💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › CURRENTCITIES › 1993.4-8 captured on 2022-06-12 at 11:10:49.

View Raw

More Information

-=-=-=-=-=-=-


                                _Current_Cites_
                                Volume 4, no. 8 
                                  August 1993
 
                   Information Systems Instruction & Support
		       		 The Library
                      University of California, Berkeley
                         Edited by David F. W. Robison
                                ISSN: 1060-2356 
       
                                 Contributors:
    David B. Rez, Teri Rinne, Vivienne Roumani-Denn, Mark Takaro, Roy Tennant
     _______________________________________________________________________

Electronic Publishing

Glaberson, William. "Creating Electronic Editions, Newspapers Try
New Roles" The New York Times 142(49,425) (August 16, 1993).  
More and more print newspapers are beginning to aim at the online 
home computer market by offering electronic versions of their 
publications.  Generally speaking the electronic medium is new to 
newspaper publishers and questions about advertising and the
electronic newspaper's role in the media are yet to be answered. 
There are those skeptics who remember the failed "videotext 
systems" of the mid-1980's and worry that the same failure will 
be repeated.  However, the potential for expanded services 
(community bulletin boards and increased local news) and the 
ability to easily update and cross reference news stories has 
many people excited. - DBR


Hyper- and Multimedia

Abernathy, Aileen. "Managing Your Media" MacUser 9(9) (September 
1993):190-206.  Database software packages for the cataloging of 
image files are described and reviewed in this article which 
includes a chart comparing the features of 8 recent releases.  
Most programs will handle a variety of image formats, both still 
and moving, and provide thumbnail views of the image files 
themselves.  Several offer a variety of indexes for searching and 
users can define their own fields as well as use pre-established 
fields. Programs of the type described are sure to be useful as 
users seek ways to control growing image files.  - MT
 
Nordgren, Layne. "Microsoft Encarta Multimedia Encyclopedia" CD-
ROM Professional 6(4) (July 1993):46-48.  Microsoft's answer to 
the multimedia encyclopedia products from Grolier and Compton's 
is based on the Funk & Wagnall's New Encyclopedia and includes
Webster's Concise Electronic Dictionary and a thesaurus.  Users
will be able to search in the text by word, article title, 
subject browsing, or through an atlas or timeline.  Links to 
related topics, combined with more than 7,000 images, over 800 
color maps and 350 sound samples, including word pronunciations 
and foreign language examples, will make this a competitive 
product in the area of the multimedia encyclopedia. - MT
 
Dunley, Tim. "Microsoft Modular Windows: A Key Platform for
Multimedia CD-ROM Development" CD-ROM Professional 6(4) (July
1993):152-157.  Describing a Microsoft Windows operating system 
for the control of interactive multimedia that is open for third-
party development, scalable throughout the Windows family and 
extensible for new devices or applications, this article details 
the new modular approach taken in Microsoft's newest multimedia 
authoring release.  The user interface is designed for a 
television as the display and the package has been optimized to 
use less memory that Windows 3.1 through the use of a smaller set 
of core routines.  The open system approach will enable other 
vendors to develop multimedia applications based on the modules 
and authors should find working with the new system simpler and 
easier than many other authoring kits. - MT
 
Holzberg, Carol S. "Let Your Fingers Do The Walking: CD-ROM
Encyclopedias" CD-ROM World 8(8)(September 1993):28-37.  Holzberg
offers a roundup of multimedia encyclopedias providing a survey 
and evaluation of 9 different products ranging from The Animals 
from Software Toolworks to World Books' Information Finder.  With 
the growth in this segment of multimedia publishing, users both 
young and old will gain new knowledge of the world and have easy 
access to information that is presented in a timely manner and 
often with sound and images to round out the view. - MT


Networks and Networking

"Answers to Clipper Questions" EFFector Online 5(14) (August 5,
1993) [should be available via anonymous FTP from ftp.eff.org as 
/pub/EFF/newsletters/effector5.14 <URL=ftp://ftp.eff.org/pub/EFF
/newsletters/effector5.14>].  Responding to 114 questions sent to 
President Clinton about the Clipper Chip proposal, John D. 
Podesta, Assistant to the President and Staff Secretary, provides 
answers to the questions.  Highlights of the answers appear in 
this article, while the entire response should be available at 
the EFF FTP archive site in the directory /pub/EFF/legal-issues 
<URL=ftp://ftp.eff.org/pub/EFF/legal-issues/>.  Among the 
questions and answers: Q: Why is the key escrow scheme being 
proposed? A: To provide security for US businesses while 
preserving the ability to perform authorized wiretaps; Q: Is the 
key escrow initiative compatible with constitutional rights? A: 
The key escrow initiative does not require the user to create 
"speech" nor does it infringe upon the content of the speech, so 
it does not infringe upon 1st Amendment rights, as wiretaps would 
need to be authorized, and the user does not know their own 
escrowed keys, there is no 4th or 5th Amendment infringement.  
- DFWR

