Skip to main content

Home/ IMT122 OUA Group/ Group items tagged digital

Rss Feed Group items tagged

Joanne S

Mobile Strategy | National Library of Australia - 0 views

  • must move towards a model with comprehensive mobile access to online services
  • mobile’ has come to encompass an ever-expanding field of devices, platforms and content
  • Smart (internet enabled) or dumb/cellular
  • ...98 more annotations...
  • Supplied (on-site device distribution) or privately owned
  • Native apps
  • Mobile websites
  • In terms of content this includes:
  • Applications (software designed for specific tasks
  • Podcasts (audio and video content
  • Other downloadable content (e.g. PDFs and ebook
  • the Library may look to harness the potential of these technologies to break away from the traditional broadcast-only website presence and move towards two-way conversations between the Library and its users, or conversations between the users themselves
  • the key objectives stated in the Information Technology Strategic Plan 2012-2015 include Online Presence and supporting “the needs of our users for easy discovery of, access to, and engagement with our services, collections and other information resources in the digital environment”
  • ensure equal access to our resources and services for all Australians.
  • facilitate equal access to Library resources for everyone.
  • Putting Library resources into the hands of users in their lounge rooms reflects a deeper understanding of the need to move beyond the desire to follow our users and instead reach out to them to “take them some place new
  • mobile will only continue to grow and overtake desktop internet usage within 2-3 years
  • building both infrastructure and a culture of engagement will pave the way to more efficiently and effectively meeting that need in the future
  • 4         Strategic goals
  • Improve access to our collection and services for audiences, wherever they are, whether on-site or anywhere else in the world.
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Adopt an evidence-based approach to service development and delivery
  • Modernise the Library brand to reflect relevance, accessibility and innovation.
  • Create opportunities for learning
  • Facilitate connections, conversation and overall engagement with national collection material.
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Build, consolidate and share expertise
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • A focus on strategic, audience-driven activity with a utility function.
  • Seek out and engage new technologies to achieve marketing and communications goals.
  • 6         Recommended activities
  • activities provide a means to implement and ground the strategy with specific and measurable tasks
  • 6.1      Governance and infrastructure
  • The Library’s IT Strategy Group will determine priorities
  • formalising the Web Committee’s role as an advisory body
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • Information Technology Division to examine ongoing resourcing of development work, administrative models, and potential for partial cost-recovery
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • Develop and review policy in support of the use of both enterprise devices and use of personal devices for work-related purposes. Identify
  • Investigate infrastructure and resourcing requirements for digital recording and distribution
  • Collections Management Division to keep a watching brief on any developments pertaining to the extension of Legal Deposit to include digital (and mobile) content
  • developing a statement of collecting intentions for the various categories of ebook titles within the context of revising the collecting policy for Australian electronic publications in general
  • Applications
  • Podcasts (audio and video content
  • Other downloadable content (e.g. PDFs and ebooks
  • 3         Our mobile vision
  • Improve access to our collection and services for audiences, wherever they are, whether on-site or anywhere else in the world.
  • 4         Strategic goals
  • 3         Our mobile vision
  • 4         Strategic goals
  • 3         Our mobile vision
  • Improve access to our collection and services for audiences, wherever they are, whether on-site or anywhere else in the world.
  • 4         Strategic goals
  • Adopt an evidence-based approach to service development and delivery
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Modernise the Library brand to reflect relevance, accessibility and innovation.
  • Adopt an evidence-based approach to service development and delivery
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Create opportunities for learning
  • Facilitate connections, conversation and overall engagement with national collection material.
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Tactics
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Adopt an evidence-based approach to service development and delivery
  • Modernise the Library brand to reflect relevance, accessibility and innovation.
  • Create opportunities for learning
  • Facilitate connections, conversation and overall engagement with national collection material.
  • Tactics
  • Tactics
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Build, consolidate and share expertise
  • Tactics
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Build, consolidate and share expertise
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • Build, consolidate and share expertise
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • A focus on strategic, audience-driven activity with a utility function.
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • A focus on strategic, audience-driven activity with a utility function.
  • Seek out and engage new technologies to achieve marketing and communications goals.
  • Seek out and engage new technologies to achieve marketing and communications goals.
  • Recommended
  • 6.1      Governance and infrastructure
  • Library’s IT Strategy Group will determine priorities
  • formalising the Web Committee
  • Information Technology Division to examine ongoing resourcing
  • formalising the Web Committee
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • formalising the Web Committee
  • Develop and review policy in support of the use of both enterprise devices and use of personal devices for work-related purposes
  • Investigate infrastructure and resourcing requirements for digital recording and distribution to ensure the long-term sustainability of online broadcast activity
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • formalising the Web Committee
  • Information Technology Division to examine ongoing resourcing
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • Collections Management Division to keep a watching brief on any developments pertaining to the extension of Legal Deposit to include digital (and mobile) conten
  • developing a statement of collecting intentions for the various categories of ebook titles within the context of revising the collecting policy for Australian electronic publications
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • Develop and review policy in support of the use of both enterprise devices and use of personal devices for work-related purposes
Joanne S

