Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Software Evaluation | 6 |
Information Networks | 6 |
Information Technology | 6 |
Internet | 4 |
Information Systems | 3 |
Computer Networks | 2 |
Online Searching | 2 |
Performance Technology | 2 |
Technological Advancement | 2 |
Access to Information | 1 |
Authority Control… | 1 |
More ▼ |
Author
Chretien, Wendy | 1 |
Emery, Jill | 1 |
Greenfield, Rich | 1 |
Gupta, Amardeep | 1 |
Helfer, Joe | 1 |
Panettieri, Joseph C. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Adult Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Emery, Jill – Journal of Electronic Resources Librarianship, 2009
Twitter provides rapid information in a short form, and it is extremely easy to follow the updates of others because of myriad software applications with which it works on both mobile devices and traditional computing hardware. Currently, most academic librarians are using Twitter primarily as a tool at library conferences and seminars to capture…
Descriptors: Internet, Librarians, Use Studies, Information Networks
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Chretien, Wendy – Campus Technology, 2008
Emergency notification has become a critical component of every higher education institution's overall emergency plan, as incidents across the country have galvanized campus safety officials to find more ways to notify their campus populations. Emergency notification systems can help get and keep students, faculty members, and staff out of harm's…
Descriptors: School Security, School Safety, Emergency Programs, Crisis Management
Helfer, Joe – Searcher, 1997
Analyzes whether push technology is a threat or opportunity for online searchers. Outlines key functions of push technology products and defines key technology terms. Illustrates how the role of the online searcher changes with push technology. (AEF)
Descriptors: Computer Networks, Computer Software Evaluation, Information Networks, Information Technology
Gupta, Amardeep – Journal of Educational Technology, 2005
Current search engines--even the constantly surprising Google--seem unable to leap the next big barrier in search: the trillions of bytes of dynamically generated data created by individual web sites around the world, or what some researchers call the "deep web." The challenge now is not information overload, but information overlook.…
Descriptors: Search Engines, Computer System Design, Computer Software Evaluation, Information Retrieval
Greenfield, Rich – 1997
The author argues that traditional library cataloging (MARC) and the online public access catalog (OPAC) are in collision with the world of the Internet because items in electronic formats undergo MARC cataloging only on a very selective basis. Also the library profession initially isolated itself from World Wide Web development by predicting no…
Descriptors: Access to Information, Authority Control (Information), Automatic Indexing, Bibliographic Records