Skip to main content

Home/ IMT122 OUA Group/ Contents contributed and discussions participated by Joanne S

Contents contributed and discussions participated by Joanne S

Joanne S

Database design basics - Access - Office.com - 0 views

  •  
    Designing elements and database design
Joanne S

What is a Database, really? Data Storage for Librarians « The Other Librarian - 0 views

  • A Text File Good old text is still not a bad way to store data. 
  • If you want to retrieve that information, you can use a script to tell the computer to organize the information in a particular way.   This is called parsing
  • Structured Text As you climb the data food chain, complex systems get developed to organize information. 
  • ...17 more annotations...
  • Mark-up:   Marked information is data that has marks or signals to let a computer distinguish one type of data from the other.  
  • A variable:   A variable happens when you give some data a name. 
  • A string:   A string is a kind of variable that has text.
  • An array:   An array is a type of variable that includes a list used by computer programs for later manipulation.    
  • An object:   Explaining objects in full requires that someone read up on object-oriented programming.  
  • Tree-based  Structures Tree-based structures, or cluster models are a subset of “structured text” data storage models.  
  • XML is probably the best example.
  • data is organized in “parents”, “siblings” and “children”.
  • The Relational Model The relational model is better than a tree-model when your dataset is large and complicated.    The way it works is, instead of thinking in terms of “parents, siblings and children,” you think in term of relationships.
  • the “Primary Key.”   This means that every data object (such as a library) has a way of identifying itself in a unique way
  • a “Foreign Key.”    The Foreign key is a way to associate one dataset (eg. libraries) with another dataset (eg. library branches, hospitals or businesses).
  • This association is called a relationship.
  • In more complicated relationships (called the Many-to-Many relationship), you might have to create a third table to associate two entities.      
  • TEXT/XML Based Text files can be organized in such a way as to accommodate some of the benefits of the relational model.
  • Two examples of XML-based databases include Xindice and Sedna.
  • SQL/Binary-based Databases The more common relational database type is a piece of software running on a server, rather than a set of text files.   They are generally accessed using a standard language called SQL (Structure Query Language), or more specifically SQL as supported by a popular scripting language like PHP, Python or Java.
  • Almost any major web application will have a combination of all these types of data storage methods!  
  •  
    How databases are used in libraries
Joanne S

How to get better marks in a university assignment. What this marker wants you to know ... - 1 views

    • Joanne S
       
      What you need to do to get better marks. What markers want you to know. Use APA6. Markers already know you are clever and capable. Markers want to give you marks but you need to help them. How? 1. Answer the Question. 2. Know the Marking criteria. 3. Do what is says 4. Use conventions of Academic Writing 3.1 Demonstrate,  Show Evidence Of We give you marks for what you show. 3.2 Growth of subject knoweledge. Critical thinking. Insight into material covered.
    • Joanne S
       
      Show basic knowledge of terms and readings. Spell out abbreviations. Correct scholarly writing
    • Joanne S
       
      Critical thinking about the subject and readings. Have I shown the "So what?"  Evaluative and showing both sides of the story.
    • Joanne S
       
      4. Show clearly your own ideas. In Academic writing, if you do not clearly indicate where an idea comes from, the reader presumes you are claiming it as original thought. Your critical engagement with the ideas. It's up to you to demonstrate the seperation of ideas, what's yours and what is the readings. To get more marks: Read the question Answer it. All of it. Know the marking criteria Remember markers want to give you marks but you have to demonstrate what you know Be specific Use academic writing Clarify what is you idea and what is someone else Show critical and evaluative thinking
  •  
    Markers already know you are clever and capable.
Joanne S

Page 6. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • Linking to the Future As long as the web’s basic principles are upheld, its ongoing evolution is not in the hands of any one person or organization—neither mine nor anyone else’s. If we can preserve the principles, the Web promises some fantastic future capabilities.
  • Locked within all these data is knowledge about how to cure diseases, foster business value and govern our world more effectively.
  • We should examine legal, cultural and technical options that will preserve privacy without stifling beneficial data-sharing capabilities.
  • ...1 more annotation...
  • The goal of the Web is to serve humanity. We build it now so that those who come to it later will be able to create things that we cannot ourselves imagine.
Joanne S

Page 5. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • Debate has risen again in the past year about whether government legislation is needed to protect net neutrality.
  • Accessing the information within an Internet packet is equivalent to wiretapping a phone or opening postal mail.
  • Totalitarian governments aren’t the only ones violating the network rights of their citizens.
  • ...1 more annotation...
  • “No person or organization shall be deprived of the ability to connect to others without due process of law and the presumption of innocence.”
Joanne S

Page 4. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • The Web is an application that runs on the Internet
  • Although internet and web designs are separate, a Web user is also an Internet user and therefore relies on an Internet that is free from interference.
  • Technology for interference has become more powerful
Joanne S

Page 3. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • Web Consortium’s royalty-free patent policy says that the companies, universities and individuals who contribute to the development of a standard must agree they will not charge royalties to anyone who may use the standard.
  • Apple’s iTunes system, for example, identifies songs and videos using URIs that are open. But instead of “http:” the addresses begin with “itunes:,” which is proprietary. You can access an “itunes:”
  • martphone “apps” rather than Web apps is disturbing, because that material is off the Web.
Joanne S

Page 2. Long Live the Web: A Call for Continued Open Standards and Neutrality: Scientif... - 0 views

  • Several threats to the Web’s universality have arisen recently. Cable television companies that sell Internet connectivity are considering whether to limit their Internet users to downloading only the company’s mix of entertainment.
  • Social-networking sites present a different kind of problem. Facebook, LinkedIn, Friendster and others typically provide value by capturing information as you enter it
  • The sites assemble these bits of data into brilliant databases and reuse the information to provide value-added service—but only within their sites.
  • ...1 more annotation...
  • The basic Web technologies that individuals and companies need to develop powerful services must be available for free, with no royalties.
Joanne S

xkcd: Password Strength - 0 views

  •  
    Cartoon/Picture
Joanne S

Full Report - Information Systems Audit Report: Full Report (No. 4). Perth, Western Au... - 0 views

  •  
    ( Full report at Office of the Auditor General for Western Australia. (2011). Information Systems Audit Report: Full Report (No. 4). Perth, Western Australia. Retrieved from http://www.audit.wa.gov.au/reports/pdfreports/report2011_04.pdf )
Joanne S

Office of the Auditor General for Western Australia. (2011). Information Systems Audit ... - 0 views

  •  
    Office of the Auditor General for Western Australia. (2011). Information Systems Audit Report: Summary. Perth, Western Australia. Retrieved from http://www.audit.wa.gov.au/reports/pdfreports/insert2011_04.pdf
Joanne S

Companies and information: The leaky corporation | The Economist - 0 views

  • the WikiLeaks threat and the persistent leaking of other supposedly confidential corporate information have brought an important issue to the fore.
  • Companies are creating an ever-growing pile of digital information, from product designs to employees' e-mails.
  • Much of this information would do little damage if it seeped into the outside world; some of it, indeed, might well do some good. But some could also be valuable to competitors—or simply embarrassing—and needs to be protected. Companies therefore have to decide what they should try to keep to themselves and how best to secure it.
  • ...10 more annotations...
  • more and more data are seeping out of companies, even of the sort that should be well protected.
  • To be able to work better with data, employees often transfer them into spreadsheets and other types of files that are easier to manipulate—but also easier to lose control of.
  • Although most leaks are not deliberate, many are.
  • “data loss prevention” (DLP).
  • software that sits at the edge of a firm's network and inspects the outgoing data traffic.
  • “bells in the dark”. False records—made-up pieces of e-mail, say—are spread around the network. Because they are false, no one should gain access to them. If somebody does, an alarm is triggered
  • In the corporate world, to limit the channels through which data can escape, some companies do not allow employees to bring their own gear to work or to use memory sticks or certain online services.
  • How then to strike the right balance between secrecy and transparency?
  • Intel, the world's largest chipmaker, issues “speeding tickets” to employees who break its rules.
  • Transparency is not just a natural inclination but a necessity, says Mitchell Baker, who chairs the foundation. If Mozilla kept its cards close to the chest, its global community of developers would not and could not help write the program. So it keeps secrets to a minimum: employees' personal information, data that business partners do not want made public and security issues in its software.
Joanne S

User Security | Infopeople - 0 views

  • User identification is the process of establishing the user's identity and usually requires very little interaction on the user's part.
  • Authentication is the process of a user proving that s/he is actually the person who s/he claims.
  • Authorization is the final process in user-level security. It is the process of determining what resources a user can access after successful identification and authentication.
Joanne S

Network Passwords | Infopeople - 0 views

  • Your library or organization should consider adopting the following rules for network passwords:Passwords may not be blankPasswords must be seven or more characters longPasswords must use a mixture of letters (upper and lower case), numbers and charactersPasswords must be changed on a regular basisPasswords must be successively unique (in other words, users shouldn't use the same password repeatedly)Passwords must never be written down or posted in an insecure location (such as on a monitor)In addition, consider adding these prohibitions:Passwords cannot be the user's name, the name of someone in their family, or their birth datePasswords must not be constructed by adding a numeral or character to the beginning or end of a regular word; this is too easily guessed (e.g."chair1")
Joanne S

How Secure is a Secure Web Page? | Richard Farrar's Blog - 0 views

  • To help improve security on the web, the standard HTTP protocol was enhanced with an additional security layer called the Secure Socket Layer (SSL) to produce a new protocol called HTTPS (HTTP over a Secure socket layer).
Joanne S

Anderson, C. (2006). Ethics and digital preservation. In Ethical decision making for di... - 0 views

  •  
    Anderson, C. (2006). Ethics and digital preservation. In Ethical decision making for digital libraries (pp. 81-90). Oxford: Chandos Publishing. Retrieved from http://eres.lis.curtin.edu.au/cgi-bin/gw?url=DC60260496
Joanne S

Welcome to Torchwood House - 0 views

  •  
    Out of the 7 sites. - two are genuine, the rest are fake. Which is which? Why?
Joanne S

Petrol Direct - petroldirect.com - 0 views

  •  
    Out of the 7 sites. - two are genuine, the rest are fake. Which is which? Why?
« First ‹ Previous 81 - 100 of 166 Next › Last »
Showing 20 items per page