Sunday, July 31, 2011

Reading Assignment #8

Title: 7 Things You Should Know About Cloud Computing
Publisher: Educause
URL: "7 Things You Should Know About Cloud Computing"Educause. 2009 August. Retrieved August 1, 2011.

Abstract of the article:

Cloud computing is the delivery of scalable IT resources over the Internet, as opposed to hosting and operating those resources locally, such as on a college or university network. Those resources can include applications and services, as well as the infrastructure on which they operate. By deploying IT infrastructure and services over the network, an organization can purchase these resources on an as-needed basis and avoid the capital costs of software and hardware. With cloud computing, IT capacity can be adjusted quickly and easily to accommodate changes in demand. Cloud computing also allows IT providers to make IT costs transparent and thus match consumption of IT services to those who pay for such services. Operating in a cloud environment requires IT leaders and staff to develop different skills, such as managing contracts, overseeing integration between in-house and outsourced services, and mastering a different model of IT budgets.

Three things I learned from my Reading Assignment:
  • Cloud computing relies on applications and file storage that resides on a network (usually the internet itself), and is being maintained by a host provider.
  • Cloud computing would be a good alternative for those institutions who can't afford to purchase their own servers, or those who have limited resources.
  • Although cloud computing technology brings convenience to cloud users, there are still issues that need consideration such as privacy, security, intellectual property, etc.

Application / Implication of the new things I learned to my work / to me as a person:

Upon learning that I am already a cloud user, I will continue using this technology because of its many advantages. However, knowing that it has also its disadvantages, I will use it with caution.


Sunday, July 24, 2011

Reading Assignment #7

Title: Measuring Use Patterns of Online Journals and Databases
Author: Sandra L. De Groote
Publisher: Medical Library Association
URL: De Groote, S.L. (2003). "Measuring Use Patterns of Online Journals and Databases".  J Med Library Association. 2003 April; 91(2): 231–241. Retrieved July 25, 2011.

Abstract of the article:

This research sought to determine use of online biomedical journals and databases and to assess current user characteristics associated with the use of online resources in an academic health sciences center. The Library of the Health Sciences–Peoria is a regional site of the University of Illinois at Chicago (UIC) Library with 350 print journals, more than 4,000 online journals, and multiple online databases. A survey was designed to assess online journal use, print journal use, database use, computer literacy levels, and other library user characteristics. A survey was sent through campus mail to all (471) UIC Peoria faculty, residents, and students. Forty-one percent (188) of the surveys were returned. Ninety-eight percent of the students, faculty, and residents reported having convenient access to a computer connected to the Internet. While 53% of the users indicated they searched MEDLINE at least once a week, other databases showed much lower usage. Overall, 71% of respondents indicated a preference for online over print journals when possible. Users prefer online resources to print, and many choose to access these online resources remotely. Convenience and full-text availability appear to play roles in selecting online resources. The findings of this study suggest that databases without links to full text and online journal collections without links from bibliographic databases will have lower use. These findings have implications for collection development, promotion of library resources, and end-user training.

Three things I learned from my Reading Assignment:
  • Because most of the online journals come with a great cost, maximum utilization is essential. Therefore, librarians should take steps to make users aware of the online resources that they can access and use for their research needs.
  • Convenience and easy access should be given considerations, for that reason, online resources should not only be accessible in campus but also at home.
  • User groups differ in their methods of access and in their frequency of use of online resources, and mostly it is based on their information needs and their reasons for accessing online resources.

Application / Implication of the new things I learned to my work / to me as a person:

As a student, I will take advantage of the opportunity to access online resources available, especially journals that will help me in my research works.
As a librarian, I will search for online resources that can be accessed for free and have them introduced in our library to aid research needs of our students and teachers.



Sunday, July 17, 2011

Reading Assignment #6

Title: Visual Elements in Search and Information Retrieval Systems
Author: Mari Carmen Marcos
Publisher: Emerald Group Publishing
URL: Marcos, M.C. (2005). "Visual Elements in Search and Information Retrieval Systems".  Hipertext.net, number 3. Retrieved July 17, 2011.

