Wednesday, February 29, 2012

week 7 lab

This was a really hard lab for me!

http://www.pitt.edu/~phh12/index.html

Monday, February 20, 2012

Week 7 Blog : HTML

HTML or HYPERTEXT HOW I LOVE THEE...let me get my cheat sheet out!
So this week's reading more lend themselves to my crazy ideas of what I could do once I become queen of HTML...hum, I was thinking a website dedicated to Charles Dicken's 200th birthday or Literary Mardi Gras.  But then I read the last article (Goans, D., Leach, G., & Vogel, T. M. (2006). Beyond HTML: Developing and re-imagining library web guides in a content management system. Library Hi Tech, 24(1), 29-53.), and it struck me that perhaps the next generation library webpage is a blended version of catelogue in a open source Koha format and a overlay of HTML that takes the patron beyond just the book search to events and local and national articles about their topic.  Now I realize that the such a crazy hare-brain scheme is probably very labor intensive.  But the times they are a changing and who know the capabilities and what patrons will want, no, demand from their libraries in only lets say 5 years from now.  So, I better watch that tutorial again and post that monkey cheat sheet at my cubical and get ready for the HTML library revolution.  I have a strong feeling it will probably show up at interview time.

Week 6 Lab Koha






Barcode:000060060

Tuesday, February 14, 2012

week 6 blog


Dismantling Integrated Library Systems – Andrew Pace 2/04
-early 90’s librarians cautiously embraced web as new gateway to information
-resulting in old technology of ILS clashed with new web technologies
-library’s dismantle systems and create new modules due to frustration with inflexibility of technology of current systems
-vendors creating standalone products to harness new technologies and capture or inven6 new maekt shares
-any basic ILS is going to get you where you need to go
-RFP process doesn’t reflect the similarities among current integrated systems and require retooling to distinguish one vendor from another
-achieving the “same intellectual” logic that is part of the older system as develop the new system is the key
-when a library opts to alter/tinker with either the back or front end of current system there is a temptation to start from scratch
- Incremental functionality improvement to current systems is more and more expensive
--serving larger and larger customers in a web based environment with one stop search option is norm of today’s library
-some librarians and vendors are content with current levels of features and functionality
-some librarian’s feel current systems don’t satisfy internet savvy users
-some vendors acknowledge the revenue flattening with lack of any development to ILS platforms
-ILS vendors say that new products are a direct response to newer and better technologies, but that these technologies cost money in development and third party alliances
-Author states that ILS maintenance fees are cheap yet it is librarian’s resistance to pay for development that has caused the lack of technological development with traditional ILS systems
-When organizations do create their own modules often these systems integrate easily with the legacy system and often need patch programming in Perl to connect to main system
-At eth heart of the issue is that by redefining ILS as application platform vendors should be have to offer better integration with third party systems while simultaneously fiving librarians better interoperability tools
-prior to interoperability can meet libraries changing needs vendors need to re-direct their efforts
A few Thoughts on the Google Books Library Project – Charles Edward Smith
-Main point: Google’s initiative will not make books obsolete; it will make the information in them more widely available
-digitalized endeavors will preserve and perpetuate the ideas of thousands of authors by transferring them to today’s technology
-books are other printed material would quickly reach obsolescence if not easily accessible through digital technology
-we now expect information to all kinds and form all sources to be only a few keystrokes away
-search engines are the new subject indexes to virtually infinite amount of information on the internet
-still: performing research in a major library remains the preserve of specialists
-as the internet generation graduates from school research that can’t be obtained via the keyboard might as will not exist
-therefore: an author’s efforts to compose their life’s work should not be irrelevant simply because they wrote and published in the wrong format
-Summary: the successful transfer of knowledge is the task that les before us…any effort that responsibility further that task benefits all of us
How Internet Infrastructure Works – Jeff Tyson
-Nobody owns the internet
-the Internet Society   is a non-profit group est.  In 1992 that oversees the formation of policies and protocols that define usage and interaction with the web
-dozens of large internet providers interconnect at NAPs in various cites and trillions of bytes of data flow between the individual network at theism points
-All of these networks rely on NAPs , backbones and routers to talk to each other
-Routers have e2 separate but related jobs
                -ensure information doesn’t go wee it is not needed
                -make sure information makes it to the intended destination
-Routers join to 2 networks allowing information to pass between and protect the network from over flow of information traffic spilling over unnecessarily
-National Science Foundation created first high speed backbone in 1987

Saturday, February 11, 2012

Week 5 Lab








Screen Shot for task 1

http://www.pitt.edu/~phh12/index.html


Wednesday, February 8, 2012

Week 5: Computer Networks

Wikipedia: Local Area Networks

-A computer network that interconnects computers in a limited area such as home, school, office, computer lab.
-Characteristics of LAN
    -higher data-transfer rates
    -smaller geographic area
    -lack of need for physical lines
-Ethernet and Wifi most common technologies
-History:
  -Ethernet developed at Xerox from 1973-1975
  -DOS based system starting in 1981 meant way many sites grew to dozen or even hundred of computers
  -initial driving force for networking sharing storage and printer access
  -introduction of Novell software provided even handed support for dozens of competing card/cable types on one platform
  -1990's Microsoft introduced Window NT advanced server
  -Unix computer work stations from such vendors such as SUN Microsystems were using TCP/IP based networking
         -although this market segemtn has since receded, the technologies developed using TCP/IP continue to be influential on the Internet and in both Linux and Apple OSx networking
-WiFi is not the most common technology in residential premises
   -requires modem and is well suited to mobile devices and laptops
-Smaller LANs use one or more technologies linked to each other and thus link to a router or modem for Internet access

Wikipedia:Computer Networks:
-Computer network is a collection of hardware components and computer interconnected by communication channels that allow sharing of resources dn information
-Communication protocols define rules and data formats for exchanging information in a computer network and provide the basis for network programming
-computer networking is sometimes considered a sub-discipline of electrical engineering, telecommunications, computer science, since it relies upon the theoretical and practical application of these disciplines
-the Internet is a global system of interconnected computer network that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide
-Properties of computer networks:
facilitate communication
permit shairng of files, data and other types of information
sharing network and computing resources
may be insecure
may interfere with other technologies
may be difficult to set up
-A well known family of communication media is collectively know as Etehrnet;
    -utilizes various standards and media that enable commuication between devices
    -wireless LAN technology is designed to connect devices without wiring-by use of radio waves or infrared signals as a transmission medium
-Features of communication protocols is that they may be staked above each other : one in use to carry another ie:HTTP running over TCP over IP
-Communication protocols have various propteries
    -connection oriented vs connectionless
    -circuit mode or packet switching
    -hierarchical or flat address
*Communication protocols
-Ethernet: for many users mos twell known member of the protocol family (wireless LAN)
-Internet Protocol Suite: included TCP/IP, foundation of all modem inter networking, at its core the protocol suite defines the addressing, identification and routing specifications in form of the tradition Internet protocol version
-Synchronous Optical Networking: SONET and ADH standardized multiplexing protocols that transfer multiple digit bit streams over optical fibers using lasers
-SONSET/SDH: primarily to support real time, uncompressed circuit - switched voice encoded to PMC format
-Asynchronous Transfer Mode (ATM): is a switching techniques for telecommunication networks, encodes data into small fixed sized cells, ATM has similarities with both circuit and packet switching networks, a good choice for a network that must handle both tradition high data traffic and real time lwo latency content such as voice and video, plays a role in the last leg of the user Internet connection between the service provider and the home user
-Network Programming:writing programs that communicate with each other across a computer network
-Scale: usage, trust level, access rights, differ between types of networks
*Personal Area Network (PAN)
-computer network used for communication among computer and different information tech devices for one person, includes wireless and wired devices
*Storage Area Network (SAN)
-is a dedicated network that provides access to consolidated blocks level data storage
-primarily used to make storage devices accessible to servers so that the device appears like locally attached device to the operating system
*Campus Network
-a computer network made up of an interconnection of LANS within a limited geographical area
*Backbone Network
-part  of a computer network infrastructure that interconnects various pieces of the network
-provides a path for the exchange of information between different LANS of sub networks
-backbone capacity is greater than that of the networks connected to it
*Metropolitan Area Network (MAN)
-large computer network that usually spans s city or a large network
*Wide Area Network (WAN)
-computer network that covers a large geographic area (city, country....)
-WAN often uses transmissions facilities provided by common carriers such as telephone companies
*Enterprise Private Network
-is a network built by an enterprise to interconnect various company sites in order to share computer resources
*Internet work
-is a connection of multiple computer networks via a common routing technology using routers
*Organizational Scope
-networks are managed by the organization which owns them, seen as intranet or extranets
*Intranet & Extranet
-intranet is a set of networks that is under direct control of a single admin.
-commonly is the internal network of organization
-larger intranet will have at least one web server to proceed users with organization info
-extranet is lilmed in scope to pa single organization and also has limited connections to the network of one or more trusted outside organization
*Intranet
-global system of interconnected government academic, corporate, public or private computer networks
*Network topology: bus, star, ring, mesh, fully connected network
*Overlay network
-is a virtual computer network that is built on top of another network
*Basic Hardware Component
-Network interface cards:disguised to allow computer to physically access a network medium
-Bridge: connects multiple network segments at eh data level layer
*Switch
-a device that forwards and filters chunks of data between ports based on the MAC addresses in the packet
*Firewall
-important in respect to security, typically rejects access requests from unsafe sources while allowing access from recognized ones
-role of firewalls grows in parallel with constant cyber attacks for the purpose of stealing, corrupting daa dn planting viruses
*Network Security
-provisions and policies adopted by the network administration to protect and monitor unauthorized access, misuse, modification denial of network and network accessible resources
-Resilience
-is the ability to provide and maintain an acceptable level of service  in the face of faults and challenges to nominal operations

