Database Usage at the Naval Air Warfare Center Technical Library
The rapidly changing face of research and technology in the science and research forum, as well as the world, has prompted the Naval Air Warfare Center Weapons Division (NAWC-WD) Technical Library to be in a constant state of change. These changes in information technology are made in order to consistently provide the patrons as well as the library staff with the latest capabilities in order to best perform their job duties. Database usage has become the mainstay of the NAWCWD Technical Library, with all staff members and patrons utilizing numerous databases daily. The more frequently used databases at the NAWCWD Technical Library are the STILAS Workflow Catalog, and the Information File, a FileMaker Pro database used to store useful point-of-contact information. This paper will explain these databases, as well as their importance to the NAWCWD Technical Library and proposed improvements to each, where applicable.
STILAS, the Technical Library's networked computer cataloging database, is essential to our day-to-day operations. It allows both patrons and staff up-to-the-minute access to the library current holdings. It shows what is available for check out, what is already checked out, and in some instances- what is missing from the library's collection. The records that appear in the online catalog are created by a process called copy cataloging. Copy cataloging is the process of "copying bibliographic records from a source database such as OCLC WorldCat, [and] has increased librarians' efficiency by eliminating duplication of effort. One library creates a bibliographic record for an item such as a book and many other libraries can copy or migrate the data into their local online catalogs, thus saving each individual library the work of cataloging the item and entering the data into the system." (Beall & Kafadar, 2004). There is one potential flaw to copy cataloging, however. If the original record is created with typographical errors, those errors are then imported, or migrated, into every successive database there afterwards. A typographical error can greatly hinder one's ability to locate desired materials, so this is not situation that is best avoided. However, this flaw can be eliminated or greatly reduced if care is taken to carefully select the source of the record. For instance, if the cataloger at the Technical Library has the option of copy cataloging an original record from a Library of Congress (LCC) cataloger, or from an elementary school library technician, she should choose the LCC record.
The Civil Reserve Air Fleet is a partnership between the Department of Defense and commercial airlines where the airlines contractually commit a portion of their aircraft and crews to be used by the Department in the event of any level of military conflict. These aircraft can be “called up” and required to respond quickly to provide airlift support to the Department of Defense. There are minimum required levels of participation in order for the airlines to be eligible, and in turn they receive peace time business including passenger and cargo movement approximately in proportion to their commitment level. The program is divided into three segments which include varying amounts and sizes of aircraft that serve specific purposes. There are also three levels of activation depending on the severity of the conflict, which also require different amounts and sizes of aircraft. This program has been in place for nearly 53 years, and has become an essential partnership required for an effective United States military. The following pages are an investigation various aspects of the Civil Reserve Air Fleet such as its purpose, history, and effectiveness.
While the Dewey decimal system contains a comprehensive index, the Library of Congress Classification system does not (Taylor 430). Each volume of the LCC schedules contains its own index and these indexes do not refer to one another. Finding subjects in the schedules can be awkward. To locate a topic, one must check through each volume index of all the different disciplines that may ...
The Army Quartermaster Corps has been around since 16 June 1775. The Quartermaster Corps is made up of all elements that support warfighters while in garrison and in war times. Food service is a very important element in the Quartermaster Corps. The Army food service assists by building moral to help win wars and achieve satisfactory training.
Middle of August 1990 is when B/2-7 AIR DEFENSE ARTILLERY (ADA), commanded by CPT Joe D'Antona became operational at Dhahran airbase. That is seven months before “D day” of the Gulf War, also known as Desert Storm took place. Working with only a few missiles in its database, they had added 500 more Tactical ballistic missiles (TBM) to the Patriot database before the ground campaign began in February. 11th Air Defense Artillery Brigade was the higher level air defense unit during Desert Storm, they deployed 12 patriot batteries from 1-7 ADA, 2-7 ADA, 2-43 ADA, 3-43 ADA, and 8-43 ADA 4-5 ADA deployed the first Army's Avenger Battery in DESERT STORM it was one of the Army's first units to lose a soldier due to hostile fire. Before the War
...6. Fisher Center for Information Technology & Management, University of California in Berkeley. June 1995
Sperazi, L. An Evaluation of the IBM PALS Program for the Massachusetts Board of Library Commissioners. Newton Highlands, MA: Evaluation Research, 1990. (ED 328 267)
The intent of the trip was to make 120th INF Brigade (Bde) aware of G27 web enable tool suite (ESA, EDT, ION, VoA and ISIT) and show practical applications to assist with their support to ARNG pre/post mobilized units. In addition to the 120th INF Bde, also provide exposure and awareness of G27's tool suite, including a detail tutorial and train the trainer of ISR Staff Integration Trainer (ISIT) to the Air Force's 9th Air Support Operations Squadron (ASOS), who provides resident ISR support to III Corps and 1st Cavalry Division staffs, and finally meet with Fort Hood MTC director or rep to further the MTC User Conference discussion to secure a date for formalized tool training.
I started my research by logging into the Ebsco database. Young, teacher, and stress were the keywords I first used. These keywords were included in 16 results. I found one article within these 16 results, so I expanded my search by excluding the word young. After I expanded my search there were 2,806 results. I read through some of them and decided if I felt they should be included in my paper. I found one article that had statics that I thought could greatly benefit my paper. After I finished locating sources on Ebsco, I started my search on the ProQuest database. I began by searching for stress in young teachers. This search brought up 73,016 results. I found that when I searched with these keywords the results were more based on how teachers
The Army Knowledge Management Principles is a trio of dimensions that collaborate to form a very powerful single process, which enables the Army Enterprise to learn, store and share knowledge. “The objective of the Army Knowledge Management Principle is to connect those who know with those who need to know, (know-why, know-what, and know-how) by leveraging knowledge transfers from one-to-many across the Global Army Enterprise” (“The Army Knowledge Management Principles” N.D. pg. 1). The three dimensions are People/Culture, Technology and Process. Each dimension plays a role while Knowledge Managements fits in the middle overlapped by each dimension. There are twelve key principles as explained in the Army Knowledge Management Principles document “Twelve key principles are featured.
The internet is arguably the most used feature of today’s society. There is almost nothing that you cannot find on the internet. However, the information found is not always accurate information. I did a search of “privacy and security on the internet” on a Google (a free search engine). I then did the same search using the EBSCOhost’s Academic Search Premier database which is a subscription type search engine. I am going to evaluate the accuracy, authority, objectivity, and currency of the sources that came from these two search engines. Evaluating the websites that you retrieve information from is very important to understand the validity of the source.
Turning to the issues related to information handling, the definition of the information management should be mentioned. According to Hinton’s perspective (2006, p.57) the information management is “the conscious process of gathering information”. A brief overview of the presumable information sources in a high-technology company can help to outline the situation. T...
Kasdorf, B. (2014). Welcome to the metadata millenium. Book Business, 17(1), 18-23. Retrieved from http://search.proquest.com/docview/1500945974?accountid=10043
There are many types of technological developments in the military happening at all times. They range from new aircraft to sophisticated guidance systems. Teams of specialists work for years to develop some of our simplest equipment. These people’s everyday lives are devoted to the safety and protection of the citizens of the U.S.
of multiple types of end users. The data is stored in one location so that they