In Module 2, you will learn the basics of conducting online research. Topics covered include how to approach online research; where to look for information; the three “R’s” when utilizing search engines; and how to structure your search results for excellent, credible results. Finally, you will receive an introduction in utilizing citations and copyright restrictions.
Upon completion of this module, you should be able to:
• Manage your research time wisely to locate information on line
• Describe the three “R’s” of search engines
• Structure your search for excellent results
• Determine the credibility of your search results
• Explain the correct use of citations and copyright restrictions
User research was conducted to evaluate a proposed new design for the BIS website and inform its optimal information architecture. Methods included workshops and one-on-one sessions testing an interactive prototype. Key findings were that the top-level navigation works well but the scope and purpose of BIS is unclear. Users expect to easily find the latest updates and news on the homepage as well as information clearly defining each department's mission and actions. The classification of policies requires clarification as regulations are sometimes difficult to locate.
Search engines and digital libraries both provide search capabilities but work differently:
- Search engines use crawlers to index the web and return keyword search results, while digital libraries provide access to structured collections of digitized materials from libraries and archives.
- Both have limitations in coverage, and searching must be done individually in different databases within digital libraries rather than via federated search.
- It is important for users to understand how each system works, what is included in their indexes, and how results may be influenced by business models, sponsorship, or other factors to get the most relevant information for their needs.
Wookey Search Technology Corporation (WSTC) provides a summary of recent developments and future plans. Key points include: the engineering team has experience developing large-scale systems and social media products; research and development plans include Phase II development milestones to improve the user interface and search experience; post-Phase II strategies involve adoption through content providers and monetization through mobile/web views and partnerships; the exit strategy involves a reverse merger that would provide liquidity for shareholders by converting their shares to shares of the public company.
“Youth-led Tech | Summer 2015” is a technology mentoring program in five Chicago neighborhoods: Austin, Englewood, Humboldt Park, North Lawndale, and Roseland. As part of this program, we’re teaching various classes on digital skills. We’ve open sourced our curriculum through a series of blog posts.
We cover an introductions to WordPress, Wordpress dashboards, themes, how to post, and how to add media to your WordPress site. We also have set time aside each day for students to work on their typing skills.
These are minute-by-minute guides on teaching the youth. If you want to start your own Youth-Led Tech program, this is the place to start. At Smart Chicago, we are dedicated to sharing all of our methods. Not just code published to Github (though we do that, too), but whole swaths of templates, resources, and guides that help spread the practice of community technology.
This document discusses the concept of "digital citizenship" and how it relates to broader notions of citizenship. It defines digital citizens as those who use the Internet regularly and effectively. It argues that digital citizenship promotes social inclusion and participation in society. The document examines how Internet use relates to three traditions of U.S. citizenship: liberalism and economic opportunity, civic republicanism and political participation, and ascriptive hierarchy and social inequality. It presents new evidence that Internet use increases civic engagement, political participation, and economic outcomes like income. The document argues that digital citizenship represents an individual's capacity to participate in the modern information society.
This study examines a phenomenon called the "informatics moment" that occurs when library patrons seek help using new digital technologies, such as computers or the internet, at public libraries. The study identifies four types of literacy involved in these moments: basic literacy, computer literacy, library literacy, and domain literacy, which is most commonly related to job searches. These informatics moments provide opportunities to understand how social capital, such as help from familiar people, can help individuals and societies transition to the digital age by overcoming barriers. The study aims to understand both the informatics moment itself and how social capital affects the process and outcomes of these help-seeking interactions.
This document discusses the role of humans in analyzing big data, noting that while data is abundant, humans are needed to make sense of patterns and provide useful insights. It introduces Lola Chen, who is able to identify patterns of pothole problems across Chicago streets through close observation, whereas analyzing large amounts of road data would take much longer. The document lists the contributors and software used to create it.
User research was conducted to evaluate a proposed new design for the BIS website and inform its optimal information architecture. Methods included workshops and one-on-one sessions testing an interactive prototype. Key findings were that the top-level navigation works well but the scope and purpose of BIS is unclear. Users expect to easily find the latest updates and news on the homepage as well as information clearly defining each department's mission and actions. The classification of policies requires clarification as regulations are sometimes difficult to locate.
Search engines and digital libraries both provide search capabilities but work differently:
- Search engines use crawlers to index the web and return keyword search results, while digital libraries provide access to structured collections of digitized materials from libraries and archives.
- Both have limitations in coverage, and searching must be done individually in different databases within digital libraries rather than via federated search.
- It is important for users to understand how each system works, what is included in their indexes, and how results may be influenced by business models, sponsorship, or other factors to get the most relevant information for their needs.
Wookey Search Technology Corporation (WSTC) provides a summary of recent developments and future plans. Key points include: the engineering team has experience developing large-scale systems and social media products; research and development plans include Phase II development milestones to improve the user interface and search experience; post-Phase II strategies involve adoption through content providers and monetization through mobile/web views and partnerships; the exit strategy involves a reverse merger that would provide liquidity for shareholders by converting their shares to shares of the public company.
“Youth-led Tech | Summer 2015” is a technology mentoring program in five Chicago neighborhoods: Austin, Englewood, Humboldt Park, North Lawndale, and Roseland. As part of this program, we’re teaching various classes on digital skills. We’ve open sourced our curriculum through a series of blog posts.
We cover an introductions to WordPress, Wordpress dashboards, themes, how to post, and how to add media to your WordPress site. We also have set time aside each day for students to work on their typing skills.
These are minute-by-minute guides on teaching the youth. If you want to start your own Youth-Led Tech program, this is the place to start. At Smart Chicago, we are dedicated to sharing all of our methods. Not just code published to Github (though we do that, too), but whole swaths of templates, resources, and guides that help spread the practice of community technology.
This document discusses the concept of "digital citizenship" and how it relates to broader notions of citizenship. It defines digital citizens as those who use the Internet regularly and effectively. It argues that digital citizenship promotes social inclusion and participation in society. The document examines how Internet use relates to three traditions of U.S. citizenship: liberalism and economic opportunity, civic republicanism and political participation, and ascriptive hierarchy and social inequality. It presents new evidence that Internet use increases civic engagement, political participation, and economic outcomes like income. The document argues that digital citizenship represents an individual's capacity to participate in the modern information society.
This study examines a phenomenon called the "informatics moment" that occurs when library patrons seek help using new digital technologies, such as computers or the internet, at public libraries. The study identifies four types of literacy involved in these moments: basic literacy, computer literacy, library literacy, and domain literacy, which is most commonly related to job searches. These informatics moments provide opportunities to understand how social capital, such as help from familiar people, can help individuals and societies transition to the digital age by overcoming barriers. The study aims to understand both the informatics moment itself and how social capital affects the process and outcomes of these help-seeking interactions.
This document discusses the role of humans in analyzing big data, noting that while data is abundant, humans are needed to make sense of patterns and provide useful insights. It introduces Lola Chen, who is able to identify patterns of pothole problems across Chicago streets through close observation, whereas analyzing large amounts of road data would take much longer. The document lists the contributors and software used to create it.
This document outlines a technology plan for the City of Chicago with the goal of making the city fueled by technology. It lays out five strategies: 1) Establishing next-generation infrastructure to enable digital connectivity, 2) Ensuring full participation in the digital economy through training and engagement, 3) Leveraging data and technology to improve government efficiency and transparency, 4) Encouraging civic innovation, and 5) Supporting technology sector growth. The plan aims to accelerate economic growth, improve quality of life, engage residents, and position Chicago as a leader in technology.
“Youth-led Tech | Summer 2015” is a technology mentoring program in five Chicago neighborhoods: Austin, Englewood, Humboldt Park, North Lawndale, and Roseland. As part of this program, we’re teaching various classes on digital skills. We’ve open sourced our curriculum through a series of blog posts.
We cover an introductions to WordPress, Wordpress dashboards, themes, how to post, and how to add media to your WordPress site. We also have set time aside each day for students to work on their typing skills.
These are minute-by-minute guides on teaching the youth. If you want to start your own Youth-Led Tech program, this is the place to start. At Smart Chicago, we are dedicated to sharing all of our methods. Not just code published to Github (though we do that, too), but whole swaths of templates, resources, and guides that help spread the practice of community technology.
