This guide provides an overview of the diverse nature of the relationship between the system librarian and the computer. Offering a vision of the future of data processing, this book discusses the requirements of library computer systems and the concomitant demands of library users, vendors and staff members. The first chapter covers general systems management including computer security, suggestions for questions to ask when interviewing potential systems staff, how to decide who gets that new terminal, dealing with consultants and more. Chapter two covers problems of data processing. Other subjects covered include back-up systems, computer security, desktop publishing, controlling the user and the usage of CD-ROM. The authors base the information on their own experience.
This guide provides an overview of the diverse nature of the relationship between the system librarian and the computer. Offering a vision of the future of data processing, this book discusses the requirements of library computer systems and the concomitant demands of library users, vendors and staff members. The first chapter covers general systems management including computer security, suggestions for questions to ask when interviewing potential systems staff, how to decide who gets that new terminal, dealing with consultants and more. Chapter two covers problems of data processing. Other subjects covered include back-up systems, computer security, desktop publishing, controlling the user and the usage of CD-ROM. The authors base the information on their own experience.
Reihe
Sprache
Verlagsort
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Illustrationen
Maße
Höhe: 228 mm
Breite: 152 mm
ISBN-13
978-0-88736-580-5 (9780887365805)
Copyright in bibliographic data is held by Nielsen Book Services Limited or its licensors: all rights reserved.
Schweitzer Klassifikation
Part 1: how to compute the rip off factor; in defence of mousekin; the sorry state of RFPs - the vendor's plight - why, then? - what we'd do; RFP response response; who sells the system; what's your backup system?; service versus reality; CPUs per FTE - formula one - terminal support - what is support? - formula two - printers - the maintenance factor; twisting in the wind; terminals - who gets the new ones?; product obsolescence; buried in the paperless office; the consultant trap; computer security - open up the trap door; desktop publishing; typeset snobbism; tricky shelving; CD-ROM - only a few dollars more; joy of programming; new standards needed - MARC format disappears after loading - ASCII for data - say bye bye to mama. Part 2: where is the rose?; blaming the system; creative contempt; computer chauvinism - part one; chauvinism - part two; the dark side of the force; barcodes - sign of the devil; heresy of our own - how we stopped a microwave tower; how barcodes work; the VDT hazard; on controlling the user. Part 3 You're crazy if you ever do this: IBM keyboards; crucial info online/ TSR programs can be trouble; air conditioning filters; look before you leap; backup? who, moi?; test plugs for diagnostics; test the hardware first; how to destroy equipment; it might be easier to walk; it worked...except for this unfortunate side-effect; leaping lizards! isn't this an election year?; we don't do copy machines. Part 4 Gremlin's corner: unplugging; aluminum foil; multi-plexer wars; barwands in space; velcro to the rescue; memory redux. Part 5 Microsoft book: dynabook design; the screen; controls; system controls; inside the box; software. Part 6 Cyberpunk: reviews of contemporary cyberpunk science fiction. Part 7 Information overload.