NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vincent F. Scalfani; Kevin W. Walker; Lance Simpson; Avery M. Fernandez; Vishank D. Patel; Anastasia Ramig; Cyrus Gomes; Michael T. Moen; Adam M. Nguyen – Issues in Science and Technology Librarianship, 2023
Scholarly web-based application programming interfaces (APIs) allow users to interact with information and data programmatically. Interacting with information programmatically allows users to create advanced information query workflows and quickly access machine-readable data for downstream computations. With the growing availability of scholarly…
Descriptors: Access to Information, Bibliographic Databases, Library Services, Electronic Libraries
Ohler, Jason – Learning & Leading with Technology, 2010
The Information Age has been built, in part, on the belief that more information is always better. True to that sentiment, people have found ways to make a lot of information available to the masses--perhaps more than anyone ever imagined. The goal of the Semantic Web, often called Web 3.0, is for users to spend less time looking for information…
Descriptors: Internet, Technological Advancement, Mass Media, Information Dissemination
Buchanan, Larry – MultiMedia Schools, 1996
Defines HyperText Markup Language (HTML) as it relates to the World Wide Web (WWW). Describes steps needed to create HTML files on a UNIX system and to make them accessible via the WWW. Presents a list of basic HTML formatting codes and explains the coding used in the author's personal HTML file. (JMV)
Descriptors: Access to Information, Authoring Aids (Programming), Coding, Guidelines
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Merchant, David – Library Computing, 1999
Most libraries don't have the resources to cross-platform and cross-version test all of their JavaScript coding. Many turn to WYSIWYG; however, WYSIWYG editors don't generally produce optimized coding. Web developers should: test their coding on at least one 3.0 browser, code by hand using tools to help speed that process up, and include a simple…
Descriptors: Access to Information, Coding, Computer Software, Computer System Design
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Jin Tan; Horng, Huai-Chien – International Journal of Distance Education Technologies, 2006
This paper proposes a design framework for constructing Digital Rights Management (DRM) that enables learning objects in legal usage. The central theme of this framework is that any design of a DRM must have theories as foundations to make the maintenance, extension or interoperability easy. While a learning objective consists of learning…
Descriptors: Design, Legal Responsibility, Resource Units, Metadata
Peer reviewed Peer reviewed
Direct linkDirect link
Chang, Naicheng – Program: Electronic Library and Information Systems, 2005
Purpose: To help to clarify the role of XML tools and standards in supporting transition and migration towards a fully XML-based environment for managing access to information. Design/methodology/approach: The Ching Digital Image Library, built on a three-tier architecture, is used as a source of examples to illustrate a number of methods of data…
Descriptors: Electronic Libraries, Visual Aids, Classification, Programming Languages
Peer reviewed Peer reviewed
Direct linkDirect link
Pitti, Daniel V. – Journal of Archival Organization, 2005
The emergence of computer and network technologies has presented the archival profession with daunting challenges as well as inspiring opportunities. Archivists have been actively imagining and realizing the application of advanced technologies to their professional functions and activities. Using advanced technologies, archivists have been…
Descriptors: Archives, Documentation, Influence of Technology, Technological Advancement