Workshop
10
9:00
a.m. - 4:30 p.m.
Designing
Usable Library Sites — Keep Your Eye on the Users
Darlene
Fichter, Data Library Coordinator, University of Saskatchewan
Frank
Cervone, DePaul University Libraries
Now
that you’ve built it, does it work? How do you know? Building a successful
library site is becoming a mission critical application as libraries’ services
and resources become digital. What design factors should you consider?
Learn about various usability tests and techniques that will help you have
a “user-focused” design. Practice some of the tests and take home some
useful guidelines for your own project. Anyone who is charged with managing
or designing a Web site will have an interest in the live demos, tests
and guidelines.
Workshop
11
9:00
a.m. - 4:30 p.m.
Intranet
Taxonomies & Metadata: Creating Them, Using Them
Marjorie
Hlava, President, Access Innovations, Inc.
Heather
Hlava, President, Data Harmony
Putting
content on the Internet with a flexible, effective and easy-to-use interface
requires a strong metadata set and accompanying taxonomy or taxonomies.
Metadata and taxonomies are the two major components that allow for quick,
easy navigation and excellent search results, and when they are linked
to well-formed data, create the basis of successful sites. Several standards
are in the process of being set and many techniques have evolved to help
achieve these goals. Learn about the Dublin Core Metadata, the INDECS data
dictionary, the EPICS project, the latest BISAC initiatives, the RDF from
W3C, and other metadata projects that can be used in your own Internet
or intranet development projects. Taxonomy management deals with the core
concern of content developers and disseminators — how to quickly convey
meaning of a record or document so that it can be found precisely and accurately.
Ambiguity is the ever-present enemy of clarity. Thesaurus (taxonomy) design
and control provide tools and techniques for disambiguation. As designers
and developers of databases for over twenty years, presenters discuss techniques
for building and managing vocabularies and metadata and define the various
types of word control including rules for distinguishing among different
word control formats. They also demonstrate an XML RDF solution for text
management as an example of how these new standards can work together for
an effective outcome.
Workshop
12
9:00
a.m. - 12:00 p.m.
The
Extreme Searcher’s Web Finding Tools: Choosing and Using the Right One
Randolph
Hock, Online Strategies, Author of The Extreme Searcher's Guide to
Web Search Engines
Web
search engines, Web directories, metasites — all are useful tools for finding
the right sites efficiently and effectively. For any question though, one
tool may be much more appropriate than another. In this workshop we’ll
look at which to use when, and the relative strengths, weaknesses and applications
of each category of tool. Each of the major directories and search engines
will likewise be examined in terms of strengths, weaknesses, and unique
applications. As for metasites, we’ll see why this category of tool needs
more recognition and how to easily locate the best metasites in any area.
The emphasis of the workshop will be on practical applications and on that
knowledge which will enable attendees to most effectively and efficiently
find the answers they need.
Workshop
13
9:00
a.m. - 12:00 p.m.
The
E-Book: Today and Tomorrow
Hope
Tillman, Director of Libraries, Babson College
Walt
Howe, Internet Consultant, Delphi.com Forums
As
a technology the electronic book will evolve and morph, but it is inevitable
that the e-book of today and its successors will change how people read,
learn, and interact with information in the next century. This workshop
covers the technology of the e-book both as device and software, and the
barriers and keys to its acceptance today. It looks at companies providing
current e-book solutions and at early library adopters and how they are
providing access to e-books. Whether it replaces the book bag, book stacks,
or book at the beach, the e-book is here. Join us for an exploration of
the concept and the reality.
Workshop
14
9:00
a.m. - 12:00 p.m.
The
Armored Desktop Computer: Blocking Crackers, Hackers & Snoopers
David
J. Ives, Chief Information Technology Officer, NELINET, Inc.
This
half-day workshop takes a serious look at the actual threats, modifications,
security software and procedures necessary to protect desktop computers.
