Maximizing Your E-rate Is the staff trained in the use of technology page on universal service (see MaximizingYour E Telecommunications Discounts for Schools and libraries for the http://statelibrary.dcr.state.nc.us/hottopic/uniserv/eratesum.htm
Extractions: for Schools and Libraries Satellite Videoconference, June 3, 1997 The FCC's May 7 ruling makes provisions for discounts on basic telecommunications services, Internet services, and internal connections necessary to access networked resources. The discounts will be available to elementary schools, secondary schools and public libraries. These discounts will range from 20% to 90% and are based on two factors: comparative economic disadvantage and high cost/rurality. Funding available nationwide to support the discounts will have an annual cap of $2.25 billion. Additional amounts may be available in states which elect to create a supplemental fund. Funds will be distributed on a first come, first served basis. (Note: when available funds are depleted to $250 million, rules of priority will take effect and subsequent distribution of funds will be in order of need, i.e. high-cost/ high poverty areas first). Under this program, libraries will pay the discounted price and the difference will be distributed directly to the vendor/service provider from the universal service fund. Funding will be available January 1, 1998. Universal Service discounts are available for any telecommunications services. This includes internal connections and equipment necessary for carrying data (e.g. hubs, routers, servers), as well as monthly telecommunications services (phone and datacomm services, Internet service provider fees). Computers, software, training, and purchase of content (e.g. databases, electronic resources) are excluded from eligibility. Services received under the discount must be used for educational purposes only and may not be resold.
The 3M Library Systems Web Site Has Moved Library Systems Great Tips for maximizing use of Your 3M the number of borrowerswho can use your SelfCheck Those libraries that have high usage also have http://www.3m.com/market/security/library/whatsnew/selfchecktipslist.jhtml
Libraries You can use terminals in any of the libraries or from any personal computer connectedto This is a key person who can assist you in maximizing use, not only of http://www.botany.hawaii.edu/FacilityGuide/text/library.htm
Extractions: The Department has a small library, primarily housing floras, general botanical reference books and an extensive series of reprints contributed by Harold St. John. These books do not circulate and must be used in the library. This library also has a large table and on-line computer for undergraduate Botany majors. See Dr. Carr for more information and access to the room. The University's graduate library houses over 1.5 million monographs. It ranks about 49th nationally among research libraries (1995 statistics). Botany is one of its specialty areas, so the collection is quite good. If you don't find what you are looking for, you should inquire at the SciTech Desk (3rd floor). The Interlibrary Loan program will likely be expanded as Hamilton Library, like all other research libraries, face the problems of increased costs and severe shortages of space. The University library sytem is fully indexed so that you can do a computer search for items such as books, journals (and in some cases, the articles within journals this is the "uncover" function), videotapes, movies, and recordings. You can use terminals in any of the libraries or from any personal computer connected to the University computer network. ( Click here to try using this through TELNET.
Extractions: If my branch of the library doesn't carry the desired book, they do a search by computer to see where a copy of the book is located. When a copy is located they put in a request for the book to be sent to the library. How far away the lending library is will determine how soon you will receive the book. The library takes your name, address, telephone number and your library card number and the wait begins.
Extractions: What are the characteristics of ILL/DD operations in the ten libraries with the lowest unit costs, the ten with the highest fill rates, or the ten with the fastest turnaround times? How do these high-performing operations differ from the other research library participants? High-Performing Borrowing Operations Nineteen other research libraries ranked in the top ten for a single borrowing performance measure. Thus, a total of 25 research libraries ranked in the top ten for one or more borrowing performance measures. These high-performing borrowing operations share a number of characteristics. User-Initiated Ordering A majority of the top-performing borrowing operations offer electronic user-initiated ordering, either via statewide systems such as OhioLINK or through locally-developed electronic order forms. Systems that pass electronic patron request forms directly to the potential lender or into national messaging systems eliminate the need for ILL staff involvement in these initial steps of the borrowing process. Staff costs represent two-thirds of the borrowing unit cost, so by increasing user-initiated ordering staff costs are lessened and the borrowing unit cost is thus lowered. Maximizing Technology Many of the high-performing borrowing operations use a single ILL messaging system. Workflow and procedures are streamlined when only one system is used, resulting in faster turnaround time and lower unit costs.