Journal of Academic Leadership: Management of RFID in Libraries - Karen Coyle
-RF: radio frequency
-ID means identifies the tag itself consists of a computer chip and an antenna
-RFID is like a bar code but is read with an electromagnetic field rather than by a laser beam
-does not have to be visible to be read
-can be read even if embedded in an item
-carry not only item number used but also info such as the title of the book and/or its call number
-the size of the info payload of the rfid chip - a fracture will expand as the tech addresses creating smaller and more powerful chip

Should library use RFID?
-could be successor technology to bar codes
-considering any introduction into libraries need to ask "why" use new technologies
-manage inventory more effeciently and with less human interaction
-highly advantageous technology for a wide variety of inventory tracking situation
-key factors -library curculation  is increasing while library budget and purchasing power are decreasing

RFID and Library Function
-as an identifiers, particularly suited inventory functions and a library has a strong inventory component
-same RFID tag is re-used many times
-can be seen as a security mechanism
-not a highly secured technology
-can read multiple tags at once
-allowing checkouts of a stack of books with single transaction
-tag can be read while book sits on the shelf
-cost of doing inventory goes down
-odd of doing regular inventory goes up
-allowing the library to do more rather than just doing the same functions with greater efficiency
-libraries using RFID still in early ages


-










Saturday, February 4, 2012

Week 4 Lab

SELECT * FROM isi_jcr_report_isls i where jcr_year='2007' and j_abbr='ANNU REV INFORM SCI'


SELECT * FROM isi_jcr_report_isls i where jcr_year=2008 and j_if>1

Week 4:Databases


Wikipedia: Databases

I like the idea that databases are like rooms in a hotel. The visual simplifies the larger concept for me.   I think I know understand that a database is a computer application whose purpose is to store information.  It then allows it to be retrieved at will later by many users.  Simple right!  A relational database is more complicated than that.  It allows the information to access through a variety of access paths by means of requests (queries) that return sets of information by reference to common or related properties.  Now –a  day it is the relational database  that we interact with in professional ways.  Databases use SQL (standard query language)- which defines the command language for making a request (the query) to any database.  The typical request is known as CRUD, standing for Create, Read, Update, Delete.  Which are the four primary commands in SQL.



Wikipedia: Entity-Relationship Model:

Entity-relationship model is a graphical representation of how the objects in a relational database management system are related to one another.  My husband has some on his computer right now for work.  It seems to only to be used for planning or documenting the structure of a database.

Phlonx tutorial:

Ok when I read all three assignments I must wonder, why?  Why do I care?  My husband points out in passing that it is all about set theory.  I stare back at him and blink……

I love the rules we must recite in our sleep:

1.    No repeating elements or groups of elements

2.    No partial dependencies on a concatenated key

3.    No dependencies on non-key attributes

Elements means attributes means in fields

A concatenated key is more commonly called a composite key, but a key is better understood to be something about it that makes it identifiable. 

So in the library world this can relate to library title researches.   The idea that if I look for a work of fiction of a specific genre, the assumption is that there is a collection of titles of in different genre categories.  With categories of authors, publishers, years, holdings….all making up keys, attributes and elements happening at the same time in a simple search for Tales of Two Cities by Charles Dickins.