Abstract of the article:

Using a mantra, Ben Shneiderman prophesises in many of his articles and conferences what the next generation of data recovery interfaces will be like : a general vision first , followed by a closer approach and a filter, and finally details about the part of interest . Shneiderman thus synthesises four stages of the process of information search, and to each of these he adds a visual component. The mantra refers to "animated GUIs and visual data mining tools". The area of information visualization attempts to offer visual representations that communicate information in a speedy and effective way. Diverse techniques have been developed to achieve this objective and to make the process of data recovery a more comprehensible job and on occasions, more interactive. Visualization when applied to information helps people form a mental image of the information space. If the visualization takes place in an interface whose objective is information retrieval, the expression used for this type of system is Visual Information Retrieval Interfaces (VIRIs). Some systems of information presentation - mainly projects that have not been commercially implemented served as examples showing these elements of visualization. They have been classified into three groups: overall vision of the collection, visualization of results, and visualization of the attributes of each document. What remains is to tackle the final phase of the process of search and recovery of information, that which links the moment of presentation of results obtained by the system with the query. 

Three things I learned from my Reading Assignment:
  • According to  Shneiderman, the following are the four (4) stages of process of information search:
    • The user comes to the system and sees the overall information he can find there, what subjects are contained within, and how it works.
    • Once viewed in a general way, the user zooms in, that is to say, he centres in on one part that is of major interest.
    • In order to refine his search better, he applies a filter, so that the results obtained better match his information needs.
    • To end the process, the user asks for more detail from some of the results in order to determine if it will be of interest.
  • A great field of research in the application of visualization of information retrieval exists. However, the investigation into information visualization still has a lot to study and evaluate in order for satisfactory results to be obtained and be beneficial to information seekers.
  • Visualization tools have emerged in research environments, thus, visual representations are being used in information retrieval to facilitate searching process and help the users in "digging for information".

Application / Implication of the new things I learned to my work / to me as a person:

Librarians exist for the service of its clients/users, and it is our desire to give them the best service as much as possible. The use of visual elements or visualization tools will be a great help for us and the users in our search for information. Therefore, as a librarian, I will read more about it and see how can I apply or use it in our library. 

Reading Assignment #5

Title: Rethinking Copyrights for the Library Through Creative Commons Licensing
Author: Cushla Kapitzke
Publisher: The Johns Hopkins University Press
URL/Citation : Kapitzke, C. (Summer 2009). "Rethinking Copyrights for the Library Through Creative Commons Licensing". Library Trends, Volume 58, Number 1, Summer 2009, pp. 95-108. Retrieved, July 17, 2011 from Google Scholar.

Abstract of the article:

These two recent and related social developments of note for libraries are an upsurge in cultural participation enabled by Web 2.0 media and calls in government policy for enhanced innovation through education. Ironically, these have occurred at the same time that increasingly stringent copyright laws have restricted access to cultural content. Concepts of governmentality are used here to examine these tensions and contradictions. In particular, Foucault’s critique of the author figure and freedom as part of the will to govern within liberal democratic societies is used to argue for better quality copyright education programs in school libraries and library information science education programs. For purposes of teaching and research, copyrights are defined as agglomerations of legal, economic, and educational discourses that enable and constrain what can and cannot be done with text in homes, schools, and library media centers. This article presents some possibilities for renewal of school libraries around copyright education and Creative Commons licensing.

Three things I learned from my Reading Assignment:
  • The trend toward privatizing information through copyright law is also at odds with the increased access to information through the internet and the widespread use of social networking tools wherein digital texts can be easily copied and edited.
  • Strong copyright protection solves two (2) problems for governing authorities (e.g. copyright industries):
    • it constructs a state of scarcity to keep prices high, and 
    • it drives the so-called information/knowledge/creative economy, which advantages advanced capitalists nation-states such as US and Europe
  • Creative Commons (CC) licensing is a worldwide philosophical movement and nonprofit organization which seeks to sustain and extend the information commons by assisting copyright owners to license their creative products upstream through open content licensing protocols. CC protocols use IPRs  which include four options for tagging creative artifacts:
    • Attribution : Other people may use, modify and distribute the content as long as they give the original author credit.
    • Non commercial : Other people may use, modify and distribute the content but for noncommercial purposes only
    • No derivatives : Other people may use and distribute the content but cannot modify it to create derivative works.
    • Share alike : Other people may modify the content and distribute derivatives but only on the condition that the derivatives are made available to people on the same license terms. 

