FEDLINK
Technical
Notes

February, 1998— Volume 16 Number 2




TABLE OF CONTENTS

Cost/Benefit Study Confirms Advantages of FEDLINK Program

TECH NEWS: Understanding Firewalls

Task Group Examines Consortial Purchasing of Electronic Journals

New Domain Name Plan Available for Comment

OCLC News

FEDLINK Book Buying Tips

Editorial Staff


Cost/Benefit Study Confirms Advantages of FEDLINK Program

In FY97, FEDLINK saved its members more than $9 million in cost avoidance and millions more in vendor discounts. According to the Abacus Technology Corporation's Cost/Benefit Study of FEDLINK Services, "FEDLINK acts as a vital link between federal agencies and information services vendors."

Abacus researchers worked with FLICC/FEDLINK staff and members in FY97 to develop a study which would "identify and quantify, wherever possible, the tangible cost savings/cost avoidance and the intangible benefits which accrue to users of FEDLINK services and FEDLINK vendors." The final Abacus report concluded that the program provides libraries, information centers, and vendors with cost avoidance, a centralized procurement process, an expanded supplier base for increased competition, an improved payment process, and knowledgable and experienced staff members.

Pulling together the facts

As a preliminary step, Abacus reviewed current literature on information retrieval and publications acquisition services in the federal context. They discovered that information services vendors are experiencing increased competitive pressures in the rapidly changing information dissemination market. As a result, federal libraries and information centers are in a position to leverage their buying power to influence the pricing of electronic information. Consortia such as FEDLINK allow small buyers to join together to demand volume discounts.

Next, Abacus researchers developed a profile of the "typical agency" cost structure for procuring information retrieval and publications acquisition services. They drew information on the steps and estimated time needed for a typical agency to put a procurement in place from a 1994 report from NASA's Administrative Issues Group on reengineering the small purchase process; a report from the Federal Electronic Commerce Acquisition Team on streamlining procurement through electronic commerce; responses from FEDLINK's Contracts and Logistics, Fiscal Operations, and Network Operations staff members; and reviews of the cost estimates by two FEDLINK member agencies. Additional interviews with FEDLINK members and vendors completed the Abacus study.

Abacus calculated the cost of agency equivalents to the FEDLINK process, including open market purchases using simplified procedures for acquisitions under $100,000 and published competitions for acquisitions above $100,000. The open competition process requires solicitation, evaluations, best and final offer, negotiation, and special approvals. Procurements of $25,000 or more require announcement in the Commerce Business Daily (CBD). Researchers estimated that a typical agency's cost for one procurement would be approximately $2,000 for procurements less than $25,000, nearly $12,000 for procurements between $25,000-$100,000, and $23,000 or more for procurements greater than $100,000.

Benefits to FEDLINK members

In FY97, FEDLINK offered agencies two service levels: transfer pay, with a charge of 8% of agency service dollars, or direct pay, with a charge of $850 per account plus a supplemental fee of .5% for accounts above $100,000.* Under the transfer pay option, members transfer funds to FEDLINK under the authority of the Economy Act, and FEDLINK provides them with technical assistance and centralized procurement and accounting services. Direct pay customers handle their own procurement and accounting processes, but reference FEDLINK BOAs, thereby avoiding the initial requirements development and Request for Proposal (RFP) processes and sharing in group discounts.

Abacus researchers found that using FEDLINK services results in a cost savings for agencies who choose either transfer or direct pay options. The study recommends that agencies choose FEDLINK for all procurements above $25,000, and for books and database services under $25,000 as well. More research is necessary to establish cost savings for serials procurements under $25,000, due to limited information about serials agent fees on small accounts outside of FEDLINK.

Four FEDLINK member agencies responded to a survey intended to identify the benefits of choosing one payment option over the other. Both transfer pay and direct pay customers indicated that the FEDLINK program helped their agencies save local procurement time and offered them a wide variety of vendors from which to choose. Transfer pay customers indicated that the FEDLINK service also saved library staff time, allowed the agency to comply with vendors which require transfer payment, permitted them to move no-year funds balances forward to the next year, saved time in invoice reconciliation, and provided them with access to FEDLINK staff knowledge and expertise. Direct pay customers noted that the program saved procurement time while allowing their agency to retain local control of billing and funding.

The Abacus report noted that by using FEDLINK, the staff of a typical agency saves the time it takes to develop expertise in information technology products and the experience in dealing with vendors that FEDLINK staff members already offer. FEDLINK members also suggested that using FEDLINK services helps to improve agency staff morale by reducing staff time spent on procurement issues and increasing time spent on professional tasks such as evaluating the quality of received publications.

