Skip to main content

Home/ Groups/ IMT122 OUA Group
Joanne S

How to solve impossible problems: Daniel Russell's awesome Google search techniques - 0 views

  • Most of what you know about Boolean is wrong.
  • Think about how somebody else would write about the topic.
  • Use language tools.
  • ...8 more annotations...
  • Use quotes to search for phrases.
  • Force Google to include search terms.
  • intext:”San Antonio” intext:Alamo
  • It forces Google to show results with the phrase “San Antonio” and the word Alamo. You won’t get results that are missing either search term.
  • Minus does not equal plus.
  • “Control F” is your friend
  • Limit the time frame.
  • Use this keyboard shortcut to find a word or phrase on any web page. I
Joanne S

What is a Database, really? Data Storage for Librarians « The Other Librarian - 0 views

  • A Text File Good old text is still not a bad way to store data. 
  • If you want to retrieve that information, you can use a script to tell the computer to organize the information in a particular way.   This is called parsing
  • Structured Text As you climb the data food chain, complex systems get developed to organize information. 
  • ...17 more annotations...
  • Mark-up:   Marked information is data that has marks or signals to let a computer distinguish one type of data from the other.  
  • A variable:   A variable happens when you give some data a name. 
  • A string:   A string is a kind of variable that has text.
  • An array:   An array is a type of variable that includes a list used by computer programs for later manipulation.    
  • An object:   Explaining objects in full requires that someone read up on object-oriented programming.  
  • Tree-based  Structures Tree-based structures, or cluster models are a subset of “structured text” data storage models.  
  • XML is probably the best example.
  • data is organized in “parents”, “siblings” and “children”.
  • The Relational Model The relational model is better than a tree-model when your dataset is large and complicated.    The way it works is, instead of thinking in terms of “parents, siblings and children,” you think in term of relationships.
  • the “Primary Key.”   This means that every data object (such as a library) has a way of identifying itself in a unique way
  • a “Foreign Key.”    The Foreign key is a way to associate one dataset (eg. libraries) with another dataset (eg. library branches, hospitals or businesses).
  • This association is called a relationship.
  • In more complicated relationships (called the Many-to-Many relationship), you might have to create a third table to associate two entities.      
  • TEXT/XML Based Text files can be organized in such a way as to accommodate some of the benefits of the relational model.
  • Two examples of XML-based databases include Xindice and Sedna.
  • SQL/Binary-based Databases The more common relational database type is a piece of software running on a server, rather than a set of text files.   They are generally accessed using a standard language called SQL (Structure Query Language), or more specifically SQL as supported by a popular scripting language like PHP, Python or Java.
  • Almost any major web application will have a combination of all these types of data storage methods!  
  •  
    How databases are used in libraries
Joanne S

Boolean Searching on the Internet - 0 views

  • Boolean logic consists of three logical operators: OR AND NOT
  • Combined AND and OR logic Question: I want information about the behavior of cats. Search: behavior AND (cats OR felines)
Joanne S

Go To Hellman: Ten Evil Uses for URL Shortening Services - 0 views

  • Today, we cover URL shortening services:  Bit.ly, TinyURL, Ow.ly and friends.
  • Here are ten link shortening menaces for you to nibble on.
  • cross-site scripting vulnerability
  • ...7 more annotations...
  • Phishing attacks
  • SQL injection
  • Spam blocking
  • avoid the porn filter
  • Shortened links are free, so you can use a new one for every recipient.
  • PURL. If one of your machines gets taken out, you can edit the PURL to keep your link working, and shorten it for good measure.
  • As I've described here, there are lots of ways to abuse a link redirection service
Joanne S

Academic Search Engine Spam and Google Scholar's Resilience Against it - 0 views

  • Web-based academic search engines such as CiteSeer(X), Google Scholar, Microsoft Academic Search and SciPlore have introduced a new era of search for academic articles.
  • With classic digital libraries, researchers have no influence on getting their articles indexed. They either have published in a publication indexed by a digital library, and then their article is available in that digital library, or they have not
  • citation counts obtained from Google Scholar are sometimes used to evaluate the impact of articles and their authors.
  • ...9 more annotations...
  • ‘Academic Search Engine Optimization’ (ASEO)
  • Citation counts are commonly used to evaluate the impact and performance of researchers and their articles.
  • Nowadays, citation counts from Web-based academic search engines are also used for impact evaluations.
  • Most academic search engines offer features such as showing articles cited by an article, or showing related articles to a given article. Citation spam could bring more articles from manipulating researchers onto more of these lists.
  • It is apparent that a citation from a PowerPoint presentation or thesis proposal has less value than a citation in a peer reviewed academic article. However, Google does not distinguish on its website between these different origins of citations[8].
  • Google Scholar indexes Wikipedia articles when the article is available as PDF on a third party website.
  • That means, again, that not all citations on Google Scholar are what we call ‘full-value’ citations.
  • As long as Google Scholar applies only very rudimentary or no mechanisms to detect and prevent spam, citation counts should be used with care to evaluate articles’ and researchers’ impact.
  • However, Google Scholar is a Web-based academic search engine and as with all Web-based search engines, the linked content should not be trusted blindly.
Joanne S

