Skip to main content

Home/ MOBIUS Libraries/ Group items tagged code

Rss Feed Group items tagged

Scott Peterson

With 'Access Codes,' Textbook Pricing Gets More Complicated Than Ever - 0 views

  •  
    A fairly concerning article about how a student taking a course with his wife didn't see the need to buy a second textbook for the class. However, with the textbook came a mandatory access code for supplementary materials and also to get access to the online discussion board and homework submission system. The student was unable to purchase the access code itself. This highlights an ongoing problem with software and digital access; publishers may legally be in their rights that every user is only granted access to a work and then to only one person, but users expect to be able to buy used books, old software, and so on. By essentially and artificially eliminating the secondary market of used/older materials publishers may increase their revenue per user but also increase user dissatisfaction and distrust.
Megan Durham

ReadWriteWeb Technology DeathWatch: QR Codes - 0 views

  •  
    Interesting look at QR codes. There's even a website dedicated to bad QR codes! My only big question is do I still have to respond to RT tickets dealing with QR codes since its an almost dead technology :)
Sharla Lair

How to Turn a City into a Library - The Digital Reader - 0 views

  •  
    Interesting project in Austria. They placed 70 QR codes around the city each leading to a particular ebook or mp3 that can be downloaded for free.  The blog states, "This project is in effect giving digital content a finite location, thus removing one of the key aspects that separates paper books from ebooks". 
  •  
    I wonder if the posts are in places with literary or historical significance-- e.g., a QR code near the former home of a famous author, leading to excerpts or readings from his or her books. I can see a huge potential for museums here, actually. For example, at the Old Courthouse in St. Louis, a QR code can be posted to information or collections on the Dred Scott Decision. Or here in Columbia, QR codes posted in the Red Campus can pull up copies of historical documents on the 1892 fire.
Megan Durham

Codeacademy's Free Kits Help Kids (and Educators) Learn to Code - 0 views

  •  
    Free kits for teachers to help students learn to code and hopefully generate interest in coding. This is a really neat program I'm interested in how teachers like it and how they fit it in to their busy schedules. I imagine there is a lot of collaboration between teachers and librarians, since often times librarians are in charge of the school's computer lab.
anonymous

QR Code and 2D Code Generator | Kerem Erkan - 2 views

  •  
    This is the one.
adrienne_mobius

3 Big Privacy Issues Of 2013 - And What You Can Do About Them - 1 views

  •  
    Major privacy issues that everyone should pay attention to in 2013: transparency, data sharing, and dodgy QR codes.
Justin Hopkins

Buzzblog: Microsoft code contains the phrase 'big boobs' ... Yes, really - 0 views

  •  
    This is why we can't have nice things...
Scott Peterson

Forget the Cellphone Fight - We Should Be Allowed to Unlock Everything We Own - 0 views

  •  
    An article that makes some good points about copyright, namely that the information we need to access, repair, or modify equipment we own is often copyrighted in itself. Which means by virtue of copyright we are unable to access the service manuals, error codes, or diagnostic tools we need to do anything with a technological device. The author makes a point that while works of art may be restricted by we own a performance right to it, physical objects we own outright.
anonymous

Software Engineering: How often do major software companies push code to production? - ... - 0 views

  •  
    I love the idea of automatically pushing to production after a new commit is made to master.
anonymous

Closure Tools - Google Developers - 0 views

  • The Closure Compiler is a tool for making JavaScript download and run faster. It is a true compiler for JavaScript. Instead of compiling from a source language to machine code, it compiles from JavaScript to better JavaScript. It parses your JavaScript, analyzes it, removes dead code and rewrites and minimizes what's left. It also checks syntax, variable references, and types, and warns about common JavaScript pitfalls.
  •  
    This works amazingly well. The javascript we use to send text messages in the webpacs went from 8.5k to 4.3k. Also this works to combine multiple scripts and optimize them all together.
anonymous

Videos - gource - Creating videos with Gource. - software version control visualization... - 1 views

