...Technology Author(s): H. Stephen Wright Source: Notes, Second Series, Vol. 56, No. 3 (Mar., 2000), pp. 591-597 Published by: Music Library Association Stable URL: http://www.jstor.org/stable/899642 Accessed: 01-10-2015 14:13 UTC Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at http://www.jstor.org/page/ info/about/policies/terms.jsp JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org. Music Library Association is collaborating with JSTOR to digitize, preserve and extend access to Notes. http://www.jstor.org This content downloaded from 103.5.183.171 on Thu, 01 Oct 2015 14:13:57 UTC All use subject to JSTOR Terms and Conditions TECHNOLOGY BY H. STEPHEN WRIGHT In an astonishing 1945 article, scientist Vannevar Bush offered his vision of a marvelous machine he called the "memex."' As depicted by Bush, the memex would enable scholars to search a vast repository of scholarly information, take notes, copy information as needed, and create new scholarship-all with incredible speed. One of the most striking features of the memex is what Bush called "associative indexing," in which links can be built between items of information...
Words: 3383 - Pages: 14
...- is the catalog relevant? Today, the online library catalog is in a state of crisis. The current challenges facing the catalog are numerous. There is the challenge of having to catalog ever-increasing inputs; more print titles and online resources exist today than ever before. The high cost of cataloging is a factor as well. "In 2004, [American research] libraries spent an estimated $239 million on technical services labor alone." (Calhoun, 11) But the biggest challenge to cataloging today is competition from other services. (Danskin, 2) The Catalog began life as an inventory control tool for the sum total of our collective knowledge. Before the internet, the library catalog was the starting point for research. Now, however, the catalog is becoming less and less relevant to scholars and other library users. The OCLC Report of 2005 found evidence that “89% of college students began their searches on the web, with only 2% starting at the library website.” (Calhoun, 37) In May 1999, at the Medical Library Association's annual meeting, Dick Miller discussed the "frustrations that we encounter regularly at Lane Medial Library, in trying to cope with proliferating digital resources. With burgeoning web development, we [Lane Medical Library] felt that our 'library information' was under-utilized due to its segregation from mainstream web resources, and in danger of becoming marginalized." (Miller,1) What Miller feared in 1999, the under-utilization of library information...
Words: 1755 - Pages: 8
...Planning and implementation of Library Automation Bangladesh perspective Prepared by M Hossam Haider Chowdhury Associate Librarian, Independent University, Bangladesh (IUB) For Workshop on “Digitization of Medical Library and Information Services”, 2002, Mohakhali, Dhaka Automation, i.e., dependency on machine, has remarkable influence at our work place. With the help of machine people perform their job comfortably and quickly and ultimately it increases people’s efficiency and effectiveness. In case of library the term “automation” basically means computerization of library activity. Computer influences all fields of human activity. Pandey S.K. Sharma describes influence of computer very nicely in his book on library automation. “The invention and increasing use of computers in various fields of human activity is witness to the fact that the computer is considered to be essential component for all-round development. Computers’ entry and its continuance in almost all fields of human endeavor is due to its invincible qualities, viz., the splendid speed to act in nano-second, the superb capabilities to do unmanageable and impossible looking things, the unlimited capacity to store ocean of information on to tiny storage mediums, immense capability to perform repetitive jobs without fatigue, the radical power to sort, arrange, retrieve and disseminate information almost instantaneously etc., etc. Day by day it is becoming more and more indispensable for...
Words: 2996 - Pages: 12
...Library Management System with Rack Identification and Deadline Intimation Using GSM V.PRAVEEN KUMAR1 1K.S.Rangasamy college of Technology, ECE, praveeneceofficial@gmail.com S.PAVYA2 2K.S.Rangasamy college of Technology, ECE, pavyas@ksrct.ac.in Abstract The major problem faced by the users in the university libraries and big libraries is the identification of the books in the certain racks where they are placed. To overcome this difficulty library management with identification of the specific racks is implemented. The deadline of the book to be returned is also intimated to the user by means of an intimation message from the management system through the GSM module. The RFID tag is used to store the information of the user who has...
Words: 1456 - Pages: 6
...Course Registration System Problem Statement As the head of information systems for Wylie College you are tasked with developing a new student registration system. The college would like a new client-server system to replace its much older system developed around mainframe technology. The new system will allow students to register for courses and view report cards from their personal computers attached to the campus LAN, or from any machine on the Internet (such as the machines in the school library). Professors will be able to access the system to sign up to teach courses as well as record grades. Due to a decrease in federal funding the college cannot afford to replace the entire system at once. The college will keep the existing course catalog database where all course information is maintained. This database is an Ingres relational database running on a DEC VAX. Fortunately the college has invested in an open SQL interface that allows access to this database from college’s Unix servers. The legacy system performance is rather poor, so the new system must insure that access to the data on the legacy system occurs in a timely manner. The new system will access course information from the legacy database but will not update it. The registrar’s office will continue to maintain course information through another system. At the beginning of each semester students may request a course catalogue containing a list of course offerings for the semester. Information about...
