Small voluntary sector organisations with limited budgets often cannot afford expensive commercial software and may not need all the facilities such software provides. A…
Small voluntary sector organisations with limited budgets often cannot afford expensive commercial software and may not need all the facilities such software provides. A large quantity of cheap software is distributed in the form of shareware but, for a number of reasons, is not widely used in the UK. This article describes the findings of a postgraduate project which aimed to assess the usefulness of shareware to information officers in small, voluntary sector organisations. A specific objective was to identify reliable shareware packages that could be used to manage reading lists, mailing lists, and other inhouse databases. The packages evaluated were 3by5, Business Librarian, File Express, Freefile, Instant Recall and PC‐File 5. The use of four of the packages was tested in two voluntary organisations (the National Self‐Help Support Centre and the Women's Nutritional Advisory Service) and is described.
Examines the advantages of “shareware” as opposed to commercial softwarein the fields of dietetics and nutrition, categorizing these into: wordprocessing; data storage and…
Examines the advantages of “shareware” as opposed to commercial software in the fields of dietetics and nutrition, categorizing these into: word processing; data storage and statistical analysis; multinational analysis; and educational. Gives useful hints to those contemplating their use.
Laments the fact that new and expensive software upgrades are notalways a step forward, and can, in fact, be costly mistakes if they arenot what the buyer wanted in the…
Laments the fact that new and expensive software upgrades are not always a step forward, and can, in fact, be costly mistakes if they are not what the buyer wanted in the first place. Introduces the concepts of ′shareware′ – software that can be given a trial run before being purchased, and ′public domain′ software, which is available free of charge to be used by any member of the public. Lists a few of the better shareware programs and places where it can be obtained.
On April 2, 1987, IBM unveiled a series of long‐awaited new hardware and software products. The new computer line, dubbed the Personal Systems 30, 50, 60, and 80, seems destined to replace the XT and AT models that are the mainstay of the firm's current personal computer offerings. The numerous changes in hardware and software, while representing improvements on previous IBM technology, will require users purchasing additional computers to make difficult choices as to which of the two IBM architectures to adopt.
Gives information on software of interest to those working in the areas of food and nutrition including two shareware programs called Arcus Pro III and Kwickstat. Discusses the capabilities of each package and their suitability for use with different groups of people and in different types of research. Gives information on software costs, registration fees for shareware and the addresses from which further details can be obtained.
In its clearest statement yet on such matters, OCLC has laid out the options facing libraries wishing to gain access to its Online Union Catalog. The details on this…
In its clearest statement yet on such matters, OCLC has laid out the options facing libraries wishing to gain access to its Online Union Catalog. The details on this statement can be found in Communications & Access Planning Guide, a 36‐page booklet available from OCLC and OCLC network offices.
Spyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this…
Spyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this study was to determine the prevalence of spyware in internet shareware and freeware and to investigate the personal information collected.
The methodology was a two‐phase, multi‐case study. The first phase determined that five of the 50 most popular pieces of Windows®‐based freeware and shareware available to internet users from CNETDownload.com were suspected of containing spyware: these were included as data sources for phase two. The purpose of phase two was to confirm the existence of spyware and to identify the types and frequencies of any personal data transmissions. For this phase, data were collected and analyzed utilizing a passive network monitor program to examine packets of data transmitted from a personal computer to external destinations on the internet.
The findings confirmed the existence and use of spyware in three of five suspected cases. However, the data indicated that there was a low occurrence of spyware and that these programs have the capability to collect numerous types of personal data. The main limitation is that these results are based on a snapshot of data obtained during five days.
The study has practical implications for internet users, who should be aware that spyware exists and understand its potential threat. Spyware developers should provide the user with an effective removal tool. Finally, marketers are cautioned that spyware might alienate customers.
This paper confirms the potential for misuse of these programs.
Once in a while, you should take stock of your personal computing environment. What is on your system? How did it get there? What do you actually use? How did you arrive at your hardware configuration, and does it still meet your needs? You may find that you can free up some disk space in the process; at the very least, you'll understand your situation better. The author goes through this exercise both as an example of what it can show and because full disclosure is important for this series of articles. You need to know the background for the advice that appears here. The author discloses his current computing environments, how they got that way, and what that may mean. He also points out the real limits within which he operates as a PC commentator. When you go through the software on your system, you should check to see whether it represents ethical computing. The author offers a few notes on ethical issues related to software. The author also provides notes from PC literature for January‐June 1992.
Hooking into the Electronic Grid. Cyberpunk science fiction postulates a world in the not too distant future where a vast information grid is responsible for most activity of any importance. Future hackers with the requisite skills and mental discipline can hook their brains directly to this grid and travel the ‘data paths’ in search of adventure. Novels such as Neuromancer by William Gibson have invigorated the often dull genre by extrapolating present trends into an all‐too‐believable near future. In some sense, the world postulated by cyberpunk is already here. Anyone connected to a network has already become dependent on the vast information grid that is now responsible for a great deal of activity. Indeed, a computer sitting off by itself may still be a useful tool. But with the addition of a modem it can serve as a window into a vast array of information and services.
While bargains abound in the personal computing field, they must be evaluated considering your needs—and it is sometimes hard to distinguish between inexpensive and merely…
While bargains abound in the personal computing field, they must be evaluated considering your needs—and it is sometimes hard to distinguish between inexpensive and merely cheap alternatives. The author discusses low‐priced software alternatives, noting how to look for bargains and a few specific examples. The PC‐related media scene continues to change, as does the slice of it reviewed for “Notes on the Media.” In the second portion of this article, the author offers some typically opinionated notes on some current publications. The author concludes with the usual roundup of comparative reviews and other notes on the PC literature for January‐March 1995. It was a big quarter for printer reviews, with few desktop computer comparisons—and life's about to get more interesting for those who prefer the Macintosh operating system: the clones are coming!