Skip to main content

Home/ MOBIUS Libraries/ Group items tagged network

Rss Feed Group items tagged

anonymous

Researcher runs IP network over xylophones - 2 views

  • With OSI, each layer is encapsulated from the others, allowing new technologies to replace older ones without disrupting the system as a whole. In this exercise, humans operated layer 1, the physical layer, where the bits are physically moved from one system to another. To the two computers communicating, however, it made no difference that people were conveying the bits back and forth with their xylophones. "With a properly configured network interface and operating system, an application does not know -- and does not need to know -- the logistics of what is known as the physical layer,"
  • Typically, it takes about 15 minutes to transmit a single packet at this rate -- if the volunteer is patient enough to complete a whole packet, and doesn't hit any wrong notes in the process. Such dedication and proficiency has turned out to be a rarity in trials, however. "Humans are really terrible interfaces,"
  • As an LED lights up, the human participant strikes the corresponding key on the xylophone. Piezo sensors are attached to each xylophone, so that they are able to sense when a note is played on the other xylophone. The Arduino for the receiving computer senses the note and then converts it back into hexadecimal code. And when the second computer sends a return packet, the order of operations is reversed.
Scott Peterson

An online hub for archical materials - 0 views

  •  
    The Social Networks and Archival Context Project (SNAC) is a project that aims to bring together online resources and archival materials on historical person, to basically allow a researcher to know where all the records are to understand a person. What I found in the prototype is that it resembled a catalog of sophisticated authority records. This could be useful for someone needing quick information or seeing how a historical figure fits in context, but I question if in the end it doesn't repeat information found almost as readily in other resources such as Wikipedia.
adrienne_mobius

Very Pinteresting!: The hot social network is taking educators by storm - The Digital S... - 0 views

  •  
    "Everyone's buzzing about Pinterest, a new social media tool that connects people through the things they like-but for a growing number of users in classrooms and media centers, it's fast becoming a powerful resource where teachers and students share images, store lesson plans, read about current events, watch video clips, and collect their favorite apps."
Scott Peterson

Tumblrarian 101: Tumblr for Libraries and Librarians - 1 views

  •  
    I think I have a Tumblr account (?) but obviously I don't use it. Anyone have one? Tumblr got me a job. Being intimidated by the prospect of a "full-size" blog, I joined Tumblr in February 2011. Since then I've shamelessly promoted my "name" and stalked down as many libraries/librarians on the site as I could find. I've connected with libraries, librarians, library students, publishers, writers, readers, Doctor Who fanatics, and cat lovers.
  •  
    A bit too much of a fan piece but a general description of how librarians can use Tumblr as networking. The basic function is similar to Twitter--namely microblogging, but post aren't limited to 140 characters of text and can include image, videos, and audio clips.
Scott Peterson

How College Students Manage Technology While in the Library during Crunch Time - 0 views

  •  
    An interesting read even if it is the familiar territory of user surveys. Some results that stood out is 85% of users were consider "light" technology users. Also, Facebook time during study crunches is more like a yawn or break than anything facilitating networking. Another concerning result was that only about 11% used scholarly research databases.
Scott Peterson

The Digital Preservation Network - 0 views

  •  
    An interesting organization but sounds ultimately like a variation of the LOCKKS concept, namely preserving a digital archive by means of multiple copies on data nodes, so if one fails others step in to replace it.
Jennifer Parsons

What is metadata? A Christmas themed exploration. | Information Culture, Scientific Ame... - 1 views

  • Broadly speaking, metadata is simply a structured description of something else. The most popular example of metadata comes from the library catalog. Each book has a title, author, call number, publisher, ISBN etc. listed in the online catalog. These elements comprise the book’s metadata, and there are rules to make sure that things are standardized.
  •  
    Includes one of the best brief descriptions of metadata that I've found. The author also, using example photos, illustrates the importance of metadata and its relevance to a material being used.
  •  
    Nice! Thanks for sharing Jennifer.
anonymous

New Attack Breaks Confidentiality Model of SSL, Allows Theft of Encrypted Cookies | thr... - 0 views

    • anonymous
       
      It's worth noting that to execute this attack you have to be on the network of your target and have the ability to execute a man in the middle attack.
  •  
    Two researchers have developed a new attack on TLS 1.0/SSL 3.0 that enables them to decrypt client requests on the fly and hijack supposedly confidential sessions with sensitive sites such as online banking, e-commerce and payment sites. The attack breaks the confidentiality model of the protocol and is the first known exploitation of a long-known flaw in TLS, potentially affecting the security of transactions on millions of sites.
anonymous

HP unveils Ethernet-powered thin client - thin clients, Power over Ethernet, HP - Thin ... - 0 views

  • HP has unveiled an all-in-one thin client capable of being powered by an Ethernet cable. HP claims the t410 AiO is the first all-in-one thin client that supports the 802.3at Type 1 Power over Ethernet (PoE) standard, which means it is capable of drawing its power from a network connection.Although the thin client can run off standard AC power using a DC adapter, it can also be powered by its Gigabit Ethernet port (which drops to 10/100 when using PoE). It draws just 13 Watts of power.
  •  
    This is awesome. Imagine having only one cable to run. ISG does desktop virtualization and with something like this plus fiber to the datacenter the whole thing would be super smooth. I can't wait to see what it ends up costing.
Sharla Lair

