Search (5 results, page 1 of 1)

  • × classification_ss:"020"
  1. Gurnsey, J.; White, M.: Information consultancy (1988) 0.02
    0.017566202 = product of:
      0.035132404 = sum of:
        0.035132404 = product of:
          0.07026481 = sum of:
            0.07026481 = weight(_text_:libraries in 593) [ClassicSimilarity], result of:
              0.07026481 = score(doc=593,freq=4.0), product of:
                0.1711139 = queryWeight, product of:
                  3.2850544 = idf(docFreq=4499, maxDocs=44218)
                  0.052088603 = queryNorm
                0.4106318 = fieldWeight in 593, product of:
                  2.0 = tf(freq=4.0), with freq of:
                    4.0 = termFreq=4.0
                  3.2850544 = idf(docFreq=4499, maxDocs=44218)
                  0.0625 = fieldNorm(doc=593)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    PRECIS
    Information services & libraries / Consultancy services
    Subject
    Information services & libraries / Consultancy services
  2. Berman, S.: Not in my library! : "Berman's bag" columns from The Unabshed Librarian, 2000-2013 (2013) 0.01
    0.010415476 = product of:
      0.020830952 = sum of:
        0.020830952 = product of:
          0.041661903 = sum of:
            0.041661903 = weight(_text_:libraries in 1515) [ClassicSimilarity], result of:
              0.041661903 = score(doc=1515,freq=10.0), product of:
                0.1711139 = queryWeight, product of:
                  3.2850544 = idf(docFreq=4499, maxDocs=44218)
                  0.052088603 = queryNorm
                0.2434747 = fieldWeight in 1515, product of:
                  3.1622777 = tf(freq=10.0), with freq of:
                    10.0 = termFreq=10.0
                  3.2850544 = idf(docFreq=4499, maxDocs=44218)
                  0.0234375 = fieldNorm(doc=1515)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Content
    Introduction (Counterpoise interview with Kristin Hoyer, 2005) -- Why catalog? (u*l 116, 2000) -- Must "the poor" always be among us? (u*l 117, 2000) -- The top censored library stories of 1998-2000 (u*l 118, 2001) -- Updates and additions (u*l 119, 2001) -- Updates and additions (u*l 120, 2001) -- No more shushing : library staff and users speak (part 1) (u*l 121, 2001) -- Harry Potter imperiled, keyword searching as panacea, Robin Hood's noble liege, and other foolishness (u*l 124, 2002) -- "Not in my library!" (u*l 125, 2002) -- Updates and additions (u*l 127, 2003) -- Cuba libre! (u*l 128, 2003) -- No more shushing : library staff and users speak (part 2), more on Cuba (u*l 129, 2003) -- King County responds, "Banned books week" deconstructed, cataloging blues at LAPL, Loompanics' Mike Hoy on censorship, deep-sixed Afghan atrocity film, Cuba again (u*l 130, 2004) -- Access denied (u*l 133, 2004) -- Squelched letters, more access denied (u*l 134, 2005) -- Fighting the USA Patriot Act, updates and additions (u*l 135, 2005) -- UCLA cross-refs, AACR3, library openness (u*l 136, 2005) -- Cataloging zines and widgets (u*l 137, 2005) -- Questions (u*l 138, 2006) -- "Genocide" or merely "massacres"? : the politics of subject cataloging (u*l 139, 2006) -- Darfur revisited, GLBT access denied (u*l 140, 2006) -- Subject cataloging (part 1) (u*l 143, 2007) -- Subject cataloging (part 2) (u*l 142, 2007) -- Subject cataloging (postscript), self-censorship (u*l 143, 2007) -- Obsessions (u*l 144, 2007) -- Huh?, fines and fees, self-censorship (continued) (u*l 145, 2007) -- "Controversial" cataloging (u*l 146, 2008) -- Flawed indexing, erotica selection, subject heading currency, undercataloging (u*l 147, 2008) -- Darfur redux, LC cataloging rescue, subject heading currency (u*l 148, 2008) -- Book, many missed opportunities, or why cataloging matters (when it's done right) (u*l 149, 2008) -- Cats, cataloging, fines, and BBW (Banned books week) (u*l 150, 2009) -- More classism in the stacks (u*l 151, 2009) -- Cataloging stink, truth in materials selection, CEO pay (u*l 152, 2009) -- Liberated foreword, unrequited LC letters (u*l 153, 2009) -- Nation gets it wrong, more unrequited LC letters, LCSH currency (u*l 154, 2010) -- More (attempted) LCSH input, geopolitics versus historical truth (u*l 155, 2010) -- LCSH currency (continued), libraries and politics, retiring the r-word, Celeste West tribute (u*l 156, 2010) -- The kids are not all right (u*l 157, 2010) -- Remembrance of things past, interview excerpts (u*l 158, 2011) -- More interview excerpts, atheist deficit, what Rosa said (u*l 159, 2011) -- No to government secrecy and repression! (u*l 160, 2011) -- Word peeves, "content-enriched metadata," no "sexting" allowed (u*l 161, 2011) -- Really banned books, another word peeve, Clint's fantasy, OWS library trashed, PFC Manning's gift (u*l 162, 2012) -- Post office crisis, LC letters (u*l 163, 2012) -- Another real banning, the trashing of both Hypatia and her library, not-so-funny cataloging (u*l 164, 2012) -- Laureates support PFC Manning, self-censorship affirmed, J'accuse LC of untimeliness and sloth, let's hear it for Robin Hood! (u*l 166, 2013).
