NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Helsing, Cheryl; And Others – 1989
Computers have changed the way information resources are handled. Large amounts of information are stored in one central place and can be accessed from remote locations. Users have a personal responsibility for the security of the system and the data stored in it. This document outlines the user's responsibilities and provides security and control…
Descriptors: Access to Information, Computer Networks, Confidentiality, Databases
Howden, Norman – 1997
This manual offers guidance for librarians on every aspect of local area networking from start-up through maintenance and trouble shooting. This second edition has been revised to include information on: definition and explication of TCP/IP; Novell 4.0; Internet connection gear; equipment capable of handling Web access; Windows NT and Windows for…
Descriptors: Computer Networks, Guidelines, Information Management, Internet
Peters, Paul Evan – CAUSE/EFFECT, 1991
This article examines the role of advanced networks such as the National Science Foundation Network, with emphasis on their potential in improving information distribution and access in college and university libraries. Questions are posed concerning technical, political, institutional, and human aspects of networked information. (DB)
Descriptors: Academic Libraries, Change Agents, Computer Networks, Futures (of Society)
Bittleston, Richard – Information Management & Technology, 1995
Discusses techniques for managing documents in wide area networks, reviews technique limitations, and offers recommendations to database designers. Presented techniques include: increasing bandwidth, reducing data traffic, synchronizing documentation, partial synchronization, audit trials, navigation, and distribution control and security. Two…
Descriptors: Computer Networks, Computer Peripherals, Corporations, Data Processing
Garvey, Alan – Information Management & Technology, 1997
Outlines three rules to help companies plan for and implement intranets: (1) adopt a long-term vision for corporate Intranet usage; (2) create a culture of information usage; and (3) recognize, adapt to and take advantage of the inherent qualities of electronic information. (AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Corporations, Information Management
New York State Education Dept., Albany. Div. of Elementary and Secondary Education Planning. – 1990
Designed to provide assistance to school district personnel who seek to develop a plan for information management and related applications of technology, this guide presents the School District Information Study (SDIS) model for the review of management policies, procedures, and activities related to information processing done by school district…
Descriptors: Computer Networks, Elementary Secondary Education, Information Management, Information Technology
National School Boards Association, Alexandria, VA. – 1997
The National School Boards Association (NSBA), the National School Boards Foundation, NSBA's Institute for the Transfer of Technology to Education, and Apple Computer, Inc., launched "The School Board of Tomorrow Exhibit" at NSBA's 1996 annual conference and exposition in Orlando, Florida. This handbook summarizes the communication technologies…
Descriptors: Boards of Education, Computer Mediated Communication, Computer Networks, Computer System Design
Tennant, Roy – 1996
Creating and maintaining a web server, particularly for a large organization, is both an art and a science. The science of link management, statistical analysis, and error redirection is only a part of what is required of web managers. Additional responsibilities include knowing the information needs of users; data owner support services; training…
Descriptors: Computer Networks, Computer System Design, Computer Uses in Education, Error Correction
Szuba, Tom – 1998
This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software