Skip to main content

Home/ IMT122 OUA Group/ Group items tagged user

Rss Feed Group items tagged

3More

User Security | Infopeople - 0 views

  • User identification is the process of establishing the user's identity and usually requires very little interaction on the user's part.
  • Authentication is the process of a user proving that s/he is actually the person who s/he claims.
  • Authorization is the final process in user-level security. It is the process of determining what resources a user can access after successful identification and authentication.
1More

Library 2.0 and User-Generated Content What can the users do for us? - 0 views

  •  
    Danowski, P. (2007). Library 2.0 and User-Generated Content What can the users do for us? In World Library and Information Congress: 73rd IFLA General Conference and Council. Durban, South Africa: IFLA. Retrieved from http://archive.ifla.org/IV/ifla73/papers/113-Danowski-en.pdf
10More

Library 2.0 : service for the next generation library. - 0 views

  • he heart of Library 2.0 is user-centered change
  • nviting user participatio
  • It also attempts to reach new users and better serve current ones through improved customer-driven offerin
  • ...6 more annotations...
  • Technological advances in the past several years have enabled libraries to create new services that before were not possible, such as virtual reference, personalized OPAC interfaces, or downloadable media that library customers can use in the comfort of their own homes. This increase in available technologies gives libraries the ability to offer improved, customer-driven service opportunities.
  • Libraries are in the habit of providing the same services and the same programs to the same groups
  • , Stephens believes that “Library 2.0 will be a meeting place, online or in the physical world, where [library users'] needs will be fulfilled through entertainment, information, and the ability to create [their] own stuff to contribute to the ocean of content out there.”
  • . It's never been easy to reach this group with physical services, because libraries are constrained by space and money and cannot carry every item that every user desires
  • Chris Anderson, editor-in-chief of Wired, who coined the phrase in an article of the same name in 2004, argues that the demand for movies or books that are not hits far outnumbers the demand for those that are hit
  • Going after the diverse long tail requires a combination of physical and virtual services
  •  
    Casey, M. E., & Savastinuk, L. C. (2006). Library 2.0 : service for the next generation library. Library Journal, 131(4), 40-42. Retrieved from http://www.libraryjournal.com/article/CA6365200.html
101More

Mobile Strategy | National Library of Australia - 0 views

  • must move towards a model with comprehensive mobile access to online services
  • mobile’ has come to encompass an ever-expanding field of devices, platforms and content
  • Smart (internet enabled) or dumb/cellular
  • ...98 more annotations...
  • Supplied (on-site device distribution) or privately owned
  • Native apps
  • Mobile websites
  • In terms of content this includes:
  • Applications (software designed for specific tasks
  • Podcasts (audio and video content
  • Other downloadable content (e.g. PDFs and ebook
  • the Library may look to harness the potential of these technologies to break away from the traditional broadcast-only website presence and move towards two-way conversations between the Library and its users, or conversations between the users themselves
  • the key objectives stated in the Information Technology Strategic Plan 2012-2015 include Online Presence and supporting “the needs of our users for easy discovery of, access to, and engagement with our services, collections and other information resources in the digital environment”
  • ensure equal access to our resources and services for all Australians.
  • facilitate equal access to Library resources for everyone.
  • Putting Library resources into the hands of users in their lounge rooms reflects a deeper understanding of the need to move beyond the desire to follow our users and instead reach out to them to “take them some place new
  • mobile will only continue to grow and overtake desktop internet usage within 2-3 years
  • building both infrastructure and a culture of engagement will pave the way to more efficiently and effectively meeting that need in the future
  • 4         Strategic goals
  • Improve access to our collection and services for audiences, wherever they are, whether on-site or anywhere else in the world.
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Adopt an evidence-based approach to service development and delivery
  • Modernise the Library brand to reflect relevance, accessibility and innovation.
  • Create opportunities for learning
  • Facilitate connections, conversation and overall engagement with national collection material.
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Build, consolidate and share expertise
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • A focus on strategic, audience-driven activity with a utility function.
  • Seek out and engage new technologies to achieve marketing and communications goals.
  • 6         Recommended activities
  • activities provide a means to implement and ground the strategy with specific and measurable tasks
  • 6.1      Governance and infrastructure
  • The Library’s IT Strategy Group will determine priorities
  • formalising the Web Committee’s role as an advisory body
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • Information Technology Division to examine ongoing resourcing of development work, administrative models, and potential for partial cost-recovery
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • Develop and review policy in support of the use of both enterprise devices and use of personal devices for work-related purposes. Identify
  • Investigate infrastructure and resourcing requirements for digital recording and distribution
  • Collections Management Division to keep a watching brief on any developments pertaining to the extension of Legal Deposit to include digital (and mobile) content
  • developing a statement of collecting intentions for the various categories of ebook titles within the context of revising the collecting policy for Australian electronic publications in general
  • Applications
  • Podcasts (audio and video content
  • Other downloadable content (e.g. PDFs and ebooks
  • 3         Our mobile vision
  • Improve access to our collection and services for audiences, wherever they are, whether on-site or anywhere else in the world.
  • 4         Strategic goals
  • 3         Our mobile vision
  • 4         Strategic goals
  • 3         Our mobile vision
  • Improve access to our collection and services for audiences, wherever they are, whether on-site or anywhere else in the world.
  • 4         Strategic goals
  • Adopt an evidence-based approach to service development and delivery
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Modernise the Library brand to reflect relevance, accessibility and innovation.
  • Adopt an evidence-based approach to service development and delivery
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Create opportunities for learning
  • Facilitate connections, conversation and overall engagement with national collection material.
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Tactics
  • Equip staff to champion and drive the development of mobile services to improve access and productivity.
  • Adopt an evidence-based approach to service development and delivery
  • Modernise the Library brand to reflect relevance, accessibility and innovation.
  • Create opportunities for learning
  • Facilitate connections, conversation and overall engagement with national collection material.
  • Tactics
  • Tactics
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Build, consolidate and share expertise
  • Tactics
  • Establish and expand the infrastructure and back-end systems required to support mobile initiatives, products and services.
  • Build, consolidate and share expertise
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • Build, consolidate and share expertise
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • A focus on strategic, audience-driven activity with a utility function.
  • Adopt standards and best practices for interoperable mobile content and cross-platform data management.
  • A focus on strategic, audience-driven activity with a utility function.
  • Seek out and engage new technologies to achieve marketing and communications goals.
  • Seek out and engage new technologies to achieve marketing and communications goals.
  • Recommended
  • 6.1      Governance and infrastructure
  • Library’s IT Strategy Group will determine priorities
  • formalising the Web Committee
  • Information Technology Division to examine ongoing resourcing
  • formalising the Web Committee
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • formalising the Web Committee
  • Develop and review policy in support of the use of both enterprise devices and use of personal devices for work-related purposes
  • Investigate infrastructure and resourcing requirements for digital recording and distribution to ensure the long-term sustainability of online broadcast activity
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • formalising the Web Committee
  • Information Technology Division to examine ongoing resourcing
  • Include requisite support for mobile content collection, preservation and access in the Digital Library Infrastructure Replacement Project (DLIR
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • Collections Management Division to keep a watching brief on any developments pertaining to the extension of Legal Deposit to include digital (and mobile) conten
  • developing a statement of collecting intentions for the various categories of ebook titles within the context of revising the collecting policy for Australian electronic publications
  • Adopt emerging Commonwealth requirements and advice pertaining to managing devices and content
  • Develop and review policy in support of the use of both enterprise devices and use of personal devices for work-related purposes
1More

Emerald | Diffusion of innovation theories and their relevance to understanding the rol... - 0 views

  •  
    Holland, M. (1997). Diffusion of innovation theories and their relevance to understanding the role of librarians when introducing users to networked information. The Electronic Library, 15(5), 389-394. doi:10.1108/eb045587 Start at part 2. Background and History p.390 
27More

Reprogramming The Museum | museumsandtheweb.com - 0 views

  • Powerhouse experie
  • her APIs
  • Flickr AP
  • ...23 more annotations...
  • Thomson Reuters OpenCalais
  • OCLC's WorldCat
  • Before we began our work on the Commons on Flickr, some museum colleagues were concerned that engaging with the Flickr community would increase workloads greatly. While the monitoring of the site does take some work, the value gained via the users has far outweighed any extra effort. In some cases, users have dated images for us.
  • In subsequent use of the Flickr API, we appropriated tags users had added to our images, and now include them in our own collection database website (OPAC). We also retrieved geo-location data added to our images for use in third party apps like Sepiatown and Layar.
  • In our case the purpose of creating an API was to allow others to use our content.
  • So consider the questions above not in the context of should we or shouldn't we put our data online (via an API or otherwise) but rather in the context of managing expectations of the data's uptake.
  • Steps to an API
  • several important things which had to happen before we could provide a public web API. The first was the need to determine the licence status of our content.
  • The drive to open up the licensing of our content came when, on a tour we conducted of the Museum's collection storage facilities for some Wikipedian
  • This prompted Seb Chan to make the changes required to make our online collection documentation available under a mix of Creative Commons licences. (Chan, April 2009)
  • Opening up the licensing had another benefit: it meant that we had already cleared one hurdle in the path to creating an API.
  • The Government 2.0 Taskforce (http://gov2.net.au/about/) was the driver leading us to take the next step.
  • "increasing the openness of government through making public sector information more widely available to promote transparency, innovation and value adding to government information"
  • the first cultural institution in Australia to provided a bulk data dump of any sort.
  • The great thing about this use is that it exposes the Museum and its collection to the academic sector, enlightening them regarding potential career options in the cultural sector.
  • I will briefly mention some of the technical aspects of the API now for those interested. In line with industry best practice the Powerhouse Museum is moving more and more to open-source based hosting and so we chose a Linux platform for serving the API
  • Images are served from the cloud as we had already moved them there for our OPAC, to reduce outgoing bandwidth from the Museum's network.
  • Once we had the API up and running, we realised it would not be too much work to make a WordPress plug-in which allowed bloggers to add objects from our collection to their blogs or blog posts. Once built, this was tested internally on our own blogs. Then in early 2011 we added it to the WordPress plugin directory: http://wordpress.org/extend/plugins/powerhouse-museum-collection-image-grid/
  • One of the main advantages the API has over the data dump is the ability to track use.
  • It is also worth noting that since the API requests usually do not generate pages that are rendered in a browser it is not possible to embed Google Analytics tracking scripts in the API's output.
  • y requiring people to sign up using a valid email address before requesting an API key we are able to track API use back to individuals or organisations.
  • Concerns that people would use the API inappropriately were dealt with by adding a limit to the number of requests per hour each key can generate
  • An Application Programming Interface (API) is a particular set of rules and specifications that a software program can follow to access and make use of the services and resources provided by another particular software program
  •  
    Dearnley, L. (2011). Repreogramming the museum. In Museums and the Web 2011 : Proceedings. Presented at the Museums and the Web 2011, Toronto: Archives & Museum Informatics. Retrieved from http://conference.archimuse.com/mw2011/papers/reprogramming_the_museum
1More

Social Metadata for Libraries, Archives, and Museums - 0 views

  •  
    Smith-Yoshimura, K., & Shein, C. (2011). User contributions sought by LAMs. Social Metadata for Libraries, Archives and Museums Part 1: Site Reviews (pp. 13-36). Dublin  Ohio: OCLC. Retrieved from http://www.oclc.org/research/publications/library/2011/2011-02r.htm Skim-read this to ensure that you understand the definitions of the seven different ways that libraries, archives and museums are using social metadata. Read more of this report if you are interested:
1More

What Is Web 2.0 - O'Reilly Media - 0 views

  •  
    O'Reilly, T. (2005, September 30). What Is Web 2.0 - O'Reilly Media. Retrieved September 10, 2010, from http://oreilly.com/web2/archive/what-is-web-20.html To discover how Tim O'Reilly originally conceptualised Web 2.0, please read the following explanation. Do not worry too much about understanding every web tool mentioned or all the technical processes. Do pay particular attention to the discussion of RSS on page 3 and the different ways that users relate to the web in this vision.
9More

safer internet group - 5 Point Plan - 0 views

  • The Safer Internet Group brings together a diverse group of stakeholders who all share the goal of developing the Internet as a platform for education, communication and economic activity.
  • Australia needs to take effective action to ensure that Internet users, and particularly children, have a safe experience online, while ensuring that the benefits of the open Internet are available to all Australians.
  • We believe our way is comprehensive and practical. More importantly, we know it works. It delivers:
  • ...5 more annotations...
  • . More Effective Education
  • Comprehensive Policing of Illegal material on the Internet
  • User Tools that work
  • A new dialogue about Internet safety
  • Targeted Research of Internet Risks and Opportunities for Young People
  •  
    Safer Internet Group (2009) 5 Point Plan. Retrieved from http://www.saferinternetgroup.org/5pointplan.html (The Australian Library and Information Association is one of the members of the Safer Internet Group)
1More

Network Passwords | Infopeople - 0 views

  • Your library or organization should consider adopting the following rules for network passwords:Passwords may not be blankPasswords must be seven or more characters longPasswords must use a mixture of letters (upper and lower case), numbers and charactersPasswords must be changed on a regular basisPasswords must be successively unique (in other words, users shouldn't use the same password repeatedly)Passwords must never be written down or posted in an insecure location (such as on a monitor)In addition, consider adding these prohibitions:Passwords cannot be the user's name, the name of someone in their family, or their birth datePasswords must not be constructed by adding a numeral or character to the beginning or end of a regular word; this is too easily guessed (e.g."chair1")
3More

Page 4. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • The Web is an application that runs on the Internet
  • Although internet and web designs are separate, a Web user is also an Internet user and therefore relies on an Internet that is free from interference.
  • Technology for interference has become more powerful
4More

Zoom Q3HD Handy Video Recorder: Review and comparison with iPhone 4 video | TUAW - The ... - 0 views

  • Recording video with the Zoom Q3HD is quite easy. Press one button on the side of the device to power it up, press the large red record button on the back of the device once to start recording, then press the record button again to stop. Playback is equally easy, with a play button conveniently located just below the display.
  • Update: Several commenters noted that the audio is out of sync with the video on both Zoom videos. This is not the case with the original files, and appears to be a problem with the way that YouTube handled the uploaded file. Zoom is looking into the situation and I will update again as soon as I hear more.
  • In the end, it's all going to boil down to two things: whether you have the money to buy a secondary video camera such as the Zoom Q3HD and if you truly need the extra video quality of this camera for your needs
  • ...1 more annotation...
  • For other Mac users, the Zoom Q3HD might be an excellent way to capture HD video at a relatively bargain price of $300 compared to higher end dedicated camcorders.
18More

The Code4Lib Journal - How Hard Can It Be? : Developing in Open Source - 0 views

  • We experienced freedom to explore alternate avenues, to innovate, to take risks in ways that would have been difficult under the direct control of a district council.
  • patrons made it clear that while they appreciated that computers were a necessary part of a modern library, they did not consider them the most important part.
  • Our overall objective was to source a library system which: could be installed before Y2K complications immobilised us, was economical, in terms of both initial purchase and future license and maintenance support fees, ran effectively and fast by dial-up modem on an ordinary telephone line, used up-to-the minute technologies, looked good, and was easy for both staff and public to use, took advantage of new technology to permit members to access our catalogue and their own records from home, and let us link easily to other sources of information – other databases and the Internet. If we could achieve all of these objectives, we’d be well on the way to an excellent service.
  • ...14 more annotations...
  • "How hard can it be" Katipo staff wondered, "to write a library system that uses Internet technology?" Well, not very, as it turned out.
  • Koha would thus be available to anyone who wanted to try it and had the technical expertise to implement it.
  • fairly confident that we already had a high level of IT competence right through the staff, a high level of understanding of what our current system did and did not do.
  • ensure the software writers did not miss any key points in their fundamental understanding of the way libraries work.
  • The programming we commissioned cost us about 40% of the purchase price of an average turn-key solution.
  • no requirement to purchase a maintenance contract, and no annual licence fees.
  • An open source project is never finished.
  • Open source projects only survive if a community builds up around the product to ensure its continual improvement. Koha is stronger than ever now, supported by active developers (programmers) and users (librarians)
  • There are a range of support options available for Koha, both free and paid, and this has contributed to the overall strength of the Koha project.
  • Vendors like Anant, Biblibre, ByWater, Calyx, Catalyst, inLibro, IndServe, Katipo, KohaAloha, LibLime, LibSoul, NCHC, OSSLabs, PakLAG, PTFS, Sabinet, Strategic Data, Tamil and Turo Technology take the code and sell support around the product, develop add-ons and enhancements for their clients and then contribute these back to the project under the terms of the GPL license.
  • FRBR [5] arrangement, although of course it wasn’t called that 10 years ago, it was just a logical way for us to arrange the catalogue. A single bibliographic record essentially described the intellectual content, then a bunch of group records were attached, each one representing a specific imprint or publication.
  • The release of Koha 3.0 in late 2008 brought Koha completely into the web 2.0 age and all that entails. We are reconciled to taking a small step back for now, but the FRBR logic is around and RDA should see us back where want to be in a year or so – but with all the very exciting features and opportunities that Koha 3 has now.
  • In the early days, the Koha list appeared to have been dominated by programmers but I have noticed a lot more librarians participating now
  • "Adopt technology that keeps data open and free, abandon[ing] technology that does not." The time is right for OSS.
  •  
    For more information about Koha and how it was developed, see: Ransom, J., Cormack, C., & Blake, R. (2009). How Hard Can It Be? : Developing in Open Source. Code4Lib Journal, (7). Retrieved from http://journal.code4lib.org/articles/1638
4More

Library 2.0 Theory: Web 2.0 and Its Implications for Libraries - 0 views

  • Already libraries are creating RSS feeds for users to subscribe to, including updates on new items in a collection, new services, and new content in subscription databases.
  • hybrid applications, where two or more technologies or services are conflated into a completely new, novel service.
  • personalized OPAC that includes access to IM, RSS feeds, blogs, wikis, tags, and public and private profiles within the library's network.
  •  
    Maness, J. (2006). Library 2.0 Theory: Web 2.0 and its Implications for Libraries. Webology, 3(2). Retrieved from http://webology.ir/2006/v3n2/a25.html
12More

Recordkeeping In Brief 62 - FAQs about cloud computing - State Records NSW - 0 views

  • Cloud computing is internet-based computing whereby shared resources, software and information are provided to computers and other devices on demand.
  • Cloud computing is a general term for anything that involves delivering hosted services over the Internet.
  • There are a range of applications that can be delivered to users via cloud computing models, from email or content management to specialist applications for activities such as project management or human resources management to data storage.
    • Joanne S
       
      Models include: Software-as-a-Service (SaaS) Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS)
  • ...8 more annotations...
  • A cloud can be private or public:
  • As with any business related activity there are both risks and opportunities associated with using cloud computing services.
  • potentially a number of business and information risks associated with using cloud computing services.
  • noted that even if the cloud computing environment is managed wholly within NSW an appropriate risk assessment of the service and the provider should occur.
  • level of risk that an organisation attributes to a proposed cloud computing arrangement will vary according to the content or subject matter of their records
  • The content of the contract in these types of service arrangements is very important.
  • What are others saying? Australia Australasian Digital Recordkeeping Initiative (ADRI), Advice on managing the recordkeeping risks associated with cloud computing, July 2010, available at http://www.adri.gov.au Defence Signals Directorate (Commonwealth), Cloud computing security considerations, April 2011, available at http://www.dsd.gov.au/infosec/cloudsecurity.htm Department of Finance and Deregulation (Commonwealth), Cloud computing strategic direction paper: opportunities and applicability for use by the Australian Government, April 2011, available at http://www.finance.gov.au/e-government/strategy-and-governance/docs/final_cloud_computing_strategy_version_1.pdf
  • International Archives and Records Association UK and Ireland, Cloud computing toolkit: guidance for outsourcing information storage to the cloud, August 2010, available at http://www.archives.org.uk/images/documents/Cloud_Computing_Toolkit-2.pdf – this guidance contains a comprehensive overview of the range of cloud computing services available and the recordkeeping considerations that apply to each CIO Council and Chief Acquisition Officers Council (USA), Creating effective cloud computing contracts for the Federal Government: best practices for acquiring IT as a service, February 2012, available at http://www.cio.gov/cloudbestpractices.pdf – this is a comprehensive and useful document for those seeking to procure cloud computing services
16More

Scot Colford, "Explaining free and Open Source software," - 0 views

  • Ten criteria must be met in order for a software distribution to be considered open source:
  • Free redistribution
  • the source code freely available to developers.
  • ...13 more annotations...
  • The license must permit modifications
  • Integrity of the author's source code
  • No discrimination against persons or groups
  • No discrimination against fields of endeavor
  • same license must be passed on to others when the program is redistributed.
  • License must not be specific to a product
  • License must not restrict other software
  • License must be technology-neutral
  • list of the nine most widely used licenses is
  • Apache Software License 2.0 (www.apache.org/licenses/LICENSE-2.0.html) New BSD License (www.opensource.org/licenses/bsd-license.php) GNU General Public License (GPL) (www.gnu.org/licenses/gpl.html) GNU Lesser General Public License (LGPL) (www.gnu.org/licenses/lgpl.html) MIT License (www.opensource.org/licenses/mit-license.php) Mozilla Public License 1.1 (MPL) (www.mozilla.org/MPL/MPL-1.1.html) Common Development and Distribution License (www.sun.com/cddl/cddl.html) Common Public License 1.0 (www.ibm.com/developerworks/library/os-cpl.html)  Eclipse Public License (www.eclipse.org/legal/epl-v10.html) [5].
  • common misconception, alluded to above, is that since the source code is freely distributed without royalty or licensing fee, open source applications are free of cost.
  • Free and open source software application users, on the other hand, must rely on development communities for support.
  • The pervasiveness of the World Wide Web guarantees that nearly every information organization is using free or open source software to perform some function.
21More

The Strongest Link: Libraries and Linked Data - 0 views

  • For many years now we have been hearing that the semantic web is just around the corner
  • most libraries, however, is that we are still grappling with 2.0 technologies.
  • By marking up information in standardized, highly structured formats like Resource Description Framework (RDF), we can allow computers to better "understand" the meaning of content
  • ...17 more annotations...
  • For most librarians this concept is fairly easy to understand. We have been creating highly structured machine-readable metadata for many years
  • By linking our data to shared ontologies that describe the properties and relationships of objects, we begin to allow computers not just to "understand" content, but also to derive new knowledge by "reasoning" about that content.
  • the term "Semantic Web" to refer to a full suite of W3C standards including RDF, SPARQL query language, and OWL web ontology language.
  • This article will outline some of the benefits that linked data could have for libraries, will discuss some of the non-technical obstacles that we face in moving forward, and will finally offer suggestions for practical ways in which libraries can participate in the development of the semantic web.
  • What benefits will libraries derive from linked data?
  • Having a common format for all data would be a huge boon for interoperability and the integration of all kinds of systems.
  • The linking hub would expose a network of tightly linked information from publishers, aggregators, book and journal vendors, subject authorities, name authorities, and other libraries.
  • semantic search could take us far beyond the current string-matching capabilities of search engines like Google.
  • What are the major obstacles for libraries?
  • A fundamental challenge for the development of linked data in libraries is lack of awareness.
  • Linked Data becomes more powerful the more of it there is.
  • Until there is enough linking between collections and imaginative uses of data collections there is a danger librarians will see linked data as simply another metadata standard, rather than the powerful discovery tool it will underpin.
  • a more practical concern is that changing the foundation of library metadata is no trivial task.
  • Privacy is a huge concern for many interested in linked data.
  • Related to privacy is trust.
  • Rights management poses potential problems for linked data in libraries. Libraries no longer own much of the content they provide to users; rather it is subscribed to from a variety of vendors.
  • What needs to happen to move libraries to the next level?
  •  
    Byrne, G., & Goddard, L. (2010). The Strongest Link: Libraries and Linked Data. D-Lib Magazine, 16(11/12). doi:10.1045/november2010-byrne Retrieved from http://www.dlib.org/dlib/november10/byrne/11byrne.html
2More

SEO: The Beginners guide to SEO - 0 views

  • Search queries, the words that users type into the search box, carry extraordinary value.
  • In addition to making content available to search engines, SEO also helps boost rankings so that content will be placed where searchers will more readily find it.
6More

BBC News - French downloaders face government grilling - 0 views

  • Hadopi takes its name from the 2009 legislation which permits authorities to fine copyright infringers, or to cut off their internet connection.
  • In the UK, the Digital Economy Act makes some similar provisions, although the exact nature of possible sanctions has yet to be fully explained.
  • It has sent a total of 470,000 first warnings by email, with 20,000 users receiving a second warning through the mail.
  • ...1 more annotation...
  • If the person does not confess or does not even show up, the only evidence the agency can present before the judge is a series of numbers - a particular computer's IP address
  •  
    "We looked at what it would mean if the internet was a "human right" in France, given that there is legislation that people who violate copyright can have internet access cut off for up to a month."
  •  
    "We looked at what it would mean if the internet was a "human right" in France, given that there is legislation that people who violate copyright can have internet access cut off for up to a month."
1 - 20 of 23 Next ›
Showing 20 items per page