The document provides an outline for a one-day youth technology curriculum on WordPress. The day includes icebreakers, team-building exercises, an introduction to WordPress, and goal-setting activities. It outlines the schedule, materials needed, and step-by-step instructions for each activity. The curriculum aims to develop both technical skills in WordPress and leadership skills in students.
In Module 1, you will learn the basics of searching government websites that will prepare you to perform civic engagement activities. In addition, you will learn to search the websites to get information about services and other information you may need. Community organizations often need to know how to search government websites for information and/or data on community issues. Upon completion of this module, you will be able to:
Define civic engagement.
Search the City of Chicago website for information.
Review school report data on the Illinois State Board of Education website.
Access election results.
Use CPD CLEARMAP to access neighborhood reported crime data.
Search the Cook County website for healthcare service information.
Use CTA Bus Tracker to determine bus arrival times for specific bus stops.
This is a great primer for any municipality, community foundation, nonprofit, and/or civic tech outfit that is interested in replicating the Smart Chicago model.
This document discusses working with tables and templates in LibreOffice. It provides information on creating and formatting tables, including adding borders, backgrounds, headers and footers. Templates are described as models used to create other documents. The document outlines how to create, edit, import, export and organize templates using the template management dialog box. Templates can be saved, installed from other sources, and deleted.
Presentation and meeting guide for the first Connect Chicago Digital Skills Road Map Working Group hosted at the Chicago Community Trust on September 9, 2016. This working group formed out of conversations from the Connect Chicago Meetup events. Find out more about the Meetup at http://meetup.com/connectchicago
This session is designed specifically for the Digital Inclusion Fellows, though other NTC attendees are welcome to attend.
Scaling pilot programs and transitioning responsibility from one person, team, or department to another requires intentional documentation, training, and sharing. This session will address how to successfully prepare a program to undergo change, so that work in progress continues and lessons learned support future expansion.
http://www.nten.org/session/digital-inclusion-program-sustainability-documenting-lessons-sharing-successes-and-transitioning-work/
1) The document provides instructions for putting together and presenting a slide show in LibreOffice Impress, including how to set up slide transitions and animations, customize a slide show, and use the Presenter Console.
2) Basic settings for a slide show include the starting slide, slide advancement, presentation type, and pointer options. Slides can also be hidden or arranged in a custom order.
3) Animation effects are applied to individual elements on slides and can be customized for effects, timing, and properties. The Presenter Console provides extra controls for slide shows.
The emergence of social media means a new and different way for people to contribute digital content. Likewise, it means we need new ways to search for and find this new content. The big search engines don't necessarily focus on finding this content. This session will provide an overview of some search engines that help you find information in the social media. At the end of this session, you should be able to:
Understand why we want to search and participate in the social media
Understand what types of search engines are available on the public Internet that allow you to search social content.
About Bill Chamberlin
Bill is a 30 year veteran of IBM spanning a career in both Sales and Marketing. He has spent the last 16 years in IBM's Market Insights organization supporting IBM Marketing and Strategy professionals. He currently works as a Principal Consultant Analyst on a small team focused on helping IBMers develop social media marketing strategies. Bill is also a community leader, having built and managed the 1900 member HorizonWatch community within IBM since 2001. He is very active in the social media blogging and tweeting under the HorizonWatching brand name. Bill received his MBA in 1995 from the Kellogg Graduate School of Management and has lived in the Chicagoland area his entire life.
This document provides an overview of various online research tools and strategies that can be used beyond just Google. It discusses topics like Web 2.0, social bookmarking, tagging, blogs, wikis, RSS feeds, and open access resources. It also provides tips on developing search strategies, using Boolean logic operators, and evaluating online information sources. The document aims to help researchers efficiently find and organize information from the abundant resources available on the internet.
NYC UXPA: 2014 - Bringing Together User Experience and Web Analytics (Michael...NYCUXPA
The document discusses how web analytics can be used to enhance user experience (UX) design. It explains that web analytics provides data on real user behavior that can help UX designers answer complex questions and give context to usability findings. The document also outlines how web analytics data can be used to understand problems on existing sites, measure the success of new designs, and speak to business stakeholders. Finally, it provides guidance for UX professionals who want to get started with web analytics, such as getting access to tools, asking questions to solve real problems, and learning from others in their organization who use these tools.
This document discusses Web 2.0 and its implications for libraries. It begins by defining Web 2.0 as the next generation of the internet that allows for two-way communication rather than just static websites. Examples of Web 2.0 tools include social networking sites, photo sharing, wikis, and podcasts. For libraries, Web 2.0 allows for more interactive collections and services focused on information sharing rather than just access. Challenges include resistance to change, funding, and copyright issues. A social media policy is recommended to guide appropriate use of these new technologies.
CC BY license implementation deep dive (OPEN Kick-off)Jane Park
Session description from http://open4us.org/events/kick-off-conference-agenda/:
This session will dive into detail about the CC BY licensing requirement and what it takes to implement the license when hosting content on individual and external platforms. CC staff will go over the license metadata, examples of good implementation, and OER platforms where you can host resources under the CC BY license. We will also demonstrate tools and sites to find existing CC BY or otherwise licensed OER for your project. (SBCTC will share their stories, ie. around Open Course Library.)
This document provides information about using Squidoo.com to market and promote websites. It discusses what Squidoo is as a Web 2.0 site that allows users to create "lens pages" on topics they are passionate about. The document then covers how to set up a lens page on Squidoo, including using their automated wizard. It also discusses how Squidoo differs from traditional content sites by focusing on pointing users to external information rather than hosting full content. The document outlines several ways users can make money using Squidoo, such as gaining backlinks, increasing search engine rankings, building email lists, and promoting affiliate programs. It emphasizes setting up lenses with relevant content in popular niches to best promote products and
This document provides an overview of various Web 2.0 tools and how they can help teachers be better educators in the 21st century. It discusses tools for blogging, wikis, social bookmarking, photos, drawings, presentations, and more. Survey data is presented showing students want schools to better prepare them with technology skills and that many tools they use outside of school are being restricted inside school.
This document provides an overview of social media and how to develop an effective social media strategy. It defines social media and the differences between Web 1.0 and Web 2.0. Popular social media tools are described like blogs, microblogging, online platforms, Facebook, SlideShare, bookmarks, and strategies for developing a social media presence, evaluating success, and safety tips. Resources for further information are also included. The document aims to educate about using social media for knowledge mobilization.
Heuristic website review: It's your website. But it's your members' experience.Ray van Hilst
Have you taken a fresh look at your association's website lately? Could YOU use your website as a member? Is it putting your best foot forward to meet member needs through web usability best practices? In this highly interactive session, usability and communications experts will guide you through the process of conducting an independent heuristic website review and how to make improvements that reduce frustration, increase engagement, and advance your goals. You’ll learn how to conduct a website review including user behavior, web usability, conversion, messaging, and content best practices viewed through modern web principles to walk away with an action plan to for their own site.
This document outlines a technology plan for the City of Chicago with the goal of making the city fueled by technology. It lays out five strategies: 1) Establishing next-generation infrastructure to enable digital connectivity, 2) Ensuring full participation in the digital economy through training and engagement, 3) Leveraging data and technology to improve government efficiency and transparency, 4) Encouraging civic innovation, and 5) Supporting technology sector growth. The plan aims to accelerate economic growth, improve quality of life, engage residents, and position Chicago as a leader in technology.
“Youth-led Tech | Summer 2015” is a technology mentoring program in five Chicago neighborhoods: Austin, Englewood, Humboldt Park, North Lawndale, and Roseland. As part of this program, we’re teaching various classes on digital skills. We’ve open sourced our curriculum through a series of blog posts.
We cover an introductions to WordPress, Wordpress dashboards, themes, how to post, and how to add media to your WordPress site. We also have set time aside each day for students to work on their typing skills.
These are minute-by-minute guides on teaching the youth. If you want to start your own Youth-Led Tech program, this is the place to start. At Smart Chicago, we are dedicated to sharing all of our methods. Not just code published to Github (though we do that, too), but whole swaths of templates, resources, and guides that help spread the practice of community technology.