Benford, Steve, et al. "GRACE: A System to Support the 
Development and Use of Global Computer-Supported Cooperative Work 
(CSCW) Applications" Internet Research 3(1) (Spring 1993):25-35.  
Benford and his colleagues describe both the concepts and 
implementation issues of a cooperative work system.  Although the 
system they are developing is designed around Open Systems 
Interconnection (OSI), the conceptual model could be ported to 
other networks, and is intended to support world-wide cooperative 
work. - DFWR

Clarkson, Mark. "All-Terrain Networking" BYTE 18(9) (August 
1993):111-116.  Asynchronous Transfer Mode (ATM) is considered 
the new panacea of networking, providing a seamless interface 
between LANs and the public telephone network and high-speed, 
high-bandwidth communications over common media.  Clarkson 
explains how ATM makes this possible by standardizing packet size 
and thereby allowing for dynamic, very high-speed switching.  
Although widespread implementation of ATM is not expected for 
another 18 months, it can be used effectively in small-scale 
implementations today. - DFWR

Dern, Daniel P. "Meeting the Challenges of Business and Public 
End-Users on the Internet: What They Want, What They Need, What 
They're Doing" Internet World 4(5-6) (June/July/August 1993):4-9.  
Dern outlines the needs and desires of both individual, private, 
and business Internet users (now numbered in the thousands).  
While individuals want a simpler interface and new user training, 
businesses are interested in stable and secure services.  Dern 
also predicts that we are approaching a another burst of new 
connectivity, and consequent development of the network and 
services for these new users. - DFWR

DeLoughry, Thomas J. "Promoters of Plan to Create a National 
'Data Highway' Turn to 'Thorny' Policy Issues and Legal 
Questions" The Chronicle of Higher Education 39(46) (July 21, 
1993):A17, A20.  While no big problems were solved, the 
impressive part of a meeting on the National Information 
Infrastructure at the Library of Congress was the list of 
participants.  The first hour of the meeting was presided over 
by Vice-President Gore who pointed out that gigabytes of 
information that is poorly organized will be useless.  Other 
participants included university, library, networking, and 
entertainment representatives. - DFWR

Electronic Frontier Foundation. "Toward a New Public Interest 
Communications Policy Agenda for the Information Age: A 
Framework for Discussion" EFFector Online 5(13) (July 23, 1993) 
[a complete copy of this paper is available via anonymous FTP 
from ftp.eff.org as the file named /pub/EFF/papers/open-
platform-discussion-1993 <URL=ftp://ftp.eff.org/pub/EFF/papers/
open-platform-discussion-1993>].  The EFF describes its 1993 
open platform proposal to encourage the development of open 
networking.  The document calls for universal service, free 
speech and common carriage, privacy and security of 
communications, and the development of public interest 
applications and services.  The key is to be sure that the 
emerging infrastructure that includes cable and telephone 
services provides two-way, switched communications that gives 
users the power to be both information providers as well as 
information consumers. - DFWR

Kent, Stephen T. "Internet Privacy Enhanced Mail" 
Communications of the ACM 36(8) (August 1993):48-60.  Privacy 
Enhanced Mail (PEM) offers Internet users the ability to 
integrate various levels of privacy and security in their 
communications without making big changes in the way they do 
their work.  Mail authentication does not require that 
recipients employ PEM, though those users will not benefit from 
PEMs authentication scheme.  PEM has been designed to offer 
various levels of security so that implementation can be effected 
according to need and level of participation on the recipient's 
part.  PEM offers further flexibility by being able to employ 
either public or private key encryption. - DFWR

