NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases
Peer reviewed Peer reviewed
Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Peer reviewed Peer reviewed
Wall, C. Edward – Library Hi Tech, 1986
Discussion among teams of administrators from eight major universities concluded that new opportunities exist for the publication, acquisition, and distribution of knowledge; libraries can add to their traditional resources and services by utilizing new technology; and librarians will need to add new skills to ensure important roles in the future.…
Descriptors: Academic Libraries, Access to Information, Administrators, Futures (of Society)
Peer reviewed Peer reviewed
Matthews, Joseph R. – Library Hi Tech, 1997
Libraries are moving into an era that incorporates improvements of a library's existing databases, embraces the research results of the information-seeking process, and makes fundamental improvements by adding new databases such as WordFocus. These new systems should convert the frustrated user of today's online public access catalog (OPAC) into…
Descriptors: Access to Information, Databases, Information Seeking, Library Automation
Peer reviewed Peer reviewed
Dowlin, Kenneth E.; And Others – Library Hi Tech, 1986
Describes the Maggie III automated library system, which supports a public access catalog, cataloging interface, bibliographic maintenance, circulation, electronic mail, and community information databases, with acquisitions and serials modules planned. Sidebars describe the community information database's structure, planned use of software by…
Descriptors: Access to Information, Community Information Services, Computer Software, Databases