Mobile Strategy | National Library of Australia - 0 views
-
must move towards a model with comprehensive mobile access to online services
-
mobile’ has come to encompass an ever-expanding field of devices, platforms and content
-
Smart (internet enabled) or dumb/cellular
- ...98 more annotations...
Eli Pariser: Beware online "filter bubbles" | Video on TED.com - 0 views
-
-
Mark Zuckerberg, a journalist was asking him a question about the news feed. And the journalist was asking him, "Why is this so important?" And Zuckerberg said, "A squirrel dying in your front yard may be more relevant to your interests right now than people dying in Africa." And I want to talk about what a Web based on that idea of relevance might look like. So when I was growing up in a really rural area in Maine, the Internet meant something very different to me. It meant a connection to the world. It meant something that would connect us all together. And I was sure that it was going to be great for democracy and for our society. But there's this shift in how information is flowing online, and it's invisible. And if we don't pay attention to it, it could be a real problem. So I first noticed this in a place I spend a lot of time -- my Facebook page. I'm progressive, politically -- big surprise -- but I've always gone out of my way to meet conservatives. I like hearing what they're thinking about; I like seeing what they link to; I like learning a thing or two. And so I was surprised when I noticed one day that the conservatives had disappeared from my Facebook feed. And what it turned out was going on was that Facebook was looking at which links I clicked on, and it was noticing that, actually, I was clicking more on my liberal friends' links than on my conservative friends' links. And without consulting me about it, it had edited them out. They disappeared. So Facebook isn't the only place that's doing this kind of invisible, algorithmic editing of the Web. Google's doing it too. If I search for something, and you search for something, even right now at the very same time, we may get very different search results. Even if you're logged out, one engineer told me, there are 57 signals that Google looks at -- everything from what kind of computer you're on to what kind of browser you're using to where you're located -- that it uses to personally tailor you
-
-
Podcast downloadable at - http://itunes.apple.com/au/podcast/eli-pariser-beware-online/id470623747?i=106115787
Library 2.0 and User-Generated Content What can the users do for us? - 0 views
-
Danowski, P. (2007). Library 2.0 and User-Generated Content What can the users do for us? In World Library and Information Congress: 73rd IFLA General Conference and Council. Durban, South Africa: IFLA. Retrieved from http://archive.ifla.org/IV/ifla73/papers/113-Danowski-en.pdf
Companies and information: The leaky corporation | The Economist - 0 views
-
the WikiLeaks threat and the persistent leaking of other supposedly confidential corporate information have brought an important issue to the fore.
-
Companies are creating an ever-growing pile of digital information, from product designs to employees' e-mails.
-
Much of this information would do little damage if it seeped into the outside world; some of it, indeed, might well do some good. But some could also be valuable to competitors—or simply embarrassing—and needs to be protected. Companies therefore have to decide what they should try to keep to themselves and how best to secure it.
- ...10 more annotations...
Library 2.0 : service for the next generation library. - 0 views
-
he heart of Library 2.0 is user-centered change
-
nviting user participatio
-
It also attempts to reach new users and better serve current ones through improved customer-driven offerin
- ...6 more annotations...
-
Casey, M. E., & Savastinuk, L. C. (2006). Library 2.0 : service for the next generation library. Library Journal, 131(4), 40-42. Retrieved from http://www.libraryjournal.com/article/CA6365200.html
Scot Colford, "Explaining free and Open Source software," - 0 views
-
Ten criteria must be met in order for a software distribution to be considered open source:
-
Free redistribution
-
the source code freely available to developers.
- ...13 more annotations...
K. G Schneider, "The Thick of the Fray: Open Source Software in Libraries in the First ... - 0 views
-
the vast majority of libraries continue to rely on legacy proprietary systems
-
iVia,
-
there are at least a dozen active OSS projects based in or with their genesis in library organizations
- ...10 more annotations...
Page 6. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views
-
Linking to the Future As long as the web’s basic principles are upheld, its ongoing evolution is not in the hands of any one person or organization—neither mine nor anyone else’s. If we can preserve the principles, the Web promises some fantastic future capabilities.
-
Locked within all these data is knowledge about how to cure diseases, foster business value and govern our world more effectively.
-
We should examine legal, cultural and technical options that will preserve privacy without stifling beneficial data-sharing capabilities.
- ...1 more annotation...
Page 1. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views
-
profound concept: that any person could share information with anyone else, anywhere.
-
Web evolved into a powerful, ubiquitous tool because it was built on egalitarian principles and because thousands of individuals, universities and companies have worked, both independently and together as part of the World Wide Web Consortium
-
Large social-networking sites are walling off information posted by their users from the rest of the Web.
- ...3 more annotations...
1 - 12 of 12
Showing 20▼ items per page