Libraries Do Matter: Enhancing Traditional Services with Library 2.0St. Petersburg College
What is library 2.0? Should your library actually 'upgrade' from version 1.0 to 2.0? Is Library 3.0 on the horizon? Sit back and relax while Diana Sachs-Silveira and Chad Mairn answer these questions while unscrambling the hodgepodge of Web 2.0 lingo. Diana and Chad will introduce a variety of Web 2.0 concepts that have evolved into services like MySpace, Wikipedia, Del.ic.ious, Digg, Flickr, RSS, Second Life, Writely, and others and discuss how libraries can play a part in all of this.
The document summarizes key topics from an Enterprise 2.0 workshop, including definitions of knowledge management, knowledge processes in learning organizations, and contrasts between Web 1.0 and 2.0 technologies. Various Web 2.0 tools are also described such as wikis, blogs, forums, social bookmarking, social networking, and RSS feeds. The goal of knowledge management is to transform organizations into learning organizations by creating, acquiring, transferring knowledge and modifying behaviors.
This presentation was session 11 in a 12 part webinar series on the book Extreme Democracy. Extreme democracy is a political philosophy of the information era that puts people in charge of the entire political process. It suggests a deliberative process that places total confidence in the people, opening the policy-making process to many centers of power through deeply networked coalitions that can be organized around local, national and international issues. This seminar covered Political Tools: A discussion of the essays of Adina Levin (Campaign Tools), pages 320 - 362 & Phillip Windley (eVoting), pages 191 – 198.
Digital Visitors and Residents: Project Feedbackjisc-elearning
Students and staff have been developing their own digital literacies for years and successfully integrating them into their social and professional activities. The Visitors and Residents project has been capturing these literacies by interviewing participants within four educational stages from secondary school to experienced scholars. Using the Visitors and Residents idea as a framework the project has been mapping what motivates individuals and groups to engage with the web for learning. We have been exploring the information-seeking and learning strategies that are evolving in both personal and professional contexts. In this presentation we will discuss these emerging ‘user owned’ literacies and how they might integrate with institutional approaches to developing digital literacies. We also will discuss the Visitors and Residents mapping process and how this could be utilised by projects as a tool for reflecting on existing and potential literacies and the development of services and systems.
David White, Co-manager , Technology Assisted Lifelong Learning, University of Oxford
Lynn Silipigni Connaway, Ph.D., Senior Research Scientist, OCLC Research
Presented at PLAN Media Specialist in-service days August 2012
Just noticed links for photo attribution did not load. I'll repost with links as soon as I can!
Slides from the "Author Identity – Creating a new kind of reputation online" session at Science Online London (solo09) with Duncan Hull, Geoffrey Bilder, Michael Habib, Reynold Guida
ResearcherID, Contributor ID, Scopus Author ID, etc. help to connect your scientific record. How do these tools connect to your online identity, and how can OpenID and other tools be integrated? How can we build an online reputation and when should we worry about our privacy?
This presentation was session 8 in a 12 part webinar series on the book Extreme Democracy. Extreme democracy is a political philosophy of the information era that puts people in charge of the entire political process. It suggests a deliberative process that places total confidence in the people, opening the policy-making process to many centers of power through deeply networked coalitions that can be organized around local, national and international issues. This seminar covered DeanSpace: A discussion of the essays of Clay Shirky (Exiting Dean Space), pages 228 -240; Jon Lebkowky (Deanspace, Social Networks & Politics) & Aldon Hays (What is DeanSpace?), pages 296 - 319
Connect With Your Users: Communicate Using Social Software ToolsRobFav
NELA presentation delivered at the 113th Vermont Library Conference, May 15, 2007. The presentation explores how libraries are using Blogs, Wikis, and RSS.
Libraries Do Matter: Enhancing Traditional Services with Library 2.0St. Petersburg College
What is library 2.0? Should your library actually 'upgrade' from version 1.0 to 2.0? Is Library 3.0 on the horizon? Sit back and relax while Diana Sachs-Silveira and Chad Mairn answer these questions while unscrambling the hodgepodge of Web 2.0 lingo. Diana and Chad will introduce a variety of Web 2.0 concepts that have evolved into services like MySpace, Wikipedia, Del.ic.ious, Digg, Flickr, RSS, Second Life, Writely, and others and discuss how libraries can play a part in all of this.