The document provides an outline for a one-day youth technology curriculum on WordPress. The day includes icebreakers, team-building exercises, an introduction to WordPress, and goal-setting activities. It outlines the schedule, materials needed, and step-by-step instructions for each activity. The curriculum aims to develop both technical skills in WordPress and leadership skills in students.
In Module 1, you will learn the basics of searching government websites that will prepare you to perform civic engagement activities. In addition, you will learn to search the websites to get information about services and other information you may need. Community organizations often need to know how to search government websites for information and/or data on community issues. Upon completion of this module, you will be able to:
Define civic engagement.
Search the City of Chicago website for information.
Review school report data on the Illinois State Board of Education website.
Access election results.
Use CPD CLEARMAP to access neighborhood reported crime data.
Search the Cook County website for healthcare service information.
Use CTA Bus Tracker to determine bus arrival times for specific bus stops.
This is a great primer for any municipality, community foundation, nonprofit, and/or civic tech outfit that is interested in replicating the Smart Chicago model.
This document discusses working with tables and templates in LibreOffice. It provides information on creating and formatting tables, including adding borders, backgrounds, headers and footers. Templates are described as models used to create other documents. The document outlines how to create, edit, import, export and organize templates using the template management dialog box. Templates can be saved, installed from other sources, and deleted.
Presentation and meeting guide for the first Connect Chicago Digital Skills Road Map Working Group hosted at the Chicago Community Trust on September 9, 2016. This working group formed out of conversations from the Connect Chicago Meetup events. Find out more about the Meetup at http://meetup.com/connectchicago
This session is designed specifically for the Digital Inclusion Fellows, though other NTC attendees are welcome to attend.
Scaling pilot programs and transitioning responsibility from one person, team, or department to another requires intentional documentation, training, and sharing. This session will address how to successfully prepare a program to undergo change, so that work in progress continues and lessons learned support future expansion.
http://www.nten.org/session/digital-inclusion-program-sustainability-documenting-lessons-sharing-successes-and-transitioning-work/
1) The document provides instructions for putting together and presenting a slide show in LibreOffice Impress, including how to set up slide transitions and animations, customize a slide show, and use the Presenter Console.
2) Basic settings for a slide show include the starting slide, slide advancement, presentation type, and pointer options. Slides can also be hidden or arranged in a custom order.
3) Animation effects are applied to individual elements on slides and can be customized for effects, timing, and properties. The Presenter Console provides extra controls for slide shows.
The emergence of social media means a new and different way for people to contribute digital content. Likewise, it means we need new ways to search for and find this new content. The big search engines don't necessarily focus on finding this content. This session will provide an overview of some search engines that help you find information in the social media. At the end of this session, you should be able to:
Understand why we want to search and participate in the social media
Understand what types of search engines are available on the public Internet that allow you to search social content.
About Bill Chamberlin
Bill is a 30 year veteran of IBM spanning a career in both Sales and Marketing. He has spent the last 16 years in IBM's Market Insights organization supporting IBM Marketing and Strategy professionals. He currently works as a Principal Consultant Analyst on a small team focused on helping IBMers develop social media marketing strategies. Bill is also a community leader, having built and managed the 1900 member HorizonWatch community within IBM since 2001. He is very active in the social media blogging and tweeting under the HorizonWatching brand name. Bill received his MBA in 1995 from the Kellogg Graduate School of Management and has lived in the Chicagoland area his entire life.
This document provides an overview of various online research tools and strategies that can be used beyond just Google. It discusses topics like Web 2.0, social bookmarking, tagging, blogs, wikis, RSS feeds, and open access resources. It also provides tips on developing search strategies, using Boolean logic operators, and evaluating online information sources. The document aims to help researchers efficiently find and organize information from the abundant resources available on the internet.
NYC UXPA: 2014 - Bringing Together User Experience and Web Analytics (Michael...NYCUXPA
The document discusses how web analytics can be used to enhance user experience (UX) design. It explains that web analytics provides data on real user behavior that can help UX designers answer complex questions and give context to usability findings. The document also outlines how web analytics data can be used to understand problems on existing sites, measure the success of new designs, and speak to business stakeholders. Finally, it provides guidance for UX professionals who want to get started with web analytics, such as getting access to tools, asking questions to solve real problems, and learning from others in their organization who use these tools.