Amazon | Kindle Price Drop Prediction - 0 views

  •  
    Manjoo, F. (2012, September 3). Kindles for free: a report from the future. The Sydney Morning Herald. Retrieved from http://www.smh.com.au/digital-life/digital-life-news/kindles-for-free-a-report-from-the-future-20120830-252b9.html
Joanne S

Archives & Museum Informatics: Museums and the Web 2009: Paper: Gow, V. et al., Making ... - 0 views

  • New Zealand content difficult to discover, share and use
  • DigitalNZ is testing ways to create digital content, collect and share existing digital content, and build smart, freely available search and discovery tools.
  • Memory Maker blurs the line between consuming and producing content. What’s sometimes called ‘remix culture’ […]. Digital technologies have opened up new possibilities for young people to access and represent the stories of their culture by taking sound and images and recombining them to say something new, something relevant to them. (Sarah Jones, Lunch Box: Software & digital media for learning, November 2008) http://lunchbox.org.nz/2008/11/get-coming-home-on-your-schools-website-wiki-or-blog/)
  • ...7 more annotations...
  • The Memory Maker provides a taste of what is possible when collecting institutions modernise their practices for keeping and managing copyright information, using Creative Commons licenses or ‘no known copyright’ statements.
  • Learning about ‘hyperlinks’ today, these young New Zealanders will be the developers and creators of tomorrow.
  • The full set of contributions is accessible through a Coming Home search tool, occasionally on a google-like hosted search page (Figure 5), but more often through a search widget embedded on many New Zealand Web sites (Figure 6).
  • Digital New Zealand is developing and testing solutions that showcase what’s possible when we really focus on improving access to and discovery of New Zealand content.
  • Technically, the Digital New Zealand system is in three parts: a backend, a metadata store, and a front end.
  • The coolest thing to be done with your data will be thought of by someone else
  • “an API is basically a way to give developers permission to hack into your database”.
  •  
    Gow, V., Brown, L., Johnston, C., Neale, A., Paynter, G., & Rigby, F. (2009). Making New Zealand Content Easier to Find, Share and Use. In Museums and the Web 2009. Presented at the Museums and the Web 2009, Toronto: Archives & Museum Informatics, Retrieved from http://www.archimuse.com/mw2009/papers/gow/gow.html
Joanne S

Anderson, C. (2006). Ethics and digital preservation. In Ethical decision making for di... - 0 views

  •  
    Anderson, C. (2006). Ethics and digital preservation. In Ethical decision making for digital libraries (pp. 81-90). Oxford: Chandos Publishing. Retrieved from http://eres.lis.curtin.edu.au/cgi-bin/gw?url=DC60260496
Joanne S

Digital Armageddon for flood victims - 0 views

  •  
    Moses, A., & Grubb, B. (2011, January 12). Digital Armageddon for flood victims. Sydney Morning Herald. Retrieved from http://www.smh.com.au/technology/technology-news/digital-armageddon-for-flood-victims-20110112-19nfy.html
Joanne S

