NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Hoeppner, Athena – Computers in Libraries, 2012
Librarians are familiar with the single-line form, the consolidated index, which represents a very large portion of a library's print and online collection. Their end users are familiar with the idea of a single search across a comprehensive index that produces a large, relevancy-ranked results list. Even though most patrons would not recognize…
Descriptors: Electronic Libraries, Librarians, Library Services, Information Technology
Hamby, Rogan – Computers in Libraries, 2012
The technology of the 21st century has had no shortage of challenges for libraries, but it has also brought opportunities. Operating systems, databases, and application environments that can use cheap off-the-shelf hardware to scale and handle hundreds of millions of transactions were not developed for libraries. However, libraries have taken…
Descriptors: Delivery Systems, Pilot Projects, Libraries, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Shafi-Ullah, Farasat; Qutab, Saima – Program: Electronic Library and Information Systems, 2012
Purpose: This paper aims to elaborate the library data migration process from LAMP (Library Automation Management Program) to the open source software Koha's (2.2.8 Windows based) Pakistani flavour PakLAG-Koha in six legislative assembly libraries of Pakistan. Design/methodology/approach: The paper explains different steps of the data migration…
Descriptors: Library Personnel, Qualitative Research, Research Methodology, Library Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Dow, Elizabeth H. – Journal of Archival Organization, 2009
In the mid 1990s, Encoded Archival Description (EAD) appeared as a revolutionary technology for publishing archival finding aids on the Web. The author explores whether or not, given the advent of Web 2.0, the archival community should abandon EAD and look for something to replace it. (Contains 18 notes.)
Descriptors: Archives, Online Catalogs, Library Automation, Metadata
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis