Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Source
Computers in Libraries | 4 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Guides - Non-Classroom | 1 |
Opinion Papers | 1 |
Education Level
Audience
Location
Illinois | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lewontin, Amy – Computers in Libraries, 1995
Describes and defines the relationship between and capabilities of World Wide Web (WWW) and Mosaic, a software interface program. The uses of hypertext and hypermedia and possibilities for educational use of Mosaic are mentioned. A sidebar includes information on recommended material on the WWW and Mosaic. (JKP)
Descriptors: Computer Interfaces, Computer Networks, Computer Software, Computer Uses in Education
Breeding, Marshall – Computers in Libraries, 2005
This brief article gives a description of the Open Croquet Project and its applications. The project's Web site describes Croquet as a "combination of computer software and network architecture that supports deep collaboration and resource sharing among large numbers of users within the context of a large-scale distributed information system." One…
Descriptors: Computer System Design, Computer Interfaces, Computer Software, Computer Networks
Schlumpf, Kay; Zschernitz, Rob – Computers in Libraries, 2007
Since its humble beginning, Digital Past, a centralized local history digitization initiative at the North Suburban Library System (NSLS), a multitype consortium in Wheeling, Illinois, has now grown into a large centralized collaboration that consists of 32 libraries and a museum as its primary contributors. With Digital Past, there are various…
Descriptors: Local History, Pilot Projects, Library Networks, Libraries
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources