Tuesday, May 25, 2010

Sugnificant Learning Outline

Introduction to Computer Networks
On the first day of our meeting, we had a discussion on the introduction of information networks. Its history is connected with the history of internet. ARPANET (Advanced Research Projects Agency Network), created by the Defense Advanced Research Projects Agency (DARPA) of the United States Department of Defense, was the world's first operational packet switching network, and the predecessor of the contemporary global Internet in 1969. It was just on the 1970’s when the networks become cost-effective and reliable for ordinary computer users to transmit data between computers over long distances.

We also looked on the definition of words like the network, information networks, library networks, internet and open access which we will be using for the whole term of the subject. Network is defined as when two or more libraries engaged in a common pattern of information exchange, through communications for some functional purpose. Information Networks is a set of inter-related information systems associated with communication facilities, which are cooperating through more or less formal arrangements in order to implement information handling operations to offer better services to the users. Library Networks is broadly described as a group of libraries coming together with some agreement of understanding to help each other with a view to satisfying the information needs of their clientele. Internet is network that links computer networks all over the world by satellite and telephone, connecting users with service networks such as e-mail- and the World Wide Web and Open Access is a concept that allows the results of a publicly-funded research to be made available online without charge to the reader.
We did take noticed on the types of networks according to Franklin Davia Jebaraj & Frederick Ribin Devadoss of India that is the LAN, MAN and WAN. Local Area Network (LAN) is a number of related computers and electronic devices that share information over a transmission media within a building or campus wide networks. This LAN is commonly used in the library where files of different sections are saved in one network that is accessible by all the library sections. Metropolitan Area Network (MAN) is citywide or metropolitan areas are connected. Example that we had discussed about is the Mendiola consortium that is an educational organization of four institutions located along the street of Mendiola in Manila, Philippines. It was founded in July 16, 1974 upon the invitation of then Centro Escolar University President Dionisio Tiongco the heads of San Beda College, College of the Holy Spirit and La Consolation College. Wide Area Networks (WAN) is a large-scale network which is specially designed to interconnect data transmission devices over wide geographical areas.
We had also discussed the types of networks according to purpose and administration by Quarterman and Hoskins which are the research or academic, company, cooperative, commercial and metanetworks. Research or academic is for use of the academic and research community. These networks generally serve a region or a country. Examples given are the BITNET of United State of America and JANET of United Kingdom. Company is an in-house proprietary system, linking staff and machines at a single site and/or between branches and divisions of a company or organization; these are normally private with tight security to restrict access to authorized members of the organization. In co-operative, the costs are supported by a group of separate institutions or individuals. Many cooperative cataloguing systems, whereby member libraries could exchange catalogue records, were originally established on this basis. Example given is the FIDONET. Commercial (for-profit networks) is available to the public at large or closed user groups, on a fee-paying basis. Example is the CompuServe (An American network with a global user base, which has recently added a range of UK-specific information to its services in order to attract more British users). Metanetworks is the ‘networks or networks’ encompassing any of all of the above types; the Internet is a metanetwork - a vast conglomerate of interconnected computer networks that brings together people, information and computer resources across the globe.
We also tackled the objectives of the National Commission on Libraries & Information Science network. The objectives discussed in here are to promote and support adaptation of standards in library operations; to create databases for projects, specialists and institutions to provide online information services; to improve the efficiency of housekeeping operations; to coordinate with other regional, national & international network for exchange of information and documents; and to enumerate new services and to improve the efficiency of existing ones.
After the full discussion, we had our quiz which we do write-up in a tabular format about the four library network or consortium, library history, objectives, description, strengths and weaknesses of the networked library.