This document discusses Web 2.0 and its implications for libraries. It begins by defining Web 2.0 as the next generation of the internet that allows for two-way communication rather than just static websites. Examples of Web 2.0 tools include social networking sites, photo sharing, wikis, and podcasts. For libraries, Web 2.0 allows for more interactive collections and services focused on information sharing rather than just access. Challenges include resistance to change, funding, and copyright issues. A social media policy is recommended to guide appropriate use of these new technologies.
CC BY license implementation deep dive (OPEN Kick-off)Jane Park
Session description from http://open4us.org/events/kick-off-conference-agenda/:
This session will dive into detail about the CC BY licensing requirement and what it takes to implement the license when hosting content on individual and external platforms. CC staff will go over the license metadata, examples of good implementation, and OER platforms where you can host resources under the CC BY license. We will also demonstrate tools and sites to find existing CC BY or otherwise licensed OER for your project. (SBCTC will share their stories, ie. around Open Course Library.)
This document provides information about using Squidoo.com to market and promote websites. It discusses what Squidoo is as a Web 2.0 site that allows users to create "lens pages" on topics they are passionate about. The document then covers how to set up a lens page on Squidoo, including using their automated wizard. It also discusses how Squidoo differs from traditional content sites by focusing on pointing users to external information rather than hosting full content. The document outlines several ways users can make money using Squidoo, such as gaining backlinks, increasing search engine rankings, building email lists, and promoting affiliate programs. It emphasizes setting up lenses with relevant content in popular niches to best promote products and
This document provides an overview of various Web 2.0 tools and how they can help teachers be better educators in the 21st century. It discusses tools for blogging, wikis, social bookmarking, photos, drawings, presentations, and more. Survey data is presented showing students want schools to better prepare them with technology skills and that many tools they use outside of school are being restricted inside school.
This document provides an overview of social media and how to develop an effective social media strategy. It defines social media and the differences between Web 1.0 and Web 2.0. Popular social media tools are described like blogs, microblogging, online platforms, Facebook, SlideShare, bookmarks, and strategies for developing a social media presence, evaluating success, and safety tips. Resources for further information are also included. The document aims to educate about using social media for knowledge mobilization.
Heuristic website review: It's your website. But it's your members' experience.Ray van Hilst
Have you taken a fresh look at your association's website lately? Could YOU use your website as a member? Is it putting your best foot forward to meet member needs through web usability best practices? In this highly interactive session, usability and communications experts will guide you through the process of conducting an independent heuristic website review and how to make improvements that reduce frustration, increase engagement, and advance your goals. You’ll learn how to conduct a website review including user behavior, web usability, conversion, messaging, and content best practices viewed through modern web principles to walk away with an action plan to for their own site.
From our Future of Content Strategy: Accessible, Personalised and SEO Friendly webinar on February 11th 2021.
Discover the Cyber-Duck way for establishing a future-proof content strategy that works at scale.
This document provides information about a group project on understanding the role of internet and interactive media in integrated marketing communications. It lists the group members and five learning objectives, which cover understanding the role of internet in IMC programs, uses of web 1.0 and 2.0 platforms, evaluating communication effectiveness, and advantages/disadvantages of internet and additional online media.
What is Web 2.0 and how can it be of use to those working in international development communications? This e-tutorial gives a basic introduction to Web 2.0 and its potential. It contains examples of how development communicators have used web 2.0, and provides examples of appropriate web 2.0 tools and services.Each slide in this PowerPoint e-tutorial is supported by notes that are intended to be read in conjunction with the slides.
The document discusses various components of Web 2.0 and social media that are relevant for B2B marketers, including blogs, RSS, social networking sites, podcasts, videos, wikis, and software as a service. It provides examples and recommendations for how to utilize these channels for marketing purposes, highlighting benefits like SEO, building communities, and viral marketing. The key takeaway is that B2B companies should engage with various social media to find and convert leads on the web.