The document summarizes key topics from an Enterprise 2.0 workshop, including definitions of knowledge management, knowledge processes in learning organizations, and contrasts between Web 1.0 and 2.0 technologies. Various Web 2.0 tools are also described such as wikis, blogs, forums, social bookmarking, social networking, and RSS feeds. The goal of knowledge management is to transform organizations into learning organizations by creating, acquiring, transferring knowledge and modifying behaviors.
This presentation was session 11 in a 12 part webinar series on the book Extreme Democracy. Extreme democracy is a political philosophy of the information era that puts people in charge of the entire political process. It suggests a deliberative process that places total confidence in the people, opening the policy-making process to many centers of power through deeply networked coalitions that can be organized around local, national and international issues. This seminar covered Political Tools: A discussion of the essays of Adina Levin (Campaign Tools), pages 320 - 362 & Phillip Windley (eVoting), pages 191 – 198.
Digital Visitors and Residents: Project Feedbackjisc-elearning
Students and staff have been developing their own digital literacies for years and successfully integrating them into their social and professional activities. The Visitors and Residents project has been capturing these literacies by interviewing participants within four educational stages from secondary school to experienced scholars. Using the Visitors and Residents idea as a framework the project has been mapping what motivates individuals and groups to engage with the web for learning. We have been exploring the information-seeking and learning strategies that are evolving in both personal and professional contexts. In this presentation we will discuss these emerging ‘user owned’ literacies and how they might integrate with institutional approaches to developing digital literacies. We also will discuss the Visitors and Residents mapping process and how this could be utilised by projects as a tool for reflecting on existing and potential literacies and the development of services and systems.
David White, Co-manager , Technology Assisted Lifelong Learning, University of Oxford
Lynn Silipigni Connaway, Ph.D., Senior Research Scientist, OCLC Research
Presented at PLAN Media Specialist in-service days August 2012
Just noticed links for photo attribution did not load. I'll repost with links as soon as I can!
Slides from the "Author Identity – Creating a new kind of reputation online" session at Science Online London (solo09) with Duncan Hull, Geoffrey Bilder, Michael Habib, Reynold Guida
ResearcherID, Contributor ID, Scopus Author ID, etc. help to connect your scientific record. How do these tools connect to your online identity, and how can OpenID and other tools be integrated? How can we build an online reputation and when should we worry about our privacy?
This presentation was session 8 in a 12 part webinar series on the book Extreme Democracy. Extreme democracy is a political philosophy of the information era that puts people in charge of the entire political process. It suggests a deliberative process that places total confidence in the people, opening the policy-making process to many centers of power through deeply networked coalitions that can be organized around local, national and international issues. This seminar covered DeanSpace: A discussion of the essays of Clay Shirky (Exiting Dean Space), pages 228 -240; Jon Lebkowky (Deanspace, Social Networks & Politics) & Aldon Hays (What is DeanSpace?), pages 296 - 319
Connect With Your Users: Communicate Using Social Software ToolsRobFav
NELA presentation delivered at the 113th Vermont Library Conference, May 15, 2007. The presentation explores how libraries are using Blogs, Wikis, and RSS.
Improving the troubled relationship between Scientists and Wikipedia Duncan Hull
This document discusses improving the relationship between scientists and Wikipedia. It notes that Wikipedia often lacks basic biographical information about notable scientists. A Wikipedian in Residence program was established at the Royal Society to address this issue through edit-a-thons and releasing portraits and data under open licenses. This led to improved coverage of Fellows of the Royal Society on Wikipedia. The document advocates for expanding such programs to other scientific organizations to increase representation of scientists on Wikipedia.
Irish Studies - making library data work harderlisld
[Check out the notes for details] Explores how WorldCat can be interrogated to reveal interesting things about a subject domain - Irish Studies. Part one looks at a move to linked data, suggesting that this will better support research enquiries. Part two provides some simple examples of how bibliographic data can support 'distant reading', literary analysis at scale. The third section looks at the collective Irish Studies collection - how Irish Studies materials are distributed across library collections.
It was presented at the American Conference for Irish Studies, 1 April 2016, University of Notre Dame.
A condensed version of "New Forms of Communication: Collective Knowledge through Web Logs." This presentation was shown at the Art Libraries Society of North America’s 35th Annual Conference 2007 during the Hot Topics session.
Don volunteered in 2014 to develop simulation models in SolidWorks of a 3/4 inch scale live steam locomotive for the International Brotherhood of Live Steamers. In addition to the models, Don wrote an analysis of each section highlighting issues with the original model. The resulting series was published on the IBLS website and Don continues to submit additional sections. Daris Nevil, the IBLS Webmaster, was impressed with Don's knowledge, skills in SolidWorks, and writing abilities in making the project possible and enjoyable to read.
