{"title":"Overcoming computer phobia","authors":"Joan E. Thompson","doi":"10.1145/62691.62703","DOIUrl":"https://doi.org/10.1145/62691.62703","url":null,"abstract":"After having worked in the College of Business computer labs at Pennsylvania State University for two and a half years, I developed a set of guidelines to follow when consulting students and faculty in the use of computers. Here are the guidelines:1. Always tell them to double the time that they plan to spend in the lab doing homework. This cuts down on the time pressure to get things done. Once a person feels pressure and begins to tense up, they forget to do what they have been taught, and are more likely to make more mistakes leading to frustration.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129519343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated disaster plan auditing using knowledge base technology","authors":"J. Simon, Aaron H. Konstam","doi":"10.1145/62645.62698","DOIUrl":"https://doi.org/10.1145/62645.62698","url":null,"abstract":"Management Information System (MIS) disaster and contingency planning are the principal ingredients for the success of a computer center's reorganization pending a system loss but there is is very little information published addressing the details of how to be assured of a proper backup and recovery strategy. Disaster planning is a phrase we are using to describe the act of preparing for a disaster, such as backup procedures, insurance acquisition, fire protection and maintenance of a contingency plan. The contingency plan, on the other hand, explicitly covers the recovery procedures, responsibilities, and supplementary disaster planning, that should take place once a disaster occurs. It should be clear that there is a cyclical relationship between these two tightly related planning functions. For that reason we will use the term disaster plan to refer to both disaster and contingency planning.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133915552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Library networking: its value to education","authors":"P. Molholt","doi":"10.1145/62645.62693","DOIUrl":"https://doi.org/10.1145/62645.62693","url":null,"abstract":"I have been asked to talk about libraries in the network environment, the role of library networking, in the educational process, and my observations gained from a five month study sponsored by the Office of Library Programs, US Department of Education.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"395 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122996795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Organizational issues for user services","authors":"Agelia Velleman","doi":"10.1145/62645.62695","DOIUrl":"https://doi.org/10.1145/62645.62695","url":null,"abstract":"In this session, I'll wear two hats. One hat belongs to a computing administrator who considers global issues in academic computing and their impact on higher education. The second hat belongs to a manager of talented and dedicated technical staff who focus on providing computing services for the community at large. I want to share with you the ways in which I've chosen to reorganize User Services at Cornell to reconcile some of the conflicts that arise when wearing these two hats --- to describe some of the ways in which our new organization is working, as well as some of the ways in which more fine-tuning is required. I'd also like to know whether you think this kind of structure would work at your institution.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127082348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"File directory transmission via electronic mail","authors":"M. Wyle","doi":"10.1145/62630.62637","DOIUrl":"https://doi.org/10.1145/62630.62637","url":null,"abstract":"A portable program to package, compress, document, transmit, and re-assemble multiple files in a B-tree directory structure is presented. The program preserves the structure, mode, protection, ownership, and integrity of all files and subdirectories. The algorithm and implementation are described in detail.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125809965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An on-line system for controlling and monitoring software usage in a microcomputer laboratory","authors":"A. Kreutzer","doi":"10.1145/62630.62640","DOIUrl":"https://doi.org/10.1145/62630.62640","url":null,"abstract":"Prior to the Fall of 1984, the Academic Computing Center facilities at Allentown College consisted of a large minicomputer, a VAX/11-750. Rudimentary load statistics on the VAX were obtained by a program which periodically counted the number of users logged on at that time. The usage profiles generated helped management make decisions such as how many terminals were needed, when the computer center should be open, and when consultants could be used most effectively.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122991350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved user service - a 24 hour helpdesk","authors":"John C. Biddle, J. Tyler","doi":"10.1145/62630.62632","DOIUrl":"https://doi.org/10.1145/62630.62632","url":null,"abstract":"How do I do....? Where do I get....? What do I do....? These are some of the kinds of general questions that have flooded the Computer Center ever since it was first formed. While the nature of the questions has switched from cards to terminals and from batch to on-line, they still keep pouring in. These same questions are still being asked over and over again by both administrative and academic customers. In the past, the answer, right or wrong, depended as much upon the person providing the answer and how much they knew as it did on anything else. Also, customers may have been routed to several different individuals before their question was answered.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124786203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer center stress test","authors":"S. Stager","doi":"10.1145/62630.62638","DOIUrl":"https://doi.org/10.1145/62630.62638","url":null,"abstract":"It's old news that the work environments of college and university computing centers are stressful. I put together the \"Computer Center Stress Test\" as a way to humorously deal with the day to day stress, and to maybe provoke some discussion about why some of these seemingly trivial and predictable events are stressful and what can be done to minimize the stress of these events in our environment.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134502467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NSF initiatives in higher education: high-end computing","authors":"John W. D. Connolly","doi":"10.1145/62621.62622","DOIUrl":"https://doi.org/10.1145/62621.62622","url":null,"abstract":"I am going to describe a few NSF activities which in some ways may make your life easier and in some ways may make your life a little more complicated. Our new NSF national supercomputing facility is, in a way, very complementary to the kinds of responsibilities that you have in a local computing facility. I like to think that we are offering a top-of-the-line scientific computing resource. Your faculty who will require top-of-the-line scientific computing will be using our centers, rather than your resources. Every computing center director knows physicists who want to use the whole machine and then cry for more. These people are the ones that we welcome at the national facility.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133558582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Training adult learners - a new face in end users","authors":"Julie-Ann Scott","doi":"10.1145/62621.62623","DOIUrl":"https://doi.org/10.1145/62621.62623","url":null,"abstract":"Most people find the new age of computers both a blessing and a curse. While excited by the prospect of great quantities of information being available at one's fingertips, developing the skills and the tools to effectively access this material can be frightening and stressful. From this growth of data opportunities a new end user has evolved who is motivated by a different set of circum-stances than those encountered by users of the past. This new kind of end user is interested in learning and obtaining only the skills and tools needed for solving specific problems. Only when other problems arise which may need different skills and tools will the end user be motivated to learn and obtain them.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132534494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}