Proprietary versus Open Source Software
We had the lecture about the proprietary versus open source software. We differentiate proprietary software from the open source software.
Open source software is free of charge or non-commercial, distributed freely and can be altered, modified or change by the users. There are also different criteria of open source software. These are the free redistribution, includes source code and must allow to distribute source code, system must allow modifications of derived works and must allow them to be distributed under the same terms as the license of the original software, must have the integrity of the author’s source code, license must not discriminate against any person or groups of persons, license must not restrict anyone from making use of the program in a specific filed of endeavor, rights attached to the program must apply to all to whom the program is redistributed without the need for execution of an additional license by those parties, License must not be specific to a product, license must not restrict other software and license must be technology-neutral. Example of the Open Source Program is the Greenstone Digital Library.
Proprietary software is privately own and run; exhibiting characteristics that indicate ownership of somebody or something. Meaning, it is privately owned by a corporation or an individual that can be use by the society through buying. It is so much concerned on the rights to intellectual property that are owned, possessed, or held exclusively by an entity or individual.
We also discussed the justification of open access or why open access is preferred by some people than the proprietary software. This is based from the article of Ulrich Herb entitled “Sociological implications of scientific publishing: open access, science, society, democracy, and the digital divide”. Open access is preferred by some people because of science related justifications wherein most authors who had scientific information published their work on the free databases so that others will see and access it before the information will be obsolete. Another reason is the financial justification wherein open access is free of charge and those who cannot afford the propriety software will be able access the information. Moreover, democracy justification talks more on the freedom to access to information and free exchange of information by the people. Social justification is about the social impacts of those who cannot afford to have and those who can afford to have or the digital divide. Lastly is the sociopolitical justifications that open access is considered as a means to reduce inequities, disparities and disadvantages.
After the discussion, we had a quiz. We were asked to differentiate open access and proprietary software and give example each to illustrate our view. We give also our own views on this statement. “Free access to information is not sufficient to ensure informed discussion. A truly open concept of open access and democracy creates not only opportunities to receive and consume information; it also offers opportunities for publications and reputation building” from
Irich Herb in his article entitled “Sociological implications of scientific publishing: Open access, science, society, democracy, and the digital divide”. We put it in writing and submitted at the end of the period.


Computer Networks versus Distributed Systems
We had differentiated and defined the term computer networks and distributed systems. Computer networks is a system interconnected computers and peripheral devices. Example is a computer connected to printer, scanners and cameras. Distributed systems consist of multiple autonomous computers that communicate through a computer network. We discussed more about the computer networks, its types and uses. The types are the LAN, MAN and WAN wherein we discussed more in-depth and we had compared them on terms of cost, network site, speed, transmission type and number of computers. The uses of computer networks are on business applications, home networking and mobile users. Resource sharing is one of the most popular networks in the business applications just like, email and chat are used in communication between employees and computers connected in network can make use of one printer. In home networking, one can access office data and do his work at home. In mobile users, fixed wireless and mobile wireless as a network improved communication service.
We also discussed the internet connection options which are the cable internet access (often called simply cable internet), satellite connections and the Integrated Services Digital Network (ISDN). Cable internet access is a form of broadband Internet access that uses the cable television (CATV) infrastructure. Satellite connections is an internet access viageostationary satellite and is available almost worldwide, including vessels at sea and mobile land vehicles and it is often used in locations where terrestrial internet access is not available. The Integrated Services Digital Network (ISDN) is a set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. With all of this discussion, social issues involved in using computer networks and the Internet came up. These are internet gambling, piracy and reliability of information on the Internet.
For our activity, we chose an article from the list in the blog given by the teacher to be discuss in the class tomorrow. I chose the article entitled Reliability of information on the internet by Anton Veder and Robert Wachbroit.
After that, we had a hands-on activity in the computer where we register on the different open access software such as the springlerlink, archivists, and informaworld. We did register in our own and learned that we have so much online open access we can use.



Different Social Issues Involved In Using the Computer Networks- reporting/Greenstone
Digital Library Hands-On

The different social issues involved in using the computer networks were discussed inside the class. Ms. May Joyce discussed about Internet Gambling - The Effects of Online Gambling. In her report, online gambling has effect in the economy, in crimes, compulsive gambling and underage gambling. "Will YouTube sail into the DMCAs safe harbor or sink for Internet piracy?" by Michael Driscol was reported by Mr. Lauren Kipaan. "Perception of Quality and Trustworthiness of Internet Resources by Personal Health Information Seekers" was reported by Mrs. Rebecca. "An exploratory study of Internet piracy" by David A. Hohn, Lisa R. Muftic and Kelly Wolf was reported by Mrs. Clara Patnaan and I reported the Reliability of information on the Internet: some Distinctions by Anton Veder and Robert Wachbroit.
After the report, some of us submitted the web site URL’s with profile information on the web. I forgot the URL so I just submitted it on the following day.
We had our hands –on in the free software that is the Green Stone Digital Library where we find it very difficult because we can’t find the terms being described in its manual.