This document describes the XOVis learning analytics and visualization tool. XOVis collects metadata from students' work on their laptops to provide insights into learning and engagement. Student work is stored locally and then synced across schools and to the cloud using CouchDB and eventual consistency. This allows analytics even when internet is unavailable. XOVis processing and reporting is done both at local school appliances and in the cloud. The goal is to help educators better understand learning through visualized analytics on student computer usage.
The document discusses the state of blogging in China in 2004 and issues around information control and lack of reflection mechanisms. It notes that blogs have the potential to act as an emergent and grassroots form of media that allows for distributed sharing of everyday content and collective intelligence. However, it also faces challenges from censorship and a lack of diversity. The document advocates for building trust-based communities of practice around blogging to help address some of these issues.
The document summarizes a Pecha Kucha lightning round discussion on innovative ideas for information literacy in the 21st century. It provides examples of tools and concepts discussed, such as alternate reality games, Wikipedia school projects, and evaluating online resources. It also lists additional resources on topics like information literacy, web 2.0, and new media literacies standards and assessments. Future areas for exploration mentioned include information literacy 2.0 assignments, collaborating to teach multiple literacies, and barriers to adopting new literacies.
One Session Wonder presentation to kick off a discussion of Digital Humanities in courses. [version 1, it needs revision, and more examples/ interactivity]
Open Context and Publishing to the Web of Data: Eric Kansa's LAWDI Presentationekansa
This presentation discusses how a model of “data sharing as publishing” can contribute to developing Linked Open Data resources in archaeology and the study of the ancient world. The paper gives examples from Open Context’s developing approach to data editing, documentation and quality improvement processes. The goal of these efforts is to better align the professional interests of individual researchers with the needs of the larger community to access and use high-quality data in Linked Data scenarios.
Bibliography 2.0: A citeulike case study from the Wellcome Trust Genome CampusDuncan Hull
The document discusses Bibliography 2.0, a case study of using the citation management tool Citeulike at the Wellcome Trust Genome Campus. It describes how current publishing incentives encourage "burying" data in publication silos and obscure author identities. Citeulike provides a solution by allowing users to organize citations, see what others are reading, and increase visibility of their work. However, adoption faces barriers from privacy concerns, fragility of tools, and lack of academic rewards for participation.
This document summarizes a pilot project conducted at University College Dublin (UCD) Library to evaluate the use of subject guides created using the LibGuides platform. The project team introduced LibGuides subject guides for all disciplines over the course of one year. Usage statistics and student feedback were collected to analyze awareness, usage patterns, and perceptions of the guides. Key findings included very low student awareness, high usage of introductory pages and database links, and a preference for finding information via search engines. The project team concluded that greater promotion, integration with instruction, and collaboration with academic staff could help increase visibility and use of the subject guides.
The document summarizes the path to LGBT equality in the United States. It discusses how the push for equality has become stronger over time, with increasing inclusivity and more states allowing gender-neutral birth certificates. While progress has been made, full equality has yet to be achieved. The Equality Act is currently in progress, which would provide nationwide nondiscrimination protections for LGBT people.
We, Me and the Network: Girl Scouts Leadership & Development Conf KeynoteNancy Wright White
The document discusses concepts around learning in networks, communities, and as individuals. It introduces the concepts of "me, we, and networks" to represent learning at the individual, community, and network levels. Key ideas that are explored include reciprocal apprenticeship, belonging, applying gifts, participation versus reification, togetherness versus separateness, and roles people take on like facilitators, community leaders, and network weavers. The document encourages reflection on how these concepts apply to contexts like Girl Scouting and how to foster learning across different levels.
The Promise of BIBFRAME, by Angela KroegerAngela Kroeger
Brief overview of BIBFRAME, with a slight emphasis on intellectual freedom issues. Lightning round presentation by Angela Kroeger of the Criss Library at the University of Nebraska at Omaha, presented at the Joint Spring Meeting of the Nebraska Library Association's Intellectual Freedom Round Table and Technical Services Round Table, March 28, 2014. Full presenter notes/script and bibliography available upon request. Contact angelajkroeger [at] gmail [dot] com.
There’s No Place Like Home: Widgets and Themes and More… Oh My!D2L Barry
This document provides an overview of a faculty learning community workshop on customizing courses in the Brightspace (D2L) learning management system. The workshop will cover basic course customization using tools like widgets, themes, and third-party apps. It will also discuss challenges of customization and standardization. Specific sessions will demonstrate how to build personalized home pages using widgets, provide examples of widget types, and discuss accessibility and universal design in online courses. The document lists several session topics and includes brief descriptions, quotes, and references.
Social media, so what? Using Social Media for Information DiscoveryMichelle Dalton
The document discusses how social media can be used for information discovery compared to traditional scholarly sources. It notes that social media allows discovery of more up-to-date information, information not formally published, and hot topics in a subject area. It also discusses how social media allows discovering what peers are reading and researching. Different social media platforms serve different purposes for information discovery, such as blogs for long-form writing, Twitter for quick updates, and slideshare for sharing presentations.
Challenges and opportunities for academic librarieslisld
Research and learning behaviors are changing in a network environment. What challenges do Academic libraries face? What opportunities do they have? A presentation given at a symposium on the future of academic libraries at the Open University.
Web Proxy Log Analysis and Management 2007Anton Chuvakin
This document discusses web proxy log management and analysis. It provides an overview of what proxy logs contain such as user activities, applications, and malware traffic. Example uses of proxy log analysis include detecting spyware, monitoring user web surfing for policy compliance, and performing correlated investigations across server, firewall and proxy logs. Best practices for proxy log collection, storage, and analysis are also covered.
Web log files record details of user interactions on a website such as page requests, downloads, browser information, and timestamps. This data provides insights into visitor traffic, behavior, and origins that can help businesses optimize their site design and performance to better meet customer needs in a competitive global digital environment.
Improving the troubled relationship between Scientists and Wikipedia Duncan Hull
This document discusses improving the relationship between scientists and Wikipedia. It notes that Wikipedia often lacks basic biographical information about notable scientists. A Wikipedian in Residence program was established at the Royal Society to address this issue through edit-a-thons and releasing portraits and data under open licenses. This led to improved coverage of Fellows of the Royal Society on Wikipedia. The document advocates for expanding such programs to other scientific organizations to increase representation of scientists on Wikipedia.
Irish Studies - making library data work harderlisld
[Check out the notes for details] Explores how WorldCat can be interrogated to reveal interesting things about a subject domain - Irish Studies. Part one looks at a move to linked data, suggesting that this will better support research enquiries. Part two provides some simple examples of how bibliographic data can support 'distant reading', literary analysis at scale. The third section looks at the collective Irish Studies collection - how Irish Studies materials are distributed across library collections.
It was presented at the American Conference for Irish Studies, 1 April 2016, University of Notre Dame.
A condensed version of "New Forms of Communication: Collective Knowledge through Web Logs." This presentation was shown at the Art Libraries Society of North America’s 35th Annual Conference 2007 during the Hot Topics session.
Don volunteered in 2014 to develop simulation models in SolidWorks of a 3/4 inch scale live steam locomotive for the International Brotherhood of Live Steamers. In addition to the models, Don wrote an analysis of each section highlighting issues with the original model. The resulting series was published on the IBLS website and Don continues to submit additional sections. Daris Nevil, the IBLS Webmaster, was impressed with Don's knowledge, skills in SolidWorks, and writing abilities in making the project possible and enjoyable to read.
This document describes the XOVis learning analytics and visualization tool. XOVis collects metadata from students' work on their laptops to provide insights into learning and engagement. Student work is stored locally and then synced across schools and to the cloud using CouchDB and eventual consistency. This allows analytics even when internet is unavailable. XOVis processing and reporting is done both at local school appliances and in the cloud. The goal is to help educators better understand learning through visualized analytics on student computer usage.
The document discusses the state of blogging in China in 2004 and issues around information control and lack of reflection mechanisms. It notes that blogs have the potential to act as an emergent and grassroots form of media that allows for distributed sharing of everyday content and collective intelligence. However, it also faces challenges from censorship and a lack of diversity. The document advocates for building trust-based communities of practice around blogging to help address some of these issues.
The document summarizes a Pecha Kucha lightning round discussion on innovative ideas for information literacy in the 21st century. It provides examples of tools and concepts discussed, such as alternate reality games, Wikipedia school projects, and evaluating online resources. It also lists additional resources on topics like information literacy, web 2.0, and new media literacies standards and assessments. Future areas for exploration mentioned include information literacy 2.0 assignments, collaborating to teach multiple literacies, and barriers to adopting new literacies.