SEO: The Beginners guide to SEO - 0 views

  • Search queries, the words that users type into the search box, carry extraordinary value.
  • In addition to making content available to search engines, SEO also helps boost rankings so that content will be placed where searchers will more readily find it.
Joanne S

Eli Pariser: Beware online "filter bubbles" | Video on TED.com - 0 views

    • Joanne S
       
      Mark Zuckerberg, a journalist was asking him a question about the news feed. And the journalist was asking him, "Why is this so important?" And Zuckerberg said, "A squirrel dying in your front yard may be more relevant to your interests right now than people dying in Africa." And I want to talk about what a Web based on that idea of relevance might look like. So when I was growing up in a really rural area in Maine, the Internet meant something very different to me. It meant a connection to the world. It meant something that would connect us all together. And I was sure that it was going to be great for democracy and for our society. But there's this shift in how information is flowing online, and it's invisible. And if we don't pay attention to it, it could be a real problem. So I first noticed this in a place I spend a lot of time -- my Facebook page. I'm progressive, politically -- big surprise -- but I've always gone out of my way to meet conservatives. I like hearing what they're thinking about; I like seeing what they link to; I like learning a thing or two. And so I was surprised when I noticed one day that the conservatives had disappeared from my Facebook feed. And what it turned out was going on was that Facebook was looking at which links I clicked on, and it was noticing that, actually, I was clicking more on my liberal friends' links than on my conservative friends' links. And without consulting me about it, it had edited them out. They disappeared. So Facebook isn't the only place that's doing this kind of invisible, algorithmic editing of the Web. Google's doing it too. If I search for something, and you search for something, even right now at the very same time, we may get very different search results. Even if you're logged out, one engineer told me, there are 57 signals that Google looks at -- everything from what kind of computer you're on to what kind of browser you're using to where you're located -- that it uses to personally tailor you
Joanne S

The Code4Lib Journal - How Hard Can It Be? : Developing in Open Source - 0 views

  • We experienced freedom to explore alternate avenues, to innovate, to take risks in ways that would have been difficult under the direct control of a district council.
  • patrons made it clear that while they appreciated that computers were a necessary part of a modern library, they did not consider them the most important part.
  • Our overall objective was to source a library system which: could be installed before Y2K complications immobilised us, was economical, in terms of both initial purchase and future license and maintenance support fees, ran effectively and fast by dial-up modem on an ordinary telephone line, used up-to-the minute technologies, looked good, and was easy for both staff and public to use, took advantage of new technology to permit members to access our catalogue and their own records from home, and let us link easily to other sources of information – other databases and the Internet. If we could achieve all of these objectives, we’d be well on the way to an excellent service.
  • ...14 more annotations...
  • "How hard can it be" Katipo staff wondered, "to write a library system that uses Internet technology?" Well, not very, as it turned out.
  • Koha would thus be available to anyone who wanted to try it and had the technical expertise to implement it.
  • fairly confident that we already had a high level of IT competence right through the staff, a high level of understanding of what our current system did and did not do.
  • ensure the software writers did not miss any key points in their fundamental understanding of the way libraries work.
  • The programming we commissioned cost us about 40% of the purchase price of an average turn-key solution.
  • no requirement to purchase a maintenance contract, and no annual licence fees.
  • An open source project is never finished.
  • Open source projects only survive if a community builds up around the product to ensure its continual improvement. Koha is stronger than ever now, supported by active developers (programmers) and users (librarians)
  • There are a range of support options available for Koha, both free and paid, and this has contributed to the overall strength of the Koha project.
  • Vendors like Anant, Biblibre, ByWater, Calyx, Catalyst, inLibro, IndServe, Katipo, KohaAloha, LibLime, LibSoul, NCHC, OSSLabs, PakLAG, PTFS, Sabinet, Strategic Data, Tamil and Turo Technology take the code and sell support around the product, develop add-ons and enhancements for their clients and then contribute these back to the project under the terms of the GPL license.
  • FRBR [5] arrangement, although of course it wasn’t called that 10 years ago, it was just a logical way for us to arrange the catalogue. A single bibliographic record essentially described the intellectual content, then a bunch of group records were attached, each one representing a specific imprint or publication.
  • The release of Koha 3.0 in late 2008 brought Koha completely into the web 2.0 age and all that entails. We are reconciled to taking a small step back for now, but the FRBR logic is around and RDA should see us back where want to be in a year or so – but with all the very exciting features and opportunities that Koha 3 has now.
  • In the early days, the Koha list appeared to have been dominated by programmers but I have noticed a lot more librarians participating now
  • "Adopt technology that keeps data open and free, abandon[ing] technology that does not." The time is right for OSS.
  •  
    For more information about Koha and how it was developed, see: Ransom, J., Cormack, C., & Blake, R. (2009). How Hard Can It Be? : Developing in Open Source. Code4Lib Journal, (7). Retrieved from http://journal.code4lib.org/articles/1638
Joanne S

