Search results

1 – 10 of 358
Article
Publication date: 1 January 1993

Jean Harding and Gillian Martin

Small voluntary sector organisations with limited budgets often cannot afford expensive commercial software and may not need all the facilities such software provides. A large…

Abstract

Small voluntary sector organisations with limited budgets often cannot afford expensive commercial software and may not need all the facilities such software provides. A large quantity of cheap software is distributed in the form of shareware but, for a number of reasons, is not widely used in the UK. This article describes the findings of a postgraduate project which aimed to assess the usefulness of shareware to information officers in small, voluntary sector organisations. A specific objective was to identify reliable shareware packages that could be used to manage reading lists, mailing lists, and other inhouse databases. The packages evaluated were 3by5, Business Librarian, File Express, Freefile, Instant Recall and PC‐File 5. The use of four of the packages was tested in two voluntary organisations (the National Self‐Help Support Centre and the Women's Nutritional Advisory Service) and is described.

Details

Program, vol. 27 no. 1
Type: Research Article
ISSN: 0033-0337

Article
Publication date: 1 February 1994

Claire Seaman

Examines the advantages of “shareware” as opposed to commercial softwarein the fields of dietetics and nutrition, categorizing these into: wordprocessing; data storage and…

228

Abstract

Examines the advantages of “shareware” as opposed to commercial software in the fields of dietetics and nutrition, categorizing these into: word processing; data storage and statistical analysis; multinational analysis; and educational. Gives useful hints to those contemplating their use.

Details

Nutrition & Food Science, vol. 94 no. 1
Type: Research Article
ISSN: 0034-6659

Keywords

Article
Publication date: 1 June 1990

Stephen M. Jackson and Serafim Halkias

Laments the fact that new and expensive software upgrades are notalways a step forward, and can, in fact, be costly mistakes if they arenot what the buyer wanted in the first…

Abstract

Laments the fact that new and expensive software upgrades are not always a step forward, and can, in fact, be costly mistakes if they are not what the buyer wanted in the first place. Introduces the concepts of ′shareware′ – software that can be given a trial run before being purchased, and ′public domain′ software, which is available free of charge to be used by any member of the public. Lists a few of the better shareware programs and places where it can be obtained.

Details

OCLC Micro, vol. 6 no. 6
Type: Research Article
ISSN: 8756-5196

Keywords

Article
Publication date: 1 May 1987

On April 2, 1987, IBM unveiled a series of long‐awaited new hardware and software products. The new computer line, dubbed the Personal Systems 30, 50, 60, and 80, seems destined…

Abstract

On April 2, 1987, IBM unveiled a series of long‐awaited new hardware and software products. The new computer line, dubbed the Personal Systems 30, 50, 60, and 80, seems destined to replace the XT and AT models that are the mainstay of the firm's current personal computer offerings. The numerous changes in hardware and software, while representing improvements on previous IBM technology, will require users purchasing additional computers to make difficult choices as to which of the two IBM architectures to adopt.

Details

M300 and PC Report, vol. 4 no. 5
Type: Research Article
ISSN: 0743-7633

Article
Publication date: 1 December 1994

Claire Seaman

Gives information on software of interest to those working in the areasof food and nutrition including two shareware programs called Arcus ProIII and Kwickstat. Discusses the…

151

Abstract

Gives information on software of interest to those working in the areas of food and nutrition including two shareware programs called Arcus Pro III and Kwickstat. Discusses the capabilities of each package and their suitability for use with different groups of people and in different types of research. Gives information on software costs, registration fees for shareware and the addresses from which further details can be obtained.

Details

Nutrition & Food Science, vol. 94 no. 6
Type: Research Article
ISSN: 0034-6659

Keywords

Article
Publication date: 1 March 1988

In its clearest statement yet on such matters, OCLC has laid out the options facing libraries wishing to gain access to its Online Union Catalog. The details on this statement can…

Abstract

In its clearest statement yet on such matters, OCLC has laid out the options facing libraries wishing to gain access to its Online Union Catalog. The details on this statement can be found in Communications & Access Planning Guide, a 36‐page booklet available from OCLC and OCLC network offices.

