Two very good questions. My immediate gut response is the internet makes us smarter. Obviously, this is a general statement and response. Its always up to the individual whether to have more than an innate curiosity of the surrounding world. I start with a certain amount of brain power (capability), and then like other things, this can grow or improve with use and practice. It requires some desire for more. More knowledge, more capability, more rewards. The article touched on this matter, but in the broader terms of our current culture. Technology is fantastic, but it has upped the tempo of change. Can we as a society keep up? Societies from past eras seem to have similar proportions of intellectuals, the educated status quo, survivors and lower level base thinkers. From the evidence i have seen so far, many people are using this new medium of communication of ideas, content, entertainment, and dissemination of knowledge quite well. The possibilities seem endless. The transition of the internet, from web, web 2.0, then web 3.o is an example. Also, html, xhtml, and the new version the w3 organizations (standards committees), are working on currently. As i wrote in one of my previous assignments, the paths open to me by the WWW and internet are varied and many. I also get to choose what to focus on and invest my personal resources in to, especially time. My favorite idea from the article was the notion that "the nice thing about throwaway material is that it gets thrown away." (Shirky, 2010). The proliferation of junk content and use of the medium only to sell or entertain is sometimes discouraging when i think about the era and society i live in as a whole. But that last quote gives me hope. As more people get use to the meduim they discover along the way 'what else this thing is good for...". I have personally met some individuals who traditionally have not done well in the current 'classroom' environment, but seem to 'fly' on the computer and internet. It is said that necessity is the mother of invention, and now the internet expands on the idea. My personal needs, (and others) will dictate what i use the internet for. To quote Clay Shirky again, "our cognitive surplus is so enormous that diverting even a tiny fraction of time from consumption to participation can create enormous positive effects." On the internet we make use of links. I think this is organically how the brain works too. One idea or pursuit will lead to another, and individuals will 'stumble' upon new ways to think, new kernels of knowledge and new purposes for it. Because it is relatively still a new medium, what it is capable of in terms of how any given individual will make use of it, is still in the growth spurt. This idea of connectivity is both wonderful but also misleading. I have to focus on a piece of hardware to be 'connected'. I am interacting with others using the technology, but not always face to face. Humans need human touch, whether we realize it or acknowledge it. When i spend time with other techies, we still joke and poke, and interact humanly. My personal growth has been greatly enhanced just by the invention of the search engine. I get so much more, much more quickly. Then there are the inherent tangents that i will follow. Veer left, veer right! When a million people are participating in this new zeitgeist, what will follow? The author asks are we going "to integrate digital freedoms into society as well as we integrated literacy" (?). He seems to think so and i agree. There are always enough movers and shakers in our mix. Both the altruistic stripe, and the revolutionist; and even those with less than ideal motives cannot reverse what is becoming the norm. Widespread access to knowledge, media and each other. The next generation will make sure of that. I'm just glad i could be a part of it.
> Citation:
Author- Clay Shirky,
Article- "Does the internet make you smarter?".
Wall Street Journal, June 4, 2010
>> Author's credentials/work:
He has a joint appointment at New York University (NYU) as a Distinguished Writer in Residence at the Arthur L. Carter Journalism Institute and Assistant Arts Professor in the New Media focused graduate Interactive Telecommunications Program (ITP) [3]
# ^ http://www.nyu.edu/about/news-publications/news/2010/12/07/new-media-expert-clay-shirky-to-become-professor-at-nyus-carter-journalism-institute-tisch-school-of-the-arts.html
He has written and been interviewed extensively about the Internet since 1996. His columns and writings have appeared in Business 2.0, the New York Times, the Wall Street Journal, the Harvard Business Review and Wired.
Wednesday, December 8, 2010
Wednesday, December 1, 2010
Research Journal pt 5 - Summary
SUMMARY:
Ok, this was a bit challenging.
Clark desktops have Filezilla already installed. This is a File Transfer program, client to server (and vice/versa) using FTP. filezilla is opensource.
> from the 'twoplayfulotters' website, i copied (using select all)to the Notepad app on my desktop. This is a template for me to edit as instructed or 'dress up' with new text and/or color schemes. As you saw on the page, colors were improved, and some basic text/ideas were added.
>> the file was renamed (several x, :)), so that it could be id' and uploaded thru Filezilla later
>> The file then can be viewed in a web browser (a client based html page viewer) regardless if the cpu is online or not. This is good for page review, and editing purposes.