CAD Symbol Libraries are some of the essentials for maximizing CADD Developing These directories act assymbol libraries that can be get rid of the functions that you rarely use. http://www.caddprimer.com/cadd_primer_chapters/cad_symbol_libraries_macros_scrip
Extractions: CADD PRIMER Chapter 9: Maximizing CADD Contents: About this Chapter Key Terms in this Chapter Streamlining CADD Drawing Environment The Design Applications of CADD Integrated Systems Collaborating CADD Projects on the Internet CADD Artificial Intelligence (AI) Resources About this Chapter So far, we have concentrated on CADDs drawing capabilities. But CADD is able to do much more than just drawing. It can help you design, perform analyses, and accomplish many automated tasks. There are a number of applications for CADD in architectural design, engineering calculations, product design, etc. This chapter contains two main topics: Streamlining CADD Drawing Environment describes how to maximize CADDs drawing efficiency using symbol libraries, macros and customizing features. It also describes how CADD can be used to prepare project reports and cost estimates using database functions.
MAXIMIZING THE USE OF INFORMATION maximizing THE use OF INFORMATION. b. Developing minilibraries and dispatchingthem to remote rural health facilities BLUE TRUNK libraries. http://www.whoafro.org/ddc/presentations/maximizing_the_use_of_information.html
Extractions: MAXIMIZING THE USE OF INFORMATION RESOURCES IN DISEASE CONTROL th May 2001 Margaret Mathai VPD/DDC The presentation will begin with a brief overview of information and how it differs from data and knowledge as the final output or product. A summary of information resources will be presented featuring mainly, the information products/services, and human resources as well Information/communication technology. Information and the growth of Knowledge: INFORMATION PRODUCTS/SERVICES: ELECTRONIC Utilizing information resources in the internet effectively a. Subscribing to discussion groups on topics of interest b. Creating discussion groups on topics relevant to you c. Searching bibliographic databases on the web for completed research work in areas of work d. Publishing your work and progress on the DDC Website e. Subscribing to electronic newsletters and journals f. Accessing full text journals available on the web g. Using the reference tools available on the web (Dictionaries, catalogues and Guides etc) h.
Extractions: PUBLISHED in Bulletin of the Medical Library Association Oct 1994 With electronic storage and delivery of text images a reality, the creation of virtual libraries, libraries functioning without printed journals within physical reach, becomes feasible. There are few published reports of recent, large-scale studies of interlibrary loan transactions. Most reported studies of ILL have been carried out within single organizations or local consortia for purposes of collection development and resource sharing. The FOUDRE (Fourniture de documents sur reseau electronique) pilot project in France (7), in which eighteen libraries cooperated to scan and electronically store images of articles from three central libraries during 1991-92, found in their study that only 2% of the articles requested on interlibrary loan were requested more than once. The National Library of Medicine has published results of two studies on its interlibrary loan service (8,9) which profiled ILL requests to NLM in 1984 and 1988 at the journal title level. NLM serves as a backup resource for materials not held by other medical libraries and receives more than 300,000 ILL requests per year. Both studies revealed that a very large number of different journals were needed to fill ILL requests received by NLM, but that very few of these journals were heavily requested. Most interlibrary loan requests for biomedical literature, however, are for individual journal articles. This paper reports the results an analysis of interlibrary loan transactions at the article level.
Maximizing Security On Public-Access WWW Computers maximizing Security On PublicAccess WWW Computers. presentation at the Computersin libraries Conference, Washington a high-security public-use WWW workstation http://www.missouri.edu/~eldjives/cil98.html
Extractions: OVERVIEW The nucleus of our high-security configuration is three-fold: a series of steps taken to ensure the workstation's physical security; several commercial, shareware, and freeware security and utility programs; and the appropriate utilization of a number of PC operating system (DOS), graphic user interface (Windows 3.11), and network operating system (NetWare 3.12) functions and variables. This security program allows us to: prevent the theft of keyboards, mice, or mousepads, prohibit the user's access to the PC's hard drive and configuration files, prohibit any modification of the Windows parameters or group/program windows, prohibit the user's access to (and modification of) any network OS or data files. PHILOSOPHY Our security "philosophy" is simple and straightforward - provide for the patrons' needs; but
Dynix - [Public Libraries] s more important than ever to assure your library is maximizing use of time and hasbeen developing new and better technologies for public libraries for twenty http://www.epixtech.com/library/public/index.asp
Extractions: For both Dynix and the public library, the mission hasn't changedbut the tools have. Dynix has been developing new and better technologies for public libraries for twenty years. This heritage fused with our ongoing technology leadership provides both a solid understanding of public library challenges and the vision to lead into the era of the digital library.
Extractions: In 1994, the Libraries began developing a coordinated, system-wide information literacy program for all levels and types of users. A three-tiered approach was proposed: CORE targets the Intermediate Level goals and objectives, with additional references and links to information in support of Orientation Level objectives. Start CORE+
Extractions: The Lesson From Arizona This 1970 movie tells the story of seven highly individualistic, strong-willed, and talented individuals who manage to put aside their egos and differences to work for a common and noble good riding down into Mexico to save a village from the bandits. We may not want to imagine that the kind of cooperation we talk about here will end in a shootout, but we can learn from their tenacity. I cannot sufficiently celebrate the glorious liberty that reigns in the public libraries of the twentieth century as compared with the intolerable management of those of the nineteenth century, in which the books were jealously railed away form the people, and obtainable only at an expenditure of time and red tape calculated to discourage any ordinary taste for literature. (1888) "Universal Library: A Plea for Placing any Desired Book within the Reach of any Person Wishing to make Reasonable Use of Same."
Extractions: What are the characteristics of ILL/DD operations in the ten libraries with the lowest unit costs, the ten with the highest fill rates, or the ten with the fastest turnaround times? How do these high-performing operations differ from the other research library participants? High-Performing Borrowing Operations Nineteen other research libraries ranked in the top ten for a single borrowing performance measure. Thus, a total of 25 research libraries ranked in the top ten for one or more borrowing performance measures. These high-performing borrowing operations share a number of characteristics. User-Initiated Ordering A majority of the top-performing borrowing operations offer electronic user-initiated ordering, either via statewide systems such as OhioLINK or through locally-developed electronic order forms. Systems that pass electronic patron request forms directly to the potential lender or into national messaging systems eliminate the need for ILL staff involvement in these initial steps of the borrowing process. Staff costs represent two-thirds of the borrowing unit cost, so by increasing user-initiated ordering staff costs are lessened and the borrowing unit cost is thus lowered. Maximizing Technology Many of the high-performing borrowing operations use a single ILL messaging system. Workflow and procedures are streamlined when only one system is used, resulting in faster turnaround time and lower unit costs.
Extractions: The 1998 ALA Midwinter Meeting in New Orleans, LA marks the beginning of the five year anniversary of the Association of Research Libraries' (ARL) North American Interlibrary Loan and Document Delivery (NAILDD) Project At the beginning of 1998, over 70 for-profit and not-for-profit organizations and project participate in the NAILDD Project's Developers/Implementors Group (DIG) and/or the ILL Protocol Implementors Group (IPIG). The DIG is the vehicle by which the NAILDD Project seeks to facilitate collaboration between libraries and a broad constituency of private sector organizations. The DIG is an effort on ARL's part to be proactive consumers. The DIG serves as a forum in which to communicate the library needs to the vendors who could potentially offer these services. ARL seeks a healthy competition in the ILL/DD marketplace and thus encourages all vendors to participate. The IPIG was formed in late 1995 to expedite implementation of the international standard for ILL communication. This status report highlights and salutes the responsiveness of some of the more active DIG and IPIG members to the NAILDD Project's technical priorities. The sustained commitment of these organizations and the resources invested to achieve the Project's goals are recognized as key contributions to the future success of library programs and services.
