Knowledge Handler

Information Sources & Information Sifting Techniques

My Photo
Name:
Location: Independence, Ohio, United States

Librarian at Indiana Wesleyan University's Cleveland Education Center.

Monday, January 26, 2015

Microsoft Surface Hub

Mike Elgan reports on the promise found in Microsoft's announcement of Surface Hub , an enhanced viewing platform or environment for groupwork or design work.

-DD

Labels: ,

Thursday, January 22, 2015

Academic Journals

Brian Mathews provides examples of journal articles from 1665, and discusses how the conventions for scholarly publication have gradually developed.

-DD

Labels:

Saturday, January 17, 2015

Remembering Names

Tom Kaneshige suggests methods for memorizing names . He suggests linking mental images to the person's name as a way of embedding the name in memory.

-DD

Labels: ,

Monday, January 12, 2015

North Korea's Internet Access

Martyn Wjilliams explains how North Korea is connected to the Internet . I was amazed that the nation only received Internet access four years ago:

A connection from China Unicom into the country first appeared in late 2010. Until then, North Korea had no full-time connection to the Internet—just an email service that relayed messages every hour or so. (para. 4)
Now Korea also has Internet access through a Russian telecommunications satellite.

-DD

Labels: ,

Sunday, January 11, 2015

Engaging Students

Susan Ohrablo explains how to more effectively communicate with students .

-DD

 

Labels: ,

Saturday, January 10, 2015

Personality Assessment Tools

Sharon Florentine analyzes personality assessments used in the hiring process, and determines they have a legitimate role.

-DD

Labels: ,

Friday, January 09, 2015

Honoring Donors Effectively

Lynne Wester argues that donors do not want their name on an honor roll . Instead, they want stories about changed lives, or better yet, handwritten letters of thanks from the beneficiaries of their gift.

-DD

Labels: , ,

Thursday, January 08, 2015

Code Fellows

Allie Bidwell reports on Code Fellows , a bootcamp education in computer coding.

-DD

Labels: ,

Wednesday, January 07, 2015

China Blocking Email

John Ribeiro shares evidence that China is blocking its citizens from accessing G-mail.

-DD

Labels: ,

Tuesday, January 06, 2015

Internet of Things

Andrew Babour observes that Gartner Research has coined the phrase "Internet of Everything " to include social media as well as interconnected machines.

-DD

Labels: ,

Monday, January 05, 2015

Trans-Pacific Partnership Trade Agreement and the Freedom of Information

The Electronic Frontier Foundation has posted a video on the Trans Pacific Partnership Trade Agreement (TPP).

-DD

 

Labels: ,

Responding to Social Media Incidents

Cindy Lawson shares tips on coping with social media incidents . She recommends having a team in place to quickly analyze social media trends. The team's response would be based upon a previously developed set of policies.

-DD

Labels: , ,

Sunday, January 04, 2015

Requiring All Web Traffic Be Encrypted

Gregg Keizer observes that Google advocates that all Web sites be encrypted . Google is already reducing the "page rank" of sites lacking encryption, and wants browser makers to mark unencrypted sites as "insecure." Mozilla is supporting Google's proposal with its "Let's Encrypt initiative.

-DD

 

Labels:

Saturday, January 03, 2015

Malware

Mara Korolov reports on an advance in crimeware .

-DD

Labels: ,

Faculty Evaluation

Barbara A. Lee suggests tips for evaluating difficult faculty .

-DD

Labels: ,

Friday, January 02, 2015

Freedome VPN

Ms. Smith reviews the Freedome VPN from F-Secure, a Finnish company.

-DD

 

Labels:

Thursday, January 01, 2015

Electricity Generation

Patrick Nelson shares a technology for generating electricity from waste heat .

-DD

 

Labels: