Knowledge Handler

Information Sources & Information Sifting Techniques

My Photo
Name:
Location: Independence, Ohio, United States

I am a retired librarian, most recently serving at Indiana Wesleyan University's Cleveland Education Center.

Thursday, October 31, 2013

DIGITALATTACKMAP.COM

Google has developed a graphical depiction of denial of service attacks around the globe. This can be seen at http://www.digitalattackmap.com

. -DD

Labels: , , ,

Wednesday, October 30, 2013

Nomophobia

Yorgen Edholm muses on the growing problem of constant mobile access. He mentions a new term, "nomophobia, which he defined defined as "a condition that causes individuals to feel anxious when they have no access to mobile technology."

-DD

Labels: , , ,

Tuesday, October 29, 2013

Ten Job Search Tips for Introverts

Sharon Florentine of CIO Magazine shares "Ten Job Search Tips for Introverts." Her biggest tip is "don't try to be something you're not." Honesty about your work style/expectations helps avoid later problems with fitting into the corporate environment.

-DD

Labels: ,

Monday, October 28, 2013

YANDEX.COM - The Russian Google

The Russian equivilent of Google is Yandex.com . It offers search of the Web, images, and video, as well as translation and Web mail services.

-DD

Labels: , ,

Sunday, October 27, 2013

Remote Patient Monitoring

Lucas Mearian reports that Verizon is launching a cloud for securely sharing data from patient remote monitoring devices . This could be a lifesaver for patients and a source of research data for clinicians. There are security risks with such a service, and some joker will probably put ice cubes on his thermometer, but overall it appears to be a benefit to society.

-DD

Labels:

Saturday, October 26, 2013

Backup Failure

Mark Sample suggests that the reader "Check Your Backups. RIGHT NOW! "

-DD

Labels:

Friday, October 25, 2013

LinkedIn iPhone App

Colin Nagle reports "How LinkedIn Snuck Intro Info Into Emails on iOS ." The article describes how the LinkedIn technology team bypassed security on iPhones and iPads to to allow email senders to include a links to the sender's LinkedIn profile with each outgoing email. The technology is described in more detail on LinkedIn's Engineering Blog.

LinkedIn addresses the privacy concerns of routing a person's email through the LinkedIn proxy server. There are a couple of additional concerns about the proxy technology being employed. First of all, having all of a person's mobile-generated email routed through the LinkedIn proxy server creates a new point of failure in email transmission. If the LinkedIn server is overtaxed or fails, then there is a potential for email to be delayed or undelivered.

Second, as this service was developed without Apple's approval and counter's Apple's security provisions, the possibility exists that that Apple will block the usage of the technology in a future iOS update, resulting in the inability to transmit new email from an iPhone or iPad until the LinkedIn technology is deleted.

In summary, I think the LinkedIn engineering team was very creative, but I would not opt-in for the service if I used an iPhone for critical emails.

-DD

Labels: , , , , ,

Nine Things Job-Hunters Expect and What Employers Really Want

Melissa Shaw developed a PowerPoint which shares "what employers want, what job-hunters must do, and the disconnect between the two parties when it comes to interviewing, social media, etiquette and more." In her presentation, called "Nine Things Job-Hunters Expect and What Employers Really Want ," Shaw explores the expectations of job searchers, and the consequences to corporate reputation if those expectations are unmet. She cites a "CareerBuilder study, [which] shows that job seekers who don't hear back after applying to an employer are more likely to stop buying products or services from the company" (slide 9). A corporation's reputation is very important to human resources, as Shaw also notes that:

  • 68% [of job seakers] said they would accept a lower salary if the employer created a great impression through the hiring process.
  • 29% percent of job seekers said they don't think employers do a good job of reinforcing why their companies are a good place to work.
  • Job seekers also said they would accept a lower salary if the company had exceptionally positive reviews online (67%) or if the company had a lot of positive press recently (65%). (slide 7).

-DD

Labels: , ,

Thursday, October 24, 2013

Technology for Public Talks

Brian Croxall shares his tools for public talks .

-DD

Labels: ,

Tuesday, October 22, 2013

University Students and Information Technology

Eden Dahlstrom, J. D. Walker and Charles Dziuban prepared the ECAR Study of Undergraduate Students and Information Technology, 2013 . Key findings are that students value privacy and expect schools to teach them the technology they require.

-DD

Labels: ,

Monday, October 21, 2013

Civility In Discusions

Amy Cavendender visits the topic of creating "Civil and Productive Discussions ." This article expands on an earlier post on classroom discussions and modeling civility.

-DD

Labels: ,

Sunday, October 20, 2013

Undergraduate Information Technology

Jason Jones shares highlights from the ECAR Study of Undergraduate Students and Information Technology, 2013. Probably the most surprising classroom innovation is a large number of students are using smart phones to record lectures.

-DD

Labels:

Saturday, October 12, 2013

Abusing Personal Data Should Be A Felony

Craig Mundie, Microsoft's Chief Security Advisor, is reported to have said that abusing personal data should be a felony . Network World reporter Bob Brown says "He envisions a 'usage-based way of controlling data' under which information would be protected in a sort of cryptographic wrapper (think digital rights management on movie DVDs or music CDs) with metadata defining what can – and more importantly – can’t be done with the data."

Mike Acker made a notable comment on this article: "Everyone should be recognized as owning a Creative Commons Copyright on their Personal Data.   Copying or otherwise selling or distributing such data without written permission from the owner is a copyright violation just like pirating a song, $150,000 per occurence." While the concept is simple, it would inhibit bloggers such as myself, who often use the words of others in their posts.

-DD

Labels: ,

Wednesday, October 02, 2013

Talks At Google

Over one thousand Talks at Google are available at YouTube. These talks or interviews (often featuring popular celebraties) were originally presented at Google staff meetings and are often informative. For example, science fiction author Hannu Rajaniemi muses about "The Future of the Book," sharing speculation about new book technologies and the potential for interactions between a reader and the book. And I was surprised at how uncomfortable Lady Gaga appeared in the few minutes I watched of her interview -- so different from her stage persona where she has complete control.

-DD

 

Labels: ,

Tuesday, October 01, 2013

Social Engineering

Joan Goodchild shares a "rogues gallery of 9 infamous social engineers ."

-DD

Labels: , ,