NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Blowers, Helene – Computers in Libraries, 2012
Broadband and bandwidth allocation is an essential technology planning activity that libraries should address on a continual basis. There are five key factors that will impact your network's performance: 1. infrastructure, 2. network load, 3. workstation performance, 4. prioritization of services, and 5. network management. The author thinks it's…
Descriptors: Information Services, Internet, Technology Planning, Access to Information
Breitbach, William – Computers in Libraries, 2012
Competition in the virtual reference market got really hot this past summer. Recent developments in virtual reference offerings suggest the market is much more dynamic than most people would have imagined a short time ago. With Google's acquisition of Meebo and its subsequent decision to shut down the chat widget service, many libraries scrambled…
Descriptors: Library Services, Reference Services, Library Development, Online Systems
Breeding, Marshall – Computers in Libraries, 2012
In the library context, they depend on sophisticated business applications specifically designed to support their work. This infrastructure consists of such components as integrated library systems, their associated online catalogs or discovery services, and self-check equipment, as well as a Web site and the various online tools and services…
Descriptors: Equipment Maintenance, Technical Support, Information Technology, Technology Planning
Johnson, Jennifer; Mandity, Edward – Computers in Libraries, 2010
In fall 2008, a collaborative partnership was formed between the libraries of two Indiana universities--Marian College's (now Marian University) Mother Theresa Hackelmeier Memorial Library, and the University Library at Indiana University-Purdue University Indianapolis (IUPUI). The authors discuss the digital nature of this collaboration, which…
Descriptors: Research Libraries, Electronic Libraries, Partnerships in Education, Intercollegiate Cooperation
Bardyn, Tania P. – Computers in Libraries, 2009
Library blogs exchange information and ideas on everything from the everyday, such as library services, to the profound, such as values held by librarians (high-quality reliable resources, academic freedom, open access, and so on). According to medical librarians who maintain library blogs, a typical month includes two to four contributors writing…
Descriptors: Web Sites, Electronic Publishing, Academic Freedom, Library Administration
Saunders, Laverna – Computers in Libraries, 1992
Reports on a postconference workshop on virtual libraries that was presented at the third annual Computers in Libraries Canada Conference. Highlights include networks; technological change; administrative issues, including organizational structure, staff training, strategic planning, and financial resources; a case study of the University of…
Descriptors: Case Studies, Computer Networks, Conferences, Electronic Journals
Balas, Janet L. – Computers in Libraries, 2006
It seems that the demand for public access computers grows exponentially every time a library network is expanded, making it impossible to ever have enough computers available for patrons. One solution that many libraries are implementing to ease the demand for public computer use is to offer wireless technology that allows patrons to bring in…
Descriptors: Telecommunications, Access to Computers, Computer Networks, Public Libraries
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Mitchell, Maurice; Saunders, Laverna M. – Computers in Libraries, 1991
Discusses issues related to the idea of a virtual library, or electronic library, in an academic setting. Topics discussed include access to academic libraries via personal computers; online catalogs; wide area networks, such as Internet, and their impact on library and computer center services; administrative issues; human and technological…
Descriptors: Academic Libraries, Access to Information, Computer Centers, Computer Networks