NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Emery, Jill – Journal of Electronic Resources Librarianship, 2009
Twitter provides rapid information in a short form, and it is extremely easy to follow the updates of others because of myriad software applications with which it works on both mobile devices and traditional computing hardware. Currently, most academic librarians are using Twitter primarily as a tool at library conferences and seminars to capture…
Descriptors: Internet, Librarians, Use Studies, Information Networks
Peer reviewed Peer reviewed
Perez, Ernest – Library Software Review, 1992
Describes the features and use of PSILink's shareware software, which is designed to facilitate use of the Internet's electronic mail, bulletin boards, and USENET lists by librarians whose only access to the Internet is by modem on a personal computer. Directions for obtaining the software and for performing the various functions are given. (two…
Descriptors: Computer Software, Computer Software Evaluation, Electronic Mail, Internet
Peer reviewed Peer reviewed
Brunelle, Michael D.; Bruce, Bertram C. – Journal of Adolescent & Adult Literacy, 2002
Notes that understanding what "free software" means and its implications for access and use of new technologies is an important component of the new literacies. Concludes that if free speech and free press are essential to the development of a general literacy, then free software can promote the development of computer literacy. (SG)
Descriptors: Computer Literacy, Computer Software, Computer Software Evaluation, Computer Uses in Education
Banks, Michael A. – Computers in Libraries, 1998
Examines issues and decision-making involved in restricting Internet access in libraries, for the most part favoring filtering devices. Questions to consider when selecting a filtering program are provided. Some of the better filtering programs are described, and Web addresses are included for each. Security risks associated with Java and…
Descriptors: Access to Information, Censorship, Computer Software, Computer Software Evaluation