OCLC Micro: Volume 5 Issue 1
Table of contents
DUBLINes
If you use a Wyse PC (M310 Workstation) you have a useful, and potentially dangerous, command available on your system: the LOCK command. LOCK allows the system user to secure the…
DOS‐tips
Mark BendigHere's something we should have mentioned long ago. Say you want to copy a file from the disk in Drive A to the disk in Drive B. You enter COPY A:MYFILE B: as usual, but to your…
NETWORds
Lotus Development Corp. and Ziff Communications Co. have teamed up to develop a CD‐ROM application called Computer Library, available from Ziff Communications Co., One Park Ave.…
Booting Up
Hardin BrothersDiscusses the booting up process of IBM‐PCs. Considers the functionof IO.SYS or IBMBIO.COM in initializing hardware and loading MS‐DOS, andthe MS‐DOS file processes that lead to…
NeXT and the Library Workstation
Edward J. ValauskasConsiders what the NeXT computer can offer libraries as analternative to conventional mainframe‐PC‐terminal systems for sorting,storing, and displaying bibliographic information…
ALIX Files Download to Librarians′ PCs
Erik Delfino, Bruce MillerDiscusses the Automated Library Information Exchange electronicbulletin board, and the body of text and program it provides tolibrarians, with examples of ALIX messages. Considers…
Viruses: No Small Pox
Examines computer “virus” programs and how they can beavoided. Describes how virus programs work, and suggests preventivemethods to avoid them entering a computer through…
Batch Files for 〈F〉unction Key Definitions
John R. LikinsDescribes a batch file, J.BAT, to quickly load a set of functionkeys. Provides examples of general cataloguing and customized functionkey definitions for library work.
Selecting Printers and Modems
Vern BuisDiscusses the suitability and characteristics of various printerand modem types for OCLC library applications. Considers the featuresand suitability of daisy wheel, dot matrix…
System Security
George RowcliffeConsiders various ways of maintaining the confidentiality andintegrity of information stored in computer. Discusses key lockmechanisms, shell systems, file encryption, command…
Not for Novices: Another BASIC Input Technique
Mark BendigOne of the most important aspects of programming in BASIC or any other language involves the interaction between the program and its user. For a typical microcomputer, the…