Benefits to FEDLINK vendors

Abacus researchers conducted surveys and phone interviews with five representative FEDLINK vendors to identify the tangible and intangible benefits of selling information products and services through FEDLINK. Vendor benefits included:

  • access to a varied client base,

  • increased market intelligence,

  • savings due to prompt payment,

  • savings in marketing time and money,

  • discount pricing for federal clients due to economies of purchasing scale, and

  • simplified, single-point federal invoicing.

Next steps

FEDLINK staff can help customers or potential customers develop a targeted cost-benefit analysis on the basis of the Abacus findings. A good starting point for an analysis of your local costs is the chart titled "Cost-Benefit Comparison of Local and FEDLINK Options" in section I of the 1998 update to the FEDLINK Member Handbook. Information about pricing and discounts offered by FEDLINK vendors will be available in the "Contracting and Vendor Services" section of the FLICC/FEDLINK Web site in February. If you need additional assistance in analyzing your library's use of FEDLINK services, contact FEDLINK Vender Services Coordinator Jim Oliver at 202-707-4960 or joli@loc.gov.

*Please note: In FY98 the direct pay rates have since been adjusted to $1200 per account plus a supplemental fee of .6 percent for accounts above $100,000.

TABLE OF CONTENTS


TECH NEWS

Understanding Firewalls

By Jessica Clark

Understanding an agency's firewall system is a key piece in the puzzle of managing electronic information resources. Firewall systems protect internal networks from outside invasion, monitor incoming data for dangerous code, and may host an agency's "public face" on a protected proxy server.

To protect sensitive information and help users access Web resources, librarians should familiarize themselves with their agency's firewall programs and policies and find out whether the library Web site is posted on a secured server. Firewall programs may also be used to monitor employee use of the Internet, to block access to sites deemed inappropriate by agency management, or to track or prevent interdepartmental information sharing. Librarians should find out what the agency allows to be downloaded from the Internet and how Web and network usage information is logged and applied.

What is a firewall?

"Firewall" is a blanket term for programs or devices which control the kinds of network traffic that can pass between an intranet or LAN and the Internet. Discussions of firewalls compare the protection of computers and networks to the defense of medieval castles. Firewall systems must secure a network against attackers and double agents with measures such as moat-like barrier programs, guard-like monitoring programs, and ambassador-like proxy programs. Like a castle which is protected more stringently in times of war, secure or "closed" firewalls work on the principle that everything not explicitly permitted to enter must be denied. In contrast, open firewall systems work on the principle that everything not explicitly denied is permitted—they may be used to protect networks which do not contain sensitive information.

The most secure network is one that is not linked to the Internet. Now that Web connections have become ubiquitous, however, this type of system has become less valuable. To create a secure online presence, system administrators must evaluate security risks, identify potential saboteurs, and isolate particularly sensitive information.

Firewall programs can only protect against network-based attacks; they do not scan dial-in connections or record unsanctioned file theft. They cannot protect very well against viruses either; there are too many ways of encoding binary files for transfer over networks and too many different architectures and viruses to configure firewall software to search for them all. Finally, basic firewall programs do not automatically encrypt data e-mailed from within a network.

What kind of attacks do firewalls repel?

Firewall programs are designed to protect networks and servers from "denial of service" attacks which disable systems and allow invaders access or prevent access by other users. Such attacks include:

  • Sending "mail bombs" which flood a server with huge volumes of e-mail;

  • Claiming disk space on anonymous FTP servers;

  • Overflowing the buffer that is assigned to hold temporary data during online transactions;

  • Overwhelming servers with connection requests to freeze the system; and

  • "Packet spoofing," or altering incoming packets to look as if they come from IP networks inside your local network, giving the attacker access to services that are available only to local users.

Other Web-based practical jokes include replacing site graphics with lewd images, removing a system's password file and plumbing its databases, or capturing and posting financial reports on the Internet. Interactive Web site elements such as chat areas, electronic commerce programs, and automatic e-mail response forms create security holes because the scripts of forms include server names, which can be used to locate the addresses of vulnerable network machines. Systems administrators and library Webmasters need to be aware of these gaps in their system defenses and take steps to protect information that may be sensitive or classified.

Types of firewall programs

Routers
The router, or packet filter, is the first line of defense in network transmissions. Routers may be stand-alone devices or may be created by installing two network interface cards. System administrators can program routers to monitor the type, source, day, or time of incoming data packets and reject those transmissions which are not explicitly permitted. This screening procedure works, but can be complex and error-prone because it is so specific. Packet filters may also let an attack slip through because they allow a direct connection from the Internet to internal computers. Firewalls made up solely of packet filtering routers tend to be limited to open environments that need to block only specific IP addresses from access. Routers are often used in conjunction with other firewall programs, however, as one layer of defense in the security system.

Proxy servers
Proxy servers provide outside users with an alias for the protected system. Using proxies reduces the threat from hackers who monitor network traffic to glean information about the location of computers on internal networks. A proxy server can act as your "corporate ambassador" to the Internet, storing public information about products and services. The computer which hosts the proxy server is often called a "bastion host"; it is configured to resist attacks and should contain no sensitive information.

Circuit-level proxy servers only mask network addresses. Application-level proxy servers can also act as gateway programs, scanning the structure and content of incoming and outgoing data. These servers may be programmed to require passwords or authentication tokens for access. A typical application-level gateway can provide proxy services for common protocols such as telnet, FTP, HTTP, and SMTP. A separate proxy must be installed for each application-level service.

Managing proxies in Netscape
Firewalls can limit Netscape's ability to exchange information with external sources. If you are running Netscape on an internal network from behind a firewall, ask your system administrator the names and associated port numbers for the server running proxy software for each network service. Under "Network Preferences," select "No Proxies", "Manual Proxy Configuration", or "Automatic Proxy Configuration" to designate the conduit between your computer and the Internet. Users with a direct connection to the Internet should use the default, "No Proxies".

Stateful inspection programs
A third type of firewall device performs "state-watching" or "stateful inspection" functions. Stateful inspection techniques examine the patterns of incoming packets to see if there is deviation from an established norm. For example, if you access an outside service, the program stores facts about your original request such as its port number and source—this is called "saving the state." The response is then compared to the saved state to see if it matches up. This method requires less processing time than scanning each packet. Like packet filtering, however, stateful inspection allows a direct connection to internal servers. It is safer, therefore, to use such devices in conjunction with a proxy server.

A common arrangement for a firewall might include a router as the first line of defense to check the sender and type of incoming information or requests. The next level of defense would be an application-level gateway which requires users to enter a password. The user would then encounter a proxy server which provides him/her with logical equivalents of the network's IP addresses. Internal server machines may additionally be protected by state-watching or router devices.

Creating firewall systems and policies

A variety of freeware and commercial firewall building and security checking tools are available. Some commercial firewall products also include tools which provide additional security measures, such as checking passwords to see how easily they can be guessed; sending alarming messages to crackers who try to break into a system; scanning incoming data for viruses; and encrypting outgoing data. The National Computer Security Association (TruSecure) certifies firewall systems (http://www.trusecure.com/index.shtml).

Librarians or information center staff who are responsible for creating a firewall system or policy should ask the following questions:

  • What is the most sensitive information on the network? Should it be connected to the server which connects to the Internet?

  • Who will be able to access which files and services and why?

  • Should the agency or library block access at particular times or on particular days?

  • What kinds of incoming transmissions need to be blocked?

  • What methods of authorization will be used?

  • What configuration will be required on the internal side of the router?

  • Will certain public services be available outside of the firewall?

It is important to consider firewall policies carefully. A lax screening policy will weaken the protection provided by firewalls, but if internal users find the policies too restrictive, they may bypass the network and use a personal modem. Policy statements should address internal and external access, remote user access, virus protection and avoidance, encryption requirements, program usage, authorized media, appropriate use of the server which hosts the firewall, password protection, and backup and disaster plans.

Responding to online attacks

The CERT Coordination Center (http://www.cert.org) can help system administrators whose servers have been invaded. The center, administered by the federally funded Software Engineering Institute at Carnegie Mellon University, studies Internet security vulnerabilities, provides incident response services to sites that have been the victims of attack, publishes a variety of security alerts, researches security and survivability in wide-area-networked computing, and develops information to help site administrators improve security.

TABLE OF CONTENTS


Task Group Examines Consortial Purchasing of Electronic Journals

The FLICC Information Technology Working group has established a Consortium Purchasing Task Group to consider an additional business model for FEDLINK. In this new model, voluntarily established consortia of federal libraries would use FEDLINK's transfer pay mechanism to pool resources for group procurement and license negotiation.

Under its traditional business model, FEDLINK guarantees the vendors no minimum level of sales or number of customer libraries. With consortial purchasing, FEDLINK would negotiate a contract with a vendor for an amount specified by consortia members. This model should be especially effective in negotiations with service providers which have not previously worked with FEDLINK.