One Session Wonder presentation to kick off a discussion of Digital Humanities in courses. [version 1, it needs revision, and more examples/ interactivity]
Open Context and Publishing to the Web of Data: Eric Kansa's LAWDI Presentationekansa
This presentation discusses how a model of “data sharing as publishing” can contribute to developing Linked Open Data resources in archaeology and the study of the ancient world. The paper gives examples from Open Context’s developing approach to data editing, documentation and quality improvement processes. The goal of these efforts is to better align the professional interests of individual researchers with the needs of the larger community to access and use high-quality data in Linked Data scenarios.
Bibliography 2.0: A citeulike case study from the Wellcome Trust Genome CampusDuncan Hull
The document discusses Bibliography 2.0, a case study of using the citation management tool Citeulike at the Wellcome Trust Genome Campus. It describes how current publishing incentives encourage "burying" data in publication silos and obscure author identities. Citeulike provides a solution by allowing users to organize citations, see what others are reading, and increase visibility of their work. However, adoption faces barriers from privacy concerns, fragility of tools, and lack of academic rewards for participation.
This document summarizes a pilot project conducted at University College Dublin (UCD) Library to evaluate the use of subject guides created using the LibGuides platform. The project team introduced LibGuides subject guides for all disciplines over the course of one year. Usage statistics and student feedback were collected to analyze awareness, usage patterns, and perceptions of the guides. Key findings included very low student awareness, high usage of introductory pages and database links, and a preference for finding information via search engines. The project team concluded that greater promotion, integration with instruction, and collaboration with academic staff could help increase visibility and use of the subject guides.
The document summarizes the path to LGBT equality in the United States. It discusses how the push for equality has become stronger over time, with increasing inclusivity and more states allowing gender-neutral birth certificates. While progress has been made, full equality has yet to be achieved. The Equality Act is currently in progress, which would provide nationwide nondiscrimination protections for LGBT people.
We, Me and the Network: Girl Scouts Leadership & Development Conf KeynoteNancy Wright White
The document discusses concepts around learning in networks, communities, and as individuals. It introduces the concepts of "me, we, and networks" to represent learning at the individual, community, and network levels. Key ideas that are explored include reciprocal apprenticeship, belonging, applying gifts, participation versus reification, togetherness versus separateness, and roles people take on like facilitators, community leaders, and network weavers. The document encourages reflection on how these concepts apply to contexts like Girl Scouting and how to foster learning across different levels.
The Promise of BIBFRAME, by Angela KroegerAngela Kroeger
Brief overview of BIBFRAME, with a slight emphasis on intellectual freedom issues. Lightning round presentation by Angela Kroeger of the Criss Library at the University of Nebraska at Omaha, presented at the Joint Spring Meeting of the Nebraska Library Association's Intellectual Freedom Round Table and Technical Services Round Table, March 28, 2014. Full presenter notes/script and bibliography available upon request. Contact angelajkroeger [at] gmail [dot] com.
There’s No Place Like Home: Widgets and Themes and More… Oh My!D2L Barry
This document provides an overview of a faculty learning community workshop on customizing courses in the Brightspace (D2L) learning management system. The workshop will cover basic course customization using tools like widgets, themes, and third-party apps. It will also discuss challenges of customization and standardization. Specific sessions will demonstrate how to build personalized home pages using widgets, provide examples of widget types, and discuss accessibility and universal design in online courses. The document lists several session topics and includes brief descriptions, quotes, and references.
Social media, so what? Using Social Media for Information DiscoveryMichelle Dalton
The document discusses how social media can be used for information discovery compared to traditional scholarly sources. It notes that social media allows discovery of more up-to-date information, information not formally published, and hot topics in a subject area. It also discusses how social media allows discovering what peers are reading and researching. Different social media platforms serve different purposes for information discovery, such as blogs for long-form writing, Twitter for quick updates, and slideshare for sharing presentations.
Challenges and opportunities for academic librarieslisld
Research and learning behaviors are changing in a network environment. What challenges do Academic libraries face? What opportunities do they have? A presentation given at a symposium on the future of academic libraries at the Open University.
Web Proxy Log Analysis and Management 2007Anton Chuvakin
This document discusses web proxy log management and analysis. It provides an overview of what proxy logs contain such as user activities, applications, and malware traffic. Example uses of proxy log analysis include detecting spyware, monitoring user web surfing for policy compliance, and performing correlated investigations across server, firewall and proxy logs. Best practices for proxy log collection, storage, and analysis are also covered.
Web log files record details of user interactions on a website such as page requests, downloads, browser information, and timestamps. This data provides insights into visitor traffic, behavior, and origins that can help businesses optimize their site design and performance to better meet customer needs in a competitive global digital environment.