>>> After editing my file, making more changes, the file is saved once again, and the browser is refreshed to view the changes.
**************************************************************************
< The file is now uploaded to a web server (a host server) called '2plkflotts..' and the username is 'clark' (our user account on the host server) using FILEZILLA.
the left pane is files on my cpu, the right pane is files (available) on the host server.
<< My file is uploaded to the server with rt. click (upload) option. ((copy/paste, drag/drop?).
<<< to view my new page, the server address (with my file extension) is typed in the browser address bar.
MY PAGE IS DISPLAYED! from the internet. (and now available to all who can access that server?)
*** ? for AB: is the web page accessible thru that server, as in are the server pages not file protected by the host? can the page be googled and pop up?
*********************************************************************
LBernal
Ok, this was a bit challenging.
Clark desktops have Filezilla already installed. This is a File Transfer program, client to server (and vice/versa) using FTP. filezilla is opensource.
> from the 'twoplayfulotters' website, i copied (using select all)to the Notepad app on my desktop. This is a template for me to edit as instructed or 'dress up' with new text and/or color schemes. As you saw on the page, colors were improved, and some basic text/ideas were added.
>> the file was renamed (several x, :)), so that it could be id' and uploaded thru Filezilla later
>> The file then can be viewed in a web browser (a client based html page viewer) regardless if the cpu is online or not. This is good for page review, and editing purposes.
>>> After editing my file, making more changes, the file is saved once again, and the browser is refreshed to view the changes.
**************************************************************************
< The file is now uploaded to a web server (a host server) called '2plkflotts..' and the username is 'clark' (our user account on the host server) using FILEZILLA.
the left pane is files on my cpu, the right pane is files (available) on the host server.
<< My file is uploaded to the server with rt. click (upload) option. ((copy/paste, drag/drop?).
<<< to view my new page, the server address (with my file extension) is typed in the browser address bar.
MY PAGE IS DISPLAYED! from the internet. (and now available to all who can access that server?)
*** ? for AB: is the web page accessible thru that server, as in are the server pages not file protected by the host? can the page be googled and pop up?
*********************************************************************
LBernal
Sunday, November 28, 2010
wordle link:
will this work? TRY THE LINK..........
never mind, html code, not a link... :(
NOV 28, 2010
Larry Bernal
never mind, html code, not a link... :(
NOV 28, 2010
Larry Bernal
T-day Surprise
Wow, cool videos. I really liked the one about 'where ideas come from'. Web 2.0 to 3.0 seems like a small leap. We primarily still use the net for getting information. The addition of our own content is interesting, but how useful? Relatively, it is still a toss up. Though Wikipedia and the like are extremely useful.. our new encyclopedia. The 'commerce' sites that are mentioned used the cycle of our input to their response or 'suggestions' seems one sided and with the purpose of 'selling' more. The example of google docs, (cloud? computing) is a better use of interactive content. Truly mutual, and fostering creativity and productivity. That's where the Steven Johnson video guides us. block by block, (idea upon idea) building for new discoveries, etc. The web 3.0 affords us capability, compatibility, and mostly interdependence. But the technology still requires input (work) on our part for the tools to work. Does all this tech. really simplify my life. I think we are trading one modus operandi for another, i.e., virtual, digital, instead of what we now know as 'hard copy' and 'slow(er)' forms of communication. Speed is the benefit. A far greater access to stuff, both sundry or digital, is a benefit. But most of all, knowledge building. I dont really need any more intrusive runs at my 'wallet'. :))
Monday, November 15, 2010
RJ-4; Summary
While looking up 'nearly' the same topic (depending on exact search statement) the four domains differed in both 'native style' and results. The least liked or usable for academic or research purposes was the 'dot-com' domain. The information pointed at was 'useful' or on topic, but the search results focused on items, electronic or otherwise, that were for sale. The focus was on availability, not content. There was an interesting difference of the dot-edu, and dot-org sites. The dot org sites was a mixture of 'info' disseminating type journals, forums for problem solving and 'adware' laden bulletin board/info specific sites. The dot-gov sites provided direct links to govt. agencies, fbi, national 'computer' and 'internet security' issues related sites. These sites were helpful in dissemination of topics related to 'security' issues. The only detriment to the sites were that in trying to authenticate, content and links were strong, but 'authorship' just seemed sparse. References were made to 'directors' and subordinates, but this is common info that can be looked up elsewhere. Larry B.