Application / Implication of the new things I learned to my work / to me as a person:

As a librarian and a researcher, I will always see to it that proper credit is given to whom the credit is due, and one way is to indicate the references in my reports and research works at all times. I will also be responsible in the use of the resources I'll get, and be aware of their limitations/extent of use.


Monday, July 11, 2011

Reading Assignment #4

Title: Closing the 'DIGITAL DIVIDE'
Author: Aaron Krebeck
Publisher: Information Today
URL: Krebeck, A.. (2010, October). Closing the 'DIGITAL DIVIDE''. Computers in Libraries, 30(8), 12-15.  Retrieved July 9, 2011, from ProQuest Computing. (Document ID: 2157148761).

Abstract of the article:

This article discusses about how the Charles County Public Library addressed the nation’s “digital divide” during the lean economic times. By providing public computing centers, library statistics showed that in the last fiscal year, computer usage at CCPL's three branches has increased 67%! Recently, the University of Washington surveyed users of public access computers in libraries and found this service has dramatic impacts. Since the community center is a county facility, the library is able to take advantage of a robust fiber-optic network backbone already in place. This streamlined system eliminates some of the complex rules, oversight, and staff involvement that result from access policies enforced in the branches.

Three things I learned from my Reading Assignment:
  • To cope up with the technological advances and the increasing demand of information seeking using the internet, librarians need to devise ways on how to address these needs. One way is by means of establishing a computing center, or providing additional workstations with an internet access.
  • Expanding public computer and internet access is not always easy. There are factors to consider, such as the physical space, electrical power and broadband data/internet connections. If these factors hinder the plan for improvement, finding another/available venue should be taken into consideration.
  • Being an innovative librarian coupled with the knowledge in information technology is a must to all information specialists to be able cope up with this fast-changing information age.

Application / Implication of the new things I learned to my work / to me as a person:

To become an effective librarian nowadays, the knowledge in information technology is a must. Therefore, I will see to it that I am updated with the current trends, know the applications which will benefit our library and the users, and will maximize the use of those resources.


Reading Assignment #3

Title: Librarians 2.0: Sowing Padi in (the) SEA
Author: Ivan Chew
Publisher: Emerald Group Publishing
URL: Ivan Chew.  (2009). Librarians 2.0: Sowing Padi in (the) SEA. Program, 43(3), 275-287.  Retrieved July 9, 2011, from ABI/INFORM Global. (Document ID: 1860858771).

Abstract of the article:

The purpose of this paper is to present an exploratory survey as part of a presentation for the Bridging Worlds 2008 conference. It seeks to understand how library institutions in the South East Asia (SEA) region have implemented Web 2.0 technologies - blogs, RSS feeds, wikis, or the use of services like Flickr, YouTube, de.lici.ous. Design/methodology/approach - Libraries surveyed were in: Hong Kong, India, Indonesia, Japan, Malaysia, People's Republic of China, Philippines, Singapore and Taiwan. The survey relied on references in published papers, internet searches and personal contacts. The survey found that more academic libraries than public libraries were using Web 2.0. technologies. Blogs and RSS feeds were the most common. Blogs were used mainly as web publishing tools rather than as a means to engage library users. The survey is not comprehensive. The search relied mainly on English publications and keywords, while the native language of most countries surveyed was non-English. Future research could comprehensively cover each country, by the type of library or language. The paper contends that Web 2.0 does not rely on technology, but more on practice and participation. The emphasis should be on relationships rather than transactions. Suggestions are offered on how libraries can adopt a Library 2.0 mindset without focusing on technology. A call is made to establish an East Asian Librarians 2.0 directory. The paper offers a non-technological perspective to institutions and practising professionals who are reviewing their Web 2.0 implementation.

