NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 1,441 to 1,455 of 4,569 results Save | Export
Dertouzos, Michael L. – Scientific American, 1991
The infrastructure created by fusing computing and communications technologies is described. The effect of this infrastructure on the economy and society of the United States is discussed. The importance of knowing the value and role of information is emphasized. (KR)
Descriptors: Computer Assisted Instruction, Computer Assisted Manufacturing, Computer Networks, Computer Oriented Programs
Mark, Linda – Wilson Library Bulletin, 1992
Summarizes the 1992 Special Libraries Association (SLA) Annual Conference. Topics discussed include emphasizing internationalism; competing in a global economy; the competitive importance of information; downsizing because of financial constraints; Internet and NREN (National Research and Education Network); recruitment; ethics; standards; and the…
Descriptors: Codes of Ethics, Competition, Computer Networks, Conferences
Peer reviewed Peer reviewed
King, Hannah – Electronic Library, 1993
Questions the wisdom of permitting visions of the electronic library to drive budgets and strategic planning. Social and economic realities limiting user access to information, new roles for librarians, and models that guide management of information resources and services by real librarians for real users are discussed. A proposed action agenda…
Descriptors: Access to Information, Budgets, Computer Networks, Electronic Libraries
Peer reviewed Peer reviewed
Webb, John – Information Technology and Libraries, 1998
Presents a holistic view of the management of licensed, networked information resources in a university library. Highlights include licensing and copyrights; collection development and acquisitions; aggregators, which combine electronic resources from disparate suppliers or locations into larger resource units for users; consortia; managing…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Consortia
Peer reviewed Peer reviewed
Ma, Wei – Electronic Library, 1998
Focuses on the trend to combine Web access and CD networks, benefits of considering the community network environment as a whole, and need for flexibility in considering new technologies. Describes the Occidental College Library (California) experience of building and sharing a network and network file server. (PEN)
Descriptors: Access to Information, Computer Networks, Databases, Delivery Systems
Peer reviewed Peer reviewed
Ellis, R. Darin; And Others – Gerontologist, 1996
Provides background on the World Wide Web, reasons for its growth, its potential usefulness to gerontologists, and the results of an exhaustive search of over 300 sites. Relevant information was discovered in five general categories of gerontology-related information: academic institutions, government agencies, biomedical and health research…
Descriptors: Aging (Individuals), Aging Education, Computer Networks, Computer Uses in Education
Peer reviewed Peer reviewed
Lanier, Don; Wilkins, Walter – RQ, 1994
Discusses the use of the Internet for ready reference and considers limitations, reference policy, and cost issues. Highlights include general reference sources; database searching on the Internet; Gopher; bibliographic control and access to Internet resources; personnel issues; and levels of service. (Contains 30 references.) (LRW)
Descriptors: Access to Information, Cataloging, Computer Networks, Costs
Peer reviewed Peer reviewed
Broderick, Bill; Caverly, David C. – Journal of Developmental Education, 1996
Examines the current status of online developmental courses. Features descriptions of programs at several colleges, including the names and e-mail addresses of individuals to contact for further information. Describes the hardware requirements for offering online courses as well as how such courses typically operate. (MAB)
Descriptors: Computer Assisted Instruction, Computer Mediated Communication, Computer Networks, Computer Uses in Education
Detlor, Brian – Proceedings of the ASIS Annual Meeting, 1998
Proposes a user-centered framework for intranet design based on an understanding of people, their typical problems, information behaviors, and situated contexts. Argues that by adopting such an approach, intranets can be designed which facilitate organizational information access and use. (Author/AEF)
Descriptors: Access to Information, Computer Networks, Computer System Design, Design Preferences
Lynch, Clifford – CAUSE/EFFECT, 1998
Describes access management problems associated with networked information systems and the two major architectural approaches used to address them, including discussion of related policy issues such as privacy, accountability, and collection of management data. Focus is on the concerns of colleges and universities and on developing practical…
Descriptors: Access to Information, Accountability, Administrative Policy, College Administration
Warnick, Walter – Proceedings of the ASIST Annual Meeting, 2001
Several federal science agencies have formed an alliance to work together and to make an interagency science portal, science.gov http://www.science.gov, a reality that will serve the needs of the research community and provide universal access to physical science information for citizens. While much progress has been made, challenges of resources…
Descriptors: Access to Information, Agency Cooperation, Computer Networks, Information Networks
Sullivan, Christopher – 1989
Electronic mail is one of several telecommunications technologies that have become potent factors in modern organizational communication. The introduction of such sophisticated microelectronic technology into an organization can have a strong impact on the patterns of communication within that organization. This is the case for the Florida House…
Descriptors: Computer Networks, Electronic Mail, Online Systems, Organizational Communication
Wack, John P.; Carnahan, Lisa J. – 1989
This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…
Descriptors: Computer Networks, Computer Software, Contingency Management, Guidelines
Finn, Gregory G. – 1987
This report discusses some of the problems and limitations in existing internetwork design for the connection of packet-switching networks of different technologies and presents an algorithm that has been shown to be suitable for internetworks of unbounded size. Using a new form of address and a flat routing mechanism called Cartesian routing,…
Descriptors: Algorithms, Computer Networks, Computer System Design, Models
Parker, Donald C. – Executive Educator, 1987
Describes an electronic mail system used by the Horseheads (New York) Central School Distict's eight schools and central office that saves time and enhances productivity. This software calls up information from the district's computer network and sends it to other users' special files--electronic "mailboxes" set aside for messages and…
Descriptors: Computer Networks, Efficiency, Electronic Mail, Elementary Secondary Education
Pages: 1  |  ...  |  93  |  94  |  95  |  96  |  97  |  98  |  99  |  100  |  101  |  ...  |  305