Finding Digital Resource on the Internet/ Electronic Sources and Services

Ma’am Cheryl defined first what a digital and digital resource is. Digital describes electronic technology that generates, stores, and processes data in terms of two states: positive and non-positive. Digital resource describes a new, more efficient method of storing, processing and transmitting information through the use of computer code. Furthermore, she stated some example of the digital resources on the internet like the digital libraries: resources and projects and project Guttenberg.
Also, we tackled the topic about searching in the internet. When we do searching in the internet, we have to be prepared on the topic, organize what is about to be search and use of Boolean operators to combine the most important terms.
We also discussed what we are going to use in searching in the internet. These are the search engines that will let you search specific words and topics, search directories that let you search for concepts or subject categories and metasearchers that sends terms to several other search engines at once. Of course, when we get information from the web, we have to be noted on the copyright law, fair use and acknowledgement or citing the source of information.
We had talked about the electronic sources and services. The online databases that is involve in gathering of information from a server or mainframe computer databases, OPAC that is basically a bibliographical database that shows a library’s holdings, Electronic library that is a library where information is stored electronically-online, CD-ROM, DVD, Compact Disk Read Only Memory (CD-ROM) that is extension of database where information is also stored for access, printing and downloading, and Digital Video Disk (DVD) used for television because it offers higher resolution pictures and better sound than VCR tapes.
After these, we had our presentation from the two articles we have search about information Networks and Resource Sharing through the PowerPoint presentation. Ma’am Clara started it and I was the next.


Evaluating Internet Sources

Criteria can be used to assess information found on the Internet such as authorship, publishing body, point of view or bias, referral to other sources, verifiability, currency, how to distinguish propaganda, misinformation and disinformation, the mechanics of determining authorship, publishing body, and currency on the Internet. Authorship is perhaps the major criterion used in evaluating information. When we look for information with some type of critical value, we want to know the basis of the authority with which the author speaks. For the publishing body, question on are there headers, footers, or a distinctive watermark that show the document to be part of an official academic or scholarly Web site is being asked. For the point of view or bias when evaluating information found on the Internet, it is important to examine who is providing the "information" you are viewing, and what might be their point of view or bias. The popularity of the Internet makes it the perfect venue for commercial and sociopolitical publishing. These areas in particular are open to highly "interpretative" uses of data. One more to consider is the accuracy or verifiability of details. For a research document, the data that was gathered and an explanation of the research method(s) used to gather and interpret it are included. Currency refers to the timeliness of information. How that search engine looks for information, and how often their information is updated? Is the Internet search engines aren't like the databases found in libraries? Library databases include subject headings, abstracts, and other evaluative information created by information professionals to make searching more accurate. In addition, library databases index is more permanent and reliable information.

Networked Readiness Indexed
Networked Readiness Index (NRI) measures the propensity for countries to exploit the opportunities offered by information and communications technology. It is published annually. The NRI seeks to better comprehend the impact of ICT on the competitiveness of nations. The NRI is a composite of three components: the environment for ICT offered by a given country or community, the readiness of the community’s key stakeholders (individuals, businesses, and governments) to use ICT, and finally the usage of ICT amongst these stakeholders.
The World Economic Forum together with INSEAD publishes the Global Information Technology Report, which makes use of the index.
The index was originally developed by the Information Technology Group, which worked at Harvard University's Center for International Development until 2002.
Sweden tops the rankings of The Global Information Technology Report 2009-2010, released today for the ninth consecutive year by the World Economic Forum. Sweden is followed by Singapore and Denmark, which was in the number one position for the last three years. Switzerland (4), the United States (5) and the other Nordic countries together with the Canada, Hong Kong and the Netherlands complete the top 10.
With an extensive coverage of 133 economies worldwide, the report remains the world’s most comprehensive and authoritative international assessment of the impact of ICT on the development process and the competitiveness of nations.
After the discussion, we shared about what we have read about the networked readiness index. I shared about the video in our blog. The Global Information Technology Report 2010 by Irene Mia that stated that Sweden is now no.1 followed by Singapore, then Denmark and USA is number 5. How can one country cope up with this? It should have an environment which is condition to the development of innovation and ICT. The environment has to have an infrastructure such as education and the quality of the educational system and is its laws protect IPR and development of ICT. Another way of coping is it has to have a joint vision for ICT, and a joint implementation of the environment by the 3 main stakeholder in the society- individuals, government & business sector.
May Joyce have her presentation on her articles about the Information Networks and Resource Sharing after the sharing.


Computer Network Hardware and Software

We had an overview about the computer network that consists of two or other intelligent devices linked by communication media to achieve successful communication. We can see computing networking in our own workplace, offices and in the school. LAN is the usual network being used.
After that, we had the discussion on the networking peripherals which are the computer hardware that we can see consisting of the processor (also called as the Central Processing Unit or CPU), Memory, input devices and the output devices. It has also the Network interface card is a special electronic circuit card inside the computer attached to a network. Network Cable physically connects the computer that is being plug into the network interface card on the back of the computer. It is also called twisted-pair cable. Network switch is a box with a bunch of cable connectors. Network Software is the software that makes the network work. It has also network software applications and tools utilize the Internet or other network hardware infrastructure to perform useful functions such as the FTP clients and servers @ Windows Firewall Software that is a free network firewall software application for Windows XP and the network ping that is being utilized to test network connections. A router is a basic hardware component used to connect workers.
We distinguished the difference between the local resources and network resources. Local resources are items connected directly to the computer such as hard drives, printers, and CD-ROM or DVD drives and can be used whether you’re connected or not. While network resources are the hard drives, printers, modems and CD-ROM or DVD drives that are connected to the network’s server computer that can be used only if the computer is connected to the network.
We also found the difference between Internet Protocol (IP) and MAC Addressing Techniques. The IP is the language that computers use to communicate over the internet that usually represented by the binary form of 0 and 1. The Machine Access Control (MAC) address is a unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification and used in the Media Access Control protocol sub-layer. It has 12 digit hexadecimal numbers (48 bits in length) as its addresses.
We had also identified the difference of the communications protocol that is the Open Systems Interconnection (OSI) and the Transmission Control Protocol/Internet Protocol (TCP/IP). OSI is a series of protocol layers with a specific set of functions allocated to each layer. Each layer offers specific services to higher layers while shielding these layers from the details of how the services are implemented. In the TCP/IP model of the Internet, protocols are deliberately not as rigidly designed into strict layers as the OSI model. It recognize four broad layers of functionality which are derived from the operating scope of their contained protocols, namely the scope of the software application, the end-to-end transport connection, the internetworking range, and lastly the scope of the direct links to other nodes on the local network.
Further, we talked about the Z39.50 that is an international protocol used by networked computer system for information retrieval. It also enables information seekers to search different systems on a network for the internet through the use of a single user interface. It also enables two computer systems on a network to communicate for the purpose of information retrieval.

Network and Internet Standardization

We had a discussion on network and internet standards. Networking standards are “open” standards, administered by a standards organization or industry group. Open standards are more popular than proprietary ones in the computer industry, and that's particularly so when it comes to networking. In fact, the few technologies where there is no universally-accepted open standard have been losing ground to those with open standards, particularly in the areas of wireless LANs and home networking—pretty much proving how important an open process really is. We have talked also about the International Networking Standards Organizations that is lead by the International Organization for Standardization (ISO) as the umbrella of the organization. It is followed by the American National Standards Institute (ANSI): ANSI is the main organization responsible for coordinating and publishing computer and information technology standards in the United States, Information Technology Industry Council (ITIC): ITIC is a group of several dozen companies in the information technology (computer) industry, National Committee for Information Technology (NCITS): A committee established by the ITIC to develop and maintain standards related to the information technology world, Institute of Electrical and Electronics Engineers (IEEE): The IEEE (pronounced “eye-triple-ee”) is a well-known professional organization for those in the electrical or electronics fields, including computers and networking, Electronic Industries Alliance (EIA): The EIA is an international industry association that is best known for publishing electrical wiring and transmission standards, Telecommunications Industry Association (TIA): The TIA is the communications sector of the EIA, and is responsible for developing communications standards, International Telecommunication Union - Telecommunication Standardization Sector (ITU-T): ITU-T is another large international body that develops standards for the telecommunications industry, European Telecommunications Standards Institute (ETSI): An organization with members from dozens of countries both within and outside Europe that is dedicated to developing telecommunications standards for the European market (and elsewhere). This list represents some of the more important organizations that are responsible for establishing and publishing standards in the networking world. It is not an exhaustive list, however.
Internet Standards Organizations is a group of related organizations responsible for the development of TCP/IP standards and Internet technologies. The Internet Society (ISOC) has overall responsibility for many Internet activities including standards development. It oversees the Internet Architecture Board (IAB), which makes high-level decisions about Internet technology development. Most of the actual work of creating current Internet standards is performed by the Internet Engineering Task Force (IETF), which is managed by the Internet Engineering Steering Group (IESG). Longer-term research is done by the IETF’s sibling organization, the Internet Research Task Force (IRTF), led by the Internet Research Steering Group (IRSG).
We further discussed the important standardization functions such as the parameter standardization and global resource allocation and identifier uniqueness. In parameter standardization, most protocols rely on the use of parameters that control how they function. As just two of many, many examples, the Internet Protocol has a set of numbers that define different IP options, and the Address Resolution Protocol (ARP) has an Operation Code field that can take on many different values. Just as it is essential for devices to agree on what protocols to use, they must also agree on what parameters to use for those protocols, if communication is to be successful. While in global resource allocation and identifier uniqueness, there are a number of resources that are used on the Internet that must be allocated from a fixed set of values and where uniqueness in assignment is essential. The most obvious example is that each TCP/IP host must have a unique IP address; another important example is ensuring that only one organization uses a given DNS domain name. If two devices have the same IP address or two organizations try to use the same domain name, the results would be unpredictable, but almost certainly bad.