Saturday, November 13, 2010
RJ-4 dot-com
Search Engine: Bing
Search Statement: "network security .com"
Citation: internet.com (esucurityplanet.com)
http://www.internet.com/Internetcom/Door/41188
Credibiliy factors:
> date updated: daily
>> 6 tabs (links) to major categories, with more links to much technical info regarding computer networking, security, etc.
includes forums, tutorials, and daily 'industry' articles of relevant topics, archives, security related software downloads, etc., diverse and numerous authors on many specific topics.
>>> Purpose: focus & mission statement by Authors/Administrators:
The Internet.com Network is a comprehensive source for the latest global news and information about information technology and the Internet. It allows users to evaluate, compare and purchase IT and Internet-related products and services. The Internet.com Network attracts experienced IT and business professionals looking for:
* Real-time industry news
* Tutorials, training and skills development
* Internet market research
* Buyer's guides and products reviews
* Archives of definitive industry publications
* Discussion forums
* Expert advice
Search Statement: "network security .com"
Citation: internet.com (esucurityplanet.com)
http://www.internet.com/Internetcom/Door/41188
Credibiliy factors:
> date updated: daily
>> 6 tabs (links) to major categories, with more links to much technical info regarding computer networking, security, etc.
includes forums, tutorials, and daily 'industry' articles of relevant topics, archives, security related software downloads, etc., diverse and numerous authors on many specific topics.
>>> Purpose: focus & mission statement by Authors/Administrators:
The Internet.com Network is a comprehensive source for the latest global news and information about information technology and the Internet. It allows users to evaluate, compare and purchase IT and Internet-related products and services. The Internet.com Network attracts experienced IT and business professionals looking for:
* Real-time industry news
* Tutorials, training and skills development
* Internet market research
* Buyer's guides and products reviews
* Archives of definitive industry publications
* Discussion forums
* Expert advice
RJ-4 dot-edu
Search Engine: Dogpile
Search Statement:
Citation: "Computer and Network Security & Higher Education's Core Values"
Educause website, a research bulletin, volume 2003 issue 6, http://net.educause.edu/ir/library/pdf/ERB0306.pdf
Summary/Credibility factors:
> Authors name: Diana Oblinger, with credentials of director of Hi. Educ @ Microsoft, Adjunct professor of North Carolina Univ., senior fellow for EDUCAUSE (research ctr.), has served as the vice president for information resources and the chief information officer for the 16-campus University of North Carolina system.
>> 14 sources listed (mostly academic) for this article
>>> Purpose: Institutional risks, Rights & Privacy Act, Compromised (sensitive) data, Funding, Federal statutes, etc.
Search Statement:
Citation: "Computer and Network Security & Higher Education's Core Values"
Educause website, a research bulletin, volume 2003 issue 6, http://net.educause.edu/ir/library/pdf/ERB0306.pdf
Summary/Credibility factors:
> Authors name: Diana Oblinger, with credentials of director of Hi. Educ @ Microsoft, Adjunct professor of North Carolina Univ., senior fellow for EDUCAUSE (research ctr.), has served as the vice president for information resources and the chief information officer for the 16-campus University of North Carolina system.
>> 14 sources listed (mostly academic) for this article
>>> Purpose: Institutional risks, Rights & Privacy Act, Compromised (sensitive) data, Funding, Federal statutes, etc.
RJ-4 dot-org
Search engine: Altavista/Yahoo
Search statement: network and security and business (+ this exact phrase; "computer network"
Citation: Cert.org (us-cert.gov or U.S. computer emergency readiness team)
> http://www.cert.org/tech_tips/home_networks.html AND http://www.kb.cert.org/vuls/
>> Credibility factors:
Purpose & Coverage: The following documents are available from the US-CERT website.
Non-Technical Documents | Technical Documents | Monthly and Quarterly Reports, etc.
>>> Authority: An official site of U.S. Dept. of Homeland Security; US-CERT is the operational arm of the National Cyber Security Division (NCSD) at the Department of Homeland Security (DHS). It is a public-private partnership. The site refers to all partners as: US-CERT will include partnerships with private sector cyber security vendors, academia, federal agencies, Information Sharing and Analysis Centers (ISACs), state and local governments, and domestic and international organizations. Working together, these groups will coordinate national and international efforts to address key cyber security issues.
Search statement: network and security and business (+ this exact phrase; "computer network"
Citation: Cert.org (us-cert.gov or U.S. computer emergency readiness team)
> http://www.cert.org/tech_tips/home_networks.html AND http://www.kb.cert.org/vuls/
>> Credibility factors:
Purpose & Coverage: The following documents are available from the US-CERT website.