Hastings, S. K. and Lewis, E. C. (2005) Let's get digital. In N. Courtney, (Ed.), Techn... - 0 views

  •  
    Hastings, S. K. and Lewis, E. C. (2005) Let's get digital. In N. Courtney, (Ed.), Technology for the rest of us (Ch.11, pp 133-153). Westport, Conn.: Libraries Unlimited. Available from Curtin's eReserve:
Joanne S

Academic Search Engine Spam and Google Scholar's Resilience Against it - 0 views

  • Web-based academic search engines such as CiteSeer(X), Google Scholar, Microsoft Academic Search and SciPlore have introduced a new era of search for academic articles.
  • With classic digital libraries, researchers have no influence on getting their articles indexed. They either have published in a publication indexed by a digital library, and then their article is available in that digital library, or they have not
  • citation counts obtained from Google Scholar are sometimes used to evaluate the impact of articles and their authors.
  • ...9 more annotations...
  • ‘Academic Search Engine Optimization’ (ASEO)
  • Citation counts are commonly used to evaluate the impact and performance of researchers and their articles.
  • Nowadays, citation counts from Web-based academic search engines are also used for impact evaluations.
  • Most academic search engines offer features such as showing articles cited by an article, or showing related articles to a given article. Citation spam could bring more articles from manipulating researchers onto more of these lists.
  • It is apparent that a citation from a PowerPoint presentation or thesis proposal has less value than a citation in a peer reviewed academic article. However, Google does not distinguish on its website between these different origins of citations[8].
  • Google Scholar indexes Wikipedia articles when the article is available as PDF on a third party website.
  • That means, again, that not all citations on Google Scholar are what we call ‘full-value’ citations.
  • As long as Google Scholar applies only very rudimentary or no mechanisms to detect and prevent spam, citation counts should be used with care to evaluate articles’ and researchers’ impact.
  • However, Google Scholar is a Web-based academic search engine and as with all Web-based search engines, the linked content should not be trusted blindly.
Joanne S

What is Cloud Computing and How will it Affect Libraries? | TechSoup for Libraries - 0 views

  • If you’ve used any of the popular Web 2.0 services over the past few years (e.g. Gmail, Wikipedia, Flickr or Twitter), you already have some experience with cloud computing
  • Like water and electricity, a computing cloud is a communally-shared resource that you lease on a metered basis, paying for as little or as much as you need, when you need it
    • Joanne S
       
      Benefits-  Cost Savings, Flexibility and Innovation.
  • ...4 more annotations...
  • As individuals and members of organizations, we’re already choosing between desktop applications and cloud applications when it comes to e-mail, RSS, file storage, word processing and other simple applications. Sooner or later we’ll have to make this choice for mission-critical enterprise applications too
  • Libraries may soon be building and managing their own data centers.
  • For more practical, technical explanations of cloud computing, check out the Wikipedia article the Anatomy of Cloud Computing the MIT Technology Review Briefing on Cloud Computing.
  • For a discussion of problems and concerns about the digital cloud, read: How Secure is Cloud Computing? Security in the Ether Industry Challenges: The Standards Question
Joanne S

Recordkeeping In Brief 62 - FAQs about cloud computing - State Records NSW - 0 views

  • Cloud computing is internet-based computing whereby shared resources, software and information are provided to computers and other devices on demand.
  • Cloud computing is a general term for anything that involves delivering hosted services over the Internet.
  • There are a range of applications that can be delivered to users via cloud computing models, from email or content management to specialist applications for activities such as project management or human resources management to data storage.
    • Joanne S
       
