NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 11 results Save | Export
Hastings, Robin – Computers in Libraries, 2012
Backups are a modern fact of life. Every organization that has any kind of computing technology (and that is all of them these days) needs to back up its data in case of technological or user errors. Traditionally, large-scale backups have been done via an internal or external tape drive that takes magnetic tapes (minicassettes, essentially) and…
Descriptors: Internet, Computer Storage Devices, Information Storage, Computer Software Evaluation
Dula, Michael; Jacobsen, Lynne; Ferguson, Tyler; Ross, Rob – Computers in Libraries, 2012
This article presents the story of how Pepperdine University migrated its library management functions to the cloud using what is now known as OCLC's WorldShare Management Services (WMS). The story of implementing this new service is told from two vantage points: (1) that of the library; and (2) that of the service provider. The authors were the…
Descriptors: Pilot Projects, Library Administration, Management Systems, Internet
Huwe, Terence K. – Computers in Libraries, 2008
Digital repository is one sector of digital content creation that receives less mainstream attention. Unlike blogs with accretions of documents and commentary or websites with masses of ephemeral pages that come and go, digital repositories have a more plodding pace of development. They conform to demanding standards for metadata and information…
Descriptors: Web Sites, Electronic Publishing, Research Universities, Information Management
Caporizzo, Marilyn – Computers in Libraries, 2008
The Information Group at Millipore has been successfully using a digital rights management tool to secure the email distribution of archived laboratory notebooks. Millipore is a life science leader providing cutting-edge technologies, tools, and services for bioscience research and biopharmaceutical manufacturing. Consisting of four full-time…
Descriptors: Microforms, Marketing, Biological Sciences, Specialists
Huwe, Terence K. – Computers in Libraries, 2005
In this column on digital repository management, the author defines three areas within the sphere of digital repositories that need work. The first two pertain to information architecture, while the last one pertains to taking action. The author's first "wish" is for top-notch library Web sites that act as a gateway to any sphere of knowledge. He…
Descriptors: Information Management, Research Libraries, Web Sites, Electronic Libraries
Huwe, Terence K. – Computers in Libraries, 2005
The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…
Descriptors: Internet, Computer Security, Electronic Libraries, Information Management
Ennis, Lisa A.; Tims, Randy S. – Computers in Libraries, 2010
Back in 2008, the authors were looking for a tool that would replace the library's Outlook folders and much of what the library had stored on shared network drives. So they were mainly looking for something that would hold their documents, allow them to better organize those documents, offer an easy way to search for those documents, and be easy…
Descriptors: Information Technology, Internet, Higher Education, Computer Software
Slawsky, Donna; Fleming, Stephen – Computers in Libraries, 1997
Describes how staff at HarperCollins Publishers Information Center/Archives created HarperSource, an internal Web page customized with links to sites of special interest to the organization, Outlines other reference, archival, service, publishing, and training aspects of the intranet, and discusses page design, editing, and updating, training…
Descriptors: Access to Information, Archives, Information Centers, Information Management
Nyerges, Mike – Computers in Libraries, 1999
Describes one public school library's struggles and solutions to problems associated with managing its new Windows desktop. To implement goals for organizing the desktop, the library selected the FoolProof desktop security system, utilized networks administration to enforce the school's Acceptable Use Policy, and used Windows 95 System Policies.…
Descriptors: Administration, Computer Networks, Computer Security, Computer System Design
Schuyler, Michael – Computers in Libraries, 1997
Discusses libraries' uses of filters to prevent access to objectionable sites on the Internet. Highlights include the American Library Association's resolution against filters as a violation of First Amendment rights; patron's use of terminals for e-mail or games; using filters for collection management; and listservs and online resources…
Descriptors: Access to Information, Computer Games, Electronic Mail, Information Management
Lagace, Nettie; McClennen, Michael – Computers in Libraries, 1998
The Internet Public Library (IPL), hosted by the University of Michigan School of Information is an operating virtual library that answers reference questions from all over the world. Discussion includes the construct of the IPL Reference Center, how the Reference Center handles questions, and characteristics of e-mail reference service. (AEF)
Descriptors: Electronic Libraries, Electronic Mail, Higher Education, Information Dissemination