MacKie-Mason, Jeffrey K. and Hal R. Varian. Pricing the 
Internet. Preliminary draft. April 1993 (current version: June 
11, 1993).  Available via anonymous FTP from 
alfred.econ.lsa.umich.edu in directory /pub/Papers as 
Pricing_the_Internet.1.ps.Z 
<URL=ftp://alfred.econ.lsa.umich.edu/pub/Papers/ Internet.1.ps.Z>.  
MacKie-Mason and Varian argue that in order to encourage efficient 
use of network bandwidth and investment in increased capacity, it 
makes sense to charge for packets according to priority and 
congestion.  In this scheme, the user sets the priority of their 
data (e.g., low priority for email, but high for video 
transmission) and offers a bid for the maximum price acceptable.  
When the network is congested, users would then be forced to pay 
for data up to and including the price they bid.  These fees would 
then be applied to creating additional capacity.  Since the 
marginal cost of low priority packets and packets during non-peak 
times is essentially nothing, these packets could be priced at 
little or no cost.  The pricing structure these authors have 
devised is intended to address four types of network costs: "the 
fixed costs of providing the network infrastructure," "the 
incremental [or marginal] costs of sending extra packets," "the 
social costs of delaying other users' packets when the network is 
congested", and "the cost of expanding capacity of the network." 
- DFWR

Mello, John P., Jr. "Future Communications" BYTE 18(9) (August 
1993):94-106.  Mello describes the convergence of computers and 
telephony hardware and software and the increasing ability of 
both computers and networks to handle multimedia objects.  As 
telephone-based services become more complex, it only makes sense 
to provide users with a better interface than the 12 basic keys 
available now.  A number of computer manufacturers are teaming-up 
with telephone manufacturers to develop new computer/phones or 
"smartphones" for both desktop and wireless use.  Novell and AT&T 
have also released a product that links a PBX and Novell server 
that allows data and services to be exchanged between the two 
systems.  As computer-based telecommunications become more 
robust, the ability to share and manage multimedia objects in a 
distributed environment also grows.  Also included with this 
article are sidebars on the entrance of cable TV systems into the 
networking fray and emerging methods of mass data storage (by Bob 
Ryan). - DFWR

Murray, Janet. "K12 Network: Global Education Through 
Telecommunications" Communications of the ACM 36(8) (August 
1993):36-41.  K12Net is a network for K-12 students and 
educators and is available through FidoNet and USENET.  K12Net 
offers activities in 19 curricula as well as a data and software 
library.  Topics range from intercultural discussions to 
scientific experiments.  A conservative prediction is that there 
will be 3-4 million student users of K12Net by the year 2000. 
- DFWR

Rotenberg, Marc. "Communications Privacy: Implications for 
Network Designs" Communications of the ACM 36(8) (August 1993):
61-68.  Rotenberg, Director of the Washington Office of Computer 
Professionals for Social Responsibility, begins this article by 
describing the three areas of concern in communications privacy: 
confidentiality, anonymity, and personal data protection.  
Rotenberg then goes on to describe the major policy efforts to 
protect users' rights, internationally and in various nations.  
It is important to recognize that as the communications 
infrastructure becomes unified, privacy concerns often need to 
be addressed with a new perspective.  See also, Tuerkheimer, 
Frank M. "The Underpinnings of Privacy Protection" 
Communications of the ACM 36(8) (August 1993):69-73, and 
Hiramatsu, Tsuyoshi "Protecting Telecommunications Privacy in 
Japan" Communications of the ACM 36(8) (August 1993):74-77.  
- DFWR

Ruth, Stephen R. and Raul Gouet. "Must Invisible Colleges be 
Invisible?: An Approach to Examining Large Communities of 
Network Users" Internet Research 3(1) (Spring 1993):36-53.  
Ruth and Gouet describe their study of network use by the 
community of scientific researchers in Chile.  Unlike most other 
studies of network users, this one began with a large sample 
(908 usable responses).  Among the findings: scientists using the 
networks claimed that the network made them more efficient, there 
was no correlation between age and network usage, and women were 
more likely to be network users than men. - DFWR

Sadowsky, George. "Network Connectivity for Developing 
Countries" Communications of the ACM 36(8) (August 1993):42-47.  
While the advantages of Internet access may be obvious in the 
developed world, it is not always so in the developing one.  
Those of us in the developed world must be sensitive to local 
needs when extolling the virtues of networking in the developing 
world.  Among the benefits available to such users: stable 
communications both within their own country and internationally 
as well as access to expertise around the globe. - DFWR

Snyder, Joel M. "Jack Kerouac Never Had to Worry About E-mail" 
Internet World 4(5-6) (June/July/August 1993):2-4.  Need to get 
to your email while on the road?  Snyder offers an extensive list 
of options for keeping in touch, "from Moscow, Russia or Moscow, 
Idaho." - DFWR

Stix, Gary. "Domesticating Cyberspace" Scientific American 269(2) 
(August 1993):100-110.  Stix provides a clear analysis of the 
current situation in the development of the National Information 
Infrastructure.  The next few years should prove to bring quite a 
few changes to the network.  As digital and fiber technologies 
are deployed, we should see both telephone companies of various 
types and cable companies getting deeply involved. - DFWR