Axeda Solutions For Enterprise Technology Manufacturers no problem found calls, maximizing use of quality Service representatives can alsouse Axeda DRM to Network switches; Tape libraries; Power supplies; Computers; http://www.axeda.com/industries/hightech.html
Extractions: Customers Manufacturers of high-technology equipment are facing unprecedented service challenges. Customers today are demanding total solutions - product, service and training - not just quality product. They also want their suppliers to take more proactive ownership and responsibility for supporting the routine operation and performance of the products they sell - a task that is complicated by complex, multivendor environments, of which no two are alike. Internally, manufacturers are under pressure to meet and exceed service level agreements with their customers and ensure increased system uptime and performance - while operating within a specified service budget. The Axeda Device Relationship Management System is helping enterprise technology manufacturers such as Network Appliance and Procket Networks address these and other business challenges by making it possible to: Proactively monitor, diagnose and repair remote devices within complex IT environments
Program Review - Background Information Good stewardship maximizing use of available resources (people, time, $$); Physicalenvironment libraries, University of Maryland, College Park, MD 20742-7011 http://www.lib.umd.edu/TSD/PROGRAMREV/structure&principles.html
Extractions: May 4, 2001 This document summarizes the progress that the BRC has made thus far, organizing the concepts that have been raised in the discussions. We want a structure that: Organization Values: Effective and efficient use of all resources. This includes not only library resources such as staff, equipment and supplies, but also includes contractor and vendor services which we use to provide service to our clientele
Extractions: Characteristics of High Performing Operations The characteristics of high-performing ILL operations which follow are attributed to Mary E. Jackson's study and companion publication: Measuring the Performance of Interlibrary Loan Operations in North American Research and College Libraries , published in May, 1998, by the Association of Research Libraries. The Executive Summary of the report and ordering information may be found at: http://www.arl.org/access/illdd/pr.shtml The results of that study are further summarized in the July 1998, ARL newsletter article: A Spotlight on High-Performing ILL/DD Operations in Research Libraries. http://www.arl.org/newsltr/198/illdd.html
Ronald Williams Library - Acceptable Use Policy Ronald Williams Library is committed to networking which represents good publicpolicy by maximizing the use of the resources of all types of libraries. http://www.neiu.edu/~neiulib/about/libinformation/policies/aup.html
Extractions: Electronic Networks and the Library's Mission Libraries make it possible for citizens to have access to the information they need to make informed decisions. As a member of the Illinois Library and Information Network (ILLINET), Northeastern Illinois University's Ronald Williams Library is committed to networking which represents good public policy by maximizing the use of the resources of all types of libraries. Every library user benefits from expanded access to information beyond the four walls of a single library building. NEIU uses electronic information networks such as the Internet for a variety of purposes: Relationship to Other Library Policies NEIU's Policy for Access to Electronic Information Networks is part of the library's overall policy structure and should be interpreted in conjunction with other existing policies.
About Libraries -I Ndex - Saskatchewan Libraries and organizations maximizing their use of information technology in an informed,educated and empowered manner. In this new social context, libraries continue http://www.lib.sk.ca/aboutlibraries/
Extractions: Libraries are the most likely place where one can find specific information in an easily accessible, physical location. The social nature of libraries as institutions where like-minded individuals gather and the strong social support that libraries traditionally receive from the general public have been factors in their on-going presence in society. Libraries are essentially democratic and the goal of a library is the improvement of society by helping the individual to understand himself or herself and the world as a whole. Full Story Saskatchewan libraries Technology has revolutionized the way information is created, stored and disseminated and has been instrumental in the eventual emergence of a networked, connected and wired world of individuals and organizations maximizing their use of information technology in an informed, educated and empowered manner. In this new social context, libraries continue to play their historical role in the formation of informed, educated and capable members of society. Libraries are creating greater access to electronic information resources and ensuring access to high quality information.
Libraries Today - About Libraries - Saskatchewan Libraries maximizing their use of information technology in an informed, educated and empoweredmanner. While managing the impact of information technology, libraries http://www.lib.sk.ca/aboutlibraries/libtoday.html
Extractions: With the emergence of the information age and a knowledge-based society, we are witnessing radical social change. Social institutions - universities, record companies, businesses, etc. - have had to transform themselves and their services in an effort to meet changing social needs. It has been no less of a challenge for libraries. Technology has revolutionized the way information is created, stored, and disseminated and information technology has been the engine of social change, a development that still has many years to maximize its impact. Eventually, from a utopian perspective, the world will become a networked, connected, and wired world of individuals and organizations maximizing their use of information technology in an informed, educated and empowered manner. While managing the impact of information technology, libraries continue to play their historical role in the formation of informed, educated and capable members of society. Educated and skilled access to electronic information resources is one means of coping with information overload - and libraries play a fundamental role in the acquisition of appropriate search skills - but the staggering amount of information available today is problematic. Patrons need help with traditional print collections as societal levels of literacy diminish but also need assistance with the new forms of literacy demanded by information technology.