Transfer of Training: Moving Beyond the Barriers | trainingmag.com - 1 views

  • Notwithstanding the complexities of training, it is indisputable that the true success of training is represented in the learner’s ability to demonstrate what has been learned.
  • Overall learner satisfaction is greater if the training is relevant to the job. In alignment with this idea is the importance goal setting (Gist et al. 1990). Relevant goals intensify the learner’s interest in the tasks at hand, which results in persistence from the learner to reach the goal (Gist et al. 1990).
  • new research has shown peer support as being significantly influential on effects of transfer (Burke & Hutchins, 2008). Peer collaboration, networking, and the sharing of ideas relating to the content can act as support for skill transfer in trainees (Hawley and Barnard, 2005)
  • ...2 more annotations...
  • Provide support for transfer throughout the duration of the transfer process and not solely at specific time phases.
  • Further, incorporate assessment of transfer from trainee, trainer, and the organization’s perspective.
  •  
    Good tips on learning transfer. Teach for transfer!
Scott Peterson

It's the end of books as you knew them: E-books out-sell hardbound for the 1st time - 0 views

  •  
    A more doom-and-gloom article, although I note that while eBook sales have increased, so have those of hardbooks.
Justin Hopkins

Details of Google Fiber emerge - KansasCity.com - 1 views

  •  Get 10 percent of the homes in your area to sign up for service — it takes a $10 deposit — and Google will eventually hook you up. • Meet that quota by Sept. 9, or the network will fly around you. And if Google does come to your neighborhood, you’ll have just once chance for installation.
Justin Hopkins

Shareable: Libraries Aren't Dying, They're Evolving - 1 views

    • Justin Hopkins
       
      This is so true. I remember back in the old days of COIN (Columbia Online Information Network). COIN was an ISP that the public library ran. It was free for anyone to use, but if you wanted a decent connection or access to email you had to pay. It was in the days before www. Anyway it was so cool and the perfect example of how libraries were quick to jump on the new tech. I remember seeing the metal and smoked glass cabinet full of modems on the second floor of the old library building out where everyone could see and marvel at it. It had a big sign hanging from the ceiling "COIN".
  • The State of America’s Libraries Report for 2011 notes that library visitation per capita and circulation per capita have both increased in the past 10 years.
  • “In general, libraries embraced the internet right away,” says Raphael. “And not just to provide computers for patrons. They recognized that it became a new tool for librarians.”
  •  
    A positive four part blog entry about how libraries are evolving to meet new needs, strengthen communities during bad economic times, and are centers for sharing. Overall I think this article is the most realistic one I've read in some time. It still acknowledges that libraries are doing more with less, and that perceptions of libraries are slow to change.
Justin Hopkins

Yahoo's password leak: What you need to know (FAQ) | Security & Privacy - CNET News - 1 views

  • All of which suggests that close to 300,000 people could have just seen their personal, non-Yahoo e-mail accounts compromised as well as their Yahoo accounts.
  • To be on the safe side, if you have a Yahoo ID, you should assume it's no longer secure and change its password. (I just did, and I've never visited Yahoo's contributor-network site until today.) Yahoo is also changing the passwords of affected users. You should, however, also change other passwords if: You've used the same password for any other major service -- particularly for sensitive accounts such as banking, investing, or e-mail. You've ever signed into Yahoo or Associated Content with a non-Yahoo e-mail address.
  •  
    Also mentioned in this article is the leak from a few months back of LinkedIn. If you have a LinkedIn account the same advice applies. Hopefully you were using a unique password for all of these services and have nothing to fear ;)
anonymous

Generate and keep really secure passwords for free | ITworld - 0 views

  • Of course, they could look for a username that sounds like you in the list of 8 million LinkedIn and EHarmony logins and then just use the password published there, or the ones posted following the hack of 77 million user accounts at Sony or the 130 million credit-card accounts taken from the clearinghouse that processes your credit card payments, or tens of thousands lost by a New York electric utility or the California government services agency you thought was unquestionably trustworthy or the 24 million emails and user names swiped from Zappos or almost anywhere else.
  • you should use a different highly secure password at every site you use.
  • That way, no matter what web-site login database is breached next, your loss can be limited to only the information (or money) on that one site,
  • ...2 more annotations...
  • KeePass -- one of two apps with unquestioned leads; both come with Firefox and Internet Explorer extensions or web sites you can used independently; LastPass – the other of the two leaders. Both are stable, quick, reliable and free;
    • anonymous
       
      I've used LastPass. It's nice, but I prefer to have something local if possible. I'm not really concerned with their security, but it's nice to have your passwords offline.
  • KeePass;
    • anonymous
       
      This one doesn't have a browser integration but it can be kept on a usb key for portability
1 - 16 of 16
Showing 20 items per page