  •  
    This is an awesome tool I saw at the Evergreen conference. I used it on the Merlin git repo which was cool to see but since everything is in a flat directory structure and it's mostly Jessica (and a little bit me) committing it's not nearly as cool as some of the videos from other projects.
Justin Hopkins

Google Exec, Others Advise Tight Web Security After Writer Hack - 0 views

  •  
    If you don't already know what 2 factor authentication is - it's the use of a second out of band communication channel that is used in addition to your password. In the case of Google it means that when you go to log in they will send you a text message with a 6 digit numerical code that you'll type in as well. This means that would be hackers would need to not only know your password but also have physical access to your phone.  I've already enabled this feature for Google apps @mobiusconsortium.org - if you'd like to enable it for your account (it takes like 10 minutes to get set up and fix your applications) just let me know. 
Jennifer Parsons

A "print" format limit in a MARC-based catalog | Bibliographic Wilderness - 0 views

  • What this blog post is about: How do you figure out if a bib is “print” or not from a MARC record?
  • The problem is that the origins of AACR2-MARC sort of assume print as a default, there’s no leader bytes or 007 or 008 code for ‘print’, print is sort of the absence of anything else.
  •  
    The burgeoning presence of ebooks on library catalogs is producing an unexpected problem-- what if the patron wants a print version of a book as opposed to an ebook version? How do you tease that out of MARC? RDA's GMD appears to be helpful, but not a useful as the Leader, 007, or 008 fields.
Scott Peterson

The Future of Libraries: Short on Books, Long on Tech Read more: http://www.mobiledia.... - 1 views

  •  
    "The main floor looks more like a sleek Apple showroom than a stuffy library. And instead of a Genius Bar, there's an Ask Me alcove, where you can get help on everything from laptops to flash drives. Rather than the Dewey system, color-coded walls, stairs and elevators help you find not just books and research papers, but also media rooms, video game collections and even a 3-D printing lab to create plastic models. But the best part? Built with state funds and private donations, it's open to the public. Welcome to the library of the future."
  •  
    An article that mainly repeats many current trends in libraries but is notable for appearing in a mainstream publication (Time Magazine) and being surprisingly aware of some new developments such as maker culture.
anonymous

Adobe Introduces the Paid Security Fix - Slashdot - 0 views

  • "Adobe has posted a security bulletin for Photoshop CS5 for Windows and OSX. It seems there is a critical security hole that will allow attackers to execute arbitrary code in the context of the user running the affected application. Adobe's fix? You need to pay to upgrade to Photoshop CS6. For users who cannot upgrade to Adobe Photoshop CS6, Adobe recommends users follow security best practices and exercise caution when opening files from unknown or untrusted sources."
  •  
    Considering we own more than 1 copy of CS5, this is annoying.
anonymous

Researcher runs IP network over xylophones - 2 views

  • With OSI, each layer is encapsulated from the others, allowing new technologies to replace older ones without disrupting the system as a whole. In this exercise, humans operated layer 1, the physical layer, where the bits are physically moved from one system to another. To the two computers communicating, however, it made no difference that people were conveying the bits back and forth with their xylophones. "With a properly configured network interface and operating system, an application does not know -- and does not need to know -- the logistics of what is known as the physical layer,"
  • Typically, it takes about 15 minutes to transmit a single packet at this rate -- if the volunteer is patient enough to complete a whole packet, and doesn't hit any wrong notes in the process. Such dedication and proficiency has turned out to be a rarity in trials, however. "Humans are really terrible interfaces,"
  • As an LED lights up, the human participant strikes the corresponding key on the xylophone. Piezo sensors are attached to each xylophone, so that they are able to sense when a note is played on the other xylophone. The Arduino for the receiving computer senses the note and then converts it back into hexadecimal code. And when the second computer sends a return packet, the order of operations is reversed.
Justin Hopkins

In the Olympics of Algorithms, a Russian Keeps Winning Gold - Technology Review - 1 views

  •  
    That's really cool! I wonder if he would work for MOBIUS? Ha ha!
1 - 18 of 18
Showing 20 items per page