Skip to main content

Home/ IMT122 OUA Group/ Group items matching "computers" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
12More

Recordkeeping In Brief 62 - FAQs about cloud computing - State Records NSW - 0 views

  • Cloud computing is internet-based computing whereby shared resources, software and information are provided to computers and other devices on demand.
  • Cloud computing is a general term for anything that involves delivering hosted services over the Internet.
  • There are a range of applications that can be delivered to users via cloud computing models, from email or content management to specialist applications for activities such as project management or human resources management to data storage.
    • Joanne S
       
      Models include: Software-as-a-Service (SaaS) Platform-as-a-Service (PaaS) Infrastructure-as-a-Service (IaaS)
  • ...8 more annotations...
  • A cloud can be private or public:
  • As with any business related activity there are both risks and opportunities associated with using cloud computing services.
  • potentially a number of business and information risks associated with using cloud computing services.
  • noted that even if the cloud computing environment is managed wholly within NSW an appropriate risk assessment of the service and the provider should occur.
  • level of risk that an organisation attributes to a proposed cloud computing arrangement will vary according to the content or subject matter of their records
  • The content of the contract in these types of service arrangements is very important.
  • What are others saying? Australia Australasian Digital Recordkeeping Initiative (ADRI), Advice on managing the recordkeeping risks associated with cloud computing, July 2010, available at http://www.adri.gov.au Defence Signals Directorate (Commonwealth), Cloud computing security considerations, April 2011, available at http://www.dsd.gov.au/infosec/cloudsecurity.htm Department of Finance and Deregulation (Commonwealth), Cloud computing strategic direction paper: opportunities and applicability for use by the Australian Government, April 2011, available at http://www.finance.gov.au/e-government/strategy-and-governance/docs/final_cloud_computing_strategy_version_1.pdf
  • International Archives and Records Association UK and Ireland, Cloud computing toolkit: guidance for outsourcing information storage to the cloud, August 2010, available at http://www.archives.org.uk/images/documents/Cloud_Computing_Toolkit-2.pdf – this guidance contains a comprehensive overview of the range of cloud computing services available and the recordkeeping considerations that apply to each CIO Council and Chief Acquisition Officers Council (USA), Creating effective cloud computing contracts for the Federal Government: best practices for acquiring IT as a service, February 2012, available at http://www.cio.gov/cloudbestpractices.pdf – this is a comprehensive and useful document for those seeking to procure cloud computing services
7More

What is Cloud Computing and How will it Affect Libraries? | TechSoup for Libraries - 0 views

  • If you’ve used any of the popular Web 2.0 services over the past few years (e.g. Gmail, Wikipedia, Flickr or Twitter), you already have some experience with cloud computing
  • Like water and electricity, a computing cloud is a communally-shared resource that you lease on a metered basis, paying for as little or as much as you need, when you need it
    • Joanne S
       
      Benefits-  Cost Savings, Flexibility and Innovation.
  • ...4 more annotations...
  • As individuals and members of organizations, we’re already choosing between desktop applications and cloud applications when it comes to e-mail, RSS, file storage, word processing and other simple applications. Sooner or later we’ll have to make this choice for mission-critical enterprise applications too
  • Libraries may soon be building and managing their own data centers.
  • For more practical, technical explanations of cloud computing, check out the Wikipedia article the Anatomy of Cloud Computing the MIT Technology Review Briefing on Cloud Computing.
  • For a discussion of problems and concerns about the digital cloud, read: How Secure is Cloud Computing? Security in the Ether Industry Challenges: The Standards Question
1More

Quantum Computing - 0 views

  •  
    Given the news that Australian researchers have developed a "qubit" - the building block for the future of Quantum computing (expected in about 10-15 years), this article may have some relevance for Library and Info Tech Managers.  
1More

Metz, R. (2011). Understanding the Cloud: an Introduction to the Cloud. Getting Started... - 0 views

  •  
    Metz, R. (2011). Understanding the Cloud: an Introduction to the Cloud. Getting Started with Cloud Computing: a LITA Guide (pp. 13-28). London, England: Library and Information Technology Association. Retrieved from http://edocs.library.curtin.edu.au/eres_display.cgi?url=DC60268502.pdf [5]
21More

What is a Database, really? Data Storage for Librarians « The Other Librarian - 0 views

