Search results
21 – 30 of over 134000The writer contends that the mini‐computer provides a very substantial potential area of application for the processing of information, management control and physical control of…
Abstract
The writer contends that the mini‐computer provides a very substantial potential area of application for the processing of information, management control and physical control of warehouse plant. Mini‐computers can be coupled with a whole range of peripheral input/output devices, from which can be developed configurations extending from very simple systems costing as little as £3,500.
Computer crime and the abuse of computer and telecommunicationssystems have become a serious threat to the integrity of informationsystems. The Organization for Economic…
Abstract
Computer crime and the abuse of computer and telecommunications systems have become a serious threat to the integrity of information systems. The Organization for Economic Co‐operation and Development has addressed this problem as has Interpol. National governments such as Canada have enacted specific laws against this type of crime. Information technology security principles can prevent the commission of computer crimes. Refers to basic information technology principles and gives some examples of computer crimes and how application of IT security principles may have prevented these crimes.
Details
Keywords
The following bibliography focuses mainly on programs which can run on IBM microcomputers and compatibles under the operating system PC DOS/MS DOS, and which can be used in online…
Abstract
The following bibliography focuses mainly on programs which can run on IBM microcomputers and compatibles under the operating system PC DOS/MS DOS, and which can be used in online information and documentation work. They fall into the following categories:
Jon Drabenstott, Wilson M. Stahl, James J. Michael, Rick Richmond, Gene Robinson and James E. Rush
Typically, library building projects are undertaken to accommodate a library's needs for the foreseeable twenty years or more. With major changes in information technologies…
Abstract
Typically, library building projects are undertaken to accommodate a library's needs for the foreseeable twenty years or more. With major changes in information technologies occurring at intervals of less than five years, it should be assumed, within its twenty‐plus years of initial service, that a library building will have to accommodate a series of changes in order to support currently unknown technologies. Issues related to the development of library facilities that will meet current and future needs are discussed by three prominent consultants and representatives of two vendors: Wilson M. Stahl, James J. Michael (Data Research Associates), Rick Richmond, Gene Robinson (CLSI), and James E. Rush.
Once in a while, you should take stock of your personal computing environment. What is on your system? How did it get there? What do you actually use? How did you arrive at your…
Abstract
Once in a while, you should take stock of your personal computing environment. What is on your system? How did it get there? What do you actually use? How did you arrive at your hardware configuration, and does it still meet your needs? You may find that you can free up some disk space in the process; at the very least, you'll understand your situation better. The author goes through this exercise both as an example of what it can show and because full disclosure is important for this series of articles. You need to know the background for the advice that appears here. The author discloses his current computing environments, how they got that way, and what that may mean. He also points out the real limits within which he operates as a PC commentator. When you go through the software on your system, you should check to see whether it represents ethical computing. The author offers a few notes on ethical issues related to software. The author also provides notes from PC literature for January‐June 1992.
The developments in the use of computer systems in libraries from 1966 to date have been great. This report, written to coincide with the twenty‐first anniversary of the…
Abstract
The developments in the use of computer systems in libraries from 1966 to date have been great. This report, written to coincide with the twenty‐first anniversary of the publication of Program, looks at some of these developments, in Britain, in North America, and in other countries. It traces the history of library automation from the early experimental systems through to the co‐operative systems, the locally developed systems, the mini‐ and microcomputer‐based and stand‐alone integrated systems that are available today.
VINE is produced at least four times a year with the object of providing up‐to‐date news of work being done in the automation of library house‐keeping processes, principally in…
Abstract
VINE is produced at least four times a year with the object of providing up‐to‐date news of work being done in the automation of library house‐keeping processes, principally in the UK. It is edited and substantially written by the Information Officer for Library Automation based in Southampton University Library and supported by a grant from the British Library Research and Development Department. Copyright for VINE articles rests with the British Library Board, but opinions expressed in VINE do not necessarily reflect the news and policies of the British Library. The subscription for VINE in 1981 will be £20 for UK subscribers and £23 for overseas subscribers — the subscription year runs from January to December and VINE is available in either paper or microfiche format.
Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange…
Abstract
Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.
Details
Keywords
D. ANDREW ROBERTS and RICHARD B. LIGHT
A survey of the current state of documentation practice in museums is presented. This concentrates on the broad themes of the practice, making comparisons with analogous library…
Abstract
A survey of the current state of documentation practice in museums is presented. This concentrates on the broad themes of the practice, making comparisons with analogous library procedures, where appropriate. A brief introduction to museums and their organizational framework within the United Kingdom is given. With this as background, the methods of documentation used by museums are reviewed, and a survey presented of current developments on an international and national scale.