Este documento define un blog y describe los sistemas para crear y alojar blogs, las redes de blogs, el ranking de blogs y las comunidades y directorios de blogs. Los blogs son publicaciones digitales que presentan contenido de forma cronológica y se asemejan a diarios. Existen plataformas como Blogger y Windows Live Spaces para crear y alojar blogs. Las redes de blogs conectan comunidades de blogs por temas a través de enlaces. Los directorios como Bitacoras.com y la blogosfera agrupan blogs por temas y regiones.
The document discusses weblogs (blogs), including what they are, how to use them to obtain information and create your own, and how they can provide leverage for your own site. A blog is a regularly updated website consisting of short articles organized chronologically. It allows comments and shares content through RSS feeds. The document recommends several blogs and notes that news aggregators make blogs easier to manage by collating their RSS feeds.
Clericalismo liderazgo del s.xxi y cambio de paradigmas parte 1Paulo Arieu
Este documento discute el concepto de "cambio de paradigma" y cómo afecta el liderazgo cristiano. Explica que los paradigmas establecidos en las iglesias ya no son adecuados para el siglo 21 y deben actualizarse. También analiza la etimología del término "paradigma" y cómo ha evolucionado su significado, particularmente en ciencias e historia de la iglesia.
Baoill examines how blogs fit Habermas' model of the ideal public sphere. While blogs allow open participation, time commitment and technical skills can limit inclusion. Popular blogs are disproportionately influenced by "A-list" bloggers with existing credentials. Debate often focuses on a few transient topics, disadvantaging local issues. However, some use blogs to comment on conditions in oppressive regimes. While inclusive, the blogosphere fails to disregard rank and privileges some topics over others.
This document discusses optimizing database management of large-scale web access logs. It proposes using a pre-processor to hash and sort logs in memory before writing to the database. An experiment compares the performance of using the pre-processor versus directly writing to the database. The results show the pre-processor is 18-20 times faster for input time and memory usage is twice as high but run time is much better compared to only using the database. The document concludes the proposed approach of using a pre-processor for in-memory processing before database storage provides better performance and optimization than traditional approaches.
• What is a web log?
• Where do they come from?
• Why are they relevant?
• How can we analyze them?
• What about Clickstream?
Facing these questions I have make a personal research, and realize a synthesis, which has help me to clarify some ideas. This presentation does not intend to be exhaustive on the subject, but could perhaps bring you some useful insights.
(WEB301) Operational Web Log Analysis | AWS re:Invent 2014Amazon Web Services
Log data contains some of the most valuable raw information you can gather and analyze about your infrastructure and applications. Amid the mess of confusing lines of seemingly random text can be hints about performance, security, flaws in code, user access patterns, and other operational data. Without the proper tools, finding insights in these logs can be like searching for a hay-colored needle in a haystack. In this session you learn what practices and patterns you can easily implement that can help you better understand your log files. You see how you can customize web logs to add more information to them, how to digest logs from around your infrastructure, and how to analyze your log files in near real time.
Clickstream Data Warehouse - Turning clicks into customersAlbert Hui
As web is becoming a main channel for reaching customers and prospects, Clickstream data generated by websites has become another important enterprise data source, like other traditional business data sources, like store transactions, CRM data, call center’s logs etc. As simple as it sounds for recording every click a customer made, Clickstream data actually offers a wide range of opportunities for modelling user behaviour, gaining valuable customer insights. This is definitely a data source which has been under utilized. However, benefits also come with a problem. Amazon records 5 Billion clicks a day and the whole US generates 400 Billion clicks, equivalent to 3.4 Petabytes a day. This immense volume has given enterprises and their IT professionals a big data problem before they can fully utilize this insight-rich data source.
This presentation will use big data technology to help solve this big data problem; the presenter will explain everything about Clickstream data, like benefits, challenges and the solution. The end-to-end solution will include proposed data architecture, ETL, and various machine learning algorithms. A real world successful example will also be presented for audience to better grasp the concept and its applications. Sample codes and demo will also be presented for audience to apply in their respective areas.
The history of blogging started with early digital communities like Usenet and BBS forums. The first blogs evolved from online diaries in the 1990s. Blogging rapidly grew in popularity after 1999 with the launch of Open Diary, Pitas.com, and Blogger.com. Today, popular blogging platforms include WordPress, Blogger, TypePad, Movable Type, and Drupal. Blogging allows people to freely express themselves and interact online through regularly updated content.
