NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Combs, Joseph, Jr. – Library Software Review, 1998
Discusses the Z39.50 standard (pertaining to client software) that provides information searching and retrieval from remote servers to offer a consistent user interface; reviews currently available client software; and provides a checklist for evaluating Z39.50 client software. (LRW)
Descriptors: Check Lists, Computer Interfaces, Computer Software, Computer Software Reviews
Peer reviewed Peer reviewed
Combs, Joseph, Jr. – Library Software Review, 1995
Reviews ConSearch 3.0, a product that provides flexible searching of electronic files, allowing the location of related meanings as well as exact matches. ConSearch 3.0 differs from other file retrieval approaches by relating words in search phrases of questions to the "meaning" of the words, which are stored in a "conceptual…
Descriptors: Computer Interfaces, Computer Software, Computer Software Reviews, Databases
Peer reviewed Peer reviewed
Combs, Joseph, Jr. – Library Computing, 1999
Presents a general review of features of version 2.1 of Total Library Computerization (TLC) for Windows from On Point, Inc. Includes information about pricing, hardware and operating systems, modules/functions available, user interface, security, on-line catalog functions, circulation, cataloging, and documentation and online help. A table…
Descriptors: Bibliographic Records, Computer Interfaces, Computer Software, Computer System Design
Peer reviewed Peer reviewed
Combs, Joseph, Jr. – Library Software Review, 1995
Reviews the Total Library Computerization program, which can be used to manage small to midsized libraries. Discusses costs; operating system requirements; security features; user-interface styles; and system modules including online cataloging, circulation, serials control, acquisitions, authorities control, and interlibrary loan. (Author/JMV)
Descriptors: Authority Control (Information), Cataloging, Computer Interfaces, Computer Security