Desktop security has 5 major components of concern and responsibility:
1) the hardware, 2) the software, 3) the user, 4) the computer’s external
connectivity, and 5) administrative policies & practices. Good security
practices demand that all of these components be addressed in more than
just a superficial manner. Although there are many variations on the theme,
desktop computer security can be thought of as being comprised of three
basic models: Traditional, Hardened, and Armored (with the first being
unacceptable; the second, acceptable; and the third, desirable). These
models are defined and examined in some detail with regard to the 5 components
of concern and responsibility. While the intents of crackers, hackers and
snoopers may be different, the end result is the same — the compromising
of the data, operation and security of your computer. Appropriate security
procedures should guarantee that a computer cannot be compromised by trojans,
viruses, worms, attack scripts, port probes and scans, or social engineering.
Strong desktop security can be provided at a reasonable monetary cost and
at minimal-to-moderate costs in terms of time and effort. Security measures
that should be taken are denoted in a hierarchical order and recommendations
are made with regard to security software, hardware, policies, and user
education.
Workshop
15
9:00
a.m. - 12:00 p.m.
Technology
for Building Client Relationships
Stephen
Arnold, President, Arnold Information Technologies
Ulla
de Stricker, President, de Strickers Associates
Our
clients are awash in a sea of Web-customization and peer-peer sharing technologies
which are radically turning upside down the information industry content
delivery model we were used to. Unless we prove that we are as savvy as
our clients at deploying “relationship technologies” and desktop integration/personalization
tools, and in using them for data mining, we are at the risk of falling
off the radar screen of those clients. This half-day workshop is aimed
at information professionals, individuals wishing to stay ahead of the
curve in terms of the “next cool technology” with potential to give an
organization a competitive edge with its clients. It offers a detailed
examination of new technologies focusing on relationships and developed
for user loyalty sites, personalized e-commerce, special-interest portals,
etc.
Workshop
16
1:30
p.m. - 4:30 p.m.
Beyond
Yahoo! Beyond Google! Subject-Specific Sites & Searches on the Net
Margot
Williams, Research Editor & Internet Trainer, The Washington Post,
Author of Great Scouts! CyberGuides for Subject Searching on the Web
(with Nora Paul)
Yahoo!
was the genesis, the beginning of a noble attempt to organize the unruly
Web. Years later, Yahoo! is still the beginning point for many Web users.
This subject-oriented session by a super news searcher provides background
and guidelines to evaluating resources in specific subject areas, and gives
users of subject-specific resources some alternatives to Yahoo! and Google
when looking for the most comprehensive and dependable sources of information
on the Web.
Workshop
17
1:30
p.m. - 4:30 p.m.
Business
in a Wired World: Focus on International Business Information
Sheri
R. Lanza, Founder & President, Global InfoResources, Inc.
Is
your organization looking beyond the borders of North America to expand
its business? This workshop aims to paint an overall picture of the information
available on different countries and how to find it. It takes an indepth
look at international information, beginning with a few basics and moving
on to cover several countries and/or regions in more detail. It also covers
several industries and demonstrates how to find global information. Led
by an MBA with an information research and consulting firm that serves
domestic and international clientele, this workshop gives you the power
to turn your research from a domestic base to include a solid international
base.
Workshop
18
1:30
p.m. - 4:30 p.m.
Grant
Writing for Technology Projects
Jack
L. Smith, MPA
This
half day grant writing training program which is geared to the real life
grant writing situations faced by administrators, direct line staff and
others who must juggle their regular duties while they write grants.
Workshop
19
1:30
p.m. - 4:30 p.m.
Cutting-Edge
Technologies: What to Expect and How to Prepare
Nancy
Melin Nelson, Principal, Nelson Associates, CIL Founder and technology
writer
Information
professionals take the lead in incorporating new technologies to support
both patron services and library management and technical support operations.
The record proves their cutting edge leadership as active users and
consultants in the development of microcomputer, CD-ROM, and the Internet-based
working tools for use in libraries. Because of their technological vision
and willingness to adapt new technologies, corporations, academic institutions,
public and private agencies and, indeed, society at large has come to demand
continued and timely introduction of the latest hot technologies in support
of information services. This workshop will bring you up to
date on what new technologies you can anticipate, provide a time table
for their introduction, propose recommendations for library use, and provide
guidance in budgeting for new technology implementation. Not to be
missed!
|