Skip to main content

Home/ IMT122 OUA Group/ Group items matching "news" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Joanne S

Curtin Uni moves to Microsoft Cloud - cloud computing, Curtin University, Microsoft Office 365, Peter Nikoletatos, virtualisation, Virtualization, dimension data - CIO - 0 views

  • Curtin University has moved its email and collaboration apps to Microsoft’s Cloud
  • students can access Curtin anywhere, anytime and that was the rationale behind it
  • Earlier this year, the university announced plans to migrate to a managed version of Blackboard, as well as firing up its new Vblock infrastructure from EMC, VMware and Cisco.
Joanne S

Scot Colford, "Explaining free and Open Source software," - 0 views

  • Ten criteria must be met in order for a software distribution to be considered open source:
  • Free redistribution
  • the source code freely available to developers.
  • ...13 more annotations...
  • The license must permit modifications
  • Integrity of the author's source code
  • No discrimination against persons or groups
  • No discrimination against fields of endeavor
  • same license must be passed on to others when the program is redistributed.
  • License must not be specific to a product
  • License must not restrict other software
  • License must be technology-neutral
  • list of the nine most widely used licenses is
  • Apache Software License 2.0 (www.apache.org/licenses/LICENSE-2.0.html) New BSD License (www.opensource.org/licenses/bsd-license.php) GNU General Public License (GPL) (www.gnu.org/licenses/gpl.html) GNU Lesser General Public License (LGPL) (www.gnu.org/licenses/lgpl.html) MIT License (www.opensource.org/licenses/mit-license.php) Mozilla Public License 1.1 (MPL) (www.mozilla.org/MPL/MPL-1.1.html) Common Development and Distribution License (www.sun.com/cddl/cddl.html) Common Public License 1.0 (www.ibm.com/developerworks/library/os-cpl.html)  Eclipse Public License (www.eclipse.org/legal/epl-v10.html) [5].
  • common misconception, alluded to above, is that since the source code is freely distributed without royalty or licensing fee, open source applications are free of cost.
  • Free and open source software application users, on the other hand, must rely on development communities for support.
  • The pervasiveness of the World Wide Web guarantees that nearly every information organization is using free or open source software to perform some function.
Joanne S

The Strongest Link: Libraries and Linked Data - 0 views

  • For many years now we have been hearing that the semantic web is just around the corner
  • most libraries, however, is that we are still grappling with 2.0 technologies.
  • By marking up information in standardized, highly structured formats like Resource Description Framework (RDF), we can allow computers to better "understand" the meaning of content
  • ...17 more annotations...
  • For most librarians this concept is fairly easy to understand. We have been creating highly structured machine-readable metadata for many years
  • By linking our data to shared ontologies that describe the properties and relationships of objects, we begin to allow computers not just to "understand" content, but also to derive new knowledge by "reasoning" about that content.
  • the term "Semantic Web" to refer to a full suite of W3C standards including RDF, SPARQL query language, and OWL web ontology language.
  • This article will outline some of the benefits that linked data could have for libraries, will discuss some of the non-technical obstacles that we face in moving forward, and will finally offer suggestions for practical ways in which libraries can participate in the development of the semantic web.
  • What benefits will libraries derive from linked data?
  • Having a common format for all data would be a huge boon for interoperability and the integration of all kinds of systems.
  • The linking hub would expose a network of tightly linked information from publishers, aggregators, book and journal vendors, subject authorities, name authorities, and other libraries.
  • semantic search could take us far beyond the current string-matching capabilities of search engines like Google.
  • What are the major obstacles for libraries?
  • A fundamental challenge for the development of linked data in libraries is lack of awareness.
  • Linked Data becomes more powerful the more of it there is.
  • Until there is enough linking between collections and imaginative uses of data collections there is a danger librarians will see linked data as simply another metadata standard, rather than the powerful discovery tool it will underpin.
  • a more practical concern is that changing the foundation of library metadata is no trivial task.
  • Privacy is a huge concern for many interested in linked data.
  • Related to privacy is trust.
  • Rights management poses potential problems for linked data in libraries. Libraries no longer own much of the content they provide to users; rather it is subscribed to from a variety of vendors.
  • What needs to happen to move libraries to the next level?
  •  
    Byrne, G., & Goddard, L. (2010). The Strongest Link: Libraries and Linked Data. D-Lib Magazine, 16(11/12). doi:10.1045/november2010-byrne Retrieved from http://www.dlib.org/dlib/november10/byrne/11byrne.html
Joanne S

safer internet group - 5 Point Plan - 0 views

  • The Safer Internet Group brings together a diverse group of stakeholders who all share the goal of developing the Internet as a platform for education, communication and economic activity.
  • Australia needs to take effective action to ensure that Internet users, and particularly children, have a safe experience online, while ensuring that the benefits of the open Internet are available to all Australians.
  • We believe our way is comprehensive and practical. More importantly, we know it works. It delivers:
  • ...5 more annotations...
  • . More Effective Education
  • Comprehensive Policing of Illegal material on the Internet
  • User Tools that work
  • A new dialogue about Internet safety
  • Targeted Research of Internet Risks and Opportunities for Young People
  •  
    Safer Internet Group (2009) 5 Point Plan. Retrieved from http://www.saferinternetgroup.org/5pointplan.html (The Australian Library and Information Association is one of the members of the Safer Internet Group)
Joanne S