    LCSH
    Libraries and society
    Libraries / Censorship
    Subject
    Libraries and society
    Libraries / Censorship
  3. Greifeneder, E.: Online-Hilfen in OPACs : Analyse deutscher Universitäts-Onlinekataloge (2007) 0.01
    0.0088216085 = product of:
      0.017643217 = sum of:
        0.017643217 = product of:
          0.035286434 = sum of:
            0.035286434 = weight(_text_:22 in 1935) [ClassicSimilarity], result of:
              0.035286434 = score(doc=1935,freq=2.0), product of:
                0.18240541 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.052088603 = queryNorm
                0.19345059 = fieldWeight in 1935, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1935)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Date
    22. 6.2008 13:03:30
  4. Bedford, D.: Knowledge architectures : structures and semantics (2021) 0.01
    0.007057287 = product of:
      0.014114574 = sum of:
        0.014114574 = product of:
          0.028229147 = sum of:
            0.028229147 = weight(_text_:22 in 566) [ClassicSimilarity], result of:
              0.028229147 = score(doc=566,freq=2.0), product of:
                0.18240541 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.052088603 = queryNorm
                0.15476047 = fieldWeight in 566, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.03125 = fieldNorm(doc=566)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Content
    Section 1 Context and purpose of knowledge architecture -- 1 Making the case for knowledge architecture -- 2 The landscape of knowledge assets -- 3 Knowledge architecture and design -- 4 Knowledge architecture reference model -- 5 Knowledge architecture segments -- Section 2 Designing for availability -- 6 Knowledge object modeling -- 7 Knowledge structures for encoding, formatting, and packaging -- 8 Functional architecture for identification and distinction -- 9 Functional architectures for knowledge asset disposition and destruction -- 10 Functional architecture designs for knowledge preservation and conservation -- Section 3 Designing for accessibility -- 11 Functional architectures for knowledge seeking and discovery -- 12 Functional architecture for knowledge search -- 13 Functional architecture for knowledge categorization -- 14 Functional architectures for indexing and keywording -- 15 Functional architecture for knowledge semantics -- 16 Functional architecture for knowledge abstraction and surrogation -- Section 4 Functional architectures to support knowledge consumption -- 17 Functional architecture for knowledge augmentation, derivation, and synthesis -- 18 Functional architecture to manage risk and harm -- 19 Functional architectures for knowledge authentication and provenance -- 20 Functional architectures for securing knowledge assets -- 21 Functional architectures for authorization and asset management -- Section 5 Pulling it all together - the big picture knowledge architecture -- 22 Functional architecture for knowledge metadata and metainformation -- 23 The whole knowledge architecture - pulling it all together
  5. Gartner, R.: Metadata in the digital library : building an integrated strategy with XML (2021) 0.00
    0.004657943 = product of:
      0.009315886 = sum of:
        0.009315886 = product of:
          0.018631771 = sum of:
            0.018631771 = weight(_text_:libraries in 732) [ClassicSimilarity], result of:
              0.018631771 = score(doc=732,freq=2.0), product of:
                0.1711139 = queryWeight, product of:
                  3.2850544 = idf(docFreq=4499, maxDocs=44218)
                  0.052088603 = queryNorm
                0.1088852 = fieldWeight in 732, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.2850544 = idf(docFreq=4499, maxDocs=44218)
                  0.0234375 = fieldNorm(doc=732)
          0.5 = coord(1/2)
      0.5 = coord(1/2)
    
    Content
    Inhalt: 1 Introduction, Aims and Definitions -- 1.1 Origins -- 1.2 From information science to libraries -- 1.3 The central place of metadata -- 1.4 The book in outline -- 2 Metadata Basics -- 2.1 Introduction -- 2.2 Three types of metadata -- 2.2.1 Descriptive metadata -- 2.2.2 Administrative metadata -- 2.2.3 Structural metadata -- 2.3 The core components of metadata -- 2.3.1 Syntax -- 2.3.2 Semantics -- 2.3.3 Content rules -- 2.4 Metadata standards -- 2.5 Conclusion -- 3 Planning a Metadata Strategy: Basic Principles -- 3.1 Introduction -- 3.2 Principle 1: Support all stages of the digital curation lifecycle -- 3.3 Principle 2: Support the long-term preservation of the digital object -- 3.4 Principle 3: Ensure interoperability -- 3.5 Principle 4: Control metadata content wherever possible -- 3.6 Principle 5: Ensure software independence -- 3.7 Principle 6: Impose a logical system of identifiers -- 3.8 Principle 7: Use standards whenever possible -- 3.9 Principle 8: Ensure the integrity of the metadata itself -- 3.10 Summary: the basic principles of a metadata strategy -- 4 Planning a Metadata Strategy: Applying the Basic Principles -- 4.1 Introduction -- 4.2 Initial steps: standards as a foundation -- 4.2.1 'Off-the shelf' standards -- 4.2.2 Mapping out an architecture and serialising it into a standard -- 4.2.3 Devising a local metadata scheme -- 4.2.4 How standards support the basic principles -- 4.3 Identifiers: everything in its place -- 5 XML: The Syntactical Foundation of Metadata -- 5.1 Introduction -- 5.2 What XML looks like -- 5.3 XML schemas -- 5.4 Namespaces -- 5.5 Creating and editing XML -- 5.6 Transforming XML -- 5.7 Why use XML? -- 6 METS: The Metadata Package -- 6.1 Introduction -- 6.2 Why use METS?.