Abstract: Implementation of Information & Communication Technology has changed t he way people
access and communication information. Users want easy and instant access to relevant information.
So putting pressure on library professionals to think out of the box for meeting their information
needs. Application of mobile phones to provide library and information services are significant step in
this direction. The development of mobile technology has resulted in shifting the academic
environment from traditional to mobile learning setting. This paper high-light the assumption of
mobile technology in library services, its purpose, literature review various devices, advantages,
disadvantages and prerequisites for implementing mobile based services etc.
Emerging Technologies in the Workplace For Quality ServiceFe Angela Verzosa
presented at the Seminar on the theme “Basics and Beyond Librarianship: Towards a Compleat Librarian,” held at Holy Angel University, Angeles, Pampanga on September 9, 2009
Implications of a Mobile Computing World for Academic Libraries and Their UsersRobin M. Ashford, MSLIS
2013 Snezek Library Leadership Institute - Westmont College, Santa Barbara, CA, USA - July 19, 2013 - Co-presented with GFU Dean of Libraries, Merrill Johnson.
Abstract: Implementation of Information & Communication Technology has changed t he way people
access and communication information. Users want easy and instant access to relevant information.
So putting pressure on library professionals to think out of the box for meeting their information
needs. Application of mobile phones to provide library and information services are significant step in
this direction. The development of mobile technology has resulted in shifting the academic
environment from traditional to mobile learning setting. This paper high-light the assumption of
mobile technology in library services, its purpose, literature review various devices, advantages,
disadvantages and prerequisites for implementing mobile based services etc.
Emerging Technologies in the Workplace For Quality ServiceFe Angela Verzosa
presented at the Seminar on the theme “Basics and Beyond Librarianship: Towards a Compleat Librarian,” held at Holy Angel University, Angeles, Pampanga on September 9, 2009
Implications of a Mobile Computing World for Academic Libraries and Their UsersRobin M. Ashford, MSLIS
2013 Snezek Library Leadership Institute - Westmont College, Santa Barbara, CA, USA - July 19, 2013 - Co-presented with GFU Dean of Libraries, Merrill Johnson.
Twist is an Open World Information Sharing Network which provides a platform to the users searching information on the same project that directly publishes the new updates for a desired category or group of categories to the people who had enrolled as that category for their Personal interest.
Linked Data Love: research representation, discovery, and assessment
#ALAAC15
The explosion of linked data platforms and data stores over the last five years has been profound – both in terms of quantity of data as well as its potential impact. Research information systems such as VIVO (www.vivoweb.org) play a significant role in enabling this work. VIVO is an open source, Semantic Web-based application that provides an integrated, searchable view of the scholarly activities of an organization. The uniform semantic structure of VIVO-ISF data enables a new class of tools to advance science. This presentation will provide a brief introduction and update to VIVO and present ways that this semantically-rich data can enable visualizations, reporting and assessment, next-generation collaboration and team building, and enhanced multi-site search. Libraries are uniquely positioned to facilitate the open representation of research information and its subsequent use to spur collaboration, discovery, and assessment. The talk will conclude with a description of ways librarians are engaged in this work – including visioning, metadata and ontology creation, policy creation, data curation and management, technical, and engagement activities.
Kristi Holmes, PhD
Director, Galter Health Sciences Library
Director of Evaluation, NUCATS
Associate Professor, Preventive Medicine-Health and Biomedical Informatics
Northwestern University Feinberg School of Medicine
DOMAINS OF USER STUDIES (User Studies and User Education)Libcorpio
Domains of User Studies, User Studies, User Education, Library users, LIS Education, Library and Information Science, LIS Studies, Information Management, Education and Learning, Library science, Information science,
Global digital context
Social Media, a definition
Social Media policies?
Digital identity – the ‘research professional’
Social Media tools for academia?
Social Media – a new data source
Social Media in Research –
what considerations?
Citing Social Media sources
Value of Social Media?
e-Governance is the ICT-enabled route to achieving good governance.
An e-library is a library in which collections are stored in digital formats (as opposed to print, microform, or other media) and accessible by computers. The digital content may be stored locally, or accessed remotely via computer networks.
As a part of my regular academic activities under the course “Globalization and Governance (PA-322)”, I was assigned to plan for making department’s seminar an e-library .
This document contains an e-Library Manifesto which introduces the relevant ‘systems’. It describes the main concepts characterising these systems, i.e., content, user, functionality, quality, policy and architecture. It also describes the reference frameworks needed to clarify the e-Library Reference Architecture.
