This was a really hard lab for me!
http://www.pitt.edu/~phh12/index.html
Wednesday, February 29, 2012
Monday, February 20, 2012
Week 7 Blog : HTML
HTML or HYPERTEXT HOW I LOVE THEE...let me get my cheat sheet out!
So this week's reading more lend themselves to my crazy ideas of what I could do once I become queen of HTML...hum, I was thinking a website dedicated to Charles Dicken's 200th birthday or Literary Mardi Gras. But then I read the last article (Goans, D., Leach, G., & Vogel, T. M. (2006). Beyond HTML: Developing and re-imagining library web guides in a content management system. Library Hi Tech, 24(1), 29-53.), and it struck me that perhaps the next generation library webpage is a blended version of catelogue in a open source Koha format and a overlay of HTML that takes the patron beyond just the book search to events and local and national articles about their topic. Now I realize that the such a crazy hare-brain scheme is probably very labor intensive. But the times they are a changing and who know the capabilities and what patrons will want, no, demand from their libraries in only lets say 5 years from now. So, I better watch that tutorial again and post that monkey cheat sheet at my cubical and get ready for the HTML library revolution. I have a strong feeling it will probably show up at interview time.
So this week's reading more lend themselves to my crazy ideas of what I could do once I become queen of HTML...hum, I was thinking a website dedicated to Charles Dicken's 200th birthday or Literary Mardi Gras. But then I read the last article (Goans, D., Leach, G., & Vogel, T. M. (2006). Beyond HTML: Developing and re-imagining library web guides in a content management system. Library Hi Tech, 24(1), 29-53.), and it struck me that perhaps the next generation library webpage is a blended version of catelogue in a open source Koha format and a overlay of HTML that takes the patron beyond just the book search to events and local and national articles about their topic. Now I realize that the such a crazy hare-brain scheme is probably very labor intensive. But the times they are a changing and who know the capabilities and what patrons will want, no, demand from their libraries in only lets say 5 years from now. So, I better watch that tutorial again and post that monkey cheat sheet at my cubical and get ready for the HTML library revolution. I have a strong feeling it will probably show up at interview time.
Tuesday, February 14, 2012
week 6 blog
Dismantling
Integrated Library Systems – Andrew Pace 2/04
-early 90’s librarians cautiously embraced web as new
gateway to information
-resulting in old technology of ILS clashed with new web
technologies
-library’s dismantle systems and create new modules due to
frustration with inflexibility of technology of current systems
-vendors creating standalone products to harness new
technologies and capture or inven6 new maekt shares
-any basic ILS is going to get you where you need to go
-RFP process doesn’t reflect the similarities among current integrated
systems and require retooling to distinguish one vendor from another
-achieving the “same intellectual” logic that is part of the
older system as develop the new system is the key
-when a library opts to alter/tinker with either the back or
front end of current system there is a temptation to start from scratch
- Incremental functionality improvement to current systems
is more and more expensive
--serving larger and larger customers in a web based environment
with one stop search option is norm of today’s library
-some librarians and vendors are content with current levels
of features and functionality
-some librarian’s feel current systems don’t satisfy
internet savvy users
-some vendors acknowledge the revenue flattening with lack
of any development to ILS platforms
-ILS vendors say that new products are a direct response to
newer and better technologies, but that these technologies cost money in
development and third party alliances
-Author states that ILS maintenance fees are cheap yet it is
librarian’s resistance to pay for development that has caused the lack of
technological development with traditional ILS systems
-When organizations do create their own modules often these
systems integrate easily with the legacy system and often need patch
programming in Perl to connect to main system
-At eth heart of the issue is that by redefining ILS as application
platform vendors should be have to offer better integration with third party
systems while simultaneously fiving librarians better interoperability tools
-prior to interoperability can meet libraries changing needs
vendors need to re-direct their efforts
A few
Thoughts on the Google Books Library Project – Charles Edward Smith
-Main point: Google’s initiative will not make books obsolete;
it will make the information in them more widely available
-digitalized endeavors will preserve and perpetuate the
ideas of thousands of authors by transferring them to today’s technology
-books are other printed material would quickly reach
obsolescence if not easily accessible through digital technology
-we now expect information to all kinds and form all sources
to be only a few keystrokes away
-search engines are the new subject indexes to virtually
infinite amount of information on the internet
-still: performing research in a major library remains the
preserve of specialists
-as the internet generation graduates from school research
that can’t be obtained via the keyboard might as will not exist
-therefore: an author’s efforts to compose their life’s work
should not be irrelevant simply because they wrote and published in the wrong
format
-Summary: the successful transfer of knowledge is the task
that les before us…any effort that responsibility further that task benefits
all of us
How Internet
Infrastructure Works – Jeff Tyson