Network Security

We discussed the Network security, planning for security and Internet security. In the network security, there are 3 primary goals of security: to protect confidentiality by ensuring private information is kept private, to ensure data integrity by preventing data from being inappropriately changed or deleted and to ensure data availability by making sure services are available and uninterrupted and that data can be accessed whenever it is needed and be restored quickly. There, public access computer security must at least ensure the availability, integrity, privacy and access. Availability means that computers which demand little maintenance will be available for anyone who wants to use them when the library is open, patrons won’t be able to delete or alter (or add) applications and system files that might cause a computer to suddenly malfunction and computers will be protected against viruses spread by patron diskettes or by Internet-borne viruses and Trojans that can cause not only to local computers but also to servers. Integrity means that patrons can be confident that their documents will not be infected by viruses, Trojans horses or other malicious code, and patron can expect that applications and other software will function properly so their documents won’t be corrupted. Privacy means that patrons can feel confident that their electronic privacy is being protected: that others can’t view their documents, access their email or view of their Internet searches. Access means that libraries will be able to protect their resources and comply with federal laws by making sure that patrons will only use computers, applications or data for which they have been granted access. If the library’s policy so states, children will not be allowed to browse the unfiltered Internet without having been specifically granted that right by a parent.
In planning security, libraries must create or modify policies and procedures, revisit disaster recovery plans, ensure adequate funding and incorporate security lifecycle. Library staff and information systems personnel should work together to complete two very important tasks.
One task is to perform a risk assessment. It should include threats and vulnerabilities facing the library’s computers and networks. It will help a library decide which of its assets are most important and why. Another task is to create a security policy that will include specific protection strategies. There should be protection strategies to include IT policies and procedures such as backup procedures, a disaster recovery plan, guidelines on training for staff, and specific protection procedures. It should be also updated regularly.
Internet Security involves the protection of a computer’s Internet account and files from intrusion of an unknown user. Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer’s data. Anti-virus programs and Internet security programs are useful in protecting a computer or programmable device/system from malware. Such programs are used to detect and usually eliminate viruses. Some useful programs contain features with hidden malicious intent. These are the malware, trojans, spyware, viruses, worms and bots. Malware is designed for example to infiltrate, spy on or damage a computer or other programmable device or system of sufficient complexity, such as a home or office computer system, network, mobile phone, PDA, automated device or robot . Viruses are programs that are able to replicate their structure or effect by integrating themselves or references to themselves, etc into existing files or structures on a penetrated computer. Trojans (Trojan Horses) are programs which may pretend to do one thing, but in reality steal information, alter it or cause other problems on a computer or programmable device/system. Spyware includes programs that surreptitiously monitor keystrokes, or other activity on a computer system and report that information to others without consent. Spyware collects and relays data from the compromised computer to a third-party while adware automatically plays, displays, or downloads advertisements. Worms are programs which are able to replicate themselves over a computer network, and also perform malicious acts that may ultimately affect a whole society/economy. Bots are programs that take over and use the resources of a computer system over a network without consent, and communicate those results to others who may control the Bots.
Buffer Overflow is an attack that could be used by a cracker to get full system access through various methods. It is similar to “Brute Forcing” a computer in that it sends an immense attack to the victim computer until it cracks. Most Internet security solutions today lack protection against these types of attacks.