This e-library will meet the needs and passions of teachers and students and the learning styles of the latter of the department .
About hometown narratives of undergraduate students.
Dianne Siriban talks about how Smart phones using Microblogging could be a popular tool to engage higher education students in English Communication courses on Research Writing.
Technology Trends in Libraries - Today & TomorrowRachel Vacek
This presentation discusses the basic concepts of Web 2.0 and how they are being used in libraries. It provides examples of these concepts, and emphasizes that over the next several years, the concepts of Web 2.0 (collaboration, participation, tagging, community, etc.) will only grow, but the actual technologies themselves will change.
INNOVATION AND RESEARCH (Digital Library Information Access)Libcorpio
Innovation and research, Digital Library Information Access, LIS Education, Library and Information Science, LIS Studies, Information Management, Education and Learning, Library science, Information science, Digital Libraries, Research on Digital Libraries, DL, Innovation in libraries and publishing, Areas of Research for DL, Information Discovery, Collection Management and Preservation, Interoperability, Economic, Social and Legal Issues, Core Topics In Digital Libraries, DL Research Around The World
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
Slides from a workshop delivered for the University of Edinburgh Digital Scholarship programme, on 18th October 2017. For further information on the programme see: http://www.digital.cahss.ed.ac.uk/ or #DigScholEd. If you are interested in hosting a similar workshop, or adapting these slides please contact me: nicola.osborne@ed.ac.uk.
Anytime, anywhere, any device: mobile technologies in libraries
Mobile technology is increasingly becoming the preferred method of internet access by teenage users, and what better way for libraries to be perceived as useful and relevant than to provide instant, online, 24/7 access to reliable information using this technology? Hear how universities, schools and public libraries are marketing their services using mobile phones and devices.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
A security device which is configured to permit, deny or
proxy data connections set by the organization's security policy. Firewalls can either be hardware or software based
Twist is an Open World Information Sharing Network which provides a platform to the users searching information on the same project that directly publishes the new updates for a desired category or group of categories to the people who had enrolled as that category for their Personal interest.
Linked Data Love: research representation, discovery, and assessment
#ALAAC15
The explosion of linked data platforms and data stores over the last five years has been profound – both in terms of quantity of data as well as its potential impact. Research information systems such as VIVO (www.vivoweb.org) play a significant role in enabling this work. VIVO is an open source, Semantic Web-based application that provides an integrated, searchable view of the scholarly activities of an organization. The uniform semantic structure of VIVO-ISF data enables a new class of tools to advance science. This presentation will provide a brief introduction and update to VIVO and present ways that this semantically-rich data can enable visualizations, reporting and assessment, next-generation collaboration and team building, and enhanced multi-site search. Libraries are uniquely positioned to facilitate the open representation of research information and its subsequent use to spur collaboration, discovery, and assessment. The talk will conclude with a description of ways librarians are engaged in this work – including visioning, metadata and ontology creation, policy creation, data curation and management, technical, and engagement activities.
Kristi Holmes, PhD
Director, Galter Health Sciences Library
Director of Evaluation, NUCATS
Associate Professor, Preventive Medicine-Health and Biomedical Informatics
Northwestern University Feinberg School of Medicine
DOMAINS OF USER STUDIES (User Studies and User Education)Libcorpio
Domains of User Studies, User Studies, User Education, Library users, LIS Education, Library and Information Science, LIS Studies, Information Management, Education and Learning, Library science, Information science,
Global digital context
Social Media, a definition
Social Media policies?
Digital identity – the ‘research professional’
Social Media tools for academia?
Social Media – a new data source
Social Media in Research –
what considerations?
Citing Social Media sources
Value of Social Media?
e-Governance is the ICT-enabled route to achieving good governance.
An e-library is a library in which collections are stored in digital formats (as opposed to print, microform, or other media) and accessible by computers. The digital content may be stored locally, or accessed remotely via computer networks.
As a part of my regular academic activities under the course “Globalization and Governance (PA-322)”, I was assigned to plan for making department’s seminar an e-library .
This document contains an e-Library Manifesto which introduces the relevant ‘systems’. It describes the main concepts characterising these systems, i.e., content, user, functionality, quality, policy and architecture. It also describes the reference frameworks needed to clarify the e-Library Reference Architecture.
This e-library will meet the needs and passions of teachers and students and the learning styles of the latter of the department .
About hometown narratives of undergraduate students.
Dianne Siriban talks about how Smart phones using Microblogging could be a popular tool to engage higher education students in English Communication courses on Research Writing.