The document provides an overview of social media and various social media tools for collaboration. It defines social media and discusses the differences between Web 1.0 and Web 2.0. It then outlines several popular social media tools, including blogs, microblogs, collaborative platforms, social bookmarking, and tips for using social media effectively. Additional online resources are also listed.
Creative Commons and the Department of Labor US$2 Billion Grant ProgramCable Green
The document discusses the Open Professionals Education Network (OPEN) which will provide services to support Department of Labor TAACCCT grantees in meeting grant requirements. OPEN will help grantees license work created with grant funds under a Creative Commons license, apply learning science principles to develop open educational resources, and provide professional development opportunities regarding open policies and content development. The timeline indicates that Wave 1 of TAACCCT grants was launched in February 2014 and the OPEN kick-off event was in May 2014, with each grant wave lasting three years.
This document provides an overview of social media and how to develop an effective social media strategy. It defines social media and the differences between Web 1.0 and Web 2.0. Popular social media tools are described such as blogs, microblogging, online platforms, Facebook, SlideShare, bookmarks, and developing a strategy. Tips are provided for each tool and safety measures are discussed. Resources for further information are listed. The presentation aims to educate about using social media for knowledge mobilization.
The book summarizes the Chicago School of Data project which included a scan of our local data ecosystem from 2013 - 2014 and a convening we built on top of that scan. Typical with other Smart Chicago projects like CUTGroup and the Array of Things Civic Engagement Project, we also included “meta” sections in the Chicago School of Data book — specific details about how we executed our projects, what tools we used, and the logic or guiding principles behind our program design decisions.
http://www.chicagoschoolofdata.com/
You're invited to a presentation + community conversation about putting urban sensors to use for the public good. Join the operators of the Array of Things project to learn more about their urban sensors, how they can be used, and how they can be put to use to help measure or solve neighborhood challenges like air quality, noise pollution, etc. Learn more about Array of Things at arrayofthings.org
This curriculum, tailored to senior learners and set up for turn-key use for digital trainers, is an introduction to online safety and security. The curriculum overviews information about scams and give tips for how to avoid them.
This document layouts out an introduction to Microsoft's DigiSeniors Curriculum and gives information to prospective instructors/trainers for how to leverage it in their classrooms.
You’re Invited to a Community Technology Forum at the Windsor Park Lutheran Church!
When: Saturday, May 20, 2017 from 1pm – 4pm
Where: 2619 E 76th St.
What: Join community members and local advocates for a civic conversation about the technology in South Shore. What do you love about your community and what is working well? ¿Qué te gusta de tu comunidad? What technology resources do you use a lot and appreciate? ¿Qué recursos tecnológicos utiliza mucho y aprecia? You’re invited to share your ideas and help design solutions that leverage what works to improve what doesn't. This Community Technology Forum is hosted at the Windsor Park Lutheran Church in partnership with DePaul University, the Smart Chicago Collaborative & Connect Chicago. Lunch & refreshments will be provided! Sign up for more information and RSVP at bit.ly/chitechforum2.
The Juvenile Expungement Help Desk provides assistance expunging (erasing) juvenile arrest and delinquency records from law enforcement and court records. To receive help, individuals should visit the Cook County Juvenile Court Center Monday through Friday between 9 AM and 4 PM with their juvenile arrest record and a photo ID. Staff will assist with obtaining arrest records and filling out forms to waive any fees. Without fee waivers, there is a $64 filing fee per petition and a $60 expungement fee. Applicants must be at least 18 years old and have no open juvenile cases to be eligible for expungement.
For the 28th Civic User Testing Group (CUTGroup) test, Smart Chicago Collaborative tested the redesigned homepage of the City of Chicago’s Open Data Portal. The Open Data Portal allows users to find resources and various datasets regarding the city of Chicago. The City of Chicago Department of Innovation and Technology is working with Socrata to redesign the Open Data Portal, focused currently on the homepage, to be more user-friendly while representing multiple data and technology initiatives and applications created with open data.