Library Web Services

We discussed the Web services. Web services are concerned with the problem of enabling systematic application-to-application interactions over the Web, and the integration of the existing network computer infrastructure into the Web. The key component of this work is interoperability, and interoperability relies heavily on standards. Web Services is defined as a “loosely coupled, reusable components that semantically encapsulate discrete functionality and are distributed and programmatically accessible over standard Internet protocols” (Stencil Group). Other definition is a networked application that is able to interact using standard application-to-application Web protocols over well interfaces, and which is described using a standard functional description language. Another one is web services are a suite of protocols that define how requests and responses between software applications should encode (using XML) and transferred (e.g. over the web using HTTP or –email) and how much services should be described and registered for discovery and use. 4. Tracy Gardner, in an Ariadne article, called Web Services “interoperable building blocks for constructing applications.”
We looked on the examples of web services by the library of Portuguese National Library, WRL Consortium, University Library: University of the Philippines Diliman and CLEVNET Library Cooperation.
There are limitations of web services. Web Services are not the be-all and end-all of library web opportunities. Art Rhyno of university of Windsor, ON. cautions that Web Services “may not be enough to wire together a busy circulation system and a patron database.” However, he says, Web Services can be “a way to bring together systems that don’t have to talk together for their primary function but can take advantage of each other for extended services. In addition, most technologies, we will likely discover that Web Services can be very useful for solving particular problems but not so great for others. Since the protocols upon which Web Services are based are still new, we are still discovering the best applications for it.
There also some library programs for networking, resource sharing, etc on the internet. These are chat reference, full-text databases, e-books, electronic library, links to facebook, on-line tutoring by the librarian and many others.
After the discussion, we had an activity on visiting five online libraries and list online resources they offer to library patrons. Then make a “New Page” in your blog and name it Webliography of Library Online Resources. Post here the five libraries you have visited in item #1) and include this Webliography of Library Online Resources on you Portfolio Printout.


Web 2.0/ Library 2.0

We defined Web 2.0 and library 2.0.
Web 2.0, named by Tim O`Reilly in 2004, to refer to a second generation in Web history based on user communities and a wide range of services, such as social networks, blogs, wikis or folksonomies, that encourage collaboration and efficient exchange of information among users.
Library 2.0 is the application of interactive, collaborative, and multi-media web-based technologies to web-based library services and collections. Library 2.0 theory is user-centered. Users participate in the creation of the content and services they view within the library’s web-presence, OPAC, etc. The consumption and creation of content is dynamic, and thus the roles of librarian and user are not always clear.
We looked on to the tenets of Library 2.0. This tenets are: it allows a user presence within the library web-presence; it allows collaboration between patrons and librarians; and it allows a more dynamic experience and becoming a more web-based application (they often allow co-browsing, file-sharing, screen-capturing and data sharing
We learned also the technologies in Library 2.0. One technology is the synchronous messaging that is widely known as instant messaging (IM). Libraries have begun to provide “chat reference” services, where patrons can synchronous communicate with librarians much as they would in a face-to-face reference context. Another one is the streaming media that are multimedia that are constantly received by, and normally presented to, an end-user while being delivered by a streaming provider (the term "presented" is used in this article in a general sense that includes audio or video playback). Blogs and Wikis are also technologies in Library 2.0. A Blog is a type of website usually maintained by an individual with regular entries of commentary, descriptions of events, or other material such as graphics or video. Wikis are essentially open web-pages, where anyone registered with the wiki can publish to it, and change it. Wikis as items in a collection, and the associated instruction of users in the evaluation of them, are almost certainly part of the future of libraries. Another technology in library 2.0 is the social network that enables messaging, blogging, streaming media, and tagging. Example is the Myspace, Facebook, Del.icio.us Frappr and Flickr. It also includes the LibraryThing Tagging, and Really Simple Syndication (RSS) Feeds. Mashups is another technology involved in Library 2.0. They are ostensibly hybrid applications, where two or more technologies or services are conflated into a completely new novel service.
We had also some examples of the move from Library1.0 to Library 2.0. They are from email reference/Q&A pages to Chat reference; text-based tutorials to streaming media tutorials with interactive databases; email mailing lists, webmasters to Blogs, wikis, RSS feeds; controlled classification schemes to tagging coupled with controlled schemes; OPAC to Personalized social network interface; and catalog of largely reliable print and electronic holdings to catalog of reliable and suspect holdings, web-pages, blogs, wikis, etc

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.