Three things I learned from my Reading Assignment:
  • Library 2.0 is Web 2.0 applied in the library context and it usually means the library’s use of blogs and other social media platforms.
  • Web 2.0 culture is not about technology but about practice. More importantly, it is about participation, often about relationships rather than transactions. It is sharing of knowledge between the consumers and the producers, and in our case, between us, our professor and our classmates. We might not be aware, but the blogs that we prepared for our LIS260 subject is already a form of taking advantage of this technology.
  • Advocating and adopting Library 2.0 and Librarian 2.0 mindset is the “padi” seed that we may sow right now, so that in the near future, we may reap the harvest of greater recognition of our profession and continued relevance of our services.

Application / Implication of the new things I learned to my work / to me as a person:

I will research more about Web 2.0 by doing a lot of readings, asking colleagues for additional information, exploring the net, visiting websites and blogs and using the trial and error method in applying the learning that I’ll get. I will also adopt it in our library the soonest possible.

Friday, July 1, 2011

Reading Assignment #2

Title of the Article : Issues in High-Speed Internet Security
Author: Peder Jungck and Simon S.Y. Shim
Publisher: IEEE Computer Society
URL: Jungck, P. & Sim, S. S.Y. (2004).  Issues in High-Speed Internet SecurityComputer. 36-42.

Abstract of the article:

Over the past decade, the threat of computer worms and viruses has grown from a nuisance to perhaps the greatest obstacle to the Internet's growth and reliability. Trends in worm and virus delivery mechanisms and infection speed have also changed. Today, too often the first sign of a virus is that a part of the network goes down. Flash worms such as SQL Slammer have paved the way for future worms to carry payloads that directly target their victims and wreak havoc on government, business, and societal structures. To address both the threats facing networks today and future scalability demands, we need new security methodologies, deployment strategies, systems, and architectures. New breeds of systems based on innovative processing components will help achieve flexible line rate high-speed security over time.

Three things I learned from my Reading Assignment:
  • How the information in the internet is being transmitted from one point to another, and on what phase/stage they are prone to virus/worms attack
  • That there are different ways being undertaken to secure the internet from hackers, worms, and viruses, and it comprises careful studies
  • That the SQL Slammer is a worm that infected many computers and networks, and it served as a case to study on how to improve internet/network security

Application / Implication of the new things I learned to my work / to me as a person:
I should not take for granted the importance of internet security, therefore I will be more careful when searching the internet and as much as possible install softwares that will give security to my computer. I will also read more about internet security. Being familiar with the different viruses, worms, malicious attacks, and how to prevent them from entering the computer, network or system would be a great help to prevent further attacks on my computer and our network

Reading Assignment #1

Title: Computer ethics: Its birth and its future
Author: Terrell Ward Bynu
Publisher: Kluwer Academic Publishers
URL: Bynu, T. W. (2001). Computer Ethics : Its Birth and Its FutureEthics and Information Technology, 3: 109–112.

Abstract of the article:

This article discusses some “historical milestones” in computer ethics, as well as two alternative visions of the future of computer ethics. Topics include the impressive foundation for computer ethics laid down by Norbert Wiener in the 1940s and early 1950s; the pioneering efforts of Donn Parker, Joseph Weizenbaum and Walter Maner in the 1970s; Krystyna Gorniak’s hypothesis that computer ethics will evolve into “global ethics”; and Deborah Johnson’s speculation that computer ethics may someday “disappear”.

Three things I learned from my Reading Assignment:
  • That "computer ethics" as a field of scholarly research was created by MIT professor Norbert Wiener
  • That the rules of computer ethics (and I agree with Gorniak), no matter how well thought through will be ineffective unless respected by the vast majority of or even all computer users
  • That computer ethics was already foreseen by computer scientists, professors, etc. to be significant for the future, and it is true indeed, with this fast changing information technology nowadays, it should be a global concern

Application / Implication of the new things I learned to my work / to me as a person:
  • As a computer and internet user, I should be more responsible when taking advantage of these resources. Always taking into consideration not just my own rights but also the rights of others.
  • I should educate myself with these ethics, practice, and share them with other people.
  • I should read more about netiquette to familiarize myself with what is right and wrong, what is good and bad, and be a responsible netizen.