Descriptor
Computer System Design | 7 |
Library Automation | 7 |
Library Planning | 7 |
Integrated Library Systems | 3 |
Library Networks | 3 |
Online Catalogs | 3 |
College Libraries | 2 |
Computer Software | 2 |
Higher Education | 2 |
Local Area Networks | 2 |
Public Libraries | 2 |
More ▼ |
Author
Benson, Allen C. | 1 |
Berger, Michael G. | 1 |
Crowe, Linda | 1 |
Light, Jane | 1 |
Marks, Kenneth E. | 1 |
Miller, R. Bruce | 1 |
Simpson, Carol | 1 |
Publication Type
Journal Articles | 6 |
Guides - Non-Classroom | 5 |
Reports - Descriptive | 4 |
Reference Materials -… | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Audience
Administrators | 1 |
Practitioners | 1 |
Location
Mississippi | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Miller, R. Bruce – Information Technology and Libraries, 1988
Surveys areas of vulnerability for library databases, provides guidelines to minimize the threat of disasters, and outlines recovery procedures. Topics covered include planning for natural catastrophes, designing physical and data environments, prevention of computer failure, vendor failure, and steps for developing a disaster prevention and…
Descriptors: Computer System Design, Databases, Library Automation, Library Planning
Simpson, Carol – Book Report, 1999
Discusses the processes involved in migrating a library's automation system. Highlights include getting information from vendor demonstrations, setting up an evaluation database to analyze RFPs (requests for proposals), making a spreadsheet that compares costs of packages, making recommendations once the data are analyzed, and implementation…
Descriptors: Computer Software, Computer System Design, Decision Making, Information Systems
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Crowe, Linda; Light, Jane – Library Journal, 1994
Describes how a public library consortium jettisoned the Request for Proposal (RFP) process and used library staff, with some assistance from consultants, to evaluate new automation systems based on software demonstrations and Requests for Quotations (RFQ). The RFQ and RFP processes are compared. A sidebar article describes the financing plan.…
Descriptors: Computer Software Selection, Computer System Design, Costs, Integrated Library Systems

Berger, Michael G.; And Others – Information Technology and Libraries, 1992
The six articles comprising this special section on MELVYL, the University of California automated library system, discuss plans for the future, general recommendations for online catalog design, evaluation methods, evolution of computing resources, impact on the work of librarians, and academic goals and benefits. A chronology of MELVYL…
Descriptors: College Libraries, Computer System Design, Educational Objectives, Evaluation Methods
Marks, Kenneth E.; And Others – Computers in Libraries, 1993
This special section on local area networks includes three articles: (1) a description of migration at Joyner Library, East Carolina University (North Carolina) to a new network server; (2) a discussion of factors to consider for network planning in school libraries; and (3) a directory of companies supplying cable, hardware, software, and…
Descriptors: College Libraries, Computer Software, Computer System Design, Elementary Secondary Education
Evans Associates, Thiensville, WI. – 1996
This document provides a detailed design for the data portion of the Mississippi Library Commission (MLC) public library network. The data network is based on Frame Relay technology, and would provide more functionality at a higher speed than a previously considered dial-in network could. The document is divided into 16 sections: (1) Introduction;…
Descriptors: Computer Networks, Computer System Design, Cost Estimates, Design Requirements