Technology Trends in Libraries - Today & TomorrowRachel Vacek
This presentation discusses the basic concepts of Web 2.0 and how they are being used in libraries. It provides examples of these concepts, and emphasizes that over the next several years, the concepts of Web 2.0 (collaboration, participation, tagging, community, etc.) will only grow, but the actual technologies themselves will change.
INNOVATION AND RESEARCH (Digital Library Information Access)Libcorpio
Innovation and research, Digital Library Information Access, LIS Education, Library and Information Science, LIS Studies, Information Management, Education and Learning, Library science, Information science, Digital Libraries, Research on Digital Libraries, DL, Innovation in libraries and publishing, Areas of Research for DL, Information Discovery, Collection Management and Preservation, Interoperability, Economic, Social and Legal Issues, Core Topics In Digital Libraries, DL Research Around The World
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
Slides from a workshop delivered for the University of Edinburgh Digital Scholarship programme, on 18th October 2017. For further information on the programme see: http://www.digital.cahss.ed.ac.uk/ or #DigScholEd. If you are interested in hosting a similar workshop, or adapting these slides please contact me: nicola.osborne@ed.ac.uk.
Anytime, anywhere, any device: mobile technologies in libraries
Mobile technology is increasingly becoming the preferred method of internet access by teenage users, and what better way for libraries to be perceived as useful and relevant than to provide instant, online, 24/7 access to reliable information using this technology? Hear how universities, schools and public libraries are marketing their services using mobile phones and devices.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
A security device which is configured to permit, deny or
proxy data connections set by the organization's security policy. Firewalls can either be hardware or software based
THREATS are possible attacks.
It includes
The spread of computer viruses
Infiltration and theft of data from external hackers
Engineered network overloads triggered by malicious mass e-mailing
Misuse of computer resources and confidential information by employees
Unauthorized financial transactions and other kinds of computer fraud conducted in the company's name
Electronic inspection of corporate computer data by outside parties
Damage from failure, fire, or natural disasters
Internet Leased Line
An internet leased line is a premium internet connectivity product, delivered over fiber or wi-fi, which is dedicated fully duplex and provides uncontended, symmetrical speed Internet. With Internet becoming critical in today's business environment, the need for quality Internet connectivity is on the rise. With price difference between Broadband & Internet leased line was almost 4 times till an year ago Internet Leased Line was used by only corporate's & large organisations With the higher bandwidth availability with service providers in India & the rise in demand for Internet Leased Line among consumers saw drastic price cuts over the year bridging the gap between Internet Leased Line & Broadband making every business considering Internet Leased Line for their Internet connectivity.
Leading the pack of Service providers providing Internet Leased Line is tier one provider with over 50% market share due to its quick response, reachability & competitive pricing.
* Unparalleled Service Level Guarantee
* Easy scalability
* Premium Service dedicated to an individual customer
* 24 x 7 Dedicated Internet access
* 24 x 7 Networks Monitoring Service and Technical Helpdesk
Meeting Federal Research Requirements for Data Management Plans, Public Acces...ICPSR
These slides cover evolving federal research requirements for sharing scientific data. Provided are updates on federal agency responses to the 2013 OSTP memo, guidance on data management plans, resources for data management and curation training for staff/researchers, and tips for evaluating public data-sharing services. ICPSR's public data-sharing service, openICPSR, is also presented. Recording of this presentation is here: https://www.youtube.com/watch?v=2_erMkASSv4&feature=youtu.be
NOMENCLATURE CHANGE FOR LIBRARY AND INFORMATION SCIENCE (LIS) SCHOOLS IN NIGE...IAEME Publication
This paper provides a synopsis of the evolutionary changes in the nomenclature of Library andInformation Science (LIS) programme in different countries and makes a case for LIS Schools in
Nigeria to adopt Information and Knowledge Management (IKM) as their new name in line with
current trends. It highlights the specific factors which make this transformation of LIS to IKM
imperative. Various institutions that changed the nomenclature of their LIS programme and thosethat prefer IKM were listed. The scope and content of an IKMprogramme were outlined. In
addition, the implications of IKM for interdisciplinary research and emerging opportunities in the
21st century were discussed. Finally, a proposal was made for a bachelor degree programme inpublishing and multimedia studies/technology, which is highly entrepreneurial in nature. The push
for other information-related disciplines was used to justify the argument for a distinct faculty forthese courses in the Nigerian tertiary education sector. This has implications for the change to IKM
as it underlines the strategic importance of thisrebrandeddiscipline in the educational systems ofthe knowledge economy.
