LEADER 03020nam 2200661 a 450 001 9910463054603321 005 20200520144314.0 010 $a0-8389-9420-2 035 $a(CKB)2670000000390337 035 $a(EBL)1250070 035 $a(OCoLC)852758263 035 $a(SSID)ssj0001052998 035 $a(PQKBManifestationID)12425135 035 $a(PQKBTitleCode)TC0001052998 035 $a(PQKBWorkID)11084075 035 $a(PQKB)10033377 035 $a(MiAaPQ)EBC1250070 035 $a(Au-PeEL)EBL1250070 035 $a(CaPaEBR)ebr10751721 035 $a(EXLCZ)992670000000390337 100 $a20130911d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBridging the digital divide with mobile services$b[electronic resource]$fAndromeda Yelton 210 $aChicago, Ill. $cALA TechSource$dc2012 215 $a1 online resource (37 p.) 225 1 $aLibrary Technology Reports,$x0024-2586 ;$vVolume 48, Number 1 300 $aDescription based upon print version of record. 311 $a0-8389-5856-7 320 $aIncludes bibliographical references. 327 $aBridging the Digital Divide with Mobile Services; Cover; Contents; Who Are Smartphone Users?; Notes; Mobile Websites; Mobile-Friendly Portals; Mobile Library Websites; Picking a Tool; Resources; Notes; Expanding Access to Devices, Collections, and Services; Audiobooks; Texting: Reference and Notification Services; Expanding Access to Mobile Devices; The Unquiet Librarian; Notes; Where to Go Next; Showcasing Community Stories; Building Your Own Technological Capacity; Building Your Organization's Technological Capacity; Parting Thoughts: Why Mobile?; Resources; Notes 330 $aIn this issue of Library Technology Reports, Andromeda Yelton shows how libraries can build on the breadth of this population to help bridge the digital divide and provide even greater access to information. Yelton breaks down the demographics of mobile internet users, provides examples of how different libraries are reaching out to these populations, and suggests what the future may hold for this trend. 410 0$aLibrary technology reports ;$vv. 48, no. 1. 606 $aMobile communication systems$xLibrary applications 606 $aDigital divide 606 $aMobile computing 606 $aSmartphones 606 $aPocket computers 606 $aWireless communication systems 608 $aElectronic books. 615 0$aMobile communication systems$xLibrary applications. 615 0$aDigital divide. 615 0$aMobile computing. 615 0$aSmartphones. 615 0$aPocket computers. 615 0$aWireless communication systems. 676 $a022.9 700 $aYelton$b Andromeda$0936289 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910463054603321 996 $aBridging the digital divide with mobile services$92109160 997 $aUNINA LEADER 03446nam 22006855 450 001 9910427699203321 005 20251107151709.0 010 $a981-15-9213-6 024 7 $a10.1007/978-981-15-9213-3 035 $a(CKB)4100000011568978 035 $a(DE-He213)978-981-15-9213-3 035 $a(MiAaPQ)EBC6389908 035 $a(PPN)25250402X 035 $a(EXLCZ)994100000011568978 100 $a20201111d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBlockchain and Trustworthy Systems $eSecond International Conference, BlockSys 2020, Dali, China, August 6?7, 2020, Revised Selected Papers /$fedited by Zibin Zheng, Hong-Ning Dai, Xiaodong Fu, Benhui Chen 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (XV, 693 p. 301 illus., 198 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1267 311 08$a981-15-9212-8 327 $aTheories and Algorithms for Blockchain -- Performance Optimization of Blockchain -- Blockchain Security and Privacy -- Blockchain and Cloud Computing -- Blockchain and Internet of Things -- Blockchain and Mobile Edge Computing -- Blockchain and Smart Contracts -- Blockchain and Data Mining -- Blockchain Services and Applications -- Trustworthy System Development. 330 $aThis book constitutes the thoroughly refereed post conference papers of the Second International Conference on Blockchain and Trustworthy Systems, Blocksys 2020, held in Dali, China*, in August 2020. The 42 full papers and the 11 short papers were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections: theories and algorithms for blockchain, performance optimization of blockchain, blockchain security and privacy, blockchain and cloud computing, blockchain and internet of things, blockchain and mobile edge computing, blockchain and smart contracts, blockchain and data mining, blockchain services and applications, trustworthy system development. *The conference was held virtually due to the COVID-19 pandemic. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1267 606 $aData protection$xLaw and legislation 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aPrivacy 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aSoftware Engineering 606 $aArtificial Intelligence 615 0$aData protection$xLaw and legislation. 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 14$aPrivacy. 615 24$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aSoftware Engineering. 615 24$aArtificial Intelligence. 676 $a005.8 702 $aZheng$b Zibin 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910427699203321 996 $aBlockchain and Trustworthy Systems$92586070 997 $aUNINA