Search results

11 – 20 of over 23000
Article
Publication date: 1 January 1991

David B. Wells

Discusses the microcomputer policy implemented by Las Vegas‐ClarkCounty Library District. Examines the goals of the computer publicaccess facility, the software used, the staff…

Abstract

Discusses the microcomputer policy implemented by Las Vegas‐Clark County Library District. Examines the goals of the computer public access facility, the software used, the staff, the access policies, and the staff training program. Summarises that public access to computers should be kept manageable, that Macs have proved as popular as IBMs, and that only the most popular software should be used initially.

Details

OCLC Micro, vol. 7 no. 1
Type: Research Article
ISSN: 8756-5196

Keywords

Book part
Publication date: 27 April 2004

Josh Lerner and Jean Tirole

There has been a recent surge of interest in open source software development, which involves developers at many different locations and organizations sharing code to develop and…

Abstract

There has been a recent surge of interest in open source software development, which involves developers at many different locations and organizations sharing code to develop and refine programs. To an economist, the behavior of individual programmers and commercial companies engaged in open source projects is initially startling. This paper makes a preliminary exploration of the economics of open source software. We highlight the extent to which labor economics, especially the literature on career concerns’, can explain many of these projects’ features. Aspects of the future of open source development process, however, remain somewhat difficult to predict with off-the-shelf’ economic models.

Details

Intellectual Property and Entrepreneurship
Type: Book
ISBN: 978-1-84950-265-8

Article
Publication date: 1 January 1985

Brian Staples

The OMPX (pronounced ahm'pix) sounds like it might be a creature in a Dr. Seuss story. A picture of a heavy‐set walrus‐like animal in a teal blue stocking cap comes to mind. This…

Abstract

The OMPX (pronounced ahm'pix) sounds like it might be a creature in a Dr. Seuss story. A picture of a heavy‐set walrus‐like animal in a teal blue stocking cap comes to mind. This powerful creature is almost always good‐natured but is sometimes hard to find. With this image in mind, let's begin to find out what OMPX really is.

Details

OCLC Micro, vol. 1 no. 1
Type: Research Article
ISSN: 8756-5196

Article
Publication date: 1 January 1985

Walt Crawford

Using a modem, telephone, and telecommunications software, a computer can put you in touch with people and services. A computer isn't needed to go online. With a computer…

Abstract

Using a modem, telephone, and telecommunications software, a computer can put you in touch with people and services. A computer isn't needed to go online. With a computer, however, services can be used more effectively and cheaply. The author defines and discusses modems, software, and several services, and notes one major problem with telecommunications: money.

Details

Library Hi Tech, vol. 3 no. 1
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 February 1993

Joe Ryan

Identifies key activities that network users can perform in orderto use the network effectively. Offers recommended reading, frombeginner to expert user status. Explains some…

Abstract

Identifies key activities that network users can perform in order to use the network effectively. Offers recommended reading, from beginner to expert user status. Explains some commonly used terms (e.g. Turbo Gopher with Veronica!). Lists useful Internet resources.

Details

Internet Research, vol. 3 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 September 2004

David M. Berry

This paper examines some of the ethical problems involved in undertaking Internet research and draws on historical accounts as well as contemporary studies to offer an analysis of…

10459

Abstract

This paper examines some of the ethical problems involved in undertaking Internet research and draws on historical accounts as well as contemporary studies to offer an analysis of the issues raised. It argues that privacy is a misleading and confusing concept to apply to the Internet, and that the concept of non‐alienation is more resourceful in addressing the many ethical issues surrounding Internet research. Using this as a basis, the paper then investigates the Free/Libre and Open Source research model and argues for the principles of “open source ethics” in researching the online world, which includes a participatory and democratic research method.

Details

Internet Research, vol. 14 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 February 1988

Jay Weitz

In Cataloging Service Bulletin No. 38 (Fall 1987), pp. 2–10, the Library of Congress announced that headings for computer programs and software should be treated as uniform…

Abstract

In Cataloging Service Bulletin No. 38 (Fall 1987), pp. 2–10, the Library of Congress announced that headings for computer programs and software should be treated as uniform titles. In subjects, therefore, they would be assigned the tag 630, with a second indicator of “zero.” Computer programming languages and computer systems (including specific model names) continue to be established as 650s, with a second indicator of zero.

Details

OCLC Micro, vol. 4 no. 2
Type: Research Article
ISSN: 8756-5196

Article
Publication date: 1 March 1999

Schubert Foo, Peng Chor Leong, Siu Cheung Hui and Shigong Liu

The study outlines a number of security requirements that are typical of a host of Web‐based applications using a case study of a real life online Web‐based customer support…

1444

Abstract

The study outlines a number of security requirements that are typical of a host of Web‐based applications using a case study of a real life online Web‐based customer support system. It subsequently proposes a security solution that employs a combination of Web server security measures and cryptographic techniques. The Web server security measures include the formulation and implementation of a policy for server physical security, configuration control, users’ access control and regular Web server log checks. Login passwords, in conjunction with public key cryptographic techniques and random nonces, are used to achieve user authentication, provide a safeguard against replay attacks, and prevent non‐repudiatory usage of system by users. These techniques, together with the use of session keys, will allow data integrity and confidentiality of the customer support system to be enforced. Furthermore, a number of security guidelines have been observed in the implementation of the relevant software to ensure further safety of the system.

Details

Information Management & Computer Security, vol. 7 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 January 1987

Alison Jameson

Downloading and uploading offer labour‐saving advantages and are now accepted as useful options in online searching. All aspects are here considered, from recent technical…

Abstract

Downloading and uploading offer labour‐saving advantages and are now accepted as useful options in online searching. All aspects are here considered, from recent technical advances, applications and legal attitudes. There is also a review of current software for downloading. Recent developments mean a trend to higher internal memory and storage capacity, and greater transmission speeds. Packages now offer access to more than one host, give maximum assistance to the user without being menu‐driven and incorporate the latest developments in artificial intelligence. Disadvantages are in the length of time involved in the process and the fact that the legal issue of copyright has not yet been finalised. Database producers have turned to licensing under contract law, but there is still need to rely on user ethics, and the need for a standard permissions form is highlighted.

Details

Library Management, vol. 8 no. 1
Type: Research Article
ISSN: 0143-5124

Keywords

Article
Publication date: 1 February 1986

Have you ever wished your IBM‐compatible PC ran faster? Not everyone can afford a new AT, but for a few dollars and an hour's effort, you can increase the speed of your PC from…

Abstract

Have you ever wished your IBM‐compatible PC ran faster? Not everyone can afford a new AT, but for a few dollars and an hour's effort, you can increase the speed of your PC from five to ten percent. The secret of this increase is the new NEC V20 chip.

Details

M300 and PC Report, vol. 3 no. 2
Type: Research Article
ISSN: 0743-7633

11 – 20 of over 23000