Skip to main content

Home/ IMT122 OUA Group/ Group items tagged internet

Rss Feed Group items tagged

Joanne S

safer internet group - 5 Point Plan - 0 views

  • The Safer Internet Group brings together a diverse group of stakeholders who all share the goal of developing the Internet as a platform for education, communication and economic activity.
  • Australia needs to take effective action to ensure that Internet users, and particularly children, have a safe experience online, while ensuring that the benefits of the open Internet are available to all Australians.
  • We believe our way is comprehensive and practical. More importantly, we know it works. It delivers:
  • ...5 more annotations...
  • . More Effective Education
  • Comprehensive Policing of Illegal material on the Internet
  • User Tools that work
  • A new dialogue about Internet safety
  • Targeted Research of Internet Risks and Opportunities for Young People
  •  
    Safer Internet Group (2009) 5 Point Plan. Retrieved from http://www.saferinternetgroup.org/5pointplan.html (The Australian Library and Information Association is one of the members of the Safer Internet Group)
Joanne S

Hobbes' Internet Timeline - the definitive ARPAnet & Internet history - 0 views

  •  
    Zakon, R. (2010). Hobbes' Internet Timeline - the definitive ARPAnet & Internet history. Retrieved from http://www.zakon.org/robert/internet/timeline/
Joanne S

BBC News - French downloaders face government grilling - 0 views

  • Hadopi takes its name from the 2009 legislation which permits authorities to fine copyright infringers, or to cut off their internet connection.
  • In the UK, the Digital Economy Act makes some similar provisions, although the exact nature of possible sanctions has yet to be fully explained.
  • It has sent a total of 470,000 first warnings by email, with 20,000 users receiving a second warning through the mail.
  • ...1 more annotation...
  • If the person does not confess or does not even show up, the only evidence the agency can present before the judge is a series of numbers - a particular computer's IP address
  •  
    "We looked at what it would mean if the internet was a "human right" in France, given that there is legislation that people who violate copyright can have internet access cut off for up to a month."
  •  
    "We looked at what it would mean if the internet was a "human right" in France, given that there is legislation that people who violate copyright can have internet access cut off for up to a month."
Joanne S

Is Internet access a human right? - Technolog on NBCNews.com - 0 views

  • when the Internet is taken away, as it has been in Egypt, people feel as though their rights have been stripped.
  • "If we can't communicate, we can't organize, if we can't organize, then we are reduced to power of a single individual,"
  • "There are certain technological advances that are such leaps forward in human evolution that they do, in fact, become human rights. Vaccines, for example. Potable water. I believe the Internet has become one as well."
  •  
    "In Egypt in early 2011, during the revolution the government cut off the internet between 27 January and 2 February. These links were shared by Farah, a previous student who was in Egypt during this period."
Joanne S

Eli Pariser: Beware online "filter bubbles" | Video on TED.com - 0 views

    • Joanne S
       
      Mark Zuckerberg, a journalist was asking him a question about the news feed. And the journalist was asking him, "Why is this so important?" And Zuckerberg said, "A squirrel dying in your front yard may be more relevant to your interests right now than people dying in Africa." And I want to talk about what a Web based on that idea of relevance might look like. So when I was growing up in a really rural area in Maine, the Internet meant something very different to me. It meant a connection to the world. It meant something that would connect us all together. And I was sure that it was going to be great for democracy and for our society. But there's this shift in how information is flowing online, and it's invisible. And if we don't pay attention to it, it could be a real problem. So I first noticed this in a place I spend a lot of time -- my Facebook page. I'm progressive, politically -- big surprise -- but I've always gone out of my way to meet conservatives. I like hearing what they're thinking about; I like seeing what they link to; I like learning a thing or two. And so I was surprised when I noticed one day that the conservatives had disappeared from my Facebook feed. And what it turned out was going on was that Facebook was looking at which links I clicked on, and it was noticing that, actually, I was clicking more on my liberal friends' links than on my conservative friends' links. And without consulting me about it, it had edited them out. They disappeared. So Facebook isn't the only place that's doing this kind of invisible, algorithmic editing of the Web. Google's doing it too. If I search for something, and you search for something, even right now at the very same time, we may get very different search results. Even if you're logged out, one engineer told me, there are 57 signals that Google looks at -- everything from what kind of computer you're on to what kind of browser you're using to where you're located -- that it uses to personally tailor you
Joanne S

Egypt enters communication blackout with disruption to internet, SMS, and BlackBerry me... - 0 views

  • hard data showing that almost all routes for exchanging internet traffic with the country have been shut down
  • clearly an extreme step for any government to take
  •  
    "In Egypt in early 2011, during the revolution the government cut off the internet between 27 January and 2 February. These links were shared by Farah, a previous student who was in Egypt during this period."
Joanne S

Screenshot Egypt internet is down - 0 views

  •  
    "In Egypt in early 2011, during the revolution the government cut off the internet between 27 January and 2 February. These links were shared by Farah, a previous student who was in Egypt during this period."
Joanne S

Page 4. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • The Web is an application that runs on the Internet
  • Although internet and web designs are separate, a Web user is also an Internet user and therefore relies on an Internet that is free from interference.
  • Technology for interference has become more powerful
Joanne S

Abbate, J. (1999). Introduction. In Inventing the Internet. (E-Reserve) - 0 views

  •  
    Abbate, J. (1999). Introduction. In Inventing the Internet. Cambridge, Mass.: MIT Press. pp. 1-6. Retrieved from http://edocs.library.curtin.edu.au/eres_display.cgi?url=dc60105539.pdf
Joanne S

Electronic Frontiers Australia » Ausvotes 2010: Party Policy Guide - 0 views

  • two issues close to the hearts of our members and supporters: Mandatory internet censorship, an R-18+ rating for video games and the National Broadband Network.
  •  
    The Internet policies of the major political parties leading up to the Federal election: Electronic Frontiers Foundation (2010 August 12)  Ausvotes 2010: Party Policy Guide Retrieved from http://www.efa.org.au/ausvotes2010/
Joanne S

Topic 3 Supplementary "Reading" How it All Works YouTube Videos - 0 views

  •  
    The Internet of Things. (2010).  Retrieved from http://www.youtube.com/watch?v=sfEbMV295Kk&feature=youtube_gdata_player How the Internet Works in 5 Minutes. (2009). Retrieved from http://www.youtube.com/watch?v=7_LPdttKXPc&feature=youtube_gdata_player How Bittorrent works. (2007). Retrieved from http://www.youtube.com/watch?v=66BV2pIjfBM&feature=youtube_gdata_player
Joanne S

Egypt shows how easily Internet can be silenced - Technology & science - Security | NBC... - 0 views

  •  
    "In Egypt in early 2011, during the revolution the government cut off the internet between 27 January and 2 February. These links were shared by Farah, a previous student who was in Egypt during this period."
Joanne S

The rise of e-reading | Pew Internet Libraries - 0 views

  •  
    Rainie, L., Zickuhr, K., Purcell, K., Madden, M., & Brenner, J. (2012). The rise of e-reading. Washington, DC: Pew Research Center's Internet & American Life Project. Retrieved from http://libraries.pewinternet.org/2012/04/04/the-rise-of-e-reading/ (Read just the summary at the start or browse the whole report
Joanne S

The Cluetrain Manifesto - Entire Text Index Page - 0 views

  •  
    Levine, R., Locke, C., Searles, D., Weinberger, D., & McKee, J. (1999). The Cluetrain Manifesto. Retrieved April 29, 2011, from http://www.cluetrain.com/ CORPORATIONS, THE INTERNET AND THE "HUMAN VOICE"
Joanne S

The Technium: Better Than Free - 0 views

  •  
    Kelly, K. (2008, January 31). Better Than Free. The Technium. Retrieved September 30, 2010, from http://www.kk.org/thetechnium/archives/2008/01/better_than_fre.php THE INTERNET AS A COPYING MACHINE AND "FREE" CONTENT
Joanne S