Non-Technical Documents | Technical Documents | Monthly and Quarterly Reports, etc.
>>> Authority: An official site of U.S. Dept. of Homeland Security; US-CERT is the operational arm of the National Cyber Security Division (NCSD) at the Department of Homeland Security (DHS). It is a public-private partnership. The site refers to all partners as: US-CERT will include partnerships with private sector cyber security vendors, academia, federal agencies, Information Sharing and Analysis Centers (ISACs), state and local governments, and domestic and international organizations. Working together, these groups will coordinate national and international efforts to address key cyber security issues.
RJ -4 dot-gov
search engine: Google (advanced search)(limit to .gov domain)
" strategy:
Citation: defense.gov (U.S. Dept of Defense site, news/articles)
> http://www.defense.gov/news/newsarticle.aspx?id=54029
Credibility factors:
> Official website of U.S. Dept. of Defense
>> direct links to all D.O.D. websites, & each branch of military (U.S.)
>>> link to "Pentagon Channel", (live streaming link broadcasting to all military personnel worldwide. links to federal website policies, and a link for DOD employees,for Defense Knowledge Online (secured access).
>>>> All these speak of Purpose of site, Sources and Coverage.
" strategy:
Citation: defense.gov (U.S. Dept of Defense site, news/articles)
> http://www.defense.gov/news/newsarticle.aspx?id=54029
Credibility factors:
> Official website of U.S. Dept. of Defense
>> direct links to all D.O.D. websites, & each branch of military (U.S.)
>>> link to "Pentagon Channel", (live streaming link broadcasting to all military personnel worldwide. links to federal website policies, and a link for DOD employees,for Defense Knowledge Online (secured access).
>>>> All these speak of Purpose of site, Sources and Coverage.
Wednesday, November 3, 2010
unit 7- Subject Directories/search tools
1- follow link to "Internet Searching Tools: Subject Directories"
2- choose 1 Subj. dir. : Best information on the net
A unique feature to this site is a drop down menu of "Quick Links", which included 14 databases, which makes the home page less cluttered. Other resources were also listed on the home page, such as 'search by MAJOR', and the computer science link provide many different types of databases. Some examples were electronic journals, e-books, a specialty site 'cyber atlas' containing data & statistics info, which would be useful for many research projects and possibly even personal "decision making", (a very unique resource!) At least one link was 'broken', but a clik to the "Net Library" pulled up a nice page, similar to Cannell libr. The layout was well organized, and this page did include 'advanced' search options on the 2nd 'requested' search page. This site does allow 'boolean' and 'truncation'. and 3 search engines, two of which wwre new to me- 'hotbot', and 'altavista'.
There was not a "Search tips" or "advanced search" link on the home page but several entry portals to much larger 'search/topic' choices. for example the link to student resources was quite extensive, with a variety of topics like study related subjects (how to's
2- choose 1 Subj. dir. : Best information on the net
A unique feature to this site is a drop down menu of "Quick Links", which included 14 databases, which makes the home page less cluttered. Other resources were also listed on the home page, such as 'search by MAJOR', and the computer science link provide many different types of databases. Some examples were electronic journals, e-books, a specialty site 'cyber atlas' containing data & statistics info, which would be useful for many research projects and possibly even personal "decision making", (a very unique resource!) At least one link was 'broken', but a clik to the "Net Library" pulled up a nice page, similar to Cannell libr. The layout was well organized, and this page did include 'advanced' search options on the 2nd 'requested' search page. This site does allow 'boolean' and 'truncation'. and 3 search engines, two of which wwre new to me- 'hotbot', and 'altavista'.
There was not a "Search tips" or "advanced search" link on the home page but several entry portals to much larger 'search/topic' choices. for example the link to student resources was quite extensive, with a variety of topics like study related subjects (how to's
Friday, October 29, 2010
note to Andrea B.
here is a comment re: your comment (unit 4):
hi A.B. thanx for the comment. what is meant by "the other for other" research needs. Can you address this in class mon (nov. 1)
hi A.B. thanx for the comment. what is meant by "the other for other" research needs. Can you address this in class mon (nov. 1)
note to Instructor
Hello Andrea, i sent you an email regarding this unit and additional posts (already graded?) I suppose you can "update" the grade? Also, some of the title(s) to this blog's post may be misnamed (i.e. unit 5, instead of 6). Larry Bernal
RJ-3 Summary
My experience gained from this unit is to continue to learn to refine my searches, particularly in 2 areas: a) reducing the # of results using boolean, and B) finding specific types of content thru the links from the Dbase 1st page, i.e, magazines and articles; and continuing to change the search statement for different paths to follow or better or more focused results>
Unit 6-RJ3- Pop Magazine
Dbase used: ProQuest, magazines.