-Nobody owns the internet
-the Internet Society
is a non-profit group est. In
1992 that oversees the formation of policies and protocols that define usage
and interaction with the web
-dozens of large internet providers interconnect at NAPs in
various cites and trillions of bytes of data flow between the individual
network at theism points
-All of these networks rely on NAPs , backbones and routers
to talk to each other
-Routers have e2 separate but related jobs
-ensure
information doesn’t go wee it is not needed
-make
sure information makes it to the intended destination
-Routers join to 2 networks allowing information to pass
between and protect the network from
over flow of information traffic spilling over unnecessarily
-National Science Foundation created first high speed
backbone in 1987
Saturday, February 11, 2012
Wednesday, February 8, 2012
Week 5: Computer Networks
Wikipedia: Local Area Networks
-A computer network that interconnects computers in a limited area such as home, school, office, computer lab.
-Characteristics of LAN
-higher data-transfer rates
-smaller geographic area
-lack of need for physical lines
-Ethernet and Wifi most common technologies
-History:
-Ethernet developed at Xerox from 1973-1975
-DOS based system starting in 1981 meant way many sites grew to dozen or even hundred of computers
-initial driving force for networking sharing storage and printer access
-introduction of Novell software provided even handed support for dozens of competing card/cable types on one platform
-1990's Microsoft introduced Window NT advanced server
-Unix computer work stations from such vendors such as SUN Microsystems were using TCP/IP based networking
-although this market segemtn has since receded, the technologies developed using TCP/IP continue to be influential on the Internet and in both Linux and Apple OSx networking
-WiFi is not the most common technology in residential premises
-requires modem and is well suited to mobile devices and laptops
-Smaller LANs use one or more technologies linked to each other and thus link to a router or modem for Internet access
Wikipedia:Computer Networks:
-Computer network is a collection of hardware components and computer interconnected by communication channels that allow sharing of resources dn information
-Communication protocols define rules and data formats for exchanging information in a computer network and provide the basis for network programming
-computer networking is sometimes considered a sub-discipline of electrical engineering, telecommunications, computer science, since it relies upon the theoretical and practical application of these disciplines
-the Internet is a global system of interconnected computer network that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide
-Properties of computer networks:
facilitate communication
permit shairng of files, data and other types of information
sharing network and computing resources
may be insecure
may interfere with other technologies
may be difficult to set up
-A well known family of communication media is collectively know as Etehrnet;
-utilizes various standards and media that enable commuication between devices
-wireless LAN technology is designed to connect devices without wiring-by use of radio waves or infrared signals as a transmission medium
-Features of communication protocols is that they may be staked above each other : one in use to carry another ie:HTTP running over TCP over IP
-Communication protocols have various propteries
-connection oriented vs connectionless
-circuit mode or packet switching
-hierarchical or flat address
*Communication protocols
-Ethernet: for many users mos twell known member of the protocol family (wireless LAN)
-Internet Protocol Suite: included TCP/IP, foundation of all modem inter networking, at its core the protocol suite defines the addressing, identification and routing specifications in form of the tradition Internet protocol version
-Synchronous Optical Networking: SONET and ADH standardized multiplexing protocols that transfer multiple digit bit streams over optical fibers using lasers
-SONSET/SDH: primarily to support real time, uncompressed circuit - switched voice encoded to PMC format
-Asynchronous Transfer Mode (ATM): is a switching techniques for telecommunication networks, encodes data into small fixed sized cells, ATM has similarities with both circuit and packet switching networks, a good choice for a network that must handle both tradition high data traffic and real time lwo latency content such as voice and video, plays a role in the last leg of the user Internet connection between the service provider and the home user
-Network Programming:writing programs that communicate with each other across a computer network
-Scale: usage, trust level, access rights, differ between types of networks
*Personal Area Network (PAN)
-computer network used for communication among computer and different information tech devices for one person, includes wireless and wired devices
*Storage Area Network (SAN)
-is a dedicated network that provides access to consolidated blocks level data storage
-primarily used to make storage devices accessible to servers so that the device appears like locally attached device to the operating system
*Campus Network
-a computer network made up of an interconnection of LANS within a limited geographical area
*Backbone Network
-part of a computer network infrastructure that interconnects various pieces of the network
-provides a path for the exchange of information between different LANS of sub networks
-backbone capacity is greater than that of the networks connected to it
*Metropolitan Area Network (MAN)
-large computer network that usually spans s city or a large network
*Wide Area Network (WAN)
-computer network that covers a large geographic area (city, country....)
-WAN often uses transmissions facilities provided by common carriers such as telephone companies
*Enterprise Private Network
-is a network built by an enterprise to interconnect various company sites in order to share computer resources
*Internet work
-is a connection of multiple computer networks via a common routing technology using routers
*Organizational Scope
-networks are managed by the organization which owns them, seen as intranet or extranets
*Intranet & Extranet
-intranet is a set of networks that is under direct control of a single admin.
-commonly is the internal network of organization
-larger intranet will have at least one web server to proceed users with organization info
-extranet is lilmed in scope to pa single organization and also has limited connections to the network of one or more trusted outside organization
*Intranet
-global system of interconnected government academic, corporate, public or private computer networks
*Network topology: bus, star, ring, mesh, fully connected network
*Overlay network
-is a virtual computer network that is built on top of another network
*Basic Hardware Component
-Network interface cards:disguised to allow computer to physically access a network medium
-Bridge: connects multiple network segments at eh data level layer
*Switch
-a device that forwards and filters chunks of data between ports based on the MAC addresses in the packet
*Firewall
-important in respect to security, typically rejects access requests from unsafe sources while allowing access from recognized ones
-role of firewalls grows in parallel with constant cyber attacks for the purpose of stealing, corrupting daa dn planting viruses
*Network Security
-provisions and policies adopted by the network administration to protect and monitor unauthorized access, misuse, modification denial of network and network accessible resources
-Resilience
-is the ability to provide and maintain an acceptable level of service in the face of faults and challenges to nominal operations
Journal of Academic Leadership: Management of RFID in Libraries - Karen Coyle
-RF: radio frequency
-ID means identifies the tag itself consists of a computer chip and an antenna
-RFID is like a bar code but is read with an electromagnetic field rather than by a laser beam
-does not have to be visible to be read
-can be read even if embedded in an item
-carry not only item number used but also info such as the title of the book and/or its call number
-the size of the info payload of the rfid chip - a fracture will expand as the tech addresses creating smaller and more powerful chip
Should library use RFID?
-could be successor technology to bar codes
-considering any introduction into libraries need to ask "why" use new technologies
-manage inventory more effeciently and with less human interaction
-highly advantageous technology for a wide variety of inventory tracking situation
-key factors -library curculation is increasing while library budget and purchasing power are decreasing
RFID and Library Function
-as an identifiers, particularly suited inventory functions and a library has a strong inventory component
-same RFID tag is re-used many times
-can be seen as a security mechanism
-not a highly secured technology
-can read multiple tags at once
-allowing checkouts of a stack of books with single transaction
-tag can be read while book sits on the shelf
-cost of doing inventory goes down
-odd of doing regular inventory goes up
-allowing the library to do more rather than just doing the same functions with greater efficiency
-libraries using RFID still in early ages
-
-A computer network that interconnects computers in a limited area such as home, school, office, computer lab.
-Characteristics of LAN
-higher data-transfer rates
-smaller geographic area
-lack of need for physical lines
-Ethernet and Wifi most common technologies
-History:
-Ethernet developed at Xerox from 1973-1975
-DOS based system starting in 1981 meant way many sites grew to dozen or even hundred of computers
-initial driving force for networking sharing storage and printer access
-introduction of Novell software provided even handed support for dozens of competing card/cable types on one platform
-1990's Microsoft introduced Window NT advanced server
-Unix computer work stations from such vendors such as SUN Microsystems were using TCP/IP based networking
-although this market segemtn has since receded, the technologies developed using TCP/IP continue to be influential on the Internet and in both Linux and Apple OSx networking
-WiFi is not the most common technology in residential premises
-requires modem and is well suited to mobile devices and laptops
-Smaller LANs use one or more technologies linked to each other and thus link to a router or modem for Internet access
Wikipedia:Computer Networks:
-Computer network is a collection of hardware components and computer interconnected by communication channels that allow sharing of resources dn information
-Communication protocols define rules and data formats for exchanging information in a computer network and provide the basis for network programming
-computer networking is sometimes considered a sub-discipline of electrical engineering, telecommunications, computer science, since it relies upon the theoretical and practical application of these disciplines
-the Internet is a global system of interconnected computer network that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide
-Properties of computer networks:
facilitate communication
permit shairng of files, data and other types of information
sharing network and computing resources
may be insecure
may interfere with other technologies
may be difficult to set up
-A well known family of communication media is collectively know as Etehrnet;
-utilizes various standards and media that enable commuication between devices
-wireless LAN technology is designed to connect devices without wiring-by use of radio waves or infrared signals as a transmission medium
-Features of communication protocols is that they may be staked above each other : one in use to carry another ie:HTTP running over TCP over IP
-Communication protocols have various propteries
-connection oriented vs connectionless
-circuit mode or packet switching
-hierarchical or flat address
*Communication protocols
-Ethernet: for many users mos twell known member of the protocol family (wireless LAN)
-Internet Protocol Suite: included TCP/IP, foundation of all modem inter networking, at its core the protocol suite defines the addressing, identification and routing specifications in form of the tradition Internet protocol version
-Synchronous Optical Networking: SONET and ADH standardized multiplexing protocols that transfer multiple digit bit streams over optical fibers using lasers
-SONSET/SDH: primarily to support real time, uncompressed circuit - switched voice encoded to PMC format
-Asynchronous Transfer Mode (ATM): is a switching techniques for telecommunication networks, encodes data into small fixed sized cells, ATM has similarities with both circuit and packet switching networks, a good choice for a network that must handle both tradition high data traffic and real time lwo latency content such as voice and video, plays a role in the last leg of the user Internet connection between the service provider and the home user
-Network Programming:writing programs that communicate with each other across a computer network
-Scale: usage, trust level, access rights, differ between types of networks
*Personal Area Network (PAN)
-computer network used for communication among computer and different information tech devices for one person, includes wireless and wired devices
*Storage Area Network (SAN)
-is a dedicated network that provides access to consolidated blocks level data storage
-primarily used to make storage devices accessible to servers so that the device appears like locally attached device to the operating system
*Campus Network
-a computer network made up of an interconnection of LANS within a limited geographical area
*Backbone Network
-part of a computer network infrastructure that interconnects various pieces of the network
-provides a path for the exchange of information between different LANS of sub networks
-backbone capacity is greater than that of the networks connected to it
*Metropolitan Area Network (MAN)
-large computer network that usually spans s city or a large network
*Wide Area Network (WAN)
-computer network that covers a large geographic area (city, country....)
-WAN often uses transmissions facilities provided by common carriers such as telephone companies
*Enterprise Private Network
-is a network built by an enterprise to interconnect various company sites in order to share computer resources
*Internet work
-is a connection of multiple computer networks via a common routing technology using routers
*Organizational Scope
-networks are managed by the organization which owns them, seen as intranet or extranets
*Intranet & Extranet
-intranet is a set of networks that is under direct control of a single admin.
