NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Primich, Tracy – Library Software Review, 1992
Discusses computer viruses that attack the Macintosh and describes Symantec AntiVirus for Macintosh (SAM), a commercial program designed to detect and eliminate viruses; sample screen displays are included. SAM is recommended for use in library settings as well as two public domain virus protection programs. (four references) (MES)
Descriptors: Computer Software, Library Automation, Microcomputers
Peer reviewed Peer reviewed
Perez, Ernest – Library Software Review, 1991
Describes the development of the SNOBOL4 programing language and discusses its use in libraries for text processing applications. Other languages that are oriented toward text processing are discussed, including SPITBOL and ICON; programing skills necessary to use SNOBOL4 are discussed; and a vendor for SNOBOL4 products is recommended. (15…
Descriptors: Library Automation, Programing, Programing Languages, Word Processing
Peer reviewed Peer reviewed
Carlson, David H.; Prior, Barbara – Library Software Review, 1991
Identifies four microcomputer-based software packages for scheduling and evaluates their usefulness for scheduling employees in a library setting. Evaluation criteria are applied to (1) Schedule Master, from Schedule Master Corporation; (2) Schedule Plus, from Cyclesoft, Inc.; (3) Who Works When, from Newport Systems; and (4) Working Hours, from…
Descriptors: Computer Software Evaluation, Evaluation Criteria, Library Automation, Library Personnel
Peer reviewed Peer reviewed
Ogg, Harold C. – Library Software Review, 1991
Discusses the use of local area networks (LANs) in libraries and offers suggestions for less expensive versions through resource sharing. Varying disk sizes are discussed, file sharing is described, printer sharing is explained, and combined hardware and software packages for connecting two to four computers are described. (20 references) (LRW)
Descriptors: Computer Printers, Computer Software, Cost Effectiveness, Library Automation
Peer reviewed Peer reviewed
Vaughan, Dick – Library Software Review, 1993
Reviews the NOTIS "Acquisition Self-Paced Study Guide," designed to teach the inexperienced user the basic features of the NOTIS acquisition module, with references to the "NOTIS Acquisition User Guide" for those who need further study. Contents of the self-paced guide are listed. (EA)
Descriptors: Computer Software, Guides, Independent Study, Integrated Library Systems
Peer reviewed Peer reviewed
Perez, Ernest – Library Software Review, 1990
Discusses optical character recognition (OCR) for use with MS-DOS microcomputers. Cost effectiveness is considered, three types of software approaches to character recognition are explained, hardware and operation requirements are described, possible library applications are discussed, future OCR developments are suggested, and a list of OCR…
Descriptors: Character Recognition, Computer Software, Cost Effectiveness, Databases
Peer reviewed Peer reviewed
Combs, Joseph, Jr. – Library Software Review, 1995
Reviews the Total Library Computerization program, which can be used to manage small to midsized libraries. Discusses costs; operating system requirements; security features; user-interface styles; and system modules including online cataloging, circulation, serials control, acquisitions, authorities control, and interlibrary loan. (Author/JMV)
Descriptors: Authority Control (Information), Cataloging, Computer Interfaces, Computer Security
Peer reviewed Peer reviewed
Kilpatrick, Thomas L., Ed. – Library Software Review, 1998
Provides annotations of 29 journal articles and six book reviews on a variety of topics related to technology in libraries, including collection development, computer-assisted instruction, databases, distance education, ergonomics, hardware, information technology, interlibrary loan and document supply, Internet, online catalogs, preservation,…
Descriptors: Annotated Bibliographies, Book Reviews, Computer Assisted Instruction, Computer Security