Words: 491 - Pages: 2
.......................................................................... 2 General Information ......................................................................................................... 2 9.5.1 Campus Maps .............................................................................................................. 2 9.5.2 Academic Calendar ..................................................................................................... 2 9.5.3 Email Accounts ........................................................................................................... 2 9.5.4 Office Space ................................................................................................................ 3 9.5.5 Identification Cards...
Words: 5048 - Pages: 21
...Sample Library Request for Proposals: Integrated Library System 1. Introduction............................................................................................................... 3 1.1 RFP Purpose.................................................................................................... 3 1.2 Definitions....................................................................................................... 3 Proposal Instructions................................................................................................ 4 2.1 RFP Schedule.................................................................................................. 4 2.2 Content and Format of Vendor Response....................................................... 5 2.3 Costs................................................................................................................ 6 2.4 Proprietary Information Agreement................................................................ 6 2.5 RFP Process Conditions.................................................................................. 6 2.6 Submission of Questions................................................................................. 7 Selection Process ....................................................................................................... 8 3.1 RFP Evaluation ............................................................................................... 8 3.2 Vendor Presentations ..................
Words: 8203 - Pages: 33
...Electronic Commerce, 7th Edition 14188-37032 Chapter 10 Solutions Review Questions 1. In about 200 words, explain why Web sites use cookies. In your answer, discuss the reasons that cookies were first devised and explain where cookies are stored. You can use the links in the Online Companion to help with your research. Answer: Responses will vary, but should include references to shopping carts. Since cookies contain text data, they can help with the statelessness of the Internet. 2. In about 100 words, describe steganography and explain its connection to the topic of online security. You can use the links in the Online Companion to help with your research. Answer: Responses will vary, but should mention that this involves hiding information within another piece of information. 3. In about 200 words, explain the differences between public-key encryption and private-key encryption. List advantages and disadvantages of each encryption method. Explain which method you would use for e-mail sent from a field sales office to corporate headquarters. Assume that the e-mail regularly includes highly confidential information about upcoming sales opportunities. Answer: Responses will vary but should mention that public-key encryption, encodes messages by using two mathematically related numeric keys. Private-key encryption, encodes a message with one of several available algorithms that use a single numeric key, such as 456839420783, to...
Words: 1430 - Pages: 6
...and too often, thousands of children who struggle with reading because of a print disability such as dyslexia do not receive access to resources that may help them enjoy reading. Author and fan websites. Young readers like know more “about the author” and the Internet is rich with resources produced both by the authors themselves, their publishers, and their fans. Want to know what’s next in a favorite series? Check the author’s page or blog. Want to read more about a favorite character? Check the “fanfiction” often written by other young readers. That popular new movie jsut might be based on a novel that's in the library, so media ties-ins are powerfully motivating. Clever librarians find ways of helping students easily locate these materials by pasting printed lists of websites or QR codes in the backs of books or by adding links as a part of the electronic...
Words: 897 - Pages: 4
...MGMT 407.341 (CRN: 60240), Business Ethics Tuesdays and Thursdays, 4:34 PM to 7:15 PM Summer Semester, June 7 to July 30, 2010 Fort Hood SDC, Room # D-112 A member of the Texas A&M System since 1917 Instructor: Mr. John La Lone, BS-BA, MS-HRM Department: Management, Marketing, and Administrative Systems Office: Room 135A Phone: (254) 519-5472 E-mail: lalone@tarleton.edu Office Hours: Monday, Tuesday, Wednesday and Thursday: 1:30 PM to 4:00 PM. By appointment only. Office Secretary: Ms. Gabriele Fischbacher (254) 519-5437, Fax (254) 526-8403 A portion of this course is delivered via Blackboard Online Learning. http://online.tarleton.edu/Dual/DualLoginPage.htm You are required to check in online via e-mail within Blackboard within two days of this class. 1.0 Course Description: This course is designed to provide the student with a basic examination of the manager’s personal, social, and environmental responsibilities to oneself, ones employees, customers, the general public, the government and other agencies. It is also intended to totally familiarize the student with a basic understanding of Personal Business Ethics Concepts in today’s modern workplace environment. Emphasis will be placed upon the manager’s social and environmental responsibilities to employees, customers and the public. 1.1 Prerequisites: There are no pre-requisites for this course. 1.2 Expanded Course Description: The objective of this course is for each student...