To test the model, the group will select a specific vendor and establish a prototype consortia of libraries interested in negotiating for electronic access to journals handled by that vendor. The pilot project will focus on acquiring electronic access to full-text scientific and technical information journals. This project will also help task group members and FEDLINK staff to refine bargaining efforts with vendors in the volatile arena of electronic publications.

On January 27, the task group held a preliminary meeting. Representatives from the National Aeronautics and Space Administration, the Department of Energy, the Office of Scientific and Technical Information, the US Geological Survey, the National Agricultural Library, the National Defense University, the Army Research Lab at Aberdeen, the Naval Research Laboratories, the Navy Libraries, the US Patent and Trademark Office, the Library of Congress, and FEDLINK attended. Stephanie Publicker of the National Institutes of Health led the group through a series of questions about consortial licensing and the proposed pilot project.

Group members discussed a number of their concerns about procuring electronic journals:

  • Mapping journal access to appropriate offices and employees rather than restricting access geographically or by IP address;

  • Negotiating archiving and downloading policies;

  • Redistributing articles within the approved user group;

  • Obtaining usage statistics for individual titles;

  • Paying for both print and electronic versions of journals when budgets are limited;

  • Determining which offices within their agencies purchase individual subscriptions;

  • Minimizing the effort of writing contracts.

In order to choose a publisher for the pilot project, the group agreed that FEDLINK would ask subscription agents to identify sci-tech journals publishers most commonly used by FEDLINK customers. Attendees also agreed to forward lists of likely journal publishers to FEDLINK staff. Once this information is collected, members of the group will discuss their next steps via e-mail. Librarians interested in joining the task group should contact Publicker at publicks@nih.gov or FEDLINK Network Program Specialist Meg Williams at mwil@loc.gov.

To encourage further dialogue between federal librarians and vendors, FLICC/FEDLINK is also organizing a March 31 event featuring speakers who will discuss current directions in scholarly publishing. Watch your mail and the FLICC/FEDLINK Web site (http://www.loc.gov/flicc) for more details.

TABLE OF CONTENTS


New Domain Name Plan Available for Comment

On January 30, White House policy advisor Ira Magaziner announced a long-awaited proposal to move the authority for the Internet's Domain Name System (DNS) to the private sector.

Currently, the federally funded Internet Assigned Numbers Authority (IANA) controls the assignment of IP addresses and a government contractor, Network Solutions Inc. (NSI), controls the registration of generic top-level domain (TLD) names such as .com and .net. The proposal suggests that these functions be transferred to a new, US-based, not-for-profit corporation with an international board of directors. This transition would begin as soon as possible, and the new corporation would assume control of DNS registration by September 30, 1998. Participation in the organization would be open to any business or group with an interest in Internet governance.

The proposal also recommends adding five new registries that would each maintain a single new TLD. These new registries would differ from the seven new TLDs proposed by a group of 88 global participants under the auspices of the Geneva-based Council of Registrars (CORE). CORE had hoped to see their TLDs put into operation immediately; they will now be forced to respond to the US government proposal. CORE protests that the government proposal favors US interests and thwarts self-governance of the Internet.

The White House seeks comments on the draft policy (http://www.ntia.doc.gov/ntiahome/domainname/dnsdrft.htm) through the first week of March.

TABLE OF CONTENTS


OCLC News

Telecommunications and Access

Dedicated TCP/IP Lines Now Available
OCLC is now taking orders for TCP/IP dedicated lines. This new method for connecting to OCLC's online systems is appropriate for libraries with three or more ports dedicated to OCLC. The TCP/IP lines require a link and correct configuration to the library or agency's local area network. The cost for these lines is the same as old style, synchronous dedicated lines (also known as "multidrop" line), with fees of $110 per month for the line plus $132 per month per port, with a minimum of three ports.

Libraries that spend less than $506 per month via Internet access ($3.60/hour) or TCP/IP dial access ($6.90/hour) will not find any cost savings and should not move to dedicated TCP/IP lines. Another way to compare TCP/IP and multidrop lines is to compare 140.5 hours of Internet access available per month for the cost of a dedicated TCP/IP line, or 73 hours of TCP/IP dial access. For more information, visit OCLC's home page: from http://www.oclc.org choose Services, then Access Services. See especially the Site Preparation Guide for technical specifications regarding dedicated TCP/IP lines.