Popular Magazine: "Popular Mechanics", article:, "The Machines... are Watching"
>citation: Michael Kaplan. "The Machines... are Watching. " Popular Mechanics 1 Jan. 2010: Platinum Periodicals, ProQuest. Web. 29 Oct. 2010.
>> summary: i picked this magazine because i am familiar with it, (over 20 yrs popular), and i like the 'not necessarily' expert(s) point of view. The everyday persons viewpoint, but of topic and information addressed to the inquisitive.
Popular Magazine: "Popular Mechanics", article:, "The Machines... are Watching"
>citation: Michael Kaplan. "The Machines... are Watching. " Popular Mechanics 1 Jan. 2010: Platinum Periodicals, ProQuest. Web. 29 Oct. 2010.
>> summary: i picked this magazine because i am familiar with it, (over 20 yrs popular), and i like the 'not necessarily' expert(s) point of view. The everyday persons viewpoint, but of topic and information addressed to the inquisitive.
RJ3-unit 5-POST #2
Newspaper choice:
Search statement:
> "internet and business and security"
Dbase used: ProQuest, Newspapers link.
>> Article: "Experts Warn of a Weak Link in the Security of Web Sites"
Annotation: The article was written in the New York Times, a major publication which is widely read (business section). Also the article identifies a 'weak' link, that being the authenticating of websites that use/provide e-commerce, with sensitive data/info (i.e. bank acct. info)being shared and transferred through these sites. CONTENT is the main reason i picked this article, then source. In addition, the subjects listed (@ bottom) include all of the relevent topices, (e.g. Computer security, Data encryption, Web browsers, Certification, Web sites, Network security).
Search statement:
> "internet and business and security"
Dbase used: ProQuest, Newspapers link.
>> Article: "Experts Warn of a Weak Link in the Security of Web Sites"
Annotation: The article was written in the New York Times, a major publication which is widely read (business section). Also the article identifies a 'weak' link, that being the authenticating of websites that use/provide e-commerce, with sensitive data/info (i.e. bank acct. info)being shared and transferred through these sites. CONTENT is the main reason i picked this article, then source. In addition, the subjects listed (@ bottom) include all of the relevent topices, (e.g. Computer security, Data encryption, Web browsers, Certification, Web sites, Network security).
Wednesday, October 27, 2010
Unit 6-RJ-periodicals
"Internet theft is avoidable"
citation: (MLA)
Cherry, M., and E. Imwinkelried. "Internet theft is avoidable. " Judicature 92.1 (2008): 7-7. Research Library, ProQuest. Web. 27 Oct. 2010.
Why I choose this article?
> This article contained the primary topic i am focusing on, internet security, but the abstract included the relationship of business security from the consumers point of view, which takes into acct. both sides, not just the co. perspective. the indication is that consumers need to be more proactive and be attentive to which companies do a better job of the 'security' issue.
>> there is also the indication of the 'legal' aspects becoming more important with these issues which may point to how the industry might be shaped in the future.
>>> the 2 authors are from 2 different 'expert' disciplines, one in law, the other in 'biometrics' (computer/business security).
>>>> the article is somewhat current (2008), and the periodical listed this article in volume 92, indicating it has stability, continuity and more than likely a broad range of contributors and specific topics.
citation: (MLA)
Cherry, M., and E. Imwinkelried. "Internet theft is avoidable. " Judicature 92.1 (2008): 7-7. Research Library, ProQuest. Web. 27 Oct. 2010.
Why I choose this article?
> This article contained the primary topic i am focusing on, internet security, but the abstract included the relationship of business security from the consumers point of view, which takes into acct. both sides, not just the co. perspective. the indication is that consumers need to be more proactive and be attentive to which companies do a better job of the 'security' issue.
>> there is also the indication of the 'legal' aspects becoming more important with these issues which may point to how the industry might be shaped in the future.
>>> the 2 authors are from 2 different 'expert' disciplines, one in law, the other in 'biometrics' (computer/business security).