  • A Text File Good old text is still not a bad way to store data. 
  • If you want to retrieve that information, you can use a script to tell the computer to organize the information in a particular way.   This is called parsing
  • Structured Text As you climb the data food chain, complex systems get developed to organize information. 
  • ...17 more annotations...
  • Mark-up:   Marked information is data that has marks or signals to let a computer distinguish one type of data from the other.  
  • A variable:   A variable happens when you give some data a name. 
  • A string:   A string is a kind of variable that has text.
  • An array:   An array is a type of variable that includes a list used by computer programs for later manipulation.    
  • An object:   Explaining objects in full requires that someone read up on object-oriented programming.  
  • Tree-based  Structures Tree-based structures, or cluster models are a subset of “structured text” data storage models.  
  • XML is probably the best example.
  • data is organized in “parents”, “siblings” and “children”.
  • The Relational Model The relational model is better than a tree-model when your dataset is large and complicated.    The way it works is, instead of thinking in terms of “parents, siblings and children,” you think in term of relationships.
  • the “Primary Key.”   This means that every data object (such as a library) has a way of identifying itself in a unique way
  • a “Foreign Key.”    The Foreign key is a way to associate one dataset (eg. libraries) with another dataset (eg. library branches, hospitals or businesses).
  • This association is called a relationship.
  • In more complicated relationships (called the Many-to-Many relationship), you might have to create a third table to associate two entities.      
  • TEXT/XML Based Text files can be organized in such a way as to accommodate some of the benefits of the relational model.
  • Two examples of XML-based databases include Xindice and Sedna.
  • SQL/Binary-based Databases The more common relational database type is a piece of software running on a server, rather than a set of text files.   They are generally accessed using a standard language called SQL (Structure Query Language), or more specifically SQL as supported by a popular scripting language like PHP, Python or Java.
  • Almost any major web application will have a combination of all these types of data storage methods!  
  •  
    How databases are used in libraries
1More

Mobile Opportunity: The future of publishing: Why ebooks failed in 2000, and what that ... - 0 views

  •  
    Mace, M. (2010). The future of publishing: Why ebooks failed in 2000, and what that means for 2010. Mobile Opportunity: At the intersection of the web, wireless, entertainment and computing. Retrieved May 9, 2011, from http://mobileopportunity.blogspot.com/2010/03/future-of-publishing-why-ebooks-failed.html
3More

Curtin Uni moves to Microsoft Cloud - cloud computing, Curtin University, Microsoft Off... - 0 views

  • Curtin University has moved its email and collaboration apps to Microsoft’s Cloud
  • students can access Curtin anywhere, anytime and that was the rationale behind it
  • Earlier this year, the university announced plans to migrate to a managed version of Blackboard, as well as firing up its new Vblock infrastructure from EMC, VMware and Cisco.
21More

The Strongest Link: Libraries and Linked Data - 0 views

  • For many years now we have been hearing that the semantic web is just around the corner
  • most libraries, however, is that we are still grappling with 2.0 technologies.
  • By marking up information in standardized, highly structured formats like Resource Description Framework (RDF), we can allow computers to better "understand" the meaning of content
  • ...17 more annotations...
  • For most librarians this concept is fairly easy to understand. We have been creating highly structured machine-readable metadata for many years
  • By linking our data to shared ontologies that describe the properties and relationships of objects, we begin to allow computers not just to "understand" content, but also to derive new knowledge by "reasoning" about that content.
  • the term "Semantic Web" to refer to a full suite of W3C standards including RDF, SPARQL query language, and OWL web ontology language.
  • This article will outline some of the benefits that linked data could have for libraries, will discuss some of the non-technical obstacles that we face in moving forward, and will finally offer suggestions for practical ways in which libraries can participate in the development of the semantic web.
  • What benefits will libraries derive from linked data?
  • Having a common format for all data would be a huge boon for interoperability and the integration of all kinds of systems.
  • The linking hub would expose a network of tightly linked information from publishers, aggregators, book and journal vendors, subject authorities, name authorities, and other libraries.
  • semantic search could take us far beyond the current string-matching capabilities of search engines like Google.
  • What are the major obstacles for libraries?
  • A fundamental challenge for the development of linked data in libraries is lack of awareness.
  • Linked Data becomes more powerful the more of it there is.
  • Until there is enough linking between collections and imaginative uses of data collections there is a danger librarians will see linked data as simply another metadata standard, rather than the powerful discovery tool it will underpin.
  • a more practical concern is that changing the foundation of library metadata is no trivial task.
  • Privacy is a huge concern for many interested in linked data.
  • Related to privacy is trust.
  • Rights management poses potential problems for linked data in libraries. Libraries no longer own much of the content they provide to users; rather it is subscribed to from a variety of vendors.
  • What needs to happen to move libraries to the next level?
  •  
    Byrne, G., & Goddard, L. (2010). The Strongest Link: Libraries and Linked Data. D-Lib Magazine, 16(11/12). doi:10.1045/november2010-byrne Retrieved from http://www.dlib.org/dlib/november10/byrne/11byrne.html
18More