-commonly is the internal network of organization
-larger intranet will have at least one web server to proceed users with organization info
-extranet is lilmed in scope to pa single organization and also has limited connections to the network of one or more trusted outside organization
*Intranet
-global system of interconnected government academic, corporate, public or private computer networks
*Network topology: bus, star, ring, mesh, fully connected network
*Overlay network
-is a virtual computer network that is built on top of another network
*Basic Hardware Component
-Network interface cards:disguised to allow computer to physically access a network medium
-Bridge: connects multiple network segments at eh data level layer
*Switch
-a device that forwards and filters chunks of data between ports based on the MAC addresses in the packet
*Firewall
-important in respect to security, typically rejects access requests from unsafe sources while allowing access from recognized ones
-role of firewalls grows in parallel with constant cyber attacks for the purpose of stealing, corrupting daa dn planting viruses
*Network Security
-provisions and policies adopted by the network administration to protect and monitor unauthorized access, misuse, modification denial of network and network accessible resources
-Resilience
-is the ability to provide and maintain an acceptable level of service in the face of faults and challenges to nominal operations
Journal of Academic Leadership: Management of RFID in Libraries - Karen Coyle
-RF: radio frequency
-ID means identifies the tag itself consists of a computer chip and an antenna
-RFID is like a bar code but is read with an electromagnetic field rather than by a laser beam
-does not have to be visible to be read
-can be read even if embedded in an item
-carry not only item number used but also info such as the title of the book and/or its call number
-the size of the info payload of the rfid chip - a fracture will expand as the tech addresses creating smaller and more powerful chip
Should library use RFID?
-could be successor technology to bar codes
-considering any introduction into libraries need to ask "why" use new technologies
-manage inventory more effeciently and with less human interaction
-highly advantageous technology for a wide variety of inventory tracking situation
-key factors -library curculation is increasing while library budget and purchasing power are decreasing
RFID and Library Function
-as an identifiers, particularly suited inventory functions and a library has a strong inventory component
-same RFID tag is re-used many times
-can be seen as a security mechanism
-not a highly secured technology
-can read multiple tags at once
-allowing checkouts of a stack of books with single transaction
-tag can be read while book sits on the shelf
-cost of doing inventory goes down
-odd of doing regular inventory goes up
-allowing the library to do more rather than just doing the same functions with greater efficiency
-libraries using RFID still in early ages
-
Saturday, February 4, 2012
Week 4 Lab
SELECT * FROM isi_jcr_report_isls i where jcr_year='2007' and j_abbr='ANNU REV INFORM SCI'
SELECT * FROM isi_jcr_report_isls i where jcr_year=2008 and j_if>1
Week 4:Databases
Wikipedia: Databases
I like the idea that databases are like rooms in a hotel.
The visual simplifies the larger concept for me. I think I know understand that a database is
a computer application whose purpose is to store information. It then allows it to be retrieved at will
later by many users. Simple right! A relational database is more complicated
than that. It allows the information to access
through a variety of access paths by means of requests (queries) that return
sets of information by reference to common or related properties. Now –a
day it is the relational database
that we interact with in professional ways. Databases use SQL (standard query language)-
which defines the command language for making a request (the query) to any
database. The typical request is known
as CRUD, standing for Create, Read, Update, Delete. Which are the four primary commands in SQL.
Wikipedia: Entity-Relationship Model:
Entity-relationship model is a graphical representation of
how the objects in a relational database management system are related to one
another. My husband has some on his computer
right now for work. It seems to only to
be used for planning or documenting the structure of a database.
Phlonx tutorial:
Ok when I read all three assignments I must wonder,
why? Why do I care? My husband points out in passing that it is
all about set theory. I stare back at
him and blink……
I love the rules we must recite in our sleep:
1.
No
repeating elements or groups of elements
2.
No
partial dependencies on a concatenated key
3.
No
dependencies on non-key attributes
Elements means attributes means in fields
A concatenated key is more commonly called a composite key,
but a key is better understood to be something about it that makes it
identifiable.
So in the library world this can relate to library title
researches. The idea that if I look for
a work of fiction of a specific genre, the assumption is that there is a
collection of titles of in different genre categories. With categories of authors, publishers,
years, holdings….all making up keys, attributes and elements happening at the
same time in a simple search for Tales of Two Cities by Charles Dickins.
Subscribe to:
Comments (Atom)