>>>> the article is somewhat current (2008), and the periodical listed this article in volume 92, indicating it has stability, continuity and more than likely a broad range of contributors and specific topics.
unit 6-periodicals/RJ notes
Logged into Proquest
> search statement:
internet and privacy and security and business
>> results = 2755 pages found
reduced by using "Advanced Search" option and changed statement
>> 1st result was over 15K results, used the provided suggestion (link)of computer and network security and added 'business' to Src statement: new resutls of 45 docs,
examples are "hackproof dream", "security first", " The causation issue in computer security breach cases" (nice!!), "Virtual machines, virtual security?", and "Internet theft is avoidable".
> search statement:
internet and privacy and security and business
>> results = 2755 pages found
reduced by using "Advanced Search" option and changed statement
>> 1st result was over 15K results, used the provided suggestion (link)of computer and network security and added 'business' to Src statement: new resutls of 45 docs,
examples are "hackproof dream", "security first", " The causation issue in computer security breach cases" (nice!!), "Virtual machines, virtual security?", and "Internet theft is avoidable".
Friday, October 22, 2010
Noter to Instructor
Hi Andrea, I had to work on wed (missed class), and am still sick. Not able to focus well lately. I'm not sure what you were looking for this week. I used boolean operators on my 3 ?'s from earlier, and turned them into 'search statements'.
unit 5 Boolean/search
My 3 questions:
A What level of privacy can be expected by a Co. or individual on the Internet?
> Search statement: Priva* and internet and compan* and citizen
B How secure is sensitive information?
>> Search statement: internet and secur* and identit* and information
C Will computer/network technology evolve to virtually eliminate intrusion & info theft?
>>> Search statement: computer and future and technology and information and theft
A What level of privacy can be expected by a Co. or individual on the Internet?
> Search statement: Priva* and internet and compan* and citizen
B How secure is sensitive information?
>> Search statement: internet and secur* and identit* and information
C Will computer/network technology evolve to virtually eliminate intrusion & info theft?
>>> Search statement: computer and future and technology and information and theft
Sunday, October 17, 2010
unit 4: Summary
Each resource has it's plus/minus factors. My preference immediately is the IT Pro for interest and relevance to my study subjects and education major. The Summit and Cannell dbases are peticularly good for citations, and links to other libraries, and availability in the hardback. The google books dbase provides a more general cross section of both 'serious' content and for fun/enjoyment type of reading materials. LB
unit 4 RJ part 2d
GOOGLE BOOKS:
> Search terms: computers;
>> Citation:
Author- Vacca, John R.
Title- Practical Internet Security
City/Publ./date:
N.Y., N.Y.; Springer Science & Business Media
c-2007
>>> Credibility factors: Very in depth book w/36 chaps of tech info, author has security background w/ NASA.
> Search terms: computers;
>> Citation:
Author- Vacca, John R.
Title- Practical Internet Security
City/Publ./date:
N.Y., N.Y.; Springer Science & Business Media
c-2007
>>> Credibility factors: Very in depth book w/36 chaps of tech info, author has security background w/ NASA.
unit 4 RJ- part 2c
Books 24x7/IT Pro
> my experience w/ :
I like IT Pro mostly because it contains alot of the subjects and info i am interested in (i.e. technology, computers, etc.) each author(s) usually many more titles to choose from. The layout of the page is much better. The references include actual 'certification' instruction books. The links (left margin) allow me to search by year (for relevance, or narrowing of search), and offers to choose several more formats, i.e. large print book, computer file, and visual material. LCB
> my experience w/ :
I like IT Pro mostly because it contains alot of the subjects and info i am interested in (i.e. technology, computers, etc.) each author(s) usually many more titles to choose from. The layout of the page is much better. The references include actual 'certification' instruction books. The links (left margin) allow me to search by year (for relevance, or narrowing of search), and offers to choose several more formats, i.e. large print book, computer file, and visual material. LCB
unit 4 Summit Catalog (2b)
Search terms entered: Internet (and) Security
> CITATION INFO:
Beautiful security
by Andrew Oram; John Viega;
Book Summit
Language: English Publisher: Sebastopol, CA : Farnham : O'Reilly, 2009.
>> Related (subjects): Computer networks, Security measures.
>>> Book & eBook,
LOCATION: Summit, & Seattle Pacific University, call #TK5105.59 .B423 2009
Oram, A., & Viega, J. (2009). Beautiful security. Sebastopol, CA: O'Reilly.
>>>> CREDIBILITY: Hardcopy found at 4 colleges, availability: global (libraries), written by "security" experts. part of a series (Theory in practice).