1Mb Broadband Access Becomes Legal Right | Yle Uutiset | yle.fi - 0 views

  •  
    Links outline the Finnish legislation that all citizens need to have access to high speed broadband:
Joanne S

How Secure is a Secure Web Page? | Richard Farrar's Blog - 0 views

  • To help improve security on the web, the standard HTTP protocol was enhanced with an additional security layer called the Secure Socket Layer (SSL) to produce a new protocol called HTTPS (HTTP over a Secure socket layer).
Joanne S

Go To Hellman: Ten Evil Uses for URL Shortening Services - 0 views

  • Today, we cover URL shortening services:  Bit.ly, TinyURL, Ow.ly and friends.
  • Here are ten link shortening menaces for you to nibble on.
  • cross-site scripting vulnerability
  • ...7 more annotations...
  • Phishing attacks
  • SQL injection
  • Spam blocking
  • avoid the porn filter
  • Shortened links are free, so you can use a new one for every recipient.
  • PURL. If one of your machines gets taken out, you can edit the PURL to keep your link working, and shorten it for good measure.
  • As I've described here, there are lots of ways to abuse a link redirection service
Joanne S

Academic Search Engine Spam and Google Scholar's Resilience Against it - 0 views

  • Web-based academic search engines such as CiteSeer(X), Google Scholar, Microsoft Academic Search and SciPlore have introduced a new era of search for academic articles.
  • With classic digital libraries, researchers have no influence on getting their articles indexed. They either have published in a publication indexed by a digital library, and then their article is available in that digital library, or they have not
  • citation counts obtained from Google Scholar are sometimes used to evaluate the impact of articles and their authors.
  • ...9 more annotations...
  • ‘Academic Search Engine Optimization’ (ASEO)
  • Citation counts are commonly used to evaluate the impact and performance of researchers and their articles.
  • Nowadays, citation counts from Web-based academic search engines are also used for impact evaluations.
  • Most academic search engines offer features such as showing articles cited by an article, or showing related articles to a given article. Citation spam could bring more articles from manipulating researchers onto more of these lists.
  • It is apparent that a citation from a PowerPoint presentation or thesis proposal has less value than a citation in a peer reviewed academic article. However, Google does not distinguish on its website between these different origins of citations[8].
  • Google Scholar indexes Wikipedia articles when the article is available as PDF on a third party website.
  • That means, again, that not all citations on Google Scholar are what we call ‘full-value’ citations.
  • As long as Google Scholar applies only very rudimentary or no mechanisms to detect and prevent spam, citation counts should be used with care to evaluate articles’ and researchers’ impact.
  • However, Google Scholar is a Web-based academic search engine and as with all Web-based search engines, the linked content should not be trusted blindly.
Joanne S

Search Optimization and Its Dirty Little Secrets - NYTimes.com - 0 views

  • black-hat services are not illegal, but trafficking in them risks the wrath of Google. The company draws a pretty thick line between techniques it considers deceptive and “white hat” approaches, which are offered by hundreds of consulting firms and are legitimate ways to increase a site’s visibility.
  • In deriving organic results, Google’s algorithm takes into account dozens of criteria,
  • one crucial factor in detail: links from one site to another.
Joanne S

The Deep Web - 0 views

  • defined as the content on the Web not accessible through a search on general search engines.
  • sometimes also referred to as the hidden or invisible web.
  • the part of the Web that is not static, and is served dynamically "on the fly," is far larger than the static documents
  • ...11 more annotations...
  • When we refer to the deep Web, we are usually talking about the following:
  • The content of databases.
  • Non-text files such as multimedia, images, software, and documents in formats such as Portable Document Format (PDF) and Microsoft Word.
  • Content available on sites protected by passwords or other restrictions.
  • Special content not presented as Web pages, such as full text articles and books
  • Dynamically-changing, updated content,
  • let's consider adding new content to our list of deep Web sources. For example:
  • Blog postings Comments Discussions and other communication activities on social networking sites, for example Facebook and Twitter Bookmarks and citations stored on social bookmarking sites
  • Tips for dealing with deep Web content
  • Vertical search
  • Use a general search engine to locate a vertical search engine.
  •  
    The Web not accessible through a search on general search engines..
Joanne S

How to solve impossible problems: Daniel Russell's awesome Google search techniques - 0 views

  • Most of what you know about Boolean is wrong.
  • Think about how somebody else would write about the topic.
  • Use language tools.
  • ...8 more annotations...
  • Use quotes to search for phrases.
  • Force Google to include search terms.
  • intext:”San Antonio” intext:Alamo
  • It forces Google to show results with the phrase “San Antonio” and the word Alamo. You won’t get results that are missing either search term.
  • Minus does not equal plus.
  • “Control F” is your friend
  • Limit the time frame.
  • Use this keyboard shortcut to find a word or phrase on any web page. I
Joanne S

Egypt shows how easily Internet can be silenced - Technology & science - Security | NBC News - 0 views

  •  
    "In Egypt in early 2011, during the revolution the government cut off the internet between 27 January and 2 February. These links were shared by Farah, a previous student who was in Egypt during this period."
‹ Previous 21 - 36 of 36
Showing 20 items per page