NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 16 results Save | Export
Peer reviewed Peer reviewed
Blake, Katie – Library Hi Tech, 1988
Discusses the development of the Smart Book, a device which simplifies access to information normally found in printed form, and describes its two distinct components--the reader unit containing computer equipment, display screen, and controls, and the ROM book pack containing the text of the book and program functions. Possible applications are…
Descriptors: Algorithms, Electronic Publishing, Information Technology, Publishing Industry
Peer reviewed Peer reviewed
Murr, Lawrence E.; Williams, James B. – Library Hi Tech, 1987
Discusses emerging roles for the library and librarian, including services in the following areas: (1) special collection management and reference; (2) information systems; (3) expert systems; (4) electronic publishing; (5) telecommunications networking; and (6) computer support. The technologies of artificial intelligence, graphic imaging,…
Descriptors: Futures (of Society), Information Technology, Librarians, Library Networks
Peer reviewed Peer reviewed
Lorenzo, Albert L.; Gauri, Kul B. – Library Hi Tech, 1988
Discusses the nature and characteristics of information technology and its implications for education. Strategic directions for educational institutions are recommended: (1) improving academic quality; (2) supporting innovation; (3) developing the resource base; (4) developing partnerships with other organizations; (5) enhancing reputation; (6)…
Descriptors: Adoption (Ideas), Change Strategies, Educational Objectives, Educational Planning
Peer reviewed Peer reviewed
Drabenstott, Jon, Ed. – Library Hi Tech, 1988
Six library consultants address issues related to the future of online catalogs, including (1) types of material that will be accessible; (2) the role of the automated library; (3) evolving beyond the current objectives of library automation; (4) new technologies; and (5) the library profession's image of the future. (3 references) (MES)
Descriptors: Consultants, Futures (of Society), Information Technology, Library Automation
Peer reviewed Peer reviewed
Lavagnino, Merri Beth – Library Hi Tech, 1997
When the Committee on Institutional Cooperation (CIC), an academic consortium of 12 major teaching and research universities began implementing the Virtual Electronic Library, a Continuum of Security Needs list was created which outlines the security and authentication issues that must be addressed. The thirteen security items on the list are…
Descriptors: Academic Libraries, Computer Security, Consortia, Electronic Libraries
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Peer reviewed Peer reviewed
Van Houweling, Douglas E. – Library Hi Tech, 1986
Survey of the history and current development of information technology covers hardware (economies of scale, communications technology, magnetic and optical forms of storage), and the evolution of systems software ("tool" software, applications software, and nonprocedural languages). The effect of new computer technologies on human…
Descriptors: Computer Software, History, Information Networks, Information Storage
Peer reviewed Peer reviewed
Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Peer reviewed Peer reviewed
Webb, T. D.; Zhang, Bin – Library Hi Tech, 1997
The appearance of revolutionary information technologies must elicit equivalent responses from the library profession. Creating local online databases--information dropshipping--is an activity that public and academic libraries can implement. Through technology, libraries can create a new domain on the production side of knowledge and information.…
Descriptors: Academic Libraries, Change, Database Design, Information Industry
Peer reviewed Peer reviewed
Norman, O. Gene – Library Hi Tech, 1997
Investigates the effects of electronic information sources on collection development in 15 academic libraries. Areas studied included: the materials budget, collection development policies, and licenses; identifying, evaluating, selecting, and developing the electronic sources collection; training subject specialists to use electronic resource…
Descriptors: Academic Libraries, Classification, Information Sources, Information Technology
Peer reviewed Peer reviewed
Lynch, Clifford A. – Library Hi Tech, 1997
Reviews traditional issues surrounding authorization and authentication in an organization-centered framework and introduces new interorganizational issues that dominate networked information environment. Describes three major approaches to authentication and authorization for the interorganizational environment and discusses the following…
Descriptors: Change, Computer Mediated Communication, Computer Networks, Information Networks
Peer reviewed Peer reviewed
Riddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Peer reviewed Peer reviewed
Niemeyer, Chris – Library Hi Tech, 1997
Iowa State University has used Authorware extensively for its mandatory library skills class. This article focuses on Authorware features, skills and methods for learning it, and describes a process for creating a tutorial using this computer application. (Author)
Descriptors: Computer Assisted Instruction, Computer Software Development, Computer Uses in Education, Educational Technology
Peer reviewed Peer reviewed
Hessier, David – Library Hi Tech, 1987
Describes InfoStation, an information system which integrates a microcomputer with a videotape recorder and facsimile machine, to provide backup storage and selective retrieval of both analog and digital information. The features and applications of the system are described in detail and compared with other computer storage methods. (CLB)
Descriptors: Computer Storage Devices, Cost Effectiveness, Electronic Publishing, Facsimile Transmission
Peer reviewed Peer reviewed
Drabenstott, Jon, Ed. – Library Hi Tech, 1987
Several consultants address the issue of competencies required of professional librarians for the effective management of the automation process. Highlights include formal and professional ongoing education and the need for technical training and problem solving skills to enable librarians to evaluate and develop library systems effectively.…
Descriptors: Competency Based Education, Consultants, Critical Thinking, Evaluative Thinking
Previous Page | Next Page ยป
Pages: 1  |  2