OCLC will not charge for fewer than 3 ports for dedicated TCP/IP at this time. Some libraries which currently use one or two workstations on the synchronous dedicated line will remain at that number for another two or three years, while OCLC works with larger libraries and their move to dedicated TCP/IP. Contact FEDLINK's OCLC team for assistance in analyzing your OCLC telecommunication needs. If your library fits the dedicated TCP/IP requirements, FEDLINK will assist you in completing the Dedicated TCP/IP Analysis Form.

Passport for Windows Reminder
All libraries should now access OCLC using the Passport for Windows software, as OCLC no longer supports the DOS version of Passport. The Windows version is compatible with Windows 3.1, Windows 95 and Windows NT; however, Windows NT will not work with synchronous ("multidrop") dedicated lines.

Copies of Passport for Windows are $40 per workstation. To order, contact FEDLINK to fax you the order form, or visit OCLC's home page (http://www.oclc.org) to complete an online order form. In both instances, the charge will be billed to your FEDLINK OCLC account. For the web order form, choose Support from the OCLC home page, then select Forms to find the Passport for Windows order form.

Access Suite Software
OCLC is now offering a new, bundled set of software for accessing a variety of its services. OCLC's Access Suite contains Passport for Windows, ILL MicroEnhancer for Windows, Cataloging Micro Enhancer for Windows, CJK, and the OCLC Cataloging Label Program. The Cataloging Label Program is available free as a download from OCLC's home page (http://www.purl.oclc.org/oclc/label).

Priced as an annual license, the OCLC Access Suite will offer OCLC members the latest versions of OCLC software products as they become available, eliminating the need to budget for each product as it is released. The price will be $99 per workstation initially (Product Code SOF9321); an annual renewal of $99 per workstation is projected, billed on the anniversary of the initial purchase.

A look at OCLC statistics on federal library use patterns suggests that purchasing individual workstation licenses will be more cost effective for nearly all our member libraries. The site license is priced as the equivalent of 10 or more workstation licenses; very few federal libraries might use the MicroEnhancer on so many workstations. Passport for Windows continues to be available separately from the bundled Access Suite. ILL ME and CatMe continue to be available separately through June 30, 1998.

Cataloging MicroEnhancer Software Has Shipped
Like Passport for Windows and the Access Suite, Cataloging MicroEnhancer (CatME) Software can be ordered either via a form from FEDLINK or from the Forms section of the OCLC home page. CatME for Windows allows users to combine batch online searching and processing with offline editing. It provides improved functionality and added features over the previous DOS-based CAT ME Plus, including more batch processing options, more databases (e.g., OCLC PromptCat files), local area network capability, and an interactive connection to OCLC Cataloging to retrieve full records. CatME for Windows is a 32-bit program that runs on Windows 95 or Windows NT (version 3.51 or higher), but because it is 32-bit program, it cannot log on over the old style synchronous (or "multidrop") dedicated lines.

A guided tour of CatME is available on the OCLC home page at: http://www.oclc.org/catme/tour/catour01.htm

Collections and Technical Services

Tool for Dewey Libraries
OCLC is currently creating Passport for Windows macros for automatic "cuttering" of Dewey numbers. OCLC will also release revised and expanded Cutter tables for both the Cutter-Sanborn and the Three-Figure Cutter tables. The macro and the tables (called the OCLC Four-Figure Cutter tables) will be distributed at no charge later this year, although an exact date has not been scheduled. OCLC plans to add these tables to its other cataloging products (OCLC CatCD for Windows, OCLC CatME for Windows, and OCLC CJK software) when they are revised.

The current Cutter tables are NOT in the public domain and are still under copyright. To develop the Four-Figure Cutter tables, OCLC started with the original 1896 and 1901 tables, analyzed their distribution against WorldCat, and corrected and expanded them. The latest release of Dewey for Windows software has a cuttering function that uses the Four-Figure tables. Users can choose which cuttering scheme they prefer.

When completed, the Passport for Windows macro takes the main entry (either 1XX or 245 as appropriate), compares it against the appropriate Cutter table, and enters the results in the 092 ‡b. If you want to base the cutter on a field other than the main entry, just highlight that field and reinvoke the macro.

OCLC is also developing unique cutters for all book records in WorldCat that currently have a 082 or 092 class number. Again, you will have a choice of Cutter-Sanborn, Cutter-Three Figure, and text cutters. They will be present in a new field, the 093 field, which you can edit.