Details

Library Workstation and PC Report, vol. 5 no. 3
Type: Research Article
ISSN: 0894-9158

Article
Publication date: 1 December 2005

Kyle Kucera, Michel Plaisent, Prosper Bernard and Lassana Maguiraga

Spyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this study…

831

Abstract

Purpose

Spyware is a controversial software technology that allows the surreptitious collection of personal information from computers linked to the internet. The purpose of this study was to determine the prevalence of spyware in internet shareware and freeware and to investigate the personal information collected.

Design/methodology/approach

The methodology was a two‐phase, multi‐case study. The first phase determined that five of the 50 most popular pieces of Windows®‐based freeware and shareware available to internet users from CNETDownload.com were suspected of containing spyware: these were included as data sources for phase two. The purpose of phase two was to confirm the existence of spyware and to identify the types and frequencies of any personal data transmissions. For this phase, data were collected and analyzed utilizing a passive network monitor program to examine packets of data transmitted from a personal computer to external destinations on the internet.

Findings

The findings confirmed the existence and use of spyware in three of five suspected cases. However, the data indicated that there was a low occurrence of spyware and that these programs have the capability to collect numerous types of personal data. The main limitation is that these results are based on a snapshot of data obtained during five days.

Practical implications

The study has practical implications for internet users, who should be aware that spyware exists and understand its potential threat. Spyware developers should provide the user with an effective removal tool. Finally, marketers are cautioned that spyware might alienate customers.

Originality/value

This paper confirms the potential for misuse of these programs.

Details

Journal of Enterprise Information Management, vol. 18 no. 6
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 1 March 1992

Walt Crawford

Once in a while, you should take stock of your personal computing environment. What is on your system? How did it get there? What do you actually use? How did you arrive at your…

Abstract

Once in a while, you should take stock of your personal computing environment. What is on your system? How did it get there? What do you actually use? How did you arrive at your hardware configuration, and does it still meet your needs? You may find that you can free up some disk space in the process; at the very least, you'll understand your situation better. The author goes through this exercise both as an example of what it can show and because full disclosure is important for this series of articles. You need to know the background for the advice that appears here. The author discloses his current computing environments, how they got that way, and what that may mean. He also points out the real limits within which he operates as a PC commentator. When you go through the software on your system, you should check to see whether it represents ethical computing. The author offers a few notes on ethical issues related to software. The author also provides notes from PC literature for January‐June 1992.

Details

Library Hi Tech, vol. 10 no. 3
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 1 March 1989

Michael Schuyler

Hooking into the Electronic Grid. Cyberpunk science fiction postulates a world in the not too distant future where a vast information grid is responsible for most activity of any…

Abstract

Hooking into the Electronic Grid. Cyberpunk science fiction postulates a world in the not too distant future where a vast information grid is responsible for most activity of any importance. Future hackers with the requisite skills and mental discipline can hook their brains directly to this grid and travel the ‘data paths’ in search of adventure. Novels such as Neuromancer by William Gibson have invigorated the often dull genre by extrapolating present trends into an all‐too‐believable near future. In some sense, the world postulated by cyberpunk is already here. Anyone connected to a network has already become dependent on the vast information grid that is now responsible for a great deal of activity. Indeed, a computer sitting off by itself may still be a useful tool. But with the addition of a modem it can serve as a window into a vast array of information and services.

Details

Library Workstation Report, vol. 6 no. 3
Type: Research Article
ISSN: 1041-7923

Article
Publication date: 1 March 1995

Walt Crawford

While bargains abound in the personal computing field, they must be evaluated considering your needs—and it is sometimes hard to distinguish between inexpensive and merely cheap…

43

Abstract

While bargains abound in the personal computing field, they must be evaluated considering your needs—and it is sometimes hard to distinguish between inexpensive and merely cheap alternatives. The author discusses low‐priced software alternatives, noting how to look for bargains and a few specific examples. The PC‐related media scene continues to change, as does the slice of it reviewed for “Notes on the Media.” In the second portion of this article, the author offers some typically opinionated notes on some current publications. The author concludes with the usual roundup of comparative reviews and other notes on the PC literature for January‐March 1995. It was a big quarter for printer reviews, with few desktop computer comparisons—and life's about to get more interesting for those who prefer the Macintosh operating system: the clones are coming!

Details

Library Hi Tech, vol. 13 no. 3
Type: Research Article
ISSN: 0737-8831

1 – 10 of 358