Skip to main content

Home/ IMT122 OUA Group/ Group items tagged wikis

Rss Feed Group items tagged

Joanne S

MobileRead Wiki - E-book Reader Matrix - 0 views

  •  
    E-book Reader Matrix. (2011). Mobile Read. Retrieved from http://wiki.mobileread.com/wiki/E-book_Reader_Matrix
Joanne S

What is a Database, really? Data Storage for Librarians « The Other Librarian - 0 views

  • A Text File Good old text is still not a bad way to store data. 
  • If you want to retrieve that information, you can use a script to tell the computer to organize the information in a particular way.   This is called parsing
  • Structured Text As you climb the data food chain, complex systems get developed to organize information. 
  • ...17 more annotations...
  • Mark-up:   Marked information is data that has marks or signals to let a computer distinguish one type of data from the other.  
  • A variable:   A variable happens when you give some data a name. 
  • A string:   A string is a kind of variable that has text.
  • An array:   An array is a type of variable that includes a list used by computer programs for later manipulation.    
  • An object:   Explaining objects in full requires that someone read up on object-oriented programming.  
  • Tree-based  Structures Tree-based structures, or cluster models are a subset of “structured text” data storage models.  
  • XML is probably the best example.
  • data is organized in “parents”, “siblings” and “children”.
  • The Relational Model The relational model is better than a tree-model when your dataset is large and complicated.    The way it works is, instead of thinking in terms of “parents, siblings and children,” you think in term of relationships.
  • the “Primary Key.”   This means that every data object (such as a library) has a way of identifying itself in a unique way
  • a “Foreign Key.”    The Foreign key is a way to associate one dataset (eg. libraries) with another dataset (eg. library branches, hospitals or businesses).
  • This association is called a relationship.
  • In more complicated relationships (called the Many-to-Many relationship), you might have to create a third table to associate two entities.      
  • TEXT/XML Based Text files can be organized in such a way as to accommodate some of the benefits of the relational model.
  • Two examples of XML-based databases include Xindice and Sedna.
  • SQL/Binary-based Databases The more common relational database type is a piece of software running on a server, rather than a set of text files.   They are generally accessed using a standard language called SQL (Structure Query Language), or more specifically SQL as supported by a popular scripting language like PHP, Python or Java.
  • Almost any major web application will have a combination of all these types of data storage methods!  
  •  
    How databases are used in libraries
Joanne S

Wikis in Plain English - YouTube - 0 views

  •  
    Wikis in Plain English. (2007). . Retrieved from http://www.youtube.com/watch?v=-dnL00TdmLY
Joanne S

Comparison of e-book formats - Wikipedia, the free encyclopedia - 0 views

  •  
    Comparison of e-book formats. (2011). In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Comparison_of_e-book_formats (look at the matrix)
Joanne S

Comparison of e-book readers - Wikipedia, the free encyclopedia - 0 views

  •  
    Comparison of e-book readers. (2011). In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Comparison_of_e-book_readers#Devices_sold_directly_by_the_manufacturer
Joanne S

Go To Hellman: Ten Evil Uses for URL Shortening Services - 0 views

  • Today, we cover URL shortening services:  Bit.ly, TinyURL, Ow.ly and friends.
  • Here are ten link shortening menaces for you to nibble on.
  • cross-site scripting vulnerability
  • ...7 more annotations...
  • Phishing attacks
  • SQL injection
  • Spam blocking
  • avoid the porn filter
  • Shortened links are free, so you can use a new one for every recipient.
  • PURL. If one of your machines gets taken out, you can edit the PURL to keep your link working, and shorten it for good measure.
  • As I've described here, there are lots of ways to abuse a link redirection service
Joanne S

Archives & Museum Informatics: Museums and the Web 2009: Paper: Gow, V. et al., Making ... - 0 views

  • New Zealand content difficult to discover, share and use
  • DigitalNZ is testing ways to create digital content, collect and share existing digital content, and build smart, freely available search and discovery tools.
  • Memory Maker blurs the line between consuming and producing content. What’s sometimes called ‘remix culture’ […]. Digital technologies have opened up new possibilities for young people to access and represent the stories of their culture by taking sound and images and recombining them to say something new, something relevant to them. (Sarah Jones, Lunch Box: Software & digital media for learning, November 2008) http://lunchbox.org.nz/2008/11/get-coming-home-on-your-schools-website-wiki-or-blog/)
  • ...7 more annotations...
  • The Memory Maker provides a taste of what is possible when collecting institutions modernise their practices for keeping and managing copyright information, using Creative Commons licenses or ‘no known copyright’ statements.
  • Learning about ‘hyperlinks’ today, these young New Zealanders will be the developers and creators of tomorrow.
  • The full set of contributions is accessible through a Coming Home search tool, occasionally on a google-like hosted search page (Figure 5), but more often through a search widget embedded on many New Zealand Web sites (Figure 6).
  • Digital New Zealand is developing and testing solutions that showcase what’s possible when we really focus on improving access to and discovery of New Zealand content.
  • Technically, the Digital New Zealand system is in three parts: a backend, a metadata store, and a front end.
  • The coolest thing to be done with your data will be thought of by someone else
  • “an API is basically a way to give developers permission to hack into your database”.
  •  
    Gow, V., Brown, L., Johnston, C., Neale, A., Paynter, G., & Rigby, F. (2009). Making New Zealand Content Easier to Find, Share and Use. In Museums and the Web 2009. Presented at the Museums and the Web 2009, Toronto: Archives & Museum Informatics, Retrieved from http://www.archimuse.com/mw2009/papers/gow/gow.html
Joanne S

A social media policy for a one branch public library » Librarians Matter - 1 views

  • “Social Media.” includes community created content sites like Blogs, Forums, Flickr, YouTube, Wikis, Social Networks, Twitter and other content sharing sites.
  • When you use social media your behaviour  and content is not only a reflection of you but also of (our) Library.
  • Social Media Do’s Be Professional – Talk the way you would talk to real people in professional situations. Be Courteous – Be sure to listen & ask questions. Be Accurate – Check your facts before you post and provide supporting sources if necessary. Be Useful – Add content because you have something interesting to say, not for the sake of regular posting. Be Intelligent – Provide some value. Don’t talk down. Offer insight. Be Conversational –  Avoid overly pedantic or “composed” language. Don’t be afraid to bring in your own personality. Be Non-confrontational – If you disagree, do so respectfully Be Prompt – If you need to moderate or respond to a comment do so as quickly as possible Be Identifiable – Use your real name and do not post anonymously. Be Transparent – Disclose that you work for the library if this is relevant and be honest & truthful. Social Media Don’ts Don’t Share Secrets –If you aren’t sure you can disclose something, just don’t do it. Think about privacy, confidentiality and permission to use other people’s content. Don’t Bad Mouth – Keep the language clean & avoid slamming people or companies. Don’t Complain – If you don’t have anything nice to say, don’t say anything at all. Don’t do Stupid Things – If it doesn’t help the Library or our community, don’t do it. Don’t Defame – Show everyone respect. Don’t Forget your day job –Social Media can consume you so don’t forget your other duties. Moderate, balanced use is essential.
  •  
    Greenhill, K., & Fay, J. (2010, September 10). A social media policy for a one branch public library. Librarians Matter. Retrieved October 1, 2010, from http://librariansmatter.com/blog/2010/09/10/a-social-media-policy-for-a-one-branch-public-library/
Joanne S

Library 2.0 Theory: Web 2.0 and Its Implications for Libraries - 0 views

  • Already libraries are creating RSS feeds for users to subscribe to, including updates on new items in a collection, new services, and new content in subscription databases.
  • hybrid applications, where two or more technologies or services are conflated into a completely new, novel service.
  • personalized OPAC that includes access to IM, RSS feeds, blogs, wikis, tags, and public and private profiles within the library's network.
  •  
    Maness, J. (2006). Library 2.0 Theory: Web 2.0 and its Implications for Libraries. Webology, 3(2). Retrieved from http://webology.ir/2006/v3n2/a25.html
Joanne S

What is Cloud Computing and How will it Affect Libraries? | TechSoup for Libraries - 0 views

  • If you’ve used any of the popular Web 2.0 services over the past few years (e.g. Gmail, Wikipedia, Flickr or Twitter), you already have some experience with cloud computing
  • Like water and electricity, a computing cloud is a communally-shared resource that you lease on a metered basis, paying for as little or as much as you need, when you need it
    • Joanne S
       
      Benefits-  Cost Savings, Flexibility and Innovation.
  • ...4 more annotations...
  • As individuals and members of organizations, we’re already choosing between desktop applications and cloud applications when it comes to e-mail, RSS, file storage, word processing and other simple applications. Sooner or later we’ll have to make this choice for mission-critical enterprise applications too
  • Libraries may soon be building and managing their own data centers.
  • For more practical, technical explanations of cloud computing, check out the Wikipedia article the Anatomy of Cloud Computing the MIT Technology Review Briefing on Cloud Computing.
  • For a discussion of problems and concerns about the digital cloud, read: How Secure is Cloud Computing? Security in the Ether Industry Challenges: The Standards Question
Joanne S

Page 4. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • The Web is an application that runs on the Internet
  • Although internet and web designs are separate, a Web user is also an Internet user and therefore relies on an Internet that is free from interference.
  • Technology for interference has become more powerful
Joanne S

National Library of Australia IT Architecture Project Report - 0 views

  •  
    Advanced Reading about integrating information in many databases into one access point. National Library of Australia. (2007). National Library of Australia IT Architecture Project Report. Canberra, A.C.T.: National Library of Australia. Retrieved from http://www.nla.gov.au/dsp/documents/itag.pdf
1 - 12 of 12
Showing 20 items per page