The NSA Has Some Really Cool Tools:
• XKeyscore gives 'widest-reaching' collection of online data
• NSA analysts require no prior authorization for searches
• Sweeps up emails, social media activity and browsing history
How TCP/IP eclipsed the Open Systems Interconnection standards to become the global protocol for computer networking
Beyond these simplistic declarations of “success” and “failure,” OSI’s history holds important lessons that engineers, policymakers, and Internet users should get to know better. Perhaps the most important lesson is that “openness” is full of contradictions. OSI brought to light the deep incompatibility between idealistic visions of openness and the political and economic realities of the international networking industry. And OSI eventually collapsed because it could not reconcile the divergent desires of all the interested parties. What then does this mean for the continued viability of the open Internet?
Perhaps the best thing we can do, in planning for onsite library computing today, is to aim for maximum flexibility. Students may express a demand for desktops today, but it’s hard to imagine that will be our future. When we gaze out upon our fields of computers we should, in our mind’s eye, envisions it as a room that holds nothing but an enormous, as far-as-the-eye-can see card catalog. Because, ultimately, as the next generations of students make it to our doors, it is less likely they will expect us to provide them with computers, and it may be that they would consider such amenities laughable and a waste of their tuition dollars. It is a bit premature perhaps, but not unreasonable, for us to begin thinking about how we will use all the space currently devoted to desktop and laptop-loan computers. My crystal ball is less clear on this matter, although I suspect we can always improve things by expanding the café.
Digital Repositories workshop at the NYLA Annual Conference, Wednesday, September 25, 2013, Niagara Falls, NY
Sponsor: Academic and Special Libraries Section
Half Day PM Program 2:00 PM – 5:00 PM
This workshop addresses key issues surrounding the creation, maintenance, and cultivation of digital repositories. Drawing on the latest literature, case studies, and personal experiences, speakers lead a discussion that covers planning the digital repository, selecting a methodology for its establishment, populating it with content, marketing it to the library's constituencies, and meeting the various challenges and questions along the way. Participants have the opportunity to bring their own experiences to bear, as well as engage in group discussions regarding how to get the most out of a digital repository.
Jim DelRosso is the Digital Projects Coordinator for Cornell University's Hospitality, Labor, and Management Library, where he is responsible for such projects as DigitalCommons@ILR, the digital repository for Cornell's ILR School. A digital librarian since 2009, Jim is also the President for the Upstate New York Chapter of the Special Libraries Association, and has served as the Communication & Social Media Chair for the SLA's Academic Division.
Amy Buckland is the eScholarship, ePublishing & Digitization Coordinator at McGill University Library, where she is responsible for scholarly communication, publishing initiatives, and making rare items from special collections available to the world through digitization. She loves information almost as much as Fluevog shoes, and thinks academic libraryland is ripe for a revolution. You can find her online at informingthoughts.com and in most social networks as Jambina. -- Read More
When we read the past, we acknowledge that we stand not only, as Isaac Newton put it, on the shoulders of giants, but also on those of scholars of smaller stature who were no less passionate about their subjects and determined in their own way to contribute to the intellectual conversation. The 12th-century philosopher and educator Bernard of Chartres is said to have observed that we are all dwarfs when we attempt to climb atop gargantuan flesh. I am glad to have met more of them online, and to have profited from their vantage point.
The CRT Television
Blowing on a Nintendo Cartridge
The Telephone Slam
The Dot Matrix Printer
Advancing Film in a Camera
Friction-Shifting a Bike
Phishing attacks targeting academia aren’t the most high-profile of attacks, though they’re more common than you might think. Student populations in themselves constitute a sizeable pool of potential victims for money mule recruitment and other job scams, in fact anything that promises an easy supplemental income, unfeasibly cheap or free trendy gadgetry, and so on. But I’m talking about attacks against the institutions, rather than their ‘customers’: for example, targeted social engineering attacks as a means of accessing intellectual property. Some academic research has appreciable monetary value in its own right, and much of it is developed in partnership with and funded by businesses with a direct interest in monetizing it: that makes it of interest to people with an interest in getting in first.
A decade or so ago, ISI's EndNote bought out most of the competition, practically obtaining a monopoly on the reference manager business. In the early Library 2.0 boom, web-based products like Zotero and CSA's RefWorks became the norm. Thomson Reuters played catch up by introducing EndNote Web, and NoodleBib and other adware/freemium clones cropped up in what is now again a crowded marketplace.
Mendeley, recently purchased by Elsevier, has gained fame by offering social media integration and and sharing cababilities. It notably works on the old Questia model of selling itself directly to individual users, not institutions. ProQuest is also putting the finishing touches on RefWorks Flow, which features similar collaboration tools.
The way these newer products allow users to share articles with peers raises interesting questions about them potentially being used as a new "Napster for subscription journals," especially since they are now both owned by major publishers. See my comment for some more philosophical questions....
If you’ve ever heard someone complaining that “this system doesn’t support double-byte characters”, or asking whether “this data’s in Unicode”, and felt as though you really ought to understand what those things mean, then this post is for you.
How ASCII Lost and Unicode Won...
Paul Solman speaks with Jaron Lanier, widely regarded as the father of virtual reality and the author of "Who Owns the Future?", about how big computers -- and the government and businesses they empower -- are creating more economic inequality.