      Models include: Software-as-a-Service (SaaS) Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS)
  • ...8 more annotations...
  • A cloud can be private or public:
  • As with any business related activity there are both risks and opportunities associated with using cloud computing services.
  • potentially a number of business and information risks associated with using cloud computing services.
  • noted that even if the cloud computing environment is managed wholly within NSW an appropriate risk assessment of the service and the provider should occur.
  • level of risk that an organisation attributes to a proposed cloud computing arrangement will vary according to the content or subject matter of their records
  • The content of the contract in these types of service arrangements is very important.
  • What are others saying? Australia Australasian Digital Recordkeeping Initiative (ADRI), Advice on managing the recordkeeping risks associated with cloud computing, July 2010, available at http://www.adri.gov.au Defence Signals Directorate (Commonwealth), Cloud computing security considerations, April 2011, available at http://www.dsd.gov.au/infosec/cloudsecurity.htm Department of Finance and Deregulation (Commonwealth), Cloud computing strategic direction paper: opportunities and applicability for use by the Australian Government, April 2011, available at http://www.finance.gov.au/e-government/strategy-and-governance/docs/final_cloud_computing_strategy_version_1.pdf
  • International Archives and Records Association UK and Ireland, Cloud computing toolkit: guidance for outsourcing information storage to the cloud, August 2010, available at http://www.archives.org.uk/images/documents/Cloud_Computing_Toolkit-2.pdf – this guidance contains a comprehensive overview of the range of cloud computing services available and the recordkeeping considerations that apply to each CIO Council and Chief Acquisition Officers Council (USA), Creating effective cloud computing contracts for the Federal Government: best practices for acquiring IT as a service, February 2012, available at http://www.cio.gov/cloudbestpractices.pdf – this is a comprehensive and useful document for those seeking to procure cloud computing services
Michelle Pitman

Don Tapscott: Four principles for the open world | Video on TED.com - 0 views

    • Michelle Pitman
       
      This is AWESOME!  Socialmedia as SocialProduction! wow!
Joanne S

Companies and information: The leaky corporation | The Economist - 0 views

  • the WikiLeaks threat and the persistent leaking of other supposedly confidential corporate information have brought an important issue to the fore.
  • Companies are creating an ever-growing pile of digital information, from product designs to employees' e-mails.
  • Much of this information would do little damage if it seeped into the outside world; some of it, indeed, might well do some good. But some could also be valuable to competitors—or simply embarrassing—and needs to be protected. Companies therefore have to decide what they should try to keep to themselves and how best to secure it.
  • ...10 more annotations...
  • more and more data are seeping out of companies, even of the sort that should be well protected.
  • To be able to work better with data, employees often transfer them into spreadsheets and other types of files that are easier to manipulate—but also easier to lose control of.
  • Although most leaks are not deliberate, many are.
  • “data loss prevention” (DLP).
  • software that sits at the edge of a firm's network and inspects the outgoing data traffic.
  • “bells in the dark”. False records—made-up pieces of e-mail, say—are spread around the network. Because they are false, no one should gain access to them. If somebody does, an alarm is triggered
  • In the corporate world, to limit the channels through which data can escape, some companies do not allow employees to bring their own gear to work or to use memory sticks or certain online services.
  • How then to strike the right balance between secrecy and transparency?
  • Intel, the world's largest chipmaker, issues “speeding tickets” to employees who break its rules.
  • Transparency is not just a natural inclination but a necessity, says Mitchell Baker, who chairs the foundation. If Mozilla kept its cards close to the chest, its global community of developers would not and could not help write the program. So it keeps secrets to a minimum: employees' personal information, data that business partners do not want made public and security issues in its software.
Joanne S

BBC News - French downloaders face government grilling - 0 views

  • Hadopi takes its name from the 2009 legislation which permits authorities to fine copyright infringers, or to cut off their internet connection.
  • In the UK, the Digital Economy Act makes some similar provisions, although the exact nature of possible sanctions has yet to be fully explained.
  • It has sent a total of 470,000 first warnings by email, with 20,000 users receiving a second warning through the mail.
  • ...1 more annotation...
  • If the person does not confess or does not even show up, the only evidence the agency can present before the judge is a series of numbers - a particular computer's IP address
  •  
    "We looked at what it would mean if the internet was a "human right" in France, given that there is legislation that people who violate copyright can have internet access cut off for up to a month."
  •  
    "We looked at what it would mean if the internet was a "human right" in France, given that there is legislation that people who violate copyright can have internet access cut off for up to a month."
1 - 16 of 16
Showing 20 items per page