Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Source
Computers in Libraries | 4 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Guides - Non-Classroom | 2 |
Education Level
Higher Education | 1 |
Audience
Location
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Furlong, Katherine – Computers in Libraries, 2009
Lafayette College is an undergraduate, private liberal arts and engineering school in Easton, Pennsylvania. In 2005, Lafayette rededicated its newly renovated library, complete with shared library/instructional technology facilities and a media studio. As originally envisioned, instructional technology (ITech) would have its own separate service…
Descriptors: Library Personnel, College Libraries, Educational Technology, Liberal Arts
Thompson, Susan – Computers in Libraries, 1999
Explains how a new systems administrator can make good first impressions, become familiar with the library, and take charge. Describes ways of working effectively with equipment and human resources, and outlines types of library staff personalities the systems librarian may encounter. Discusses organizing the data gathered into action plans. (AEF)
Descriptors: Administrators, Facility Planning, Libraries, Library Administration
Butler, Sharon J. – Computers in Libraries, 1997
As librarians use new computer equipment and related procedures, "ergonomics"--the least stressful orientation and use of the body in relation to the work it performs--becomes more important. Describes thirteen steps that employees can take to make their job experience more comfortable, safe, and efficient. (AEF)
Descriptors: Guidelines, Health, Human Factors Engineering, Individual Needs
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources