Skip to main content

Home/ IMT122 OUA Group/ Group items tagged network

Rss Feed Group items tagged

1More

Keeping up: strategic use of online social networks for librarian current awareness. - 0 views

  •  
    Online social networks for current awareness Cook, S., & Wiebrands, C. (2010). Keeping up: strategic use of online social networks for librarian current awareness. In VALA 2010: Connections. Content. Conversations. Melbourne, Victoria. Retrieved from http://www.vala.org.au/vala2010/papers2010/VALA2010_78_Cook_Final.pdf
1More

Network Passwords | Infopeople - 0 views

  • Your library or organization should consider adopting the following rules for network passwords:Passwords may not be blankPasswords must be seven or more characters longPasswords must use a mixture of letters (upper and lower case), numbers and charactersPasswords must be changed on a regular basisPasswords must be successively unique (in other words, users shouldn't use the same password repeatedly)Passwords must never be written down or posted in an insecure location (such as on a monitor)In addition, consider adding these prohibitions:Passwords cannot be the user's name, the name of someone in their family, or their birth datePasswords must not be constructed by adding a numeral or character to the beginning or end of a regular word; this is too easily guessed (e.g."chair1")
1More

Emerald | Diffusion of innovation theories and their relevance to understanding the rol... - 0 views

  •  
    Holland, M. (1997). Diffusion of innovation theories and their relevance to understanding the role of librarians when introducing users to networked information. The Electronic Library, 15(5), 389-394. doi:10.1108/eb045587 Start at part 2. Background and History p.390 
1More

Online social networks in the enterprise - 0 views

  •  
    Online social networks in the enterprise Howard, Z., & Ryan, D. (2010). Replacing the water cooler: connecting through enterprise microblogging. In VALA 2010: Connections. Content. Conversations. Melbourne, Victoria. Retrieved from http://www.vala.org.au/vala2010/papers2010/VALA2010_102_Howard_Final.pdf
13More

Companies and information: The leaky corporation | The Economist - 0 views

  • the WikiLeaks threat and the persistent leaking of other supposedly confidential corporate information have brought an important issue to the fore.
  • Companies are creating an ever-growing pile of digital information, from product designs to employees' e-mails.
  • Much of this information would do little damage if it seeped into the outside world; some of it, indeed, might well do some good. But some could also be valuable to competitors—or simply embarrassing—and needs to be protected. Companies therefore have to decide what they should try to keep to themselves and how best to secure it.
  • ...10 more annotations...
  • more and more data are seeping out of companies, even of the sort that should be well protected.
  • To be able to work better with data, employees often transfer them into spreadsheets and other types of files that are easier to manipulate—but also easier to lose control of.
  • Although most leaks are not deliberate, many are.
  • “data loss prevention” (DLP).
  • software that sits at the edge of a firm's network and inspects the outgoing data traffic.
  • “bells in the dark”. False records—made-up pieces of e-mail, say—are spread around the network. Because they are false, no one should gain access to them. If somebody does, an alarm is triggered
  • In the corporate world, to limit the channels through which data can escape, some companies do not allow employees to bring their own gear to work or to use memory sticks or certain online services.
  • How then to strike the right balance between secrecy and transparency?
  • Intel, the world's largest chipmaker, issues “speeding tickets” to employees who break its rules.
  • Transparency is not just a natural inclination but a necessity, says Mitchell Baker, who chairs the foundation. If Mozilla kept its cards close to the chest, its global community of developers would not and could not help write the program. So it keeps secrets to a minimum: employees' personal information, data that business partners do not want made public and security issues in its software.
19More

Q3HD Handy Video Recorder - 0 views

  • HD audio
  • 1080p
  • two studio-quality condenser microphones
  • ...16 more annotations...
  • MPEG-4 AVC/H.264
  • QuickTime player
  • 1920 x 1080 pixel resolution
  • A USB cable is conveniently built into the unit
  • YouTube or Vimeo.
  • The Q3HD’s bundled HandyShare editing and uploading software lets you to manage and edit your videos easily as well as upload them to social networking sites.
  • The rich stereo sound captured by the X/Y mic pair can be recorded to linear PCM WAV files.
  • ready to shoot in 2 seconds.
  • The Q3HD can also be used as an audio recorder to record just sound
  • he Q3HD utilizes SD/SDHC as an affordable way to increase recording capacity.
  • 2GB SD card
  • video
  • video
  • video
  • 2GB SD
  • The Q3HD is powered by two standard AA batteries, resulting in about 2 hours of continuous recording.
4More

A social media policy for a one branch public library » Librarians Matter - 1 views

  • “Social Media.” includes community created content sites like Blogs, Forums, Flickr, YouTube, Wikis, Social Networks, Twitter and other content sharing sites.
  • When you use social media your behaviour  and content is not only a reflection of you but also of (our) Library.
  • Social Media Do’s Be Professional – Talk the way you would talk to real people in professional situations. Be Courteous – Be sure to listen & ask questions. Be Accurate – Check your facts before you post and provide supporting sources if necessary. Be Useful – Add content because you have something interesting to say, not for the sake of regular posting. Be Intelligent – Provide some value. Don’t talk down. Offer insight. Be Conversational –  Avoid overly pedantic or “composed” language. Don’t be afraid to bring in your own personality. Be Non-confrontational – If you disagree, do so respectfully Be Prompt – If you need to moderate or respond to a comment do so as quickly as possible Be Identifiable – Use your real name and do not post anonymously. Be Transparent – Disclose that you work for the library if this is relevant and be honest & truthful. Social Media Don’ts Don’t Share Secrets –If you aren’t sure you can disclose something, just don’t do it. Think about privacy, confidentiality and permission to use other people’s content. Don’t Bad Mouth – Keep the language clean & avoid slamming people or companies. Don’t Complain – If you don’t have anything nice to say, don’t say anything at all. Don’t do Stupid Things – If it doesn’t help the Library or our community, don’t do it. Don’t Defame – Show everyone respect. Don’t Forget your day job –Social Media can consume you so don’t forget your other duties. Moderate, balanced use is essential.
  •  
    Greenhill, K., & Fay, J. (2010, September 10). A social media policy for a one branch public library. Librarians Matter. Retrieved October 1, 2010, from http://librariansmatter.com/blog/2010/09/10/a-social-media-policy-for-a-one-branch-public-library/
27More

Reprogramming The Museum | museumsandtheweb.com - 0 views

  • Powerhouse experie
  • her APIs
  • Flickr AP
  • ...23 more annotations...
  • Thomson Reuters OpenCalais
  • OCLC's WorldCat
  • Before we began our work on the Commons on Flickr, some museum colleagues were concerned that engaging with the Flickr community would increase workloads greatly. While the monitoring of the site does take some work, the value gained via the users has far outweighed any extra effort. In some cases, users have dated images for us.
  • In subsequent use of the Flickr API, we appropriated tags users had added to our images, and now include them in our own collection database website (OPAC). We also retrieved geo-location data added to our images for use in third party apps like Sepiatown and Layar.
  • In our case the purpose of creating an API was to allow others to use our content.
  • So consider the questions above not in the context of should we or shouldn't we put our data online (via an API or otherwise) but rather in the context of managing expectations of the data's uptake.
  • Steps to an API
  • several important things which had to happen before we could provide a public web API. The first was the need to determine the licence status of our content.
  • The drive to open up the licensing of our content came when, on a tour we conducted of the Museum's collection storage facilities for some Wikipedian
  • This prompted Seb Chan to make the changes required to make our online collection documentation available under a mix of Creative Commons licences. (Chan, April 2009)
  • Opening up the licensing had another benefit: it meant that we had already cleared one hurdle in the path to creating an API.
  • The Government 2.0 Taskforce (http://gov2.net.au/about/) was the driver leading us to take the next step.
  • "increasing the openness of government through making public sector information more widely available to promote transparency, innovation and value adding to government information"
  • the first cultural institution in Australia to provided a bulk data dump of any sort.
  • The great thing about this use is that it exposes the Museum and its collection to the academic sector, enlightening them regarding potential career options in the cultural sector.
  • I will briefly mention some of the technical aspects of the API now for those interested. In line with industry best practice the Powerhouse Museum is moving more and more to open-source based hosting and so we chose a Linux platform for serving the API
  • Images are served from the cloud as we had already moved them there for our OPAC, to reduce outgoing bandwidth from the Museum's network.
  • Once we had the API up and running, we realised it would not be too much work to make a WordPress plug-in which allowed bloggers to add objects from our collection to their blogs or blog posts. Once built, this was tested internally on our own blogs. Then in early 2011 we added it to the WordPress plugin directory: http://wordpress.org/extend/plugins/powerhouse-museum-collection-image-grid/
  • One of the main advantages the API has over the data dump is the ability to track use.
  • It is also worth noting that since the API requests usually do not generate pages that are rendered in a browser it is not possible to embed Google Analytics tracking scripts in the API's output.
  • y requiring people to sign up using a valid email address before requesting an API key we are able to track API use back to individuals or organisations.
  • Concerns that people would use the API inappropriately were dealt with by adding a limit to the number of requests per hour each key can generate
  • An Application Programming Interface (API) is a particular set of rules and specifications that a software program can follow to access and make use of the services and resources provided by another particular software program
  •  
    Dearnley, L. (2011). Repreogramming the museum. In Museums and the Web 2011 : Proceedings. Presented at the Museums and the Web 2011, Toronto: Archives & Museum Informatics. Retrieved from http://conference.archimuse.com/mw2011/papers/reprogramming_the_museum
4More

Library 2.0 Theory: Web 2.0 and Its Implications for Libraries - 0 views

  • Already libraries are creating RSS feeds for users to subscribe to, including updates on new items in a collection, new services, and new content in subscription databases.
  • hybrid applications, where two or more technologies or services are conflated into a completely new, novel service.
  • personalized OPAC that includes access to IM, RSS feeds, blogs, wikis, tags, and public and private profiles within the library's network.
  •  
    Maness, J. (2006). Library 2.0 Theory: Web 2.0 and its Implications for Libraries. Webology, 3(2). Retrieved from http://webology.ir/2006/v3n2/a25.html
21More

The Strongest Link: Libraries and Linked Data - 0 views

  • For many years now we have been hearing that the semantic web is just around the corner
  • most libraries, however, is that we are still grappling with 2.0 technologies.
  • By marking up information in standardized, highly structured formats like Resource Description Framework (RDF), we can allow computers to better "understand" the meaning of content
  • ...17 more annotations...
  • For most librarians this concept is fairly easy to understand. We have been creating highly structured machine-readable metadata for many years
  • By linking our data to shared ontologies that describe the properties and relationships of objects, we begin to allow computers not just to "understand" content, but also to derive new knowledge by "reasoning" about that content.
  • the term "Semantic Web" to refer to a full suite of W3C standards including RDF, SPARQL query language, and OWL web ontology language.
  • This article will outline some of the benefits that linked data could have for libraries, will discuss some of the non-technical obstacles that we face in moving forward, and will finally offer suggestions for practical ways in which libraries can participate in the development of the semantic web.
  • What benefits will libraries derive from linked data?
  • Having a common format for all data would be a huge boon for interoperability and the integration of all kinds of systems.
  • The linking hub would expose a network of tightly linked information from publishers, aggregators, book and journal vendors, subject authorities, name authorities, and other libraries.
  • semantic search could take us far beyond the current string-matching capabilities of search engines like Google.
  • What are the major obstacles for libraries?
  • A fundamental challenge for the development of linked data in libraries is lack of awareness.
  • Linked Data becomes more powerful the more of it there is.
  • Until there is enough linking between collections and imaginative uses of data collections there is a danger librarians will see linked data as simply another metadata standard, rather than the powerful discovery tool it will underpin.
  • a more practical concern is that changing the foundation of library metadata is no trivial task.
  • Privacy is a huge concern for many interested in linked data.
  • Related to privacy is trust.
  • Rights management poses potential problems for linked data in libraries. Libraries no longer own much of the content they provide to users; rather it is subscribed to from a variety of vendors.
  • What needs to happen to move libraries to the next level?
  •  
    Byrne, G., & Goddard, L. (2010). The Strongest Link: Libraries and Linked Data. D-Lib Magazine, 16(11/12). doi:10.1045/november2010-byrne Retrieved from http://www.dlib.org/dlib/november10/byrne/11byrne.html
2More

Electronic Frontiers Australia » Ausvotes 2010: Party Policy Guide - 0 views

  • two issues close to the hearts of our members and supporters: Mandatory internet censorship, an R-18+ rating for video games and the National Broadband Network.
  •  
    The Internet policies of the major political parties leading up to the Federal election: Electronic Frontiers Foundation (2010 August 12)  Ausvotes 2010: Party Policy Guide Retrieved from http://www.efa.org.au/ausvotes2010/
3More

W3C Library Linked Data Incubator Group - 0 views

  • mission of the Library Linked Data incubator group is to help increase global interoperability of library data on the Web, by bringing together people involved in Semantic Web activities—focusing on Linked Data—in the library community and beyond, building on existing initiatives, and identifying collaboration tracks for the future.
  • existing building blocks of librarianship, such as metadata models, metadata schemas, standards and protocols for building interoperability and library systems and networked environments, encourage libraries to bring their content, and generally re-orient their approaches to data interoperability towards the Web, also reaching to other communities.
  •  
    W3C Library Linked Data Incubator Group. (n.d.).  Retrieved  from http://www.w3.org/2005/Incubator/lld/ .  Browse the documents associated with this site from a group that formed mid-2010 to look at how library data can be exposed as Linked Data.
3More

User Security | Infopeople - 0 views

  • User identification is the process of establishing the user's identity and usually requires very little interaction on the user's part.
  • Authentication is the process of a user proving that s/he is actually the person who s/he claims.
  • Authorization is the final process in user-level security. It is the process of determining what resources a user can access after successful identification and authentication.
15More

The Deep Web - 0 views

  • defined as the content on the Web not accessible through a search on general search engines.
  • sometimes also referred to as the hidden or invisible web.
  • the part of the Web that is not static, and is served dynamically "on the fly," is far larger than the static documents
  • ...11 more annotations...
  • When we refer to the deep Web, we are usually talking about the following:
  • The content of databases.
  • Non-text files such as multimedia, images, software, and documents in formats such as Portable Document Format (PDF) and Microsoft Word.
  • Content available on sites protected by passwords or other restrictions.
  • Special content not presented as Web pages, such as full text articles and books
  • Dynamically-changing, updated content,
  • let's consider adding new content to our list of deep Web sources. For example:
  • Blog postings Comments Discussions and other communication activities on social networking sites, for example Facebook and Twitter Bookmarks and citations stored on social bookmarking sites
  • Tips for dealing with deep Web content
  • Vertical search
  • Use a general search engine to locate a vertical search engine.
  •  
    The Web not accessible through a search on general search engines..
4More

Page 2. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • Several threats to the Web’s universality have arisen recently. Cable television companies that sell Internet connectivity are considering whether to limit their Internet users to downloading only the company’s mix of entertainment.
  • Social-networking sites present a different kind of problem. Facebook, LinkedIn, Friendster and others typically provide value by capturing information as you enter it
  • The sites assemble these bits of data into brilliant databases and reuse the information to provide value-added service—but only within their sites.
  • ...1 more annotation...
  • The basic Web technologies that individuals and companies need to develop powerful services must be available for free, with no royalties.
4More

Page 5. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • Debate has risen again in the past year about whether government legislation is needed to protect net neutrality.
  • Accessing the information within an Internet packet is equivalent to wiretapping a phone or opening postal mail.
  • Totalitarian governments aren’t the only ones violating the network rights of their citizens.
  • ...1 more annotation...
  • “No person or organization shall be deprived of the ability to connect to others without due process of law and the presumption of innocence.”
7More

Page 1. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • profound concept: that any person could share information with anyone else, anywhere.
  • Web evolved into a powerful, ubiquitous tool because it was built on egalitarian principles and because thousands of individuals, universities and companies have worked, both independently and together as part of the World Wide Web Consortium
  • Large social-networking sites are walling off information posted by their users from the rest of the Web.
  • ...3 more annotations...
  • Wireless Internet providers are being tempted to slow traffic to sites with which they have not made deals.
  • Governments—totalitarian and democratic alike—are monitoring people’s online habits, endangering important human rights.
  • eb is now more critical to free speech than any other medium
  •  
    6 pages long. see other links
1 - 17 of 17
Showing 20 items per page