Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Networks | 69 |
Libraries | 69 |
Access to Information | 24 |
Internet | 21 |
Higher Education | 16 |
Information Networks | 16 |
Library Services | 16 |
Information Technology | 15 |
Library Automation | 13 |
Telecommunications | 13 |
Foreign Countries | 12 |
More ▼ |
Source
Author
Publication Type
Education Level
Adult Education | 1 |
Elementary Secondary Education | 1 |
Higher Education | 1 |
Audience
Practitioners | 3 |
Administrators | 2 |
Media Staff | 2 |
Students | 1 |
Location
Canada | 5 |
Mexico | 5 |
Colorado | 2 |
United States | 2 |
Alaska | 1 |
Australia | 1 |
Croatia | 1 |
Hong Kong | 1 |
Illinois | 1 |
India | 1 |
Israel | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Unintended Consequences: New Materialist Perspectives on Library Technologies and the Digital Record
Manoff, Marlene – portal: Libraries and the Academy, 2013
Digital technology has irrevocably altered the nature of the archive. Drawing on materialist critiques and the evolving field of media archaeology, this essay explores new strategies for understanding the implications of computer networks in libraries. Although a significant portion of the contemporary literature within Library and Information…
Descriptors: Computer Networks, Libraries, Information Technology, Archives
Kanellopoulos, Dimitris N. – Program: Electronic Library and Information Systems, 2011
Purpose: This paper aims to provide an overview of representative multimedia applications in the cultural heritage sector, as well as research results on quality of service (QoS) mechanisms in internet protocol (IP) networks that support such applications. Design/methodology/approach: The paper's approach is a literature review. Findings: Cultural…
Descriptors: Multimedia Materials, Computer Oriented Programs, Computer Networks, Internet
Breeding, Marshall – Computers in Libraries, 2010
People live in an era of social, enterprise-oriented, and increasingly cloud-based technology; a dramatic shift away from stand-alone isolated silos that previously dominated. Computing systems can flourish today only when built to easily exchange data and services. An application that stands alone may provide practical functionality but may not…
Descriptors: Computer Software, Libraries, Educational Technology, Internet
Mitchell, Erik T. – Journal of Web Librarianship, 2010
One of the first big shifts in how libraries manage resources was the move from print-journal purchasing models to database-subscription and electronic-journal purchasing models. Libraries found that this transition helped them scale their resources and provide better service just by thinking a bit differently about their services. Likewise,…
Descriptors: Libraries, Library Materials, Electronic Publishing, Electronic Libraries
Eisenberg, Mike – Library Journal, 2008
The Web 2.0 "buzz" starts with new technologies such as virtual worlds, cell phones and handheld devices that offer 24/7 web access, tagging, social networks, and blogs and brings together various web capabilities in unique combinations. Web 2.0, however, is about much more than the technology--it is about a change in focus to participation, user…
Descriptors: Information Science Education, Information Needs, Libraries, Information Science
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Breeding, Marshall – Computers in Libraries, 2005
Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…
Descriptors: Libraries, Internet, Computer Networks, Computer Security
Minarik, Alan; Stoll, Christina – Computers in Libraries, 2005
These pioneers set out to set up new communities in the virtual frontier. Now, more than 50 libraries serve as Web hubs for their local settlements. The communities we live in have changed over time. But no matter the size of the tallest building, no matter how advanced the infrastructure, they grew to that size from humble beginnings: a…
Descriptors: Libraries, Library Services, Internet, Computer Networks
Cervone, Frank – Computers in Libraries, 2005
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Descriptors: Computer Security, Libraries, Computer Networks, Access to Information

Gainor, Larry; Foster, Erin – RSR Reference Services Review, 1993
Provides a brief description of Usenet, the computer network, and discusses how it may be applied in library settings. How to become a Usenet user, when to choose Usenet instead of a listserv group, and its use as a discussion and reference tool are covered. Six examples of Usenet communications are included. (nine references) (KRN)
Descriptors: Computer Networks, Information Networks, Libraries, Library Automation
Universal Service Administrative Company, 2007
This report shows how Universal Service Fund support for schools and libraries is used by school districts and libraries around the country. Highlighted are approximately 190 success stories of program participants that have come to rely on the USF to expand educational opportunities for students through better use of telecommunications technology…
Descriptors: Telecommunications, Information Technology, Federal Aid, Financial Support
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Ferrer, Daniel Fidel; Mead, Mary – Computers in Libraries, 2003
Describes spyware, discusses how it gets on a computer. Explains how spyware can be useful for parents, employers, and libraries. Discusses how spyware is more often used for others' gain or for surveillance without notification, how it can go undetected, and how libraries can help keep computers and patrons protected from remote installation of…
Descriptors: Computer Networks, Computer Security, Computer Software, Libraries
St. Lifer, Evan – Library Journal, 1997
Since its founding in 1990, the Coalition for Networked Information (CNI) has focused on publishing and accessing intellectual property. This article presents an interview with CNI's new executive director, Cliff Lynch discussing future changes, scholarly communication and the Internet, the University of California Berkeley's MELVYL, computer…
Descriptors: Computer Networks, Computer Science, Copyrights, Intellectual Property
Sturr, Natalie Oakes – Computers in Libraries, 1995
Describes libraries' use of the Internet to provide information on their local collections and explains how to provide searchable indexes through the use of WAIS (Wide Area Information Server) software. Highlights include Waisindex; file formats; Waissearch; and accessing WAIS indexes via a gopher, WAIS, or WWW (World Wide Web) server. (LRW)
Descriptors: Access to Information, Computer Networks, Computer Software, Indexing