Search results

1 – 10 of over 73000
Article
Publication date: 1 June 2001

Laura Tull

Cloning software is now becoming quite popular in all types of libraries. Pricing is such that even smaller libraries can afford it. Cloning software basically takes an image of…

769

Abstract

Cloning software is now becoming quite popular in all types of libraries. Pricing is such that even smaller libraries can afford it. Cloning software basically takes an image of an entire hard drive and stores it on some kind of medium such as zip disks, compact disks, or a server’s hard drive. It can be used to roll out a group of new computers or as a backup system. It can be especially helpful to libraries that have limited staffing resources to devote to troubleshooting computer software problems. If a software problem occurs on a computer, it can basically be restored in a matter of minutes to the state it was in at the time the image was created. It is well worth the cost when purchasing computers in bulk for a new building or replacing a group of old computers. It is wise to consider a couple of things before going into the cloning business. First, design the images carefully. Second, create a method to track the images after they have been created. This article describes how cloning software can benefit a library as well as designing and tracking the images for most efficient usage.

Details

Library Hi Tech, vol. 19 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 September 1990

C.D.J. Waters

Haulage contractors are always looking for waysof improving efficiency and reducing costs. Theseusually rely on better management practices.Computers are now an almost…

Abstract

Haulage contractors are always looking for ways of improving efficiency and reducing costs. These usually rely on better management practices. Computers are now an almost essential management tool and it would be reasonable to suggest that truck operators should be heavy users of computer software. There seems to be a considerable amount of software available to them, but it has been suggested that this is not widely used. To see if this is true a survey of the trucking industry was done in Alberta, Canada. This survey showed an unexpectedly low use of computers, with a preference for general business software rather than specialised packages designed for truckers. Operators often suggested their use of computers was limited by a shortage of adequate software. Overcoming this shortage could offer considerable benefits to both the trucking industry and software suppliers.

Details

International Journal of Physical Distribution & Logistics Management, vol. 20 no. 9
Type: Research Article
ISSN: 0960-0035

Keywords

Abstract

Details

Information Services for Innovative Organizations
Type: Book
ISBN: 978-0-12465-030-5

Article
Publication date: 1 April 1988

Paul Nieuwenhuysen

The following bibliography focuses mainly on programs which can run on IBM microcomputers and compatibles under the operating system PC DOS/MS DOS, and which can be used in online…

Abstract

The following bibliography focuses mainly on programs which can run on IBM microcomputers and compatibles under the operating system PC DOS/MS DOS, and which can be used in online information and documentation work. They fall into the following categories:

Details

The Electronic Library, vol. 6 no. 4
Type: Research Article
ISSN: 0264-0473

Article
Publication date: 1 February 1983

Inabeth Miller

There is no computer topic today more widely discussed, that occupies more pages in the popular and academic journals than computer software. It is said to be sparse, nonexistent…

Abstract

There is no computer topic today more widely discussed, that occupies more pages in the popular and academic journals than computer software. It is said to be sparse, nonexistent, ineffective, “junk,” inaccurate, incomprehensible, unsuitable, etc. Software is essential to the efficacy of any school computer operation, yet rarely purchased concomitant with the equipment itself. Originally, vendors gave away software with every hardware purchase. Today, school practitioners recommend that schools should budget twice the cost of the hardware for appropriate materials. The New York Times, in an article entitled “Computers: The Action's in Software,” reveals much about the economics of a field that is just beginning its rapid growth phase (November 8, 1981). Indeed, schools may come to the realization with this technology that equipment without software is a projector without a film, a phonograph without a record.

Details

Collection Building, vol. 5 no. 2
Type: Research Article
ISSN: 0160-4953

Article
Publication date: 1 January 1987

Alison Jameson

Downloading and uploading offer labour‐saving advantages and are now accepted as useful options in online searching. All aspects are here considered, from recent technical…

Abstract

Downloading and uploading offer labour‐saving advantages and are now accepted as useful options in online searching. All aspects are here considered, from recent technical advances, applications and legal attitudes. There is also a review of current software for downloading. Recent developments mean a trend to higher internal memory and storage capacity, and greater transmission speeds. Packages now offer access to more than one host, give maximum assistance to the user without being menu‐driven and incorporate the latest developments in artificial intelligence. Disadvantages are in the length of time involved in the process and the fact that the legal issue of copyright has not yet been finalised. Database producers have turned to licensing under contract law, but there is still need to rely on user ethics, and the need for a standard permissions form is highlighted.

Details

Library Management, vol. 8 no. 1
Type: Research Article
ISSN: 0143-5124

Keywords

Article
Publication date: 1 February 1996

Jaroslav Mackerle

Presents a review on implementing finite element methods on supercomputers, workstations and PCs and gives main trends in hardware and software developments. An appendix included…

Abstract

Presents a review on implementing finite element methods on supercomputers, workstations and PCs and gives main trends in hardware and software developments. An appendix included at the end of the paper presents a bibliography on the subjects retrospectively to 1985 and approximately 1,100 references are listed.

Details

Engineering Computations, vol. 13 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 1 June 2002

George K. Chacko

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange…

3764

Abstract

Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 14 no. 2/3
Type: Research Article
ISSN: 1355-5855

Keywords

Article
Publication date: 1 April 1993

Claire E.A. Seaman and Terry R. Kirk

As the range of computer software available to nutritionistsincreases, choosing software becomes more complex and more important.Provides an overview of the types of software

Abstract

As the range of computer software available to nutritionists increases, choosing software becomes more complex and more important. Provides an overview of the types of software available and the uses to which that software might be put. Considers software in four broad groups: (1) wordprocessing packages; (2) data storage and statistical analysis packages; (3) nutritional analysis packages; and (4) educational packages. Considers the conditions under which different software packages are useful and gives examples of software from each group. Provides addresses for further information about the software packages described in the text. Much of the software available is designed for use with personal computers (PCs), mainframe computers or Apple Macintosh computers, but also studies nutritional software designed for use with an electronic personal organizer. A vast range of the available nutritional analysis software can be used on a PC or an Apple Macintosh, but a system which fits easily into a pocket, such as the Psion Personal Organiser, has certain advantages, especially for those researchers who wish to take a computer with them while collecting data.

Details

Nutrition & Food Science, vol. 93 no. 4
Type: Research Article
ISSN: 0034-6659

Keywords

Article
Publication date: 1 March 2000

Mahbubur Rahim, Mohd. Noah Abd. Rahman and Afzaal H. Seyal

This article reports the results of a survey in Brunei Darussalam concerning the use of pirated software among academics. Though, the suspicion of academics using pirated software

2436

Abstract

This article reports the results of a survey in Brunei Darussalam concerning the use of pirated software among academics. Though, the suspicion of academics using pirated software has long been circulating around in East and South East Asia, no “hard data” has ever been collected. This article confirms the suspicion, and provides new information on the use of pirated software outside the USA. Also reveals the type of tasks accomplished by academics with pirated software, and identifies the reasons for using such software. Moreover, relates academics’ use of pirated software with nine factors related to demographics, computer exposure, and job profile of academics. The findings are discussed, and are compared with some related findings reported elsewhere. Finally, concludes with some suggestions to curb piracy, and identifies areas of further research.

Details

Information Management & Computer Security, vol. 8 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

1 – 10 of over 73000