Companies and information: The leaky corporation | The Economist - 0 views

  • the WikiLeaks threat and the persistent leaking of other supposedly confidential corporate information have brought an important issue to the fore.
  • Companies are creating an ever-growing pile of digital information, from product designs to employees' e-mails.
  • Much of this information would do little damage if it seeped into the outside world; some of it, indeed, might well do some good. But some could also be valuable to competitors—or simply embarrassing—and needs to be protected. Companies therefore have to decide what they should try to keep to themselves and how best to secure it.
  • ...10 more annotations...
  • more and more data are seeping out of companies, even of the sort that should be well protected.
  • To be able to work better with data, employees often transfer them into spreadsheets and other types of files that are easier to manipulate—but also easier to lose control of.
  • Although most leaks are not deliberate, many are.
  • “data loss prevention” (DLP).
  • software that sits at the edge of a firm's network and inspects the outgoing data traffic.
  • “bells in the dark”. False records—made-up pieces of e-mail, say—are spread around the network. Because they are false, no one should gain access to them. If somebody does, an alarm is triggered
  • In the corporate world, to limit the channels through which data can escape, some companies do not allow employees to bring their own gear to work or to use memory sticks or certain online services.
  • How then to strike the right balance between secrecy and transparency?
  • Intel, the world's largest chipmaker, issues “speeding tickets” to employees who break its rules.
  • Transparency is not just a natural inclination but a necessity, says Mitchell Baker, who chairs the foundation. If Mozilla kept its cards close to the chest, its global community of developers would not and could not help write the program. So it keeps secrets to a minimum: employees' personal information, data that business partners do not want made public and security issues in its software.
Ruth M.

Zoom Q3HD Handy Video Recorder Review | Mac|Life - 0 views

  • The Zoom Q3HD gets the balance right, shooting HD video while capturing audio with two terrific microphones
  • Video quality is what you’d expect from a pocket cam, which means it’s adequate
  • We just wish the documentation did a better job of explaining all these choices.
  • ...4 more annotations...
  • A built-in USB plug transfers recordings to your Mac with or without the pointless software bundle.
  • you can’t use an attached Q3HD as a live mic or camera for your Mac
  • The weak battery life—we got fewer than 90 minutes of recording time per set of AAs—will make you fearful that they’ll run out in the middle of a shot. And the plastic device even includes a plastic tripod adapter; that’s cheap.
  • . The Q3HD pairs decent image quality with uncommonly good audio. It’s easy to overlook this pocket shooter’s shortcomings once you hear the difference. Product  Q3HD Handy Video Recorder
Ruth M.

Zoom Q3HD Handy Video Recorder: Review and comparison with iPhone 4 video | TUAW - The ... - 0 views

  • Recording video with the Zoom Q3HD is quite easy. Press one button on the side of the device to power it up, press the large red record button on the back of the device once to start recording, then press the record button again to stop. Playback is equally easy, with a play button conveniently located just below the display.
  • Update: Several commenters noted that the audio is out of sync with the video on both Zoom videos. This is not the case with the original files, and appears to be a problem with the way that YouTube handled the uploaded file. Zoom is looking into the situation and I will update again as soon as I hear more.
  • In the end, it's all going to boil down to two things: whether you have the money to buy a secondary video camera such as the Zoom Q3HD and if you truly need the extra video quality of this camera for your needs
  • ...1 more annotation...
  • For other Mac users, the Zoom Q3HD might be an excellent way to capture HD video at a relatively bargain price of $300 compared to higher end dedicated camcorders.
Ruth M.

