Skip to main content

Home/ IMT122 OUA Group/ Group items tagged how

Rss Feed Group items tagged

Joanne S

Topic 3 Supplementary "Reading" How it All Works YouTube Videos - 0 views

  •  
    The Internet of Things. (2010).  Retrieved from http://www.youtube.com/watch?v=sfEbMV295Kk&feature=youtube_gdata_player How the Internet Works in 5 Minutes. (2009). Retrieved from http://www.youtube.com/watch?v=7_LPdttKXPc&feature=youtube_gdata_player How Bittorrent works. (2007). Retrieved from http://www.youtube.com/watch?v=66BV2pIjfBM&feature=youtube_gdata_player
Joanne S

The Code4Lib Journal - How Hard Can It Be? : Developing in Open Source - 0 views

  • We experienced freedom to explore alternate avenues, to innovate, to take risks in ways that would have been difficult under the direct control of a district council.
  • patrons made it clear that while they appreciated that computers were a necessary part of a modern library, they did not consider them the most important part.
  • Our overall objective was to source a library system which: could be installed before Y2K complications immobilised us, was economical, in terms of both initial purchase and future license and maintenance support fees, ran effectively and fast by dial-up modem on an ordinary telephone line, used up-to-the minute technologies, looked good, and was easy for both staff and public to use, took advantage of new technology to permit members to access our catalogue and their own records from home, and let us link easily to other sources of information – other databases and the Internet. If we could achieve all of these objectives, we’d be well on the way to an excellent service.
  • ...14 more annotations...
  • "How hard can it be" Katipo staff wondered, "to write a library system that uses Internet technology?" Well, not very, as it turned out.
  • Koha would thus be available to anyone who wanted to try it and had the technical expertise to implement it.
  • fairly confident that we already had a high level of IT competence right through the staff, a high level of understanding of what our current system did and did not do.
  • ensure the software writers did not miss any key points in their fundamental understanding of the way libraries work.
  • The programming we commissioned cost us about 40% of the purchase price of an average turn-key solution.
  • no requirement to purchase a maintenance contract, and no annual licence fees.
  • An open source project is never finished.
  • Open source projects only survive if a community builds up around the product to ensure its continual improvement. Koha is stronger than ever now, supported by active developers (programmers) and users (librarians)
  • There are a range of support options available for Koha, both free and paid, and this has contributed to the overall strength of the Koha project.
  • Vendors like Anant, Biblibre, ByWater, Calyx, Catalyst, inLibro, IndServe, Katipo, KohaAloha, LibLime, LibSoul, NCHC, OSSLabs, PakLAG, PTFS, Sabinet, Strategic Data, Tamil and Turo Technology take the code and sell support around the product, develop add-ons and enhancements for their clients and then contribute these back to the project under the terms of the GPL license.
  • FRBR [5] arrangement, although of course it wasn’t called that 10 years ago, it was just a logical way for us to arrange the catalogue. A single bibliographic record essentially described the intellectual content, then a bunch of group records were attached, each one representing a specific imprint or publication.
  • The release of Koha 3.0 in late 2008 brought Koha completely into the web 2.0 age and all that entails. We are reconciled to taking a small step back for now, but the FRBR logic is around and RDA should see us back where want to be in a year or so – but with all the very exciting features and opportunities that Koha 3 has now.
  • In the early days, the Koha list appeared to have been dominated by programmers but I have noticed a lot more librarians participating now
  • "Adopt technology that keeps data open and free, abandon[ing] technology that does not." The time is right for OSS.
  •  
    For more information about Koha and how it was developed, see: Ransom, J., Cormack, C., & Blake, R. (2009). How Hard Can It Be? : Developing in Open Source. Code4Lib Journal, (7). Retrieved from http://journal.code4lib.org/articles/1638
Joanne S

What is Cloud Computing and How will it Affect Libraries? | TechSoup for Libraries - 0 views

  • If you’ve used any of the popular Web 2.0 services over the past few years (e.g. Gmail, Wikipedia, Flickr or Twitter), you already have some experience with cloud computing
  • Like water and electricity, a computing cloud is a communally-shared resource that you lease on a metered basis, paying for as little or as much as you need, when you need it
    • Joanne S
       
      Benefits-  Cost Savings, Flexibility and Innovation.
  • ...4 more annotations...
  • As individuals and members of organizations, we’re already choosing between desktop applications and cloud applications when it comes to e-mail, RSS, file storage, word processing and other simple applications. Sooner or later we’ll have to make this choice for mission-critical enterprise applications too
  • Libraries may soon be building and managing their own data centers.
  • For more practical, technical explanations of cloud computing, check out the Wikipedia article the Anatomy of Cloud Computing the MIT Technology Review Briefing on Cloud Computing.
  • For a discussion of problems and concerns about the digital cloud, read: How Secure is Cloud Computing? Security in the Ether Industry Challenges: The Standards Question
Joanne S

Eli Pariser: Beware online "filter bubbles" | Video on TED.com - 0 views

    • Joanne S
       
      Mark Zuckerberg, a journalist was asking him a question about the news feed. And the journalist was asking him, "Why is this so important?" And Zuckerberg said, "A squirrel dying in your front yard may be more relevant to your interests right now than people dying in Africa." And I want to talk about what a Web based on that idea of relevance might look like. So when I was growing up in a really rural area in Maine, the Internet meant something very different to me. It meant a connection to the world. It meant something that would connect us all together. And I was sure that it was going to be great for democracy and for our society. But there's this shift in how information is flowing online, and it's invisible. And if we don't pay attention to it, it could be a real problem. So I first noticed this in a place I spend a lot of time -- my Facebook page. I'm progressive, politically -- big surprise -- but I've always gone out of my way to meet conservatives. I like hearing what they're thinking about; I like seeing what they link to; I like learning a thing or two. And so I was surprised when I noticed one day that the conservatives had disappeared from my Facebook feed. And what it turned out was going on was that Facebook was looking at which links I clicked on, and it was noticing that, actually, I was clicking more on my liberal friends' links than on my conservative friends' links. And without consulting me about it, it had edited them out. They disappeared. So Facebook isn't the only place that's doing this kind of invisible, algorithmic editing of the Web. Google's doing it too. If I search for something, and you search for something, even right now at the very same time, we may get very different search results. Even if you're logged out, one engineer told me, there are 57 signals that Google looks at -- everything from what kind of computer you're on to what kind of browser you're using to where you're located -- that it uses to personally tailor you
Joanne S

How to solve impossible problems: Daniel Russell's awesome Google search techniques - 0 views

  • Most of what you know about Boolean is wrong.
  • Think about how somebody else would write about the topic.
  • Use language tools.
  • ...8 more annotations...
  • Use quotes to search for phrases.
  • Force Google to include search terms.
  • intext:”San Antonio” intext:Alamo
  • It forces Google to show results with the phrase “San Antonio” and the word Alamo. You won’t get results that are missing either search term.
  • Minus does not equal plus.
  • “Control F” is your friend
  • Limit the time frame.
  • Use this keyboard shortcut to find a word or phrase on any web page. I
Joanne S

How Secure is a Secure Web Page? | Richard Farrar's Blog - 0 views

  • To help improve security on the web, the standard HTTP protocol was enhanced with an additional security layer called the Secure Socket Layer (SSL) to produce a new protocol called HTTPS (HTTP over a Secure socket layer).
Joanne S

How the W3C Has Come To Love Library Linked Data - 0 views

  • The number of influential libraries publishing their metadata onto the web as linked open data, which is the heart of the Semantic Web, is growing
  • many librarians at major institutions have recognized that a key to the bibliographic future lies in migrating their data out of library silos and into an open, global pool of shared data.
  • the linked data cloud is seen as the most promising way to ensure that library data remains accessible and reusable
  • ...11 more annotations...
  • "If libraries are to retain their role as curators of the intellectual products of society, their assets must be part of that search stream."
  • web entities such as DBpedia, which offers a Semantic Web mirror of Wikipedia
  • libraries have begun to reconceptualize metadata and publish it on the web using linked data technologies, such as the Resource Description Framework (RDF) language and its extensions OWL, SKOS, and SPARQL.
  • library metadata is formatted and linked in RDF, then library content will surface more prominently in web search results
  • Recommendations from W3CThe report is still being finalized but the draft recommends that libraries:
  • — create web addresses using Uniform Resource Identifiers (URIs) as globally unique, web-compatible identifiers for the resources (any kind of object or concept) they manage and the metadata elements they use
  • — develop library data standards that are compatible with linked data
  • — use their expertise in metadata management to become full partners
  • — foster a discussion about open data and rights.
  • — explore using libraries' ethos of quality control in the curation and long-term preservation of linked data datasets and vocabularies.
  • "As the shared understanding expands, the benefits of publishing linked data are becoming clearer,"
  •  
    Kelley, M. (2011). How the W3C Has Come To Love Library Linked Data. Library Journal. Retrieved from http://www.libraryjournal.com/lj/home/891826-264/how_the_w3c_has_come.html.csp#.TmSTdJXQprl.twitter
Joanne S

Emerald | Evaluating and comparing discovery tools: how close are we towards next gener... - 0 views

  •  
    (Curtin Login) Yang, S. Q., & Wagner, K. (2010). Evaluating and comparing discovery tools: how close are we towards next generation catalog? Library Hi Tech, 28(4), 690-709. doi:10.1108/07378831011096312 Retrieved from http://www.emeraldinsight.com.dbgw.lis.curtin.edu.au/journals.htm?articleid=1896437&show=abstract
Joanne S

What Is Web 2.0 - O'Reilly Media - 0 views

  •  
    O'Reilly, T. (2005, September 30). What Is Web 2.0 - O'Reilly Media. Retrieved September 10, 2010, from http://oreilly.com/web2/archive/what-is-web-20.html To discover how Tim O'Reilly originally conceptualised Web 2.0, please read the following explanation. Do not worry too much about understanding every web tool mentioned or all the technical processes. Do pay particular attention to the discussion of RSS on page 3 and the different ways that users relate to the web in this vision.
Michelle Pitman

Google Plus Beginner's Guide - 0 views

  •  
    Handy for those who are not yet comfortable using G+ 
Joanne S

W3C Library Linked Data Incubator Group - 0 views

  • mission of the Library Linked Data incubator group is to help increase global interoperability of library data on the Web, by bringing together people involved in Semantic Web activities—focusing on Linked Data—in the library community and beyond, building on existing initiatives, and identifying collaboration tracks for the future.
  • existing building blocks of librarianship, such as metadata models, metadata schemas, standards and protocols for building interoperability and library systems and networked environments, encourage libraries to bring their content, and generally re-orient their approaches to data interoperability towards the Web, also reaching to other communities.
  •  
    W3C Library Linked Data Incubator Group. (n.d.).  Retrieved  from http://www.w3.org/2005/Incubator/lld/ .  Browse the documents associated with this site from a group that formed mid-2010 to look at how library data can be exposed as Linked Data.
Joanne S

Companies and information: The leaky corporation | The Economist - 0 views

  • the WikiLeaks threat and the persistent leaking of other supposedly confidential corporate information have brought an important issue to the fore.
  • Companies are creating an ever-growing pile of digital information, from product designs to employees' e-mails.
  • Much of this information would do little damage if it seeped into the outside world; some of it, indeed, might well do some good. But some could also be valuable to competitors—or simply embarrassing—and needs to be protected. Companies therefore have to decide what they should try to keep to themselves and how best to secure it.
  • ...10 more annotations...
  • more and more data are seeping out of companies, even of the sort that should be well protected.
  • To be able to work better with data, employees often transfer them into spreadsheets and other types of files that are easier to manipulate—but also easier to lose control of.
  • Although most leaks are not deliberate, many are.
  • “data loss prevention” (DLP).
  • software that sits at the edge of a firm's network and inspects the outgoing data traffic.
  • “bells in the dark”. False records—made-up pieces of e-mail, say—are spread around the network. Because they are false, no one should gain access to them. If somebody does, an alarm is triggered
  • In the corporate world, to limit the channels through which data can escape, some companies do not allow employees to bring their own gear to work or to use memory sticks or certain online services.
  • How then to strike the right balance between secrecy and transparency?
  • Intel, the world's largest chipmaker, issues “speeding tickets” to employees who break its rules.
  • Transparency is not just a natural inclination but a necessity, says Mitchell Baker, who chairs the foundation. If Mozilla kept its cards close to the chest, its global community of developers would not and could not help write the program. So it keeps secrets to a minimum: employees' personal information, data that business partners do not want made public and security issues in its software.
Joanne S

Academic Search Engine Spam and Google Scholar's Resilience Against it - 0 views

  • Web-based academic search engines such as CiteSeer(X), Google Scholar, Microsoft Academic Search and SciPlore have introduced a new era of search for academic articles.
  • With classic digital libraries, researchers have no influence on getting their articles indexed. They either have published in a publication indexed by a digital library, and then their article is available in that digital library, or they have not
  • citation counts obtained from Google Scholar are sometimes used to evaluate the impact of articles and their authors.
  • ...9 more annotations...
  • ‘Academic Search Engine Optimization’ (ASEO)
  • Citation counts are commonly used to evaluate the impact and performance of researchers and their articles.
  • Nowadays, citation counts from Web-based academic search engines are also used for impact evaluations.
  • Most academic search engines offer features such as showing articles cited by an article, or showing related articles to a given article. Citation spam could bring more articles from manipulating researchers onto more of these lists.
  • It is apparent that a citation from a PowerPoint presentation or thesis proposal has less value than a citation in a peer reviewed academic article. However, Google does not distinguish on its website between these different origins of citations[8].
  • Google Scholar indexes Wikipedia articles when the article is available as PDF on a third party website.
  • That means, again, that not all citations on Google Scholar are what we call ‘full-value’ citations.
  • As long as Google Scholar applies only very rudimentary or no mechanisms to detect and prevent spam, citation counts should be used with care to evaluate articles’ and researchers’ impact.
  • However, Google Scholar is a Web-based academic search engine and as with all Web-based search engines, the linked content should not be trusted blindly.
Joanne S

How to get better marks in a university assignment. What this marker wants you to know ... - 1 views

    • Joanne S
       
      What you need to do to get better marks. What markers want you to know. Use APA6. Markers already know you are clever and capable. Markers want to give you marks but you need to help them. How? 1. Answer the Question. 2. Know the Marking criteria. 3. Do what is says 4. Use conventions of Academic Writing 3.1 Demonstrate,  Show Evidence Of We give you marks for what you show. 3.2 Growth of subject knoweledge. Critical thinking. Insight into material covered.
    • Joanne S
       
      Show basic knowledge of terms and readings. Spell out abbreviations. Correct scholarly writing
    • Joanne S
       
      Critical thinking about the subject and readings. Have I shown the "So what?"  Evaluative and showing both sides of the story.
    • Joanne S
       
      4. Show clearly your own ideas. In Academic writing, if you do not clearly indicate where an idea comes from, the reader presumes you are claiming it as original thought. Your critical engagement with the ideas. It's up to you to demonstrate the seperation of ideas, what's yours and what is the readings. To get more marks: Read the question Answer it. All of it. Know the marking criteria Remember markers want to give you marks but you have to demonstrate what you know Be specific Use academic writing Clarify what is you idea and what is someone else Show critical and evaluative thinking
  •  
    Markers already know you are clever and capable.
Joanne S

What is a Database, really? Data Storage for Librarians « The Other Librarian - 0 views

  • A Text File Good old text is still not a bad way to store data. 
  • If you want to retrieve that information, you can use a script to tell the computer to organize the information in a particular way.   This is called parsing
  • Structured Text As you climb the data food chain, complex systems get developed to organize information. 
  • ...17 more annotations...
  • Mark-up:   Marked information is data that has marks or signals to let a computer distinguish one type of data from the other.  
  • A variable:   A variable happens when you give some data a name. 
  • A string:   A string is a kind of variable that has text.
  • An array:   An array is a type of variable that includes a list used by computer programs for later manipulation.    
  • An object:   Explaining objects in full requires that someone read up on object-oriented programming.  
  • Tree-based  Structures Tree-based structures, or cluster models are a subset of “structured text” data storage models.  
  • XML is probably the best example.
  • data is organized in “parents”, “siblings” and “children”.
  • The Relational Model The relational model is better than a tree-model when your dataset is large and complicated.    The way it works is, instead of thinking in terms of “parents, siblings and children,” you think in term of relationships.
  • the “Primary Key.”   This means that every data object (such as a library) has a way of identifying itself in a unique way
  • a “Foreign Key.”    The Foreign key is a way to associate one dataset (eg. libraries) with another dataset (eg. library branches, hospitals or businesses).
  • This association is called a relationship.
  • In more complicated relationships (called the Many-to-Many relationship), you might have to create a third table to associate two entities.      
  • TEXT/XML Based Text files can be organized in such a way as to accommodate some of the benefits of the relational model.
  • Two examples of XML-based databases include Xindice and Sedna.
  • SQL/Binary-based Databases The more common relational database type is a piece of software running on a server, rather than a set of text files.   They are generally accessed using a standard language called SQL (Structure Query Language), or more specifically SQL as supported by a popular scripting language like PHP, Python or Java.
  • Almost any major web application will have a combination of all these types of data storage methods!  
  •  
    How databases are used in libraries
Joanne S

Egypt shows how easily Internet can be silenced - Technology & science - Security | NBC... - 0 views

  •  
    "In Egypt in early 2011, during the revolution the government cut off the internet between 27 January and 2 February. These links were shared by Farah, a previous student who was in Egypt during this period."
Joanne S

Page 6. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • Linking to the Future As long as the web’s basic principles are upheld, its ongoing evolution is not in the hands of any one person or organization—neither mine nor anyone else’s. If we can preserve the principles, the Web promises some fantastic future capabilities.
  • Locked within all these data is knowledge about how to cure diseases, foster business value and govern our world more effectively.
  • We should examine legal, cultural and technical options that will preserve privacy without stifling beneficial data-sharing capabilities.
  • ...1 more annotation...
  • The goal of the Web is to serve humanity. We build it now so that those who come to it later will be able to create things that we cannot ourselves imagine.
1 - 20 of 21 Next ›
Showing 20 items per page