A complete description of the cutter tables is available from the OCLC Office of Research Annual Review, 1996, available at: http://www.oclc.org/oclc/research/publications/review96/cutter.htm

Resource Sharing and FirstSearch

ILL/FirstSearch Link

On January 25, 1998, OCLC loaded changes to the FirstSearch software to improve the link to Interlibrary Loan services. FirstSearch users completing an ILL request online can now make use of the patron fields from the ISO standard for ILL (ISO 10161).

Tips about how best to process records sent to the library's review file from FirstSearch are available from FEDLINK's OCLC team; the tips are also being posted to OCLC's home page, under Bits and Pieces Articles at http://www.oclc.org/oclc/ill/doc.htm

TABLE OF CONTENTS


FEDLINK Book Buying Tips

Purchasing books through FEDLINK Transfer Pay offers members an uncomplicated way to minimize the number of personnel needed to conduct day-to-day acquisitions and contract negotiations, while maximizing the use of limited funds.

Here are a few tips to make the acquisitions process easier and more economical:

  • Use any purchasing method that fulfills both the requirements of the local procurement authority and of FEDLINK. Ordering options can include phone, fax, online, and mail.

  • Examine all materials received and compare the items received to both the shipping list and the list of items requested.

  • Have an active Blanket Purchase Agreement (BPA) with several book vendors and use a variety of vendors when acquiring library materials.

  • Maintain separate accounts for general and specialized book orders, even if the orders are placed with the same book vendor.

  • Make price a basic consideration. If price is not the main consideration when selecting a vendor, prepare a list of reasons for the choice of specific vendors.

  • Request prices from more than one vendor to receive the best possible price. When there is a question of either price or status (high discounted trade book or low discounted association publication, etc.), prices SHOULD ALWAYS be requested from more than one vendor.

  • Compare the prices listed on the invoice with the discounts promised. (See the FEDLINK Books Package for more information or call the FEDLINK Hotline at (202)707-4900.)

  • Maintain a BPA log and forward the log to LC/C&L on a quarterly basis.

  • Monitor the amount of money in the FEDLINK account and review the type of funds available.

  • Maintain a running balance of all accounts.

  • Report any incorrect charges or invoices posted to the FEDLINK account and listed on the monthly account statements. Use FEDLINK's Invoice Error Report Form or call the FEDLINK Hotline for assistance.

  • Remember that only FEDLINK members who have been authorized in writing on the LC/FEDLINK BOA can place an order with the vendor. To add or change authorized ordering officials, send a memo identifying the desired changes to FFO. (See Information Alert 97-8 for details or call the FEDLINK Hotline for assistance.)

If you need vendor information, call the vendors' representatives at the numbers listed in the Contracting & Vendor Services Section of the FLICC Web site (http://www.loc.gov/flicc).

For complete information about FEDLINK vendor offerings check the FEDLINK Web site (http://www.loc.gov/flicc) or call FEDLINK's Vendor Services Coordinator Jim Oliver at (202) 707-4900 or FEDLINK Network Program Specialist Dave Pachter at (202) 707-4848. For information on IAGs and IAG Amendments, call the FEDLINK Fiscal Hotline (202) 707-4900.

TABLE OF CONTENTS


Editorial Staff

FEDLINK Technical Notes is published by the Federal Library and Information Center Committee. Send suggestions of areas for FLICC attention or for inclusion in FEDLINK Technical Notes to:

FEDLINK Technical Notes
Federal Library and Information Center Committee
Library of Congress, 101 Independence Avenue SE, Washington, DC 20540-4935

FLICC/FEDLINK:
Phone (202) 707-4800    Fax (202) 707-4818
Email: fliccfpe@loc.gov    Web Site: http://www.loc.gov/flicc

FEDLINK Fiscal Operations:
Phone (202) 707-4900    Fax (202) 707-4999

Executive Director: Susan Tarr    Editor-In-Chief: Robin Hatziyannis
Writer/Editor: Jessica Clark    Editorial Assistant: Mitchell Harrison

FLICC was established in 1965 (as the Federal Library Committee) by the Library of Congress and the Bureau of the Budget for the purpose of concentrating the intellectual resources of the federal library and related information community. FLICC's goals are: To achieve better utilization of library and information center resources and facilities; to provide more effective planning development, and operation of federal libraries and information centers; to promote an optimum exchange of experience, skill, and resources; to promote more effective service to the nation at large; and to foster relevant educational opportunities.

TABLE OF CONTENTS


Return to FLICC Home Page

Go to: Library of Congress Home Page


Library of Congress
Comments: Library of Congress Help Desk (02/25/98)