VOLUME 26, NUMBER 3 — March 2006 Computers in Libraries Complete Coverage of Library Information Technology
This Month: How You Deliver Info Better than
the Web
Articles in this issue of Computers in
Libraries are available in a variety of formats — Preview, Full
Text, Text+Graphics, and Page Image PDF — on a pay-per-view basis,
courtesy of ITI's
InfoCentral.
Click on the
logo for a summary and full-text purchase options! Articles with theimage
are also available in full-text (HTML) on this site.
FEATURES
Two Ways to Set Up Wireless Hotspots: Comparing Apples and Oranges There are so many ways to configure wireless hotspots; this article explains two very different ones. One is open source with unrestricted access; the other is done with vendor software and full authentication. You can get a taste of both strategies here and see which would satisfy your needs. By
Andrew Mutch and Karen Ventura
Page
6
Access Without Authentication: How and Why We Let Anyone Surf Our Wireless Most libraries require authentication to ensure that only qualified, registered patrons use their services. This California public library system, however, decided to let anybody surf its new wireless service anonymously. Here the author explains why they chose this path, what the technical configuration is, and how it simplifies life for the surfers. By
Donna Watkins
Page 10
Four Commandments for Writing Policies for Public-Access Wireless Networks
Here are commandments for writing basic policies to cover wireless Internet services. Although they’re not written in stone, if you follow this savvy advice, your staff and users will be clear on topics such as technical requirements, responsibility, and liability. By
Michael Sauers