Knowledge Handler

Information Sources & Information Sifting Techniques

My Photo
Name:
Location: Independence, Ohio, United States

I am a retired librarian, most recently serving at Indiana Wesleyan University's Cleveland Education Center.

Monday, September 30, 2013

Google's Email Mining

Jeremy Kirk reports that a class action suit is proceeding against Google's mining of user email text to determine which advertisements to display to gmail users.

-DD

Labels: ,

Sunday, September 29, 2013

The Journal of Visualized Experiments

The Journal of Visualized Experiments (JoVE) is offering free access until the end of 2013, after which most video clips shall require an institutional subscription.

JoVE describes itself as follows:

The Journal of Visualized Experiments (JoVE) was established as a new tool in life science publication and communication, with participation of scientists from leading research institutions. JoVE takes advantage of video technology to capture and transmit the multiple facets and intricacies of life science research. Visualization greatly facilitates the understanding and efficient reproduction of both basic and complex experimental techniques, thereby addressing two of the biggest challenges faced by today's life science research community: i) low transparency and poor reproducibility of biological experiments and ii) time and labor-intensive nature of learning new experimental techniques.

-DD

 

Labels: ,

Saturday, September 28, 2013

BRICS Cable

Mark Gibbs expresses concern that the Internet will be Balkanized as other nations develop worldwide networks that parallel the one developed by the United States. Nations such as China, South Africa and Brazil desire an "Internet" (BRICS Cable) that is not under US government control, and which is less likely to have the US security listening to every message.

-DD

 

 

Labels: ,

Friday, September 27, 2013

Microsoft Utilities

Tim Green shares his favorite free tools for system administrators or developers. Some of the tools, such as those for detecting malicious software, would be of utility to anyone with technical knowledge.

-DD

Labels: ,

Life Detector

Grant Gross reports on a new NASA technology called FINDER that allows rescue workers to detect a heartbeat through 6 meters of concrete. It is wonderful that such detectors are becoming available to aid victims of building collapses. I suppose similar sensors could be deployed as part of a security system.

-DD

Labels: , ,

Monday, September 23, 2013

Career Success

Steven Lowe shares "Ten Hard-Earned Lessons of a Lifetime in IT."   He notes that the ability to write, to market yourself and your work to others is vital.

-DD

Labels:

Saturday, September 21, 2013

Medical Identity Theft

Elle Messmer reports that medical identity theft is on the rise.   In an age of electronic medical records, medication or treatment errors can result if two individuals are using the same health insurance identity.

-DD

Labels:

Thursday, September 19, 2013

iBeacon's Potential for Locating Individuals

Mike Elgan forecasts that Apple's iBeacon (a brand name of the Bluetooth "Low Energy" (BLE) standard) will have a disruptive effect on the mobile market.

Comments responding to Elgan note that Android phone makers have invested heavily in Near Field Communication devices that offer an expanded list of features. Others did not want the option to be tracked to the inch and to receive targeted ads as they enter each store.

-DD

 

Labels: , ,

Wednesday, September 18, 2013

The Rise of the Machines

Alan Shimel reports that more automated systems are connected to the Internet than individuals using devices. The number of devices is predicted to skyrocket due to technologies such as driverless cars. Shimel encourages readers to view the TV series Rise of the Machines on Wednesday evenings.

-DD

 

Labels: ,

Technology Initiative Planning

Tom Kaneshige reports that software initiatives often stall in the pilot phase, tying up equipment and staff time. He provides tips to avoid pitfalls, tips specifically geared to an iPad roll-out but applicable to other technology initiatives.

-DD

Labels: , ,

Tuesday, September 17, 2013

Security

Joan Goodchild explains common office security failings .

-DD

Labels:

Monday, September 16, 2013

Phishing

Steve Ragan reports on how to spot a phishing attack .

-DD

Labels:

Monday, September 09, 2013

Student Debt

Greg Gottesman gives an impassioned TED Talk about the One Trillion Dollars in student loans. He doesn't offer a solution to those students loaded with debt, but he offers ideas for streamlining those obtaining an education.

My daughter commented that new technologies may eliminate professors. My response was that professors will continue to be the foundation of higher education, but the numbers of professors necessary in higher education will decrease. After all, there is a need for at least one expert in each field to write the courses and to do research. There is also a need for at least one buggy-whip maker. . . .

-DD

 

Labels: ,

Sunday, September 08, 2013

Privacy

Grant Gross discusses the recent revelations about NSA's program to defeat data encryption .

-DD

Labels: ,

Saturday, September 07, 2013

Net Neutrality

Grant Gross of the IDG News Service reports on hearings which could alter the current "net neutrality" provisions in American agency regulations.

-DD

Labels: ,

Friday, September 06, 2013

GAO Report on Patent Trolls

Michael Cooney shares a link to a U.S. Government Accountability Office's report on Patent trolls, or what the Office calls "Patent Monetization Entities."

-DD

Labels: , ,