The Code4Lib Journal - How Hard Can It Be? : Developing in Open Source - 0 views

  • We experienced freedom to explore alternate avenues, to innovate, to take risks in ways that would have been difficult under the direct control of a district council.
  • patrons made it clear that while they appreciated that computers were a necessary part of a modern library, they did not consider them the most important part.
  • Our overall objective was to source a library system which: could be installed before Y2K complications immobilised us, was economical, in terms of both initial purchase and future license and maintenance support fees, ran effectively and fast by dial-up modem on an ordinary telephone line, used up-to-the minute technologies, looked good, and was easy for both staff and public to use, took advantage of new technology to permit members to access our catalogue and their own records from home, and let us link easily to other sources of information – other databases and the Internet. If we could achieve all of these objectives, we’d be well on the way to an excellent service.
  • ...14 more annotations...
  • "How hard can it be" Katipo staff wondered, "to write a library system that uses Internet technology?" Well, not very, as it turned out.
  • Koha would thus be available to anyone who wanted to try it and had the technical expertise to implement it.
  • fairly confident that we already had a high level of IT competence right through the staff, a high level of understanding of what our current system did and did not do.
  • ensure the software writers did not miss any key points in their fundamental understanding of the way libraries work.
  • The programming we commissioned cost us about 40% of the purchase price of an average turn-key solution.
  • no requirement to purchase a maintenance contract, and no annual licence fees.
  • An open source project is never finished.
  • Open source projects only survive if a community builds up around the product to ensure its continual improvement. Koha is stronger than ever now, supported by active developers (programmers) and users (librarians)
  • There are a range of support options available for Koha, both free and paid, and this has contributed to the overall strength of the Koha project.
  • Vendors like Anant, Biblibre, ByWater, Calyx, Catalyst, inLibro, IndServe, Katipo, KohaAloha, LibLime, LibSoul, NCHC, OSSLabs, PakLAG, PTFS, Sabinet, Strategic Data, Tamil and Turo Technology take the code and sell support around the product, develop add-ons and enhancements for their clients and then contribute these back to the project under the terms of the GPL license.
  • FRBR [5] arrangement, although of course it wasn’t called that 10 years ago, it was just a logical way for us to arrange the catalogue. A single bibliographic record essentially described the intellectual content, then a bunch of group records were attached, each one representing a specific imprint or publication.
  • The release of Koha 3.0 in late 2008 brought Koha completely into the web 2.0 age and all that entails. We are reconciled to taking a small step back for now, but the FRBR logic is around and RDA should see us back where want to be in a year or so – but with all the very exciting features and opportunities that Koha 3 has now.
  • In the early days, the Koha list appeared to have been dominated by programmers but I have noticed a lot more librarians participating now
  • "Adopt technology that keeps data open and free, abandon[ing] technology that does not." The time is right for OSS.
  •  
    For more information about Koha and how it was developed, see: Ransom, J., Cormack, C., & Blake, R. (2009). How Hard Can It Be? : Developing in Open Source. Code4Lib Journal, (7). Retrieved from http://journal.code4lib.org/articles/1638
Joanne S

Recordkeeping In Brief 62 - FAQs about cloud computing - State Records NSW - 0 views

  • Cloud computing is internet-based computing whereby shared resources, software and information are provided to computers and other devices on demand.
  • Cloud computing is a general term for anything that involves delivering hosted services over the Internet.
  • There are a range of applications that can be delivered to users via cloud computing models, from email or content management to specialist applications for activities such as project management or human resources management to data storage.
    • Joanne S
       
      Models include: Software-as-a-Service (SaaS) Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS)
  • ...8 more annotations...
  • A cloud can be private or public:
  • As with any business related activity there are both risks and opportunities associated with using cloud computing services.
  • potentially a number of business and information risks associated with using cloud computing services.
  • noted that even if the cloud computing environment is managed wholly within NSW an appropriate risk assessment of the service and the provider should occur.
  • level of risk that an organisation attributes to a proposed cloud computing arrangement will vary according to the content or subject matter of their records
  • The content of the contract in these types of service arrangements is very important.
  • What are others saying? Australia Australasian Digital Recordkeeping Initiative (ADRI), Advice on managing the recordkeeping risks associated with cloud computing, July 2010, available at http://www.adri.gov.au Defence Signals Directorate (Commonwealth), Cloud computing security considerations, April 2011, available at http://www.dsd.gov.au/infosec/cloudsecurity.htm Department of Finance and Deregulation (Commonwealth), Cloud computing strategic direction paper: opportunities and applicability for use by the Australian Government, April 2011, available at http://www.finance.gov.au/e-government/strategy-and-governance/docs/final_cloud_computing_strategy_version_1.pdf
  • International Archives and Records Association UK and Ireland, Cloud computing toolkit: guidance for outsourcing information storage to the cloud, August 2010, available at http://www.archives.org.uk/images/documents/Cloud_Computing_Toolkit-2.pdf – this guidance contains a comprehensive overview of the range of cloud computing services available and the recordkeeping considerations that apply to each CIO Council and Chief Acquisition Officers Council (USA), Creating effective cloud computing contracts for the Federal Government: best practices for acquiring IT as a service, February 2012, available at http://www.cio.gov/cloudbestpractices.pdf – this is a comprehensive and useful document for those seeking to procure cloud computing services
Joanne S

Mobile Strategy | National Library of Australia - 0 views

  • must move towards a model with comprehensive mobile access to online services
  • mobile’ has come to encompass an ever-expanding field of devices, platforms and content
  • Smart (internet enabled) or dumb/cellular
  • ...98 more annotations...
  • Supplied (on-site device distribution) or privately owned
  • Native apps
  • Mobile websites
  • In terms of content this includes:
  • Applications (software designed for specific tasks
  • Podcasts (audio and video content
  • Other downloadable content (e.g. PDFs and ebook
  • the Library may look to harness the potential of these technologies to break away from the traditional broadcast-only website presence and move towards two-way conversations between the Library and its users, or conversations between the users themselves
  • the key objectives stated in the Information Technology Strategic Plan 2012-2015 include Online Presence and supporting “the needs of our users for easy discovery of, access to, and engagement with our services, collections and other information resources in the digital environment”
  • ensure equal access to our resources and services for all Australians.
  • facilitate equal access to Library resources for everyone.
  • Putting Library resources into the hands of users in their lounge rooms reflects a deeper understanding of the need to move beyond the desire to follow our users and instead reach out to them to “take them some place new
  • mobile will only continue to grow and overtake desktop internet usage within 2-3 years
  • building both infrastructure and a culture of engagement will pave the way to more efficiently and effectively meeting that need in the future
  • 4         Strategic goals
  • Improve access to our collection and services for audiences, wherever they are, whether on-site or anywhere else in the world.
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Adopt an evidence-based approach to service development and delivery
  • Modernise the Library brand to reflect relevance, accessibility and innovation.
  • Create opportunities for learning
  • Facilitate connections, conversation and overall engagement with national collection material.
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Build, consolidate and share expertise
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • A focus on strategic, audience-driven activity with a utility function.
  • Seek out and engage new technologies to achieve marketing and communications goals.
  • 6         Recommended activities
  • activities provide a means to implement and ground the strategy with specific and measurable tasks
  • 6.1      Governance and infrastructure
  • The Library’s IT Strategy Group will determine priorities
  • formalising the Web Committee’s role as an advisory body
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • Information Technology Division to examine ongoing resourcing of development work, administrative models, and potential for partial cost-recovery
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • Develop and review policy in support of the use of both enterprise devices and use of personal devices for work-related purposes. Identify
  • Investigate infrastructure and resourcing requirements for digital recording and distribution
  • Collections Management Division to keep a watching brief on any developments pertaining to the extension of Legal Deposit to include digital (and mobile) content
  • developing a statement of collecting intentions for the various categories of ebook titles within the context of revising the collecting policy for Australian electronic publications in general
  • Applications
  • Podcasts (audio and video content
  • Other downloadable content (e.g. PDFs and ebooks
  • 3         Our mobile vision
  • Improve access to our collection and services for audiences, wherever they are, whether on-site or anywhere else in the world.
  • 4         Strategic goals
  • 3         Our mobile vision
  • 4         Strategic goals
  • 3         Our mobile vision
  • Improve access to our collection and services for audiences, wherever they are, whether on-site or anywhere else in the world.
  • 4         Strategic goals
  • Adopt an evidence-based approach to service development and delivery
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Modernise the Library brand to reflect relevance, accessibility and innovation.
  • Adopt an evidence-based approach to service development and delivery
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Create opportunities for learning
  • Facilitate connections, conversation and overall engagement with national collection material.
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Tactics
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Adopt an evidence-based approach to service development and delivery
  • Modernise the Library brand to reflect relevance, accessibility and innovation.
  • Create opportunities for learning
  • Facilitate connections, conversation and overall engagement with national collection material.
  • Tactics
  • Tactics
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Build, consolidate and share expertise
  • Tactics
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Build, consolidate and share expertise
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • Build, consolidate and share expertise
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • A focus on strategic, audience-driven activity with a utility function.
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • A focus on strategic, audience-driven activity with a utility function.
  • Seek out and engage new technologies to achieve marketing and communications goals.
  • Seek out and engage new technologies to achieve marketing and communications goals.
  • Recommended
  • 6.1      Governance and infrastructure
  • Library’s IT Strategy Group will determine priorities
  • formalising the Web Committee
  • Information Technology Division to examine ongoing resourcing
  • formalising the Web Committee
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • formalising the Web Committee
  • Develop and review policy in support of the use of both enterprise devices and use of personal devices for work-related purposes
  • Investigate infrastructure and resourcing requirements for digital recording and distribution to ensure the long-term sustainability of online broadcast activity
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • formalising the Web Committee
  • Information Technology Division to examine ongoing resourcing
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • Collections Management Division to keep a watching brief on any developments pertaining to the extension of Legal Deposit to include digital (and mobile) conten
  • developing a statement of collecting intentions for the various categories of ebook titles within the context of revising the collecting policy for Australian electronic publications
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • Develop and review policy in support of the use of both enterprise devices and use of personal devices for work-related purposes
Joanne S

Boolean Searching on the Internet - 0 views

  • Boolean logic consists of three logical operators: OR AND NOT
  • Combined AND and OR logic Question: I want information about the behavior of cats. Search: behavior AND (cats OR felines)
1 - 20 of 33 Next ›
Showing 20 items per page