Computers in Libraries

Monthly magazine provides library information technology news and practical application.

Articles from Vol. 25, No. 3, March

20th Annual Computers in Libraries 2005: North America's Largest Technology Conference & Exhibition for Librarians and Information Managers
Hilton Washington | March 16-18, 2005 EXTENDING OUR REACH * Searching and Search Engines * Digital Content Management * Web Design, Development, and Usability * Intranets, Portals, and Knowledge Management * E-Learning, Information...
A Delicate Balance: National Security vs. Public Access
Sometimes people want to see data that the government thinks should be kept under wraps. How does the Department of Defense balance the scales of justice while still ensuring information security?In the aftermath of September 11, 2001, the Defense Technical...
A Delicate Balance: National Security vs. Public Access; Sometimes People Want to See Data That the Government Thinks Should Be Kept under Wraps. How Does the Department of Defense Balance the Scales of Justice While Still Ensuring Information Security?
In the aftermath of September 11, 2001, the Defense Technical Information Center (DTIC--http://www.dtic.mil) found itself in the spotlight as journalists, academics, and policy-makers sounded the alarm on both sides of the issue of public access to...
Ask Techman
JH from Memphis, Tenn., asks: Is it really worth upgrading from a 17-inch LCD monitor to a 19-inch? techman responds: As always, it depends what you want the extra size for. Some people would argue that while you're getting something like 32 more...
Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers
I'm writing this column at the end of December 2004, while in my day job as the systems librarian at the Monroeville Public Library, I am beginning to work on my end-of-the-year reports. I am busy compiling statistics and preparing a list of the automation...
Implementing Wireless Networks without Compromising Security
I regularly teach workshops on wireless networks in libraries. It's a technology that almost all libraries are interested in implementing, but many have avoided it out of concern for security. Though many valid security issues prevail, solutions also...
Noted & Quoted
people * libraries * awards * promotionsDoes your library have a special announcement to make?CIL is always looking for more items to include in the Noted & Quoted section.So if you've been promoted or if you or your library has received an award...
Small Libraries, Big Technology
Introductions can be so awkward. Even though we have invented all kinds of unwritten rules and protocols for our initial greetings, I always seem to have questions: Just how firm should your handshake be? How should you respond if the other person...
Surviving Chronic E-Mail Fatigue
I'm too young to be nostalgic. At least, someone told me that once. But lately, technology has been making me nostalgic for a time when we used to communicate differently. I think I have Chronic E-Mail Fatigue (CEF), and I am desperate for a cure....
Surviving Hacker Attacks Proves That Every Cloud Has a SILVER LINING
I turned a hacker-attack crisis into an opportunity to advance my systems administrator skills and to better protect our server from future attacks.When I first realized I'd been hacked, I thought, "Oh, my God, they really did it!" While trying to recover...
Surviving Hacker Attacks Proves That Every Cloud Has a Silver Lining: I Turned a Hacker-Attack Crisis into an Opportunity to Advance My Systems Administrator Skills and to Better Protect Our Server from Future Attacks
When I first realized I'd been hacked, I thought, "Oh, my God, they really did it!" While trying to recover from the shock, I had to call the supervisors of the departments with services affected by the loss of the library's server. In a seemingly...
The Need to Feel Secure
Just before you go to bed each night, do you lock your doors? Do you make sure that the windows are closed or that the stove is turned off? Most people, I'll wager, do something to make sure their houses are safe before they retire for the night. There's...
Understand the BIG PICTURE So You Can Plan for NETWORK SECURITY
Putting a security plan into place may not be as difficult as you think. This overview will get you started.Network security should be a major concern for your library. There were only six exploit (security exposure) problems, worldwide, reported to...
Understand the Big Picture So You Can Plan for Network Security: Putting a Security Plan into Place May Not Be as Difficult as You Think. This Overview Will Get You Started
Network security should be a major concern for your library. There were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.