The Code4Lib Journal - How Hard Can It Be? : Developing in Open Source - 0 views

  • We experienced freedom to explore alternate avenues, to innovate, to take risks in ways that would have been difficult under the direct control of a district council.
  • patrons made it clear that while they appreciated that computers were a necessary part of a modern library, they did not consider them the most important part.
  • Our overall objective was to source a library system which: could be installed before Y2K complications immobilised us, was economical, in terms of both initial purchase and future license and maintenance support fees, ran effectively and fast by dial-up modem on an ordinary telephone line, used up-to-the minute technologies, looked good, and was easy for both staff and public to use, took advantage of new technology to permit members to access our catalogue and their own records from home, and let us link easily to other sources of information – other databases and the Internet. If we could achieve all of these objectives, we’d be well on the way to an excellent service.
  • ...14 more annotations...
  • "How hard can it be" Katipo staff wondered, "to write a library system that uses Internet technology?" Well, not very, as it turned out.
  • Koha would thus be available to anyone who wanted to try it and had the technical expertise to implement it.
  • fairly confident that we already had a high level of IT competence right through the staff, a high level of understanding of what our current system did and did not do.
  • ensure the software writers did not miss any key points in their fundamental understanding of the way libraries work.
  • The programming we commissioned cost us about 40% of the purchase price of an average turn-key solution.
  • no requirement to purchase a maintenance contract, and no annual licence fees.
  • An open source project is never finished.
  • Open source projects only survive if a community builds up around the product to ensure its continual improvement. Koha is stronger than ever now, supported by active developers (programmers) and users (librarians)
  • There are a range of support options available for Koha, both free and paid, and this has contributed to the overall strength of the Koha project.
  • Vendors like Anant, Biblibre, ByWater, Calyx, Catalyst, inLibro, IndServe, Katipo, KohaAloha, LibLime, LibSoul, NCHC, OSSLabs, PakLAG, PTFS, Sabinet, Strategic Data, Tamil and Turo Technology take the code and sell support around the product, develop add-ons and enhancements for their clients and then contribute these back to the project under the terms of the GPL license.
  • FRBR [5] arrangement, although of course it wasn’t called that 10 years ago, it was just a logical way for us to arrange the catalogue. A single bibliographic record essentially described the intellectual content, then a bunch of group records were attached, each one representing a specific imprint or publication.
  • The release of Koha 3.0 in late 2008 brought Koha completely into the web 2.0 age and all that entails. We are reconciled to taking a small step back for now, but the FRBR logic is around and RDA should see us back where want to be in a year or so – but with all the very exciting features and opportunities that Koha 3 has now.
  • In the early days, the Koha list appeared to have been dominated by programmers but I have noticed a lot more librarians participating now
  • "Adopt technology that keeps data open and free, abandon[ing] technology that does not." The time is right for OSS.
  •  
    For more information about Koha and how it was developed, see: Ransom, J., Cormack, C., & Blake, R. (2009). How Hard Can It Be? : Developing in Open Source. Code4Lib Journal, (7). Retrieved from http://journal.code4lib.org/articles/1638
3More

User Security | Infopeople - 0 views

  • User identification is the process of establishing the user's identity and usually requires very little interaction on the user's part.
  • Authentication is the process of a user proving that s/he is actually the person who s/he claims.
  • Authorization is the final process in user-level security. It is the process of determining what resources a user can access after successful identification and authentication.
1More

Network Passwords | Infopeople - 0 views

  • Your library or organization should consider adopting the following rules for network passwords:Passwords may not be blankPasswords must be seven or more characters longPasswords must use a mixture of letters (upper and lower case), numbers and charactersPasswords must be changed on a regular basisPasswords must be successively unique (in other words, users shouldn't use the same password repeatedly)Passwords must never be written down or posted in an insecure location (such as on a monitor)In addition, consider adding these prohibitions:Passwords cannot be the user's name, the name of someone in their family, or their birth datePasswords must not be constructed by adding a numeral or character to the beginning or end of a regular word; this is too easily guessed (e.g."chair1")
2More

Eli Pariser: Beware online "filter bubbles" | Video on TED.com - 0 views

    • Joanne S
       
      Mark Zuckerberg, a journalist was asking him a question about the news feed. And the journalist was asking him, "Why is this so important?" And Zuckerberg said, "A squirrel dying in your front yard may be more relevant to your interests right now than people dying in Africa." And I want to talk about what a Web based on that idea of relevance might look like. So when I was growing up in a really rural area in Maine, the Internet meant something very different to me. It meant a connection to the world. It meant something that would connect us all together. And I was sure that it was going to be great for democracy and for our society. But there's this shift in how information is flowing online, and it's invisible. And if we don't pay attention to it, it could be a real problem. So I first noticed this in a place I spend a lot of time -- my Facebook page. I'm progressive, politically -- big surprise -- but I've always gone out of my way to meet conservatives. I like hearing what they're thinking about; I like seeing what they link to; I like learning a thing or two. And so I was surprised when I noticed one day that the conservatives had disappeared from my Facebook feed. And what it turned out was going on was that Facebook was looking at which links I clicked on, and it was noticing that, actually, I was clicking more on my liberal friends' links than on my conservative friends' links. And without consulting me about it, it had edited them out. They disappeared. So Facebook isn't the only place that's doing this kind of invisible, algorithmic editing of the Web. Google's doing it too. If I search for something, and you search for something, even right now at the very same time, we may get very different search results. Even if you're logged out, one engineer told me, there are 57 signals that Google looks at -- everything from what kind of computer you're on to what kind of browser you're using to where you're located -- that it uses to personally tailor you
1 - 17 of 17
Showing 20 items per page