Search results

1 – 6 of 6
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 January 1992

Andrea Weas

Acknowledges the frustrations commonly associated with OCLC′sPASSPORT software function key editor. Elucidates, step‐by‐step, sometechniques for recreating function keys more…

14

Abstract

Acknowledges the frustrations commonly associated with OCLC′s PASSPORT software function key editor. Elucidates, step‐by‐step, some techniques for recreating function keys more easily, focusing on the tasks of ordering books and ordering journal articles.

Access Restricted. View access options
Article
Publication date: 1 April 1986

Jim Toplon

We have lots of fun with the user‐defined function keys on our M300 Workstation. To illustrate principles that you might apply in Interlibrary Loan or in another OCLC subsystem…

16

Abstract

We have lots of fun with the user‐defined function keys on our M300 Workstation. To illustrate principles that you might apply in Interlibrary Loan or in another OCLC subsystem, we'd like to share some of our uses. That single row of buttons rivals in its way the Constant Data record and, yes, even the ILL Micro Enhancer software (ILL ME) as a powerful and versatile processing tool.

Details

OCLC Micro, vol. 2 no. 4
Type: Research Article
ISSN: 8756-5196

Access Restricted. View access options
Article
Publication date: 1 May 1986

Jim Toplon

You can design sequences that use one function key to work on the results of another. In this way you can complete an entire ILL workform, sending fields in batches, and only…

9

Abstract

You can design sequences that use one function key to work on the results of another. In this way you can complete an entire ILL workform, sending fields in batches, and only rarely need to use the arrow keys. We've developed two related sequences‐one for book requests, the other to help you through requests for article photocopies. (The techniques used here were discussed in more detail in “Fun with M300 Function Keys,” OCLC Micro, vol. 2, no. 4, beginning on p. 21.)

Details

OCLC Micro, vol. 2 no. 5
Type: Research Article
ISSN: 8756-5196

Access Restricted. View access options
Article
Publication date: 1 February 1988

Carol Levin and Jim Nolte

This article describes a record‐keeping software package for ILL developed by the authors and programmed by Michael DeCorte and Gary Levin. ILLFILE can pick up information from…

44

Abstract

This article describes a record‐keeping software package for ILL developed by the authors and programmed by Michael DeCorte and Gary Levin. ILLFILE can pick up information from any field of the OCLC ILL workform so that data for CONTU copyright compliance and other needs can be collected by computer (through included sorting and duplicate‐detection software) rather than manually.

Details

OCLC Micro, vol. 4 no. 2
Type: Research Article
ISSN: 8756-5196

Access Restricted. View access options
Article
Publication date: 1 May 1991

David Kaufman

Discusses the use of the ILLFILE program for lending record‐keepingin addition to the more usual copyright limit control. Examines thesteps needed to allow ILLFILE to perform the…

34

Abstract

Discusses the use of the ILLFILE program for lending record‐keeping in addition to the more usual copyright limit control. Examines the steps needed to allow ILLFILE to perform the function, how to sort the records, using the Update command, using ILLVIEW, and producing reports. Surmises that using ILLFILE allows records of incoming and outgoing requests with only the additional step of inserting a computer disk in the daily routine.

Details

OCLC Micro, vol. 7 no. 5
Type: Research Article
ISSN: 8756-5196

Keywords

Access Restricted. View access options
Article
Publication date: 1 June 1986

OCLC requires that theft security devices not do any physical damage to the unit and that the unit remain easily serviceable by the NCR field engineer. Several types of security…

8

Abstract

OCLC requires that theft security devices not do any physical damage to the unit and that the unit remain easily serviceable by the NCR field engineer. Several types of security devices meet these stipulations.

Details

OCLC Micro, vol. 2 no. 6
Type: Research Article
ISSN: 8756-5196

1 – 6 of 6
Per page
102050