NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 226 to 240 of 301 results Save | Export
Peer reviewed Peer reviewed
Brumm, Eugenia K. – Annual Review of Information Science and Technology, 1991
This summary of the literature on document image processing from 1988-90 focuses on WORM (write once read many) technology and on rewritable (i.e., erasable) optical discs, and excludes CD-ROM. Highlights include vendors and products, standards, comparisons of storage media, software, legal issues, records management, indexing, and computer…
Descriptors: Comparative Analysis, Computer Networks, Computer Software, Computer Storage Devices
Peer reviewed Peer reviewed
Sieverts, Eric G.; And Others – Electronic Library, 1992
The fourth in a series of articles on the evaluation of microcomputer software for information storage and retrieval, conducted by the Netherlands Association of Users of Online Information Systems (VOGIN), presents test results for six indexing and full-text retrieval programs--Ask-It, KAware, Texplore, TextMaster, WordCruncher, and ZYindex. (13…
Descriptors: Automatic Indexing, Comparative Analysis, Computer Software, Computer Software Evaluation
Brandt, D. Scott, Comp. – Computers in Libraries, 1998
This annual compilation is designed as a resource for access to products (hardware and software) and services related to library automation and information storage. Sections include products and services by category, vendor, and brand name, as well as addresses (including phone/fax, e-mail, and URL for web pages) of companies and consultants. (AEF)
Descriptors: Computer Peripherals, Computer Software, Computers, Consultants
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Gray, Peter J. – 1983
Ways a microcomputer can be used to establish and maintain an evaluation database and types of data management features possible on a microcomputer are described in this report, which contains step-by-step procedures and numerous examples for establishing a database, manipulating data, and designing and printing reports. Following a brief…
Descriptors: Computer Oriented Programs, Computer Software, Data Analysis, Data Processing
Dollar, Charles M. – 1986
This study is a review of trends in information-handling technology and significant developments which are changing or will change the general environment within which archivists and records managers in international organizations will have to work. Trends in microelectronics, electronic storage, software, data transmission, computer architecture,…
Descriptors: Archives, Artificial Intelligence, Automation, Computer Software
Camerman, Virginia T. – 1986
This report describes a study designed to determine whether the collection of computer software by libraries falls into a pattern of library type and whether patron use of computer software falls into a pattern of clientele type. Following a summary of previous research, a discussion of the study methodology describes a survey of 154 randomly…
Descriptors: Cataloging, Computer Software, Library Acquisition, Library Circulation
Wise, Lauress L.; And Others – 1983
This report describes plans for the development of a major longitudinal research database designed to support the development and validation of new predictors of Army performance, and also new measures of Army performance against which the new predictors can be validated. The following aspects of the database are addressed: (1) the anticipated…
Descriptors: Computer Software, Data Collection, Data Processing, Databases
Honeyman, David S. – Electronic Learning, 1985
Discusses use of PFS File, a database management system under development by the Kansas State Department of Education, to store and sort individual education program (IEP) records and generate report information from these records. File design and range of reports that can be generated are reviewed. (MBR)
Descriptors: Computer Software, Databases, Elementary Secondary Education, Individualized Education Programs
Hunter, Beverly – Computing Teacher, 1985
Discusses typical uses of databases and data management programs in the classroom; provides a learning plan to teach students how to use databases; lists typical student projects using databases; and presents criteria to help educators choose appropriate database management programs for their classrooms. (MBR)
Descriptors: Computer Software, Databases, Elementary Education, Evaluation Criteria
Vandergrift, Kay E. – School Library Journal, 1988
Describes the possibilities of hypermedia stackware with emphasis on applications for youth librarians. A model for the development and evaluation of stackware is offered, and an example of a proposed hypermedia product is provided. Differences in personal interest levels and learning styles are considered, and copyright concerns are discussed.…
Descriptors: Adolescent Literature, Adolescents, Cognitive Style, Computer Software
Beiser, Karl – Online, 1993
Describes Kodak's Photo CD technology, a format for the storage and retrieval of photographic images in electronic form. Highlights include current and future Photo CD formats; computer imaging technology; ownership issues; hardware for using Photo CD; software; library and information center applications, including image collections and…
Descriptors: Computer Software, Futures (of Society), Information Retrieval, Information Storage
Peer reviewed Peer reviewed
Zeidberg, David S. – Library Trends, 1999
Archivists need to apply traditional principles of records management to electronic documents if these records are to survive for research by future scholars. Additionally, archivists must ensure that the electronic records preserved remain accessible as hardware and software change over time. (Author/AEF)
Descriptors: Archives, Change, Computer Software, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shujen – Policy Futures in Education, 2006
This article uses three case studies to examine the intersecting developments of technology, capitalism, and globalization through the contradictions and paradoxes of copyright governance and piracy. China is used as a case study to investigate the relations among the state, law, and global capitalism. (Contains 7 tables and 9 notes.)
Descriptors: Social Systems, Copyrights, Global Approach, Foreign Countries
Riggsby, Dutchie; And Others – 1995
This paper considers the benefits of using an electronic portfolio as opposed to the more traditional type for the professional resume and treats the use of the electronic portfolio as a means of assessment of student, student teacher, and teacher performance, and as a marketing tool in job searches. The ease of distribution, storage and use, and…
Descriptors: Computer Software, Electronic Publishing, Employment Qualifications, Evaluation Criteria
Pages: 1  |  ...  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  19  |  20  |  21