights include installation; operation; security; standards issues; documentation and technical support; and potential uses and applications. (LRW)
Descriptors: Access to Information, Computer Security, Computer Selection, Computer Software
Swan, James – Rural Libraries, 1996
Presents a four-phase plan for small libraries strategizing for automation: inventory and weeding, data conversion, implementation, and enhancements. Other topics include selecting a system, MARC records, compatibility, ease of use, industry standards, searching capabilities, support services, system security, screen displays, circulation modules,…
Descriptors: Computer Security, Computer Selection, Data Conversion, Library Automation
Vane-Tempest, Stewart – Information Management & Technology, 1995
Presents a guide for selecting an optional disc system. Highlights include storage hierarchy; standards; data life cycles; security; implementing an optical jukebox system; optimizing the system; performance; quality and reliability; software; cost of online versus near-line; and growing opportunities. Sidebars provide additional information on…
Descriptors: Computer Security, Computer Selection, Computer System Design, Data
Miller, Kevin – TECHNOS, 1997
This article, written by a high school student, describes how he helped his school attain access to state-of-the-art technology and to the Internet. Topics include problems, security issues, teacher training, examples of student Internet projects, technical details of the school's computer system, and how the school encouraged this student's…
Descriptors: Computer Assisted Instruction, Computer Security, Computer Selection, Computer System Design
Cole, Timothy W. – Computers in Libraries, 1995
Describes installation and configuration of Mosaic and a World Wide Web (WWW) site at Grainger Library. Challenges include choosing a WINSOCK; customizing Mosaic for public-access computers; reducing security risks; maximizing Multipurpose Internet Mail Extensions (MIME); designing a home page; producing Hypertext Markup Language (HTML) documents.…
Descriptors: Academic Libraries, Computer Networks, Computer Security, Computer Software Development