Resource sharing library network, Other Management

Assignment Help:

Resource Sharing Library Network

Resource sharing is the focal point of library networking and cooperation. The tested technological advances in this field have tremendously increased the ability of retrieving and accessing information over long distances. 

Library resource sharing networks entail consideration of available connections. Several capabilities need to be exploited. Some of these are discussed for your benefit. 

  1. Machine-readability: The ability to store information in magnetic form with data entered once, and used many times in a variety of requirements. 
  2. Retrievability: The ability to select information which has not been arranged in alphabetic sequence; even stored randomly, to make more relevant the material identified. 
  3. Remote accessing: The ability to disseminate or exchange information from distant locations based on local and individualistic requirements. 

The above capabilities have resulted in the preparation of machine-readable catalogue records (MARC) which could be used centrally or replicated for use locally or regionally. The ability to exploit databases to respond to individual requirements has been enhanced or facilitated by retrievability. On the other hand, the establishment of telecommunications networks which could be accessed over long distances have helped in remote accessing of bibliographic databases. The technology of sharing networks has been discussed extensively in the literature of library science. 

Since there is a need to share data about acquisitions, holdings, inter-library loan requests, and completed transactions - and to share this data over distances - the technology of computers and telecommunications is dominant in the design and operation of resource sharing systems.

There is a whole range of computers, which can be considered for resource sharing systems. Small inexpensive computers (microcomputers) to more expensive large scale computer facilities are available for this purpose. Libraries participating in resource sharing networks may wish to utilise any of these to support local automation requirements. Careful analysis is needed to ensure that equipment choices for local and/or to support consortium requirements to ensure compatibility. In a resource sharing network participating libraries must recognise both the potential and problems that result because of adoption of technology. Successful cooperation is closely related to adherence of standards. Standardisation is a must in the electronic environment.   


Related Discussions:- Resource sharing library network

Requirements for force account , Requirements for force account  Let us...

Requirements for force account  Let us now look at the requirements for force accounting:  Force account should be justifiable as to why competitive bids cannot be invite

Define the service providers under foreign trade policy, Question A ) Disc...

Question A ) Discuss the changes in the composition of India's export and import since 1991. How has this affected Balance of payment situation of India? Question B ) Trading

Economy-industry-company (e-i-c) framework analysis, QUESTION (a) Expla...

QUESTION (a) Explain the differences between warrants and convertible debentures (b) The fundamentalist insists that no one should purchase or sell a share on the basis of t

Assignment Operation Management, Prepare a lean Manufacturing plan or proje...

Prepare a lean Manufacturing plan or project in your work place. how this project going to benefited you and the company. you should perform real case that is ongoing or planning t

How three-tier architecture can be used to implement an erp, QUESTION (...

QUESTION (a) Define the term ‘Business Process Re-engineering (BPR)' and explain the role of BPR in the context of Enterprise Resource Planning (ERP). (b) ‘Firms sometimes u

Terms related to procurement - inward goods , Inward goods  The goods a...

Inward goods  The goods are delivered at the inward goods stores of the company/plant with necessary documents like delivery challans and suppliers invoice. These documents wil

Differentiate between malicious and non-malicious threats, Problem: a) ...

Problem: a) Authentication is the mechanism whereby a system securely identifies their users. Authentication system provides answers to the following questions: - Who is t

What is the importance of technology diffusion, Question 1 Write a short n...

Question 1 Write a short note on technology strategy. Describe in detail about the innovation management Question 2 What is the importance of technology diffusion? What are t

Factors affecting organisational structure , Factors Affecting Organisation...

Factors Affecting Organisational Structure-process of structuring-LIBRARAY MANAGEMENT A manager has to design a structure that will best suit the specific requirements of his

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd