NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Sequential Tests of…1
What Works Clearinghouse Rating
Showing 271 to 285 of 508 results Save | Export
Bilal, Dania – 2002
This updated and expanded second edition offers the latest findings and practices for library automation in the 21st century. With a practical, systematic approach, the book covers the entire spectrum of steps and activities involved in the automation process. Although this text does not prescribe a specific system or approach, it offers detailed…
Descriptors: Guidelines, Information Systems, Information Technology, Library Administration
McDermott, Irene E.; Quint, Barbara, Ed. – 2002
This guide discusses the use of the World Wide Web for library reference service. Part 1, "Ready Reference on the Web: Resources for Patrons," contains chapters on searching and meta-searching the Internet, using the Web to find people, news on the Internet, quality reference resources on the Web, Internet sites for kids, free full-text…
Descriptors: Electronic Libraries, Information Technology, Library Services, Reference Services
Del Vecchio, Stephen – School Library Journal, 1997
A school librarian reviews CD-ROM encyclopedias, determining their suitability for school and public library use with children and young adults, and favoring content and accessibility over special features and multimedia enhancements. Outlines essential considerations when choosing encyclopedias (price, network and print versions, and online…
Descriptors: Adolescents, Appropriate Technology, Children, Comparative Analysis
Robinson, George H. – Technology Connection, 1998
Describes an inexpensive solution for holding large-group telephone interviews, listing the equipment needed (record control, telephone, phone line with modular jack, portable amplifier with microphone-level input jack, audio cable with jack and plug compatible with the microphone input jack on the amplifier) and providing directions for setup.…
Descriptors: Cost Effectiveness, Educational Technology, Electronic Equipment, Elementary Secondary Education
Breeding, Marshall – Computers in Libraries, 2005
Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they…
Descriptors: Web Sites, Librarians, Trust (Psychology), Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Blummer, Barbara – Journal of Web Librarianship, 2007
This paper discusses the use of online learning communities for library professional organizations to promote collaboration and learning. The addition of an online learning community component to a library organization expands collaborative and educational opportunities for members through a virtual environment. Although technologies used to…
Descriptors: Electronic Learning, Needs Assessment, Online Courses, Cooperation
Heller, Norma – 1998
This book provides guidance and instruction for nine in-depth projects that integrate information literacy skills and technology skills with the elementary curriculum while promoting small-group learning and interpersonal skills. These projects use the talents of both the teacher and the librarian and emphasize small group learning. The following…
Descriptors: Art Activities, Class Activities, Consumer Education, Educational Technology
Dewey, Patrick R. – 1996
This book provides descriptions of approximately 270 CD-ROM packages and series, and references to dozens of others, all which are especially suitable for libraries. Organized by subject, entries include the vendor price (when available), platform and hardware requirements, and availability of network versions. In addition, evaluative comments…
Descriptors: Computer Software Evaluation, Costs, Information Technology, Library Materials
Peer reviewed Peer reviewed
Snyder, Fritz – Legal Reference Services Quarterly, 1986
Reviews some of the materials in the LEXIS and WESTLAW databases and the findings of a survey on the impact of technology on information publication, and discusses the possibility of using online databases as substitutes for the acquisition of new law library materials. (CLB)
Descriptors: Databases, Electronic Publishing, Information Technology, Law Libraries
Peer reviewed Peer reviewed
Mendrinos, Roxanne Baxter – Library Software Review, 1987
Describes a program designed to integrate new technology into the junior high school curriculum with emphasis on the role of the media specialist. Five steps are detailed: (1) needs assessment; (2) planning with teacher input how to fill student needs; (3) teacher training; (4) implementation; and (5) evaluation. (9 references) (MES)
Descriptors: Computer Assisted Instruction, Educational Technology, Inservice Teacher Education, Junior High Schools
Redhead, Pat – 2001
This document describes total cost of ownership (TCO) as a useful tool in the effective planning of technology use in schools. TCO is an analysis of all the costs of computer technology in a school in comparison with the value derived from the current investment. It also includes an assessment of strategies that can be implemented to reduce costs.…
Descriptors: Budgeting, Cost Effectiveness, Costs, Educational Technology
Eisenberg, Michael B.; Berkowitz, Robert E. – 2000
The Big6 is a complete approach to implementing meaningful learning and teaching of information and technology skills, essential for 21st century living. Including in-depth articles, practical tips, and explanations, this book offers a varied range of material about students and teachers, the Big6, and curriculum. The book is divided into 10 main…
Descriptors: Computer Literacy, Educational Practices, Educational Technology, Elementary Secondary Education
Peer reviewed Peer reviewed
Lavagnino, Merri Beth – Library Hi Tech, 1997
When the Committee on Institutional Cooperation (CIC), an academic consortium of 12 major teaching and research universities began implementing the Virtual Electronic Library, a Continuum of Security Needs list was created which outlines the security and authentication issues that must be addressed. The thirteen security items on the list are…
Descriptors: Academic Libraries, Computer Security, Consortia, Electronic Libraries
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
White, Andrew; Balsamo, Joseph – Computers in Libraries, 2005
There has been a move afoot in libraries of all kinds to incorporate open source software and applications to better support their rapidly evolving information access and delivery services. There has been particular interest in a specific configuration of open source components?known by the acronym LAMP?that can be used to build fairly complex Web…
Descriptors: Access to Information, Internet, Academic Libraries, Library Services
Pages: 1  |  ...  |  15  |  16  |  17  |  18  |  19  |  20  |  21  |  22  |  23  |  ...  |  34