A blog is a type of website where an individual maintains a regular diary of commentary, descriptions of events, or other content. Blog entries are usually displayed in reverse-chronological order and allow visitors to leave interactive comments. Common types of blogs include personal blogs, corporate/organizational blogs, and genre-focused blogs on topics like travel, fashion, or news. Real estate blogs help position agents as experts by providing commentary and information on local real estate trends.
The document discusses 5 blogs and what media techniques they use to convey information and engage consumers. It analyzes how effective each blog is and which areas from each blog would be useful to employ in one's own blog. The blogs covered include Concrete Loop about urban culture, The Movie Blog about film reviews, Miles Davis Online about the jazz musician, and Afrobella about African American beauty tips. The document considers things like images, videos, reviews, and personal stories or quotes used in each blog.
Blogs allow individuals to participate in public knowledge building by sharing day-to-day observations and personal experiences online. A typical blog includes permalinks to individual posts, comments from readers, and trackbacks to cite other blogs. Blogs became popular after 2001 as a way to share information in light of events like 9/11. People interact with blogs by reading, commenting, and linking to posts with similar interests across the "blogosphere."
The document discusses strategic responses for academic librarians facing disruptive changes in technology and user needs. It suggests five strategic responses: 1) creating digital libraries of rare holdings, 2) establishing institutional repositories, 3) providing infrastructure for open access journals, 4) increasing partnerships with faculty, and 5) transforming service models like reference desks. The discussion addresses how these may differ from traditional library functions and implications for LIS education.
This document provides a summary of various resources related to Web 2.0. It includes articles, books, and websites on topics such as using Web 2.0 tools for academic research, the e-policy handbook for managing social media tools, and a free ebook about amazing Web 2.0 projects. The document also summarizes resources on blogging, microblogging, the deep web, using Web 2.0 in libraries and information professionals, photo and video sharing, social networking, teaching and education with Web 2.0, virtual worlds, computing topics like cloud computing and mashups, and using Web 2.0 in business.
Social software for teaching and learning, mid-2008Bryan Alexander
1. The document discusses the rise of social media technologies known as Web 2.0 and their potential implications and applications for higher education, including collaborative writing platforms like wikis and blogs, social bookmarking, tagging, and networking sites.
2. It outlines several responses institutions could take, such as taking advantage of existing Web 2.0 projects and services, modifying or adapting them, and promoting digital and information literacy.
3. Examples of ways various schools and professors have incorporated social media into teaching are provided, such as through podcasting, blogging, digital storytelling, and multimedia assignments.
The document discusses the opportunities and challenges of integrating Web 2.0 technologies into academia. It outlines several Web 2.0 pedagogies like collaborative writing, social object pedagogies, and podcasting. However, concerns include issues around privacy, copyright, and a lack of preservation when content is hosted externally. Web 2.0 adoption in academia also faces challenges from entrenched systems like campus course management systems.
The document discusses the relationship between weblogs (blogs) and journalism. It notes that blogs provide a space for journalistic thinking not found in traditional corporate media. Blogs are seen as challenging institutional journalism and creating a more democratic and interactive space. The document also presents a case study of the Guardian Weblog and suggests blogs may provide glimpses into mainstream journalism through different relationships with readers and emphasis on making connections over authority. It concludes by discussing possible futures where online journalism focuses more on communication than just information transmission.
Pratt Sils Knowledge Organization Fall 2008PrattSILS
The document discusses how libraries are adopting various Web 2.0 technologies like blogs, wikis, social bookmarking, and open source software to become more user-centered and engage patrons. It provides examples of each technology and how libraries are using them to disseminate information, collaborate, and interact with users in new ways that align with users' needs and behaviors online.
Web 2.0 is defined as both a marketing term and set of principles that allow users to have more control over online content and collaborate through technologies like wikis, blogs, social networking sites, tagging, and RSS feeds. It represents a shift from static, top-down websites to more dynamic and customizable user-generated content. The document discusses examples of how libraries can use blogs and wikis to communicate with patrons, facilitate staff communication, and stay up to date on professional developments.
What Does Your Repository Do? Measuring and Calculating ImpactMargaret Heller
The document discusses measuring the impact of institutional repositories. It provides examples of metrics that can be used like downloads, citations in Google Scholar, and social media mentions. Case studies are presented of four universities that show differences in their size, collections, downloads and global reach. The document concludes by highlighting the many reasons why repositories are created, from altruism to increasing institutional reputation and visibility.
