Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Source
Computers in Libraries | 8 |
Author
Amrhein, Rick | 1 |
Balas, Janet L. | 1 |
Banerjee, Kyle | 1 |
Breeding, Marshall | 1 |
Doering, William | 1 |
Ives, David J. | 1 |
Jacso, Peter | 1 |
Resetar, Donna | 1 |
Thompson, Susan | 1 |
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 7 |
Book/Product Reviews | 1 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 2 |
Adult Education | 1 |
Audience
Location
Indiana | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Breeding, Marshall – Computers in Libraries, 2012
In the library context, they depend on sophisticated business applications specifically designed to support their work. This infrastructure consists of such components as integrated library systems, their associated online catalogs or discovery services, and self-check equipment, as well as a Web site and the various online tools and services…
Descriptors: Equipment Maintenance, Technical Support, Information Technology, Technology Planning
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Amrhein, Rick; Resetar, Donna – Computers in Libraries, 2004
This article presents a plan of having a new facility for the library of Valparaiso University. The authors, as dean of library services and assistant university librarian for access services at Valpo, discuss their plan of building a Center for Library and Information Resources that would house more books while also providing computing centers,…
Descriptors: Administrators, Library Services, Educational Facilities Design, College Libraries
Doering, William – Computers in Libraries, 1999
Addresses how libraries can prepare for Y2K problems. Discusses technology that might be affected and equipment that should be examined, difficulty of fixing noncompliant hardware and software, identifying problem areas and developing solutions, and dealing with vendors. Includes a checklist of necessary preparations. (AEF)
Descriptors: Computer Oriented Programs, Computer Software, Information Technology, Libraries
Thompson, Susan – Computers in Libraries, 1999
Explains how a new systems administrator can make good first impressions, become familiar with the library, and take charge. Describes ways of working effectively with equipment and human resources, and outlines types of library staff personalities the systems librarian may encounter. Discusses organizing the data gathered into action plans. (AEF)
Descriptors: Administrators, Facility Planning, Libraries, Library Administration
Jacso, Peter – Computers in Libraries, 1999
Provides advice for systems librarians facing the question of when to provide CD-ROM access and when to provide online access to databases for their patrons. Discusses price, updates, effective resource utilization, and determining users' needs. (AEF)
Descriptors: Access to Information, Databases, Decision Making, Librarians
Balas, Janet L. – Computers in Libraries, 1999
Discusses the importance of library systems administrators addressing the Year 2000 problem in their libraries. Reviews Web-based resources that deal with understanding the problem, offer vendor statements about their products, and discuss how some libraries are preparing for the Year 2000 problem. (AEF)
Descriptors: Administrators, Facility Planning, Information Sources, Librarians
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources