COMPUTERS IN LIBRARIES 2001 
THE TECHNOLOGY CONFERENCE FOR INFORMATION AGE LIBRARIANS 
March 13-17, 2001 • Washington Hilton & Towers • Washington, DC 
PostConference Workshops • Saturday, March 17th

PreConference Workshops • Tuesday, Mar. 13th --- General Conference • Friday, Mar. 16th
General Conference • Wednesday, Mar. 14th Computers in School Libraries • Friday, Mar. 16th
Wednesday Evening Session Computers in School Libraries • Saturday, Mar. 17th
General Conference • Thursday, Mar. 15th PostConference Workshops • Saturday, Mar. 17th

Workshop 10
9:00 a.m. - 4:30 p.m.
Designing Usable Library Sites — Keep Your Eye on the Users 
Darlene Fichter, Data Library Coordinator, University of Saskatchewan 
Frank Cervone, DePaul University Libraries
Now that you’ve built it, does it work? How do you know? Building a successful library site is becoming a mission critical application as libraries’ services and resources become digital. What design factors should you consider? Learn about various usability tests and techniques that will help you have a “user-focused” design. Practice some of the tests and take home some useful guidelines for your own project. Anyone who is charged with managing or designing a Web site will have an interest in the live demos, tests and guidelines.
 

Workshop 11
9:00 a.m. - 4:30 p.m.
Intranet Taxonomies & Metadata: Creating Them, Using Them
Marjorie Hlava, President, Access Innovations, Inc.
Heather Hlava, President, Data Harmony
Putting content on the Internet with a flexible, effective and easy-to-use interface requires a strong metadata set and accompanying taxonomy or taxonomies. Metadata and taxonomies are the two major components that allow for quick, easy navigation and excellent search results, and when they are linked to well-formed data, create the basis of successful sites. Several standards are in the process of being set and many techniques have evolved to help achieve these goals. Learn about the Dublin Core Metadata, the INDECS data dictionary, the EPICS project, the latest BISAC initiatives, the RDF from W3C, and other metadata projects that can be used in your own Internet or intranet development projects. Taxonomy management deals with the core concern of content developers and disseminators — how to quickly convey meaning of a record or document so that it can be found precisely and accurately. Ambiguity is the ever-present enemy of clarity. Thesaurus (taxonomy) design and control provide tools and techniques for disambiguation. As designers and developers of databases for over twenty years, presenters discuss techniques for building and managing vocabularies and metadata and define the various types of word control including rules for distinguishing among different word control formats. They also demonstrate an XML RDF solution for text management as an example of how these new standards can work together for an effective outcome.
 

Workshop 12
9:00 a.m. - 12:00 p.m.
The Extreme Searcher’s Web Finding Tools: Choosing and Using the Right One
Randolph Hock, Online Strategies, Author of The Extreme Searcher's Guide to Web Search Engines 
Web search engines, Web directories, metasites — all are useful tools for finding the right sites efficiently and effectively. For any question though, one tool may be much more appropriate than another. In this workshop we’ll look at which to use when, and the relative strengths, weaknesses and applications of each category of tool. Each of the major directories and search engines will likewise be examined in terms of strengths, weaknesses, and unique applications. As for metasites, we’ll see why this category of tool needs more recognition and how to easily locate the best metasites in any area. The emphasis of the workshop will be on practical applications and on that knowledge which will enable attendees to most effectively and efficiently find the answers they need.
 

Workshop 13
9:00 a.m. - 12:00 p.m.
The E-Book: Today and Tomorrow
Hope Tillman, Director of Libraries, Babson College 
Walt Howe, Internet Consultant, Delphi.com Forums
As a technology the electronic book will evolve and morph, but it is inevitable that the e-book of today and its successors will change how people read, learn, and interact with information in the next century. This workshop covers the technology of the e-book both as device and software, and the barriers and keys to its acceptance today. It looks at companies providing current e-book solutions and at early library adopters and how they are providing access to e-books. Whether it replaces the book bag, book stacks, or book at the beach, the e-book is here. Join us for an exploration of the concept and the reality. 
 

Workshop 14
9:00 a.m. - 12:00 p.m.
The Armored Desktop Computer: Blocking Crackers, Hackers & Snoopers
David J. Ives, Chief Information Technology Officer, NELINET, Inc.
This half-day workshop takes a serious look at the actual threats, modifications, security software and procedures necessary to protect desktop computers. Desktop security has 5 major components of concern and responsibility: 1) the hardware, 2) the software, 3) the user, 4) the computer’s external connectivity, and 5) administrative policies & practices. Good security practices demand that all of these components be addressed in more than just a superficial manner. Although there are many variations on the theme, desktop computer security can be thought of as being comprised of three basic models: Traditional, Hardened, and Armored (with the first being unacceptable; the second, acceptable; and the third, desirable). These models are defined and examined in some detail with regard to the 5 components of concern and responsibility. While the intents of crackers, hackers and snoopers may be different, the end result is the same — the compromising of the data, operation and security of your computer. Appropriate security procedures should guarantee that a computer cannot be compromised by trojans, viruses, worms, attack scripts, port probes and scans, or social engineering. Strong desktop security can be provided at a reasonable monetary cost and at minimal-to-moderate costs in terms of time and effort. Security measures that should be taken are denoted in a hierarchical order and recommendations are made with regard to security software, hardware, policies, and user education.
 

Workshop 15
9:00 a.m. - 12:00 p.m.
Technology for Building Client Relationships
Stephen Arnold, President, Arnold Information Technologies
Ulla de Stricker, President, de Strickers Associates
Our clients are awash in a sea of Web-customization and peer-peer sharing technologies which are radically turning upside down the information industry content delivery model we were used to. Unless we prove that we are as savvy as our clients at deploying “relationship technologies” and desktop integration/personalization tools, and in using them for data mining, we are at the risk of falling off the radar screen of those clients. This half-day workshop is aimed at information professionals, individuals wishing to stay ahead of the curve in terms of the “next cool technology” with potential to give an organization a competitive edge with its clients. It offers a detailed examination of new technologies focusing on relationships and developed for user loyalty sites, personalized e-commerce, special-interest portals, etc.
 

Workshop 16
1:30 p.m. - 4:30 p.m.
Beyond Yahoo! Beyond Google! Subject-Specific Sites & Searches on the Net
Margot Williams, Research Editor & Internet Trainer, The Washington Post, Author of Great Scouts! CyberGuides for Subject Searching on the Web (with Nora Paul)
Yahoo! was the genesis, the beginning of a noble attempt to organize the unruly Web. Years later, Yahoo! is still the beginning point for many Web users. This subject-oriented session by a super news searcher provides background and guidelines to evaluating resources in specific subject areas, and gives users of subject-specific resources some alternatives to Yahoo! and Google when looking for the most comprehensive and dependable sources of information on the Web.
 

Workshop 17
1:30 p.m. - 4:30 p.m.
Business in a Wired World: Focus on International Business Information
Sheri R. Lanza, Founder & President, Global InfoResources, Inc.
Is your organization looking beyond the borders of North America to expand its business? This workshop aims to paint an overall picture of the information available on different countries and how to find it. It takes an indepth look at international information, beginning with a few basics and moving on to cover several countries and/or regions in more detail. It also covers several industries and demonstrates how to find global information. Led by an MBA with an information research and consulting firm that serves domestic and international clientele, this workshop gives you the power to turn your research from a domestic base to include a solid international base. 
 

Workshop 18
1:30 p.m. - 4:30 p.m.
Grant Writing for Technology Projects
Jack L. Smith, MPA
This half day grant writing training program which is geared to the real life grant writing situations faced by administrators, direct line staff and others who must juggle their regular duties while they write grants.
 

Workshop 19
1:30 p.m. - 4:30 p.m.
Cutting-Edge Technologies: What to Expect and How to Prepare
Nancy Melin Nelson, Principal, Nelson Associates, CIL Founder and technology writer
Information professionals take the lead in incorporating new technologies to support both patron services and library management and technical support operations.  The record proves their cutting edge  leadership as active users and consultants in the development of microcomputer, CD-ROM, and the Internet-based  working tools for use in libraries. Because of their technological vision and willingness to adapt new technologies, corporations, academic institutions, public and private agencies and, indeed, society at large has come to demand continued and timely introduction of the latest hot technologies in support of  information services.  This workshop will bring you up to date on what new technologies you can anticipate, provide a time table for their introduction, propose recommendations for library use, and provide guidance in budgeting for new technology implementation.  Not to be missed!
 

 

COMPUTERS IN LIBRARIES 2001 
THE TECHNOLOGY CONFERENCE FOR INFORMATION AGE LIBRARIANS 
March 13-17, 2001 • Washington Hilton & Towers • Washington, DC 
Information Today, Inc. Home PageCIL 2001 Home