Words: 3622 - Pages: 15
...Object-Oriented Programming in C++, Fourth Edition Robert Lafore 800 East 96th St., Indianapolis, Indiana 46240 USA Copyright 2002 by Sams Publishing All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. International Standard Book Number: 0-672-32308-7 Library of Congress Catalog Card Number: 2001094813 Printed in the United States of America First Printing: December 2001 04 03 02 01 4 3 2 1 EXECUTIVE EDITOR Michael Stephens ACQUISITIONS EDITOR Michael Stephens MANAGING EDITOR Matt Purcell PROJECT EDITORS Angela Boley Christina Smith INDEXER Rebecca Salerno PROOFREADER Matt Wynalda Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Sams Publishing cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. TECHNICAL EDITOR Mark Cashman TEAM COORDINATOR ...
Words: 608 - Pages: 3
...ECommerce, Inter Organizational E-Commerce Intra Organizational E-Commerce, and Consumer to Business Electronic Commerce, Architectural framework Network Infrastructure for E-Commerce Network Infrastructure for E-Commerce, Market forces behind I Way, Component of I way Access Equipment, Global Information Distribution Network, Broad band Telecommunication. UNIT-II Mobile Commerce Introduction to Mobile Commerce, Mobile Computing Application, Wireless Application Protocols, WAP Technology, Mobile Information Devices, Web Security Introduction to Web security, Firewalls & Transaction Security, Client Server Network, Emerging Client Server Security Threats, firewalls & Network Security. UNIT-III Encryption World Wide Web & Security, Encryption, Transaction security, Secret Key Encryption, Public Key Encryption, Virtual Private Network (VPM), Implementation Management Issues. UNIT - IV Electronic Payments Overview of Electronics payments, Digital Token based Electronics payment System, Smart Cards, Credit Card I Debit Card based EPS, Emerging financial Instruments, Home Banking, Online Banking. UNIT-V Net Commerce EDA, EDI Application in Business, Legal requirement in E -Commerce, Introduction to supply Chain Management, CRM, issues in Customer Relationship Management. References: 1. Greenstein and Feinman, “E-Commerce”, TMH 2. Ravi Kalakota, Andrew Whinston, “Frontiers of Electronic Commerce”, Addision Wesley 3. Denieal Amor, “ The E-Business Revolution”, Addision Wesley 4. Diwan...
Words: 2913 - Pages: 12
...and explore ways to increase the efficiency of its supply chain, including shipping more product directly to stores. [Show less] You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer Translations powered by LEC. Translations powered by LEC. Full Text * Translate Full textUndo Translation Translation in progress... The full text may take...
Words: 4794 - Pages: 20
...Library Rules and Regulations 1. Library Hours * During regular class days * 7:30 am - 07:00 pm - Monday to Friday * 8:00 am - 12:00 nn - Saturday 2. Identification Cards Only students with identification cards will be granted library privileges. ID�s are required at all times. They are to be surrendered to the person in charge of the control desk upon entering the library. Students will be responsible for all library materials charged out in their name. Lending of ID�s is strictly prohibited; library privileges of owners of loaned ID�s will be suspended. The loss of ID�s should be reported immediately to the Office of the Registrar and a new one must be applied for. A student should have only one ID during his stay in school. 3. Library Cards Only those students with library cards will be allowed to borrow books. They should apply for a new Library Card if it is lost. Replacement will be issued after a week from the date of application. 4. Fines Reserve Books (Supplementary Reading Books) These books may be borrowed for two hours and may be renewed for another hour unless other students need them. These may be checked out for overnight use not earlier than 4:00 p.m. and should be returned not later than 9:00 a.m. of the following class day, except single copies of books and those highly in demand. These books should be returned not later than 8:00 a.m. A fine of P 1.00 will be imposed per hour of delay. Circulation Books (Home Reading Books)...
Words: 4820 - Pages: 20
...persistence and a recognition that information literacy is vital to our society. Information literacy has very broad applications from print to electronic sources. The characteristics of it are the same in both worlds: the ability to read, access, use and evaluate information . This ability is what makes a person informed and able to understand an advanced argument via literature be it electronic or hardcopy. Information literacy is also not without disagreement over several important aspects. For example, Darrow notes that regardless of the way one feels about students on the Internet, a school library media specialist must still customize the basic rubrics to fit the needs of their students . Sometimes this is very difficult. Darrow explains, “Today’s high school students are the first to grow up with the Internet” and as such, we as librarians are dealing with a generation gap. This generation gap would not be the problem it is if we were talking about theories and ideas. Instead, the problem we are talking about is learning. These generations are diametrically and fundamentally opposed in the learning opportunities and the teaching techniques, which causes problems. These problems make themselves obvious in how library programming and instruction are executed. When the librarians were in school, they did not have the Internet or electronic resources. As such, they do not have experience to draw on from their own...
Words: 2006 - Pages: 9