This document summarizes a meeting about juvenile expungement held on November 30, 2016. It provided information on juvenile expungement processes and resources in Illinois. The meeting agenda included introductions from Mikva Challenge and a youth council, an explanation of the juvenile expungement process from LAF attorneys, and a question and answer session. Key points included that juvenile records can create barriers to employment, housing and education, eligibility requirements for expungement, and common misconceptions about juvenile records. Attendees were encouraged to help spread awareness and host expungement clinics in their communities to increase access to legal resources.
On Monday, November 7, 2016, Smart Chicago Collaborative held the first CUTGroup Collective Community call. The goal of the CUTGroup Collective is to convene organizations and institutions in cities to help others establish new CUTGroups, create a new community, and share and learn from one another. For our first community call, we want to highlight CUTGroup Detroit’s story. Over the last few months, a collaboration across multiple entities invested in Detroit– the City of Detroit, Data Driven Detroit, and Microsoft– recruited for and conducted their first CUTGroup test. On our first call, the team involved will talk about their successes and challenges in building CUTGroup Detroit.
Slides were created by the CUTGroup Detroit team, which includes the City of Detroit, Data Driven Detroit, and Microsoft.
For our twenty-fourth Civic User Testing Group (CUTGroup) session, we tested OpenGrid– an open-source interface developed by the City of Chicago that allows residents to search for, interact with and visualize City of Chicago’s datasets.
This document introduces staff members for various youth programs in different Chicago communities. It provides brief biographies for each staff member, including their name, background, interests and a quote. The staff members include instructors and assistant instructors for programs related to technology, arts, education and community development.
The document describes various user interface components for a mobile app about hip hop history, including labels for the app name, genre, location, and year. It also includes a play button to play audio and images, vertical and horizontal arrangements to layout the components, a web viewer to display a map, and a slider and media player. The components are configured with properties like text, colors, sizes, and positions to display the appropriate information and interactivity for learning about the genres, locations, and years of hip hop history.
This document provides instructions and space for a student to write down goals for their adult life, by the end of high school, and by the end of the current school year. For each goal, the student is asked to identify 3 steps they can take to achieve that goal. Filling out this organizer is meant to help the student with goal setting and planning steps to work towards different goals over different time periods.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
6. The Research Process
How Do You Approach Online Research?
Managing your research time wisely means developing a research
plan/preparation. Before you begin your research efforts answer
a few important questions. Are you looking for:
• Government, business, trade, education or community
material?
• Very current material or is information from many years
ago and historical information appropriate?
• Introductory material or more advanced material that
assume the readers familiarity with the subject?
• A good but basic overview or an exhaustive search of
everything written on the subject?
• The complete text or content of articles or just the
summaries?
• Material that is readily available to public search engines
or limited to trade or limited access resources?
• Statistics, tables, graphs or images?
• Materials in specific languages or from other countries of
origin?
• Newspaper articles, video feeds and press releases?
• Social media sources, chat rooms, blogs and microblogs?
The answers to questions like these will allow you to understand
how to structure your search efforts and how to select the most
appropriate key words and phrases to produce the best search
results.
However, even the best formulated search plan will not work
everywhere or every time. Therefore managing your research
time wisely may also mean revising your search plan when your
needs don’t get met.
6 Civic 2.0 Instructor Guide
12. • Spiders are often unable to read information on a site
when the format of the information is unfamiliar, (tables,
charts, graphs, images, audio and more)
• Most spiders cannot gain access to social networking sites,
many blogs and microblogs, collaborative sites and forums
• Spiders cannot gain access to restricted, membership and
fee-based websites. For example, since most of the articles
from professional and trade literature must be purchased,
they are only accessible through Gated Web or Online
Professional Service sources.
The Three “R’s”
Retrieval and Relevance Ranking
When you enter key words into a search engine, its retrieval
software evaluates your input and determines, the best way to
process your search.
The retrieval software determines whether all of the words, most
of the words, or any one word has to appear on a webpage and
what special instructions must be considered before that page is
retrieved. It recognizes words that are uncommon and might be
more important to your search. The software then compares this
information with the search engines index database and locates
entries that match your search. Now that the search engine has
located all of the indexed entries that match your search, it must
present this bulk information to you in a manner that is effectively