Differences: different layout, have to search entire page for overall info, can be tagged, includes a better synopsis, descriptive info.
> CITATION INFO:
Beautiful security
by Andrew Oram; John Viega;
Book Summit
Language: English Publisher: Sebastopol, CA : Farnham : O'Reilly, 2009.
>> Related (subjects): Computer networks, Security measures.
>>> Book & eBook,
LOCATION: Summit, & Seattle Pacific University, call #TK5105.59 .B423 2009
Oram, A., & Viega, J. (2009). Beautiful security. Sebastopol, CA: O'Reilly.
>>>> CREDIBILITY: Hardcopy found at 4 colleges, availability: global (libraries), written by "security" experts. part of a series (Theory in practice).
Differences: different layout, have to search entire page for overall info, can be tagged, includes a better synopsis, descriptive info.
Unit 4 RJ-pt 2
logged into Cannell Library website
> typed "internet security" into searchbox
more search terms: "internet and security",, (same results)
> choice 1: "Internet and wireless security"
(choice 2)"Internet security in the Network Computing Framework" (TITLE)
>> citation info:
Added Author Temple, Robert, 1963- Editor.
Regnault, John, Editor.
Books24x7, Inc.
Institution of Electrical Engineers
Norwood, Mass. : Books24x7.com
London : Institution of Electrical Engineers, c2002(Norwood, Mass. : Books24x7.com
>>> Subject Headings: Electronic Commerce, Security, Internet
E-BOOK
LOCATION/CALL #: Books 24X7.com, (no call #)
>>>> CREDIBILITY: Publication info includes Institution of Electrical Engineers, and Source includes bibliographical references.
The
> typed "internet security" into searchbox
more search terms: "internet and security",, (same results)
> choice 1: "Internet and wireless security"
(choice 2)"Internet security in the Network Computing Framework" (TITLE)
>> citation info:
Added Author Temple, Robert, 1963- Editor.
Regnault, John, Editor.
Books24x7, Inc.
Institution of Electrical Engineers
Norwood, Mass. : Books24x7.com
London : Institution of Electrical Engineers, c2002(Norwood, Mass. : Books24x7.com
>>> Subject Headings: Electronic Commerce, Security, Internet
E-BOOK
LOCATION/CALL #: Books 24X7.com, (no call #)
>>>> CREDIBILITY: Publication info includes Institution of Electrical Engineers, and Source includes bibliographical references.
The
Wednesday, October 6, 2010
Unit 3- Activity
Matching Sources to Needs:
> Ques. 1- "What level of privacy can an individual/company/group expect while using the internet? A good RESOURCE: GVRL (Cannell Library site). REASON: this reference site has an ENCYCLOPEDIA of Science, Technology, & Ethics reference(s) which combines the topics in 1 source.
> Ques. 2- "How secure is personal,sensitive information; is critical information secure enough? A good RESOURCE: IT PRO, (Cannell Library site). REASON: this reference site focuses on topics that are computer/internet related.
> Ques. 3- "Will Computer (software) technology address and evolve to all of the levels of security required by individuals and groups? A good RESOURCE: AccessScience: Encyclopedia of Science & Technology Online, (Cannell Library site). REASON: this source has a Computing/Information tech. link that in turn has various links for new sources based on topic and category within the computing/IT area. (at least 10 more links to new sources, including narrowing/focus search function(s).
> Ques. 1- "What level of privacy can an individual/company/group expect while using the internet? A good RESOURCE: GVRL (Cannell Library site). REASON: this reference site has an ENCYCLOPEDIA of Science, Technology, & Ethics reference(s) which combines the topics in 1 source.
> Ques. 2- "How secure is personal,sensitive information; is critical information secure enough? A good RESOURCE: IT PRO, (Cannell Library site). REASON: this reference site focuses on topics that are computer/internet related.
> Ques. 3- "Will Computer (software) technology address and evolve to all of the levels of security required by individuals and groups? A good RESOURCE: AccessScience: Encyclopedia of Science & Technology Online, (Cannell Library site). REASON: this source has a Computing/Information tech. link that in turn has various links for new sources based on topic and category within the computing/IT area. (at least 10 more links to new sources, including narrowing/focus search function(s).
Friday, October 1, 2010
RJ- Unit 2- Summary
Mostly that each single idea can be expanded to many levels, facets of the original idea. The better websites, search engines, subject encylopedias open a floodgate for exploration of a subject, especially by use of keywords, and references, but mostly stimulation of the idea, the creative curiosity of the mind. I like both styles of Sources, GVRL, and Wikipedia, one is more academic and formal, the other reads like a 'helpful' friend, with some topics equally well researched. Larry Bernal
RJ- Unit 2- Part 1 (cont.)