"Telecommunications Infrastructure Act of 1993 (S. 1086): A 
Summary by the Electronic Frontier Foundation" EFFector 
Online 5(13) (July 23, 1993) [available via anonymous FTP from 
ftp.eff.org as /pub/EFF/newsletters/effector5.13 <URL=ftp://
ftp.eff.org/pub/EFF/newsletters/effector5.13>].  The bill 
before the US Senate would allow regional Bell operating 
companies (RBOCs) to compete for local telephone and cable 
services for both residential and business customers.  The new 
local carriers would still be required to support traditional 
interconnection and universal access.  One of the advantages of 
this legislation is that, if it became law, RBOCs would be in a 
better position to provide hand-off support for cellular 
services between cellular service providers.  The full text of 
the bill is available via anonymous FTP from ftp.eff.org as file 
/pub/EFF/legislation/infra-act-s1086 <URL=ftp://ftp.eff.org/pub/
EFF/legislation/infra-act-s1086>. - DFWR

Weitzner, Daniel J. "The Clipper Chip, Key Escrow and the 
Constitution" Networks & Policy 1(2) (Summer 1993):1, 4 [should 
be available via anonymous FTP from ftp.eff.org].  Weitzner asks 
whether the Clinton Administration's Clipper Chip proposal can 
really satisfy the desires of law enforcement if the encryption 
scheme is voluntary.  What is to stop criminals from using 
another, more secure encryption scheme?  If the Administration 
does in fact require that telecommunications in the United 
States be encrypted only using the Clipper Chip, a number of 
constitutional questions arise: does this violate the 4th 
Amendment? do users of the system waive their 5th Amendment 
rights? does this violate the 1st Amendment by prohibiting 
certain types of speech (i.e., speech using another type of 
encryption)? - DFWR

Wilson, David L. "Electronic Riches Are Free on the Internet, but 
Some Worry About the Consequences" The Chronicle of Higher 
Education 39(47) (July 28, 1993):A18, A20-A21.  As the Internet 
enters the public consciousness, and American campuses are 
further strapped for cash, many wonder about the appropriateness 
of the free lunch on the Internet.  While there is a tremendous 
amount of data available for no charge on the Internet, much of 
it is made available with little or no marginal cost to the 
information provider.  Wilson predicts that access to this kind 
of information will continue for a while, even as the pricing 
structure of the network itself may change. - DFWR

Winner, Langdon. "How Technology Reweaves the Fabric of Society" 
The Chronicle of Higher Education 39(48) (August 4, 1993):B1-3.  
Winner writes in this opinion piece that technological advances, 
when implemented on a wide scale, have a profound effect on 
society.  The danger now is that many changes to the US 
infrastructure are in the making but decisions are being made 
without popular participation.  Winner uses emerging national 
information infrastructure as an example of this failure to 
involve the citizenry in the decision-making process. - DFWR


Optical Disc Technologies

Bennett, Hugh. "Photo CD: A Macintosh Primer" CD-ROM Professional
6(4) (July 1993):93-99.  Bennett provides an overview of Kodak
Photo CD technology, describing the five different versions of
Photo CD (Photo CD Master, Pro Photo CD, Photo CD Portfolio,
Photo CD Catalog, Photo CD Medical), hardware/software 
specifications (including the difference between single-session
and multi-session CD-ROM drives), and, last but not least, 
explains just how far Apple has gone to incorporate Photo CDs 
into the Macintosh environment. - TR
 
Flanagan, Patrick. "Talking CD-ROM with Arthur Herr" CD-ROM World
8(7) (August 1993):32-33.  Arthur Herr is the inventor of the
Laserfile, a packaging alternative to the traditional jewel box	
CD-ROM cases.  Herr contends that the Laserfile is more durable,
easier to use, and more environmentally-friendly than jewel
box packaging. - TR
 
Folen, Doris R. and Laurie E. Stackpole. "Optical Storage and
Retrieval of Library Material" Information Technology and
Libraries 12(2) (June 1993):181-191.  This article describes
the development of an optical disk storage system at the Ruth H. 
Hooker Research Library and Technical Information Center of the 
Naval Research Laboratory.  The system consists of a Sony 
autochanger, Sun minicomputer, Sun workstations, TDC scanners, 
printers, personal computers, and various other peripherals. 
Large portions of the library's collection, including an 
impressive technical report collection numbering over 140,000, 
are stored on twelve-inch optical discs.  Plans for remote access 
to the collection over the campus network are currently underway.
- TR
 
Guenette, David R. "Have CD-ROM, Will Travel: Different Ways to
Have CD-ROMs on the Go" CD-ROM Professional 6(4) (July 1993): 28-
39.  Guenette describes in detail various solutions for on-the-go 
CD-ROM access.  Among the options covered are the permanent 
connection of a notebook computer to a CD-ROM drive; tiny parallel 
port-to-SCSI adapters for adding a portable computer to your 
laptop; portable CD-ROM drives that integrate connectors and power 
supplies in easy-to-carry cases; and customized portables or 
luggables that have the room (along with the weight) to add full-
size controller cards and CD-ROM drives. - TR

James, Jonathan K. "CD-ROM in the Information Marketplace: A
Comprehensive Study from UMI" CD-ROM Professional 6(4) (July
1993):102-105.  This article presents the results of UMI's annual 
study to track the use of CD-ROMs in the library industry, 
monitor market share levels, and identify trends.  Among the key
findings highlighted is that the use of CD-ROM is approaching
saturation in academic and public libraries; the use of CD-ROM
in high school and corporate library environments is growing
rapidly.  Use of CD-ROM networks in academic and corporate 
libraries is expected to triple by 1994, while doubling in public 
libraries.  Interestingly, this article also notes that database 
tape licensing is also expected to increase nearly threefold by 
1994.  From a product development standpoint, the author points 
out that vendors need to create CD databases that are easily 
networkable and have a tape format to satisfy this growing need. 
From an information professional standpoint, librarians need to 
make intelligent decisions regarding the best-suited database 
formats and configurations. - TR
 
Kalstrom, Dave. "Archive Project Preserves Columbus Documents
Optically" CD-ROM Professional 6(4) (July 1993):135-141.  This
article chronicles the celebrated and ambitious scanning project
currently underway at the Archivo General de Indias in Seville,
Spain.  The Archivo collection includes over 90 million pages of
historic written documents housed in over five and one-half miles
of shelving.  To improve access and preservation of the
deteriorating collections, a computerized archiving system
involving optical disc storage technology has been developed. 
Kalstrom describes the institution, the collection, and the 
system itself, which includes a user management system, text
database, and an image storage system. - TR
 
Sylvia, Margaret. "Networking Your CD-ROMs: A Texas Tale" CD-ROM
World 8(7) (August 1993):34-40.  Sylvia describes how the 
installation of a CD-ROM network at St. Mary's University 
Academic Library has created a revolution in the way students and 
faculty do research.  Although the student population is only 
4,000, log-ons to the network number over 1,000 per week during
the regular semester. - TR


General

Krumenaker, Larry. "How to Build a Library Without Walls" 
Internet World 4(5-6) (June/July/August 1993):9-12.  Virtual 
libraries are being developed at a number of institutions and 
Krumenaker describes four of these projects: Columbia 
University's Project JANUS, CORE (Chemistry Online Retrieval 
Experiment), Carnegie Mellon and Elsevier's TULIP project, 
and the Naval Research Laboratory library.  Almost all of 
these projects include both searchable ASCII (with or without 
SGML) as well as bitmapped images. - DFWR


Correction

In two past issues of Current Cites, an author's name was 
misspelled.  Here are the corrected citations:

Bauwens, Michel. "Corporate Cybrary Networks: An Idea Whose 
Time has Come" Internet Business Journal 1(1) (June/July 
1993):25-28.

Bauwens, Michel. "The Emergence of the 'Cybrarian': A New 
Organisational Model for Corporate Libraries" Business 
Information Review Journal 9(4) (April 1993):65-67.  
Originally cited under the working title: "Cybrarian's 
Manifesto."

-------------------------------------------------------------------
Current Cites 4(8) (August 1993) ISSN: 1060-2356
Copyright (C) 1993 by the Library, University of
California, Berkeley.  All rights reserved. 

All product names are trademarks or registered trademarks of
their respective holders.  Mention of a product in this publication
does not necessarily imply endorsement of the product.
 
Copying is permitted for noncommercial use by computerized
bulletin board/conference systems, individual scholars, and
libraries.  Libraries are authorized to add the journal to their
collections at no cost.  An archive site is maintained at 
ftp.lib.berkeley.edu in directory /pub/Current.Cites
[URL=ftp://ftp.lib.berkeley.edu/pub/Current.Cites].  This message 
must appear on copied material.  All commercial use requires 
permission from the editor, who may be reached in the following 
ways:

drobison@library.berkeley.edu // drobison@ucblibra // (510)643-9494
-------------------------------------------------------------------