Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
Author
Publication Type
Reports - Descriptive | 22 |
Journal Articles | 18 |
Opinion Papers | 5 |
Books | 3 |
Guides - Non-Classroom | 2 |
Book/Product Reviews | 1 |
Collected Works - Proceedings | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Secondary Education | 1 |
Middle Schools | 1 |
Audience
Media Staff | 22 |
Practitioners | 18 |
Administrators | 6 |
Policymakers | 2 |
Researchers | 1 |
Teachers | 1 |
Location
Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Anderson, Byron – Behavioral & Social Sciences Librarian, 2007
The openness of the Internet has greatly facilitated scholarly communication and led to creative developments in many fields. The Internet has been called the most democratic of media. In many countries, one does not need permission to post a new Web page. Public domain information flows freely and is widely accessible on an impartial basis to…
Descriptors: Internet, Computer Networks, Telecommunications, Federal Legislation
Farmer, Lesley; Shontz, Marilyn – School Library Journal, 2009
This year's "School Library Journal's" spending survey showed that, despite the recession, the vast majority of media centers around the country have retained their credentialed media specialists. For example, almost 85% of elementary schools and more than 95% of middle and high schools have a full-time certified librarian. In addition, salaries…
Descriptors: School Libraries, Media Specialists, Surveys, Financial Problems
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Drake, Miriam A. – Online, 1987
Describes Library 2000 at the Georgia Institute of Technology, which provides remote electronic access to a catalog of more then 350,000 books and documents, as well as access to the indexes to four extensive periodical databases. (MES)
Descriptors: Academic Libraries, Computer Networks, Databases, Futures (of Society)

Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
McNabb, Mary L.; Thurber, Bonnie B.; Dibuz, Balazs; McDermott, Pamela A.; Lee, Carol Ann – International Reading Association (NJ3), 2006
Middle-level teachers, librarians, and media specialists can use this book to meet current English language arts and technology standards and to prepare students to be literate citizens in the 21st century. Additional teaching tools include timelines of classroom events, reproducible rubrics for assessing curriculum units, suggested Web resources,…
Descriptors: Literacy Education, Writing Processes, Literacy, Internet

Breeding, Michael – Library Hi Tech, 1997
Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…
Descriptors: Computer Networks, Computer Security, Computer System Design, Internet

McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases

Cantor, Scott – Library Hi Tech, 1997
DCE (Distributed Computing Environment) is a collection of services, tools, and libraries for building the infrastructure necessary for distributed computing within an enterprise. This articles discusses the Open Software Foundation (OSF); the components of DCE, including the Directory and Security Services, the Distributed Time Service, and the…
Descriptors: Computer Networks, Computer System Design, Information Networks, Information Services
Shalvoy, Mary Lee – Electronic Learning, 1987
This description of workstations, i.e., multipurpose computers expected to become one of the dominant forms of computing in higher education, focuses on computer vendors and market considerations. Highlights include hardware requirements, cost factors, the relationship of vendors and educators, software development problems, and possible future…
Descriptors: Computer Networks, Computer Uses in Education, Corporate Support, Costs

Buckland, Michael K.; Lynch, Clifford A. – Information Technology and Libraries, 1987
Describes the Linked Systems Protocol, a draft national standard for bibliographic information retrieval aimed at developing an extended protocol for the movement of bibliographic information from one system to another, and its implications for library automation, the individual librarian, and the library user. (CLB)
Descriptors: Access to Information, Bibliographic Utilities, Cataloging, Computer Networks

Dougherty, Richard M., Ed.; And Others – Journal of Academic Librarianship, 1987
The first of two articles describes changes in computer technologies and user needs which affect the role of bibliographic utilities and discusses the need for cooperation between libraries and computing professionals. The second article discusses underlying strategies of library collection management in terms of quantitative and intuitive…
Descriptors: Bibliographic Utilities, Computer Networks, Library Automation, Library Collection Development

Lynch, Clifford A. – Library Hi Tech, 1997
Reviews traditional issues surrounding authorization and authentication in an organization-centered framework and introduces new interorganizational issues that dominate networked information environment. Describes three major approaches to authentication and authorization for the interorganizational environment and discusses the following…
Descriptors: Change, Computer Mediated Communication, Computer Networks, Information Networks

Rooney, Eugene M. – Catholic Library World, 1997
Discusses problems (poverty, lack of national publishers, use of libraries as study halls, low professional status of librarians) affecting high school libraries in Latin America and suggests ways to improve library services, focusing on reference service (opening reference stacks, improved cataloging, library skills instruction), technical…
Descriptors: Cataloging, Computer Networks, Databases, Foreign Countries
Doctor, Ronald D.; Turner, Philip M. – 1991
This paper, which was presented to National Aeronautics and Space Administration librarians as part of a telecommunications conference, describes features of the proposed National Research and Education Network (NREN). First, NREN's predecessor, the National Science Foundation network (the current NSFnet/Internet system), is discussed and the…
Descriptors: Access to Information, Computer Networks, Databases, Democracy
Previous Page | Next Page ยป
Pages: 1 | 2