Use Open Web: Wikipedia (.org)
> Eenter same search term: Internet
> Additional ideas/terms:
>> 1- Network of networks
2- Information resources
3- Information services
4- Backbone
5- Domain Names
6- Internet conventions
7- Hyperlinks
8- Personally identifiable info.
9- Surveillance
10- Computer forensics
This source (like most Search domains gives a wealth of new topics, sub-topics, and NEW ideas to follow and dig through.
Compose 3 Search Questions:
1- What level of privacy can an individual/company/group expect while using the internet?
2- How secure is personal,sensitive information; is critical information secure enough?
3- Will technology address and evolve to all of the levels of security required by individuals and groups?
> Eenter same search term: Internet
> Additional ideas/terms:
>> 1- Network of networks
2- Information resources
3- Information services
4- Backbone
5- Domain Names
6- Internet conventions
7- Hyperlinks
8- Personally identifiable info.
9- Surveillance
10- Computer forensics
This source (like most Search domains gives a wealth of new topics, sub-topics, and NEW ideas to follow and dig through.
Compose 3 Search Questions:
1- What level of privacy can an individual/company/group expect while using the internet?
2- How secure is personal,sensitive information; is critical information secure enough?
3- Will technology address and evolve to all of the levels of security required by individuals and groups?
RJ-Unit 2-Part 1
1- Workplace set: a)IExplorer, b)4 tabs open
2- Blog is open (LcbServices):
> Everything I think, use, learn and consider will be referred to here.
3- Read the IRIS tut's:
> Explore topics
> Research Notes
> Subject Encyclopedias
> Deep/Invisible Web
> Wikipedia
4- Explore Topic (GVRL)
>>> Major topic: Internet (Search term)
LIST of Keywords/ideas:
1 Internet fraud
2 Tracking and Tracing
3 Privacy
4 Dynamic and Static Addresses
5 Technology and Relationships
6 Spam and Fraud
7 Internet Spider
8 Bulletin Boards
9 Cyber-culture
10 Piracy and File sharing
11 Electronic Government and Civics
12 Computer Revolution
13 History of Online Communities
14 Internet Technology
15 Online Business
> 2 sub-topics:
>>> A: NAME-Internet Tracking and Tracing
> AUTHOR- Brian Hoyle
> Page Numbers- p147-148
> Title of the Source:
Encyclopedia of Espionage, Intelligence and Security
> Detroit: Gale, 2004
>>> B: NAME- Internet Privacy
> AUTHOR- Jeffrey Wilson (editor)
> Page #s- p1033-1039
> Title of the Source:
Gale Encyclopedia of Everyday Law
> Detroit: Gale, 2006
2- Blog is open (LcbServices):
> Everything I think, use, learn and consider will be referred to here.
3- Read the IRIS tut's:
> Explore topics
> Research Notes
> Subject Encyclopedias
> Deep/Invisible Web
> Wikipedia
4- Explore Topic (GVRL)
>>> Major topic: Internet (Search term)
LIST of Keywords/ideas:
1 Internet fraud
2 Tracking and Tracing
3 Privacy
4 Dynamic and Static Addresses
5 Technology and Relationships
6 Spam and Fraud
7 Internet Spider
8 Bulletin Boards
9 Cyber-culture
10 Piracy and File sharing
11 Electronic Government and Civics
12 Computer Revolution
13 History of Online Communities
14 Internet Technology
15 Online Business
> 2 sub-topics:
>>> A: NAME-Internet Tracking and Tracing
> AUTHOR- Brian Hoyle
> Page Numbers- p147-148
> Title of the Source:
Encyclopedia of Espionage, Intelligence and Security
> Detroit: Gale, 2004
>>> B: NAME- Internet Privacy
> AUTHOR- Jeffrey Wilson (editor)
> Page #s- p1033-1039
> Title of the Source:
Gale Encyclopedia of Everyday Law
> Detroit: Gale, 2006
1ST POST
Hi everyone! Looking forward to learning more and really solidifing my understanding of the Internet and how to search more effectively. Hope to see new perspectives from other students, and the feedback from our instructor as well as the 'live' real-time classroom interaction... Have a great quarter! Larry Bernal
Subscribe to:
Posts (Atom)