Computers in Libraries '98

Postconference
Thursday, March 5


Workshop 11
9:00am - 4:30pm
• Building the Corporate INTRANET Knowledge Center

Howard McQueen, McQueen & Associates

An intranet should provide seamless access to a variety of information resources crucial to the success of the organization. From an information management perspective this seminar examines the conceptual and proven technologies that organizations are using to build intranets, from crucial planning considerations, to types of people skills and expertise required, to technical challenges.

Learn about Groupware applications (forums & interactive discussions) that enhance communication and virtual workgroups. Middleware applications are explored as tools which provide users with a Web front-end to databases. Also learn how CD-ROMs can be accessed from the Web page.

It is our belief that the Search Engine is the "corporate brain" of the intranet. If a non-Information Specialist cannot easily gain access to relevant information, the intranet cannot be considered a true success. We explore the various methodologies of search engine technology and cut through the hype to reveal the subtle, yet very important differences between the major players in this growing market.

To play an integral role in the design, implementation or on-going enhancement to your organization's intranet, this seminar is a must!


Workshop 12
9:00am - 12:00 Noon
• Internet Tips & Tricks

Hope Tillman, Director of Libraries, Babson College
Walt Howe, Delphi Internet Services Corp.

While subject guides like Yahoo and Lycos help to make life easier these days, the sophistication of search resources like Altavista, Excite, Infoseek, etc. really improves our ability to mine the net. We expect you to have read the instructions and done the surfing. Now what tips and tricks can help you cut your searching time and retrieve what you really want? This half day workshop will explore the best tools and provide tips and techniques for getting the most out of the net.


Workshop 13
9:00am - 12:00 Noon
• Technology and the SOLO/One-Person Librarian

Judith Siess, Information Bridges International, Inc.

This course will deal with the challenges technology poses for the librarian working alone. Topics for interactive discussion will include "Will the internet replace us? or we replace the internet?" "How to implement the new technology" and "Best WWW search strategies". For all information providers working without professional peers in the organization and for others in small libraries.


Workshop 14
1:30pm - 4:30 p.m
• Integrated Library Automation Software—A Baker's Dozen

Pamela Cibbarelli, Editor, Directory of Library Automation Software, Systems & Services

The library automation software marketplace is definitely changing! The key players are changing too! Most product offerings are being enhanced, revamped, and renamed, and while old ones are being retired. This presentation will focus on the three most popular software for the following library segments: corporate & government, academic, school, and public libraries. Trends in product development, operating systems, new features and functionality will be emphasized. User ratings will be provided when available. Come and hear which firms are leading the industry now.


Workshop 15
1:30pm - 4:30pm
• Creating Secure Library Networks: Issues and Technologies

Marshall Breeding, Vanderbilt University

As libraries connect to the Internet, they must make sure that their networks are well-secured. This half day workshop focuses on security issues related to library networks. It discusses the various approaches to network security and presents options for libraries so that when they connect to the Internet they can ensure the safety of their data and other computer resources. Breeding examines different network architectures and their security implications and presents information on a number of types of network firewalls as well as other devices and technologies that enhance network security. The workshop will include advice on the policies and practices that are consistent with security concerns.


* Computers in Libraries '98 Home Page