My Blog list

Monday, July 25, 2011

Computer and Internet Security

Title of the article: can you trust your computer?
Author: Richard Stallman
Publisher: Newsforge (the online newspaper for Linux and Opensource)
URL: http://hdl.handle.net/10760/6349

    Large media corporations such as Microsoft and Intel produces proprietary software advocates to make computers which cannot be manipulated by its users. Microsoft for example, has designed Windows to scan all files and software in the end user's pc's memory. Another example is the "Kazaa" music-sharing software which uses music uploaded in its database for the renting of its proprietary clients. These software are hard to remove once installed in the pc, since their source codes are not given to its end-users. These software are designed to control all other functions of the pc. Malicious computing includes a digital encryption which keeps its instructions unknown to its end-user. These capabilities of malicious or trecherous computing have been planned to be used on sharewares and e-mails. These software can make use of rules which are accepted in the internet. Such software can actually control downloading upgrades. The use of free operating systems such as GNU/Linux can prevent the effects of proprietary software through having its developers remove these software. However, most require licensed Operating systems.
Three things I learned from my Reading Assignment:
1. The GNU Project (free software) distributes the GNU Privacy Guard, a program that advocates for public-key encryption and digital signatures used in sending secure and private emails. 
2. Palladium (a microsoft product) cheats end-users by not protecting the consumer's pc from virus attacks in which it was advertised to do.
3. Consumers must be well aware of the consequences of using proprietary malicious software which helps  in divulging information which should be protected by copyright and privacy rights for its end-users.
Application to work:
Malicious or trecherous computing is a growing trend in the computing world. However, the real application can be felt by individuals and  organizations who are financially-capable  of proprietary rights. One trend which is more felt is piracy and its debilitating effect on the country's economy.

Monday, July 18, 2011

WEB 2.0 technology applications to Libraries

Title of the article: Web 2.0 and Library 2.0: An Introduction
Author: Fatima Darries
Publisher: Tshwane University of Technology
URL: http://hdl.handle.net/10760/14645

Abstract of the article:
       The article discusses on the definition and characteristics of Web 2.0 and Library 2.0. Web 2.0 is the web which makes creating content easier, makes collaborating between people more accessible and can store web programs on the Internet. Library 2.0 services are characterized by enabling more user participation in which library users become more participatory.
      In the application of Library 2.0 in the real library work, it has to have the ff. characteristics: has an active presence, socially-networked and shares information in real time, updates status regularly or on a daily basis, offers targeted services to the networked community, accessible on real-time communication devices, designs information services specifically for delivery and use on the real time web.
      The Librarian 2.0 on the other hand is characterized by having the ff. traits: understands the user’s view and aspirations and goes where the user goes, connects people to expert discussions, new findings and information, delivers services in a device for its uses, uses non-traditional cataloging methods used on user input for content descriptions, classification and metadata and uses open sources and scrutinizes usage data for insights into user behavior.

Three things I learned:
1. Web 2.0 is the provision of a search option which allows information to be automatically searched for by keywords and necessary software but with easier modes for creating content, easier means for collaborating and uses the internet for software storage. 
2. The librarian and information specialist’s job is enriched by utilizing the new capabilities of data communication and exchange through web 2.0 such as google reader, wikispaces, blogs, slideshare, and open sources such as (open content, alliance, google book search and Open WorldCat).
3. Importance should be given to assessing information retrieval method of users, and assessing which web 2.0 applications can be effective in addressing different data and information needs.

Application to work:

·         Web 2.0 has many uses for in the library. Wikis and blogs can give information available, open sources can give information for the use of librarians as well as sharing sites like twitter, slideshare and youtube. Librarians or information specialists must screen and assess information before making it available so that information given to the clients addresses their needs adequately and properly.

Computer ethics or netiquette

Title of the article: Virtual reference services: implementation of professional and ethical standards
Author: Shachaf, P.
Publisher: American Society for Information Science and Technology
URL: http://hdl.handle.net/10760/12412


The American Library Association’s Reference and User Services Association (RUSA) and International Federation of Library Association (IFLA) Reference and Information Services Section have both guidelines for user-reference services. The American Library Association also has its code of ethics which guides reference librarians in providing information to all requesting patrons by providing the highest level of service through appropriate and usefully organized resources and unbiased service policies. A study was conducted for evaluating virtual reference service and found low levels of adherence to the guidelines set by RUSA and IFLA. However, the virtual environment may help in providing unbiased reference services because in the virtual environment social cues, context and non-verbal behavior are reduced. Another study was conducted in which the virtual reference services were assessed through their timely response, reliability and courtesy. The study found that e-services provided by reference librarians are timely attended to, reliable and courteous. Though this second study, virtual reference service may provide unbiased services. In conclusion, librarians must be aware and sensitive to the professional standards and ethical guidelines set internationally in their provision of virtual or e-reference service.

Three things I learned from my Reading Assignment:


1. There are guidelines which exist for the provision of effective library reference service provided for by International Federation of Library Association (IFLA) and American Library Association (ALA) in which librarians must follow in providing reference service. 
2. Virtual or E-Reference Services of the library enables an environment which has reduced social interaction. Through the reduction of social interaction, bias to the provision of information may also be reduced.
3. Librarians must follow the three important characteristic of effective reference service; these are timely response, reliability and courtesy.

Application or Implication of the new things I learned to my work:
    Virtual or E-referencing is a capability brought about by capability of the internet.  Professional librarians should provide effective reference service to their clients. These can be provided for by providing information using the email as quickly as can be given, answering questions efficiently and correctly and with approachability, friendliness and politeness.