Zoom's dual mic-equipped Q3HD camcorder now available for $300 -- Engadget - 0 views

  • $299.99
  • For self recording, shouldn't the video preview be on the front? So you can't sit down with your instrument and know it's framed correctly with you in the picture?
Ruth M.

Zoom Q3HD Handy Video Recorder Review & Rating | PCMag.com - 0 views

  • Expensive
  • Pros Excellent audio quality. Strong video quality. Multiple audio recording options. External microphone input. Headphone jack. Mini-HDMI out.
  • No rechargeable lithium ion batteries.
  • ...10 more annotations...
  • he $299 Q3HD Hand Video Recorder's video quality doesn't measure up to its competitors,
  • geared toward the music industry
  • , isn't quite as strong the more affordable, Editor's Choice Sony Bloggie Touch 8GB ($199.99, 4 stars)
  • Subjects must be at least 3.3 feet away for the camera to capture them sharply
  • Video is captured as .MOV files
  • Samson incorporates a ton of connectivity options into the Q3H
  • Unfortunately, the Q3HD cannot recharge over USB, unlike most camcorders. Instead, it is powered by AA batteries, which is a rarity in this field—most include a rechargeable lithium ion battery, which is preferable.
  • If you don't have high-definition video editing software, the camcorder includes a simple editor called HandyShare
  • The lack of built-in storage on the Q3HD is a huge oversigh
  • The $299 Zoom Q3HD Handy Video Camcorder delivers high quality video, unmatched audio, and loads of audio recording options
Ruth M.

Q3HD Handy Video Recorder - 0 views

  • HD audio
  • 1080p
  • two studio-quality condenser microphones
  • ...16 more annotations...
  • MPEG-4 AVC/H.264
  • QuickTime player
  • 1920 x 1080 pixel resolution
  • A USB cable is conveniently built into the unit
  • YouTube or Vimeo.
  • The Q3HD’s bundled HandyShare editing and uploading software lets you to manage and edit your videos easily as well as upload them to social networking sites.
  • The rich stereo sound captured by the X/Y mic pair can be recorded to linear PCM WAV files.
  • ready to shoot in 2 seconds.
  • The Q3HD can also be used as an audio recorder to record just sound
  • he Q3HD utilizes SD/SDHC as an affordable way to increase recording capacity.
  • 2GB SD card
  • video
  • video
  • video
  • 2GB SD
  • The Q3HD is powered by two standard AA batteries, resulting in about 2 hours of continuous recording.
Joanne S

User Security | Infopeople - 0 views

  • User identification is the process of establishing the user's identity and usually requires very little interaction on the user's part.
  • Authentication is the process of a user proving that s/he is actually the person who s/he claims.
  • Authorization is the final process in user-level security. It is the process of determining what resources a user can access after successful identification and authentication.
Joanne S

Network Passwords | Infopeople - 0 views

  • Your library or organization should consider adopting the following rules for network passwords:Passwords may not be blankPasswords must be seven or more characters longPasswords must use a mixture of letters (upper and lower case), numbers and charactersPasswords must be changed on a regular basisPasswords must be successively unique (in other words, users shouldn't use the same password repeatedly)Passwords must never be written down or posted in an insecure location (such as on a monitor)In addition, consider adding these prohibitions:Passwords cannot be the user's name, the name of someone in their family, or their birth datePasswords must not be constructed by adding a numeral or character to the beginning or end of a regular word; this is too easily guessed (e.g."chair1")
Joanne S

How Secure is a Secure Web Page? | Richard Farrar's Blog - 0 views

  • To help improve security on the web, the standard HTTP protocol was enhanced with an additional security layer called the Secure Socket Layer (SSL) to produce a new protocol called HTTPS (HTTP over a Secure socket layer).
Joanne S

Search Optimization and Its Dirty Little Secrets - NYTimes.com - 0 views

  • black-hat services are not illegal, but trafficking in them risks the wrath of Google. The company draws a pretty thick line between techniques it considers deceptive and “white hat” approaches, which are offered by hundreds of consulting firms and are legitimate ways to increase a site’s visibility.
  • In deriving organic results, Google’s algorithm takes into account dozens of criteria,
  • one crucial factor in detail: links from one site to another.
« First ‹ Previous 81 - 100 of 196 Next › Last »
Showing 20 items per page