Going social: the librarians bag of tricksBonaria Biancu
The document discusses the transition of libraries to Library 2.0 by embracing social media and web 2.0 technologies and principles. Key points include engaging users through social computing applications like blogs, wikis and podcasts; harnessing user participation and collaboration; and meeting users online through channels they use regularly like social networking sites and repositories. The goal for librarians is to have conversations with users through many platforms, gather and organize information for them, and share and remix content to better serve users in online spaces.
1. The document discusses the emergence of Web 2.0 technologies and their potential applications for education, including wikis, blogs, social networking, tagging, and user-generated media.
2. It outlines several pedagogical approaches using Web 2.0, such as collaborative writing, social object lessons, and storytelling with photos and videos.
3. Challenges of Web 2.0 integration are also examined, such as platform limitations, privacy concerns, and copyright issues. Academic adoption of these new technologies remains uneven.
The document discusses various free online tools that libraries can use to market their collections, including social media platforms like Twitter, Facebook, blogs, and library applications. Specific strategies are provided, such as using Twitter to advertise new additions and answer reference questions, creating a Facebook page to provide updates and gather feedback, and employing tools that integrate with library catalogs like LibraryThing. The presenters encourage libraries to share their success stories of using technology to promote services.
Emerging technologies for teaching and learning: into fall 2008Bryan Alexander
This document discusses the intersections between gaming and education in the context of Web 2.0. It notes that gaming is a huge, globally successful domain that is perceived as lacking seriousness. However, it argues that education can take advantage of existing gaming projects, services, and influence by modifying, hacking, and engaging in do-it-yourself literacy activities around new media like gaming.
Emerging tech for teaching and learning: heading into fall 2008Bryan Alexander
This document discusses emerging technologies related to Web 2.0, gaming, and mobile devices and their potential applications in education. It covers topics like wikis, blogs, social networking, virtual worlds, games, podcasting, and more. It also discusses various pedagogical approaches using these tools, including collaborative writing, multimedia literacies, and skills developed through gaming simulations. Overall, the document takes an optimistic view of how these new media can enhance teaching and learning if integrated thoughtfully into academic contexts.
Web 2.0 tools like blogs, wikis, social networking sites, tagging, and RSS feeds promote information fluency by allowing users to create, share, and collaborate on content. These tools make information more accessible and encourage lifelong learning. While useful, overdependence on these sources and lack of skills in evaluating digital information can also be problems if information literacy is not developed.
NIH Management Series Seminar - June 2008 - Jim AngusJim Angus
The document summarizes a presentation about using Web 2.0 technologies like social media to improve communications at NIH. It discusses various social media platforms like Facebook, LinkedIn, Twitter, YouTube and their potential uses for outreach, collaboration and engagement. It also covers techniques like syndication, tagging and mashups as well as virtual environments like Second Life and how public institutions are using these tools. The presentation envisions NIH communications evolving to utilize dashboards and geospatial data to better manage resources globally.
The document discusses using social media and web tools like blogs, Flickr, YouTube, and wikis to engage new audiences and encourage user participation. It provides examples of how museums and historical societies are using these tools, describes various options for creating blogs, uploading photos to Flickr, and more. It also discusses the idea of adopting a "philosophy of radical trust" by seeing users as co-creators rather than just customers.
The document discusses the emergence of Web 2.0 technologies and their potential applications for education. It covers topics like wikis, blogs, social networking sites, tagging, podcasting and how they can be used for collaborative learning, student content creation, and new forms of digital storytelling. The document argues that while some educational practices predate Web 2.0, new technologies allow for more distributed, participatory, and object-oriented pedagogies.
Similar to New Forms Of Communication: Harnessing Collective Knowledge through Web Logs (20)
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
GraphRAG for Life Science to increase LLM accuracy
New Forms Of Communication: Harnessing Collective Knowledge through Web Logs
1. New Forms of Communication : Harnessing Collective Knowledge through Web Logs Bryan Loar Presented at the Art Libraries Society of North America’s 35 th Annual Conference April 29, 2007
2.
3.
4. BLOGS – Are Not Just… Online Journals Places for Self-Proclaimed Nerds Vehicles for Rants
5. BLOGS – Are Not Just… Online Journals Places for Self-Proclaimed Nerds Vehicles for Rants Me Circa 2001
6.
7.
8. BLOGS – A Brief History Partially adapted from Lena Karlsson’s account 5 Wordpress Moveable Type (MT) Blogger J ørn Barger, Weblog Filter Weblogs Online Journals 2002 1998 1997 1996 RSS 2.0 MetaWeblog API Six Apart 2003 2001 1999 1995