NISO Two Day Virtual Conference:
Using the Web as an E-Content Distribution Platform:
Challenges and Opportunities
Oct 21-22, 2014
Maryann Martone, Ph.D., Professor of Neuroscience, University of California, San Diego
Social media in Libraries: Toolkit for Promotion, Productivity & Reference: a...Cheryl Peltier-Davis
Outline:
• Defining Social Media
• Social Media in Libraries : Benefits & Challenges
• Social Media Toolkit for Libraries: Promotion, Productivity, Reference
• Free Caribbean Reference Resources
LinkedIn Tips For The Biotech ProfessionalLinkedIn
This slide's embedded in a post featuring tips from LinkedIn professionals in different verticals. Thanks to Don Low - Biotech Project Lead at Baxter Biosciences, for sharing tips on how biotech professionals can extract maximum value on LinkedIn.
For more LinkedIn related tips and tricks, please check out the LinkedIn Blog - http://blog.linkedin.com/
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
1. Accessing Internet Resources: The Best Practice with Special Reference to Biomedicine Dr. Surya Nath Singh BSc (Hons); MLISc; MA; PhD Sr. Library and Information Officer Group leader, Information Centre &Library , National Institute of Virology, Pune –411001 E-Mail: snsingh @ niv .co.in ; nivicl@pn3.vsnl.net.in
8. An hour on the Web may not answer a question that you could find within two minutes of picking up a reference book.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32. Combine key words with… for better results Search Engines generally supports- Stop words, Span blockers, Boolean- AND OR, NOT, + ,- Proximity searches- NEAR, ADJ, BEFORE ; Phase searches- “ ..” Studies have indicated that if we use above Boolean logic and Proximity/Phases searches- users get better hit/results
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58. Virology and Allied Subjects Mycology Virology Study of viroids Molecular Biology Tumour Virology Immunology Biochemistry Genetics: Gene therapy, Genetic engineering Public Health and Hygiene Tissue Culture Cytology Pathology (General Medicine) Microbiology Bacteriology Medical Entomology Viral Diseases Biotechnology Biosafety Biological Warfare Medical Sciences Botanical Sciences Veterinary Sciences Bioinformatics (Viroinformatics) Nanotechnology Fig. 1: Virology and its Relationships with the Major Biological Disciplines
59. Relationship among Various Viral Information Systems NINVDI Psychological Information System (PsyIS) Metrological Information System (MIS) Full-Text Databases - Subscribed -Free -Internet NINVDI Geographical Information System (GIS) Biblio graphical Information System (BIS) Clinical Information System
60.
61.
62. Snapshot of Web OPAC Search books from this icon Search articles from this icon Search Journals available in Library from this icon
63. Searching Books from the WEB OPAC If you know the author, click on Author menu and type surname of Author If you know the title, click on Title menu and type the Title If you want to search the books on specific topic or subject, you just click on the Combination Search and type your keyword
64. Searching Journals from the WEB OPAC Type title of the journal in this bar & list will be displayed below. Select the journal from the list.
65.
66. How to Access ERMED Consortium Step 1: Type website address as www.informindia.com/ermed In the address bar of Internet Explorer Step 2: Click on Search and Browse e-Journals Icon
67. How to Access ERMED Consortium Contd… Step 3: Click on User Icon Step 4: Click on By Journal Icon You can search with keywords among the whole database of ERMED by clicking on Search Database option
68. How to Access ERMED Consortium Contd… List of Online Journals will be displayed # Labeled journals available online * Labeled journal titles are subscribed by NML Click on the Journal title it will open new window & available issues will be displayed
69. How to Access ERMED Consortium Contd… Latest issue & its content will be displayed For earlier issues click on Archives Icon For full text article click on Full Text Icon
78. DELNET Statistics as on 31-3-2010 20,000 DEVINSA Database 9 44,304 Databases of Theses and Dissertations 8 748 Union List of Sound Recordings 7 5,000 Union List of Video Recordings 6 11, 715 CD-ROM Database 5 9,12, 042 Databases of Periodical Articles 4 20,235 Union Catalogue of Periodicals 3 33,541 Union List of Current Periodicals 2 8 3, 6 9,2 99 Union Catalogue of Books-CCF 1 Value Feature No
79. How to Access “DELNET Online” Step: 1 Type website address as http://delnet.nic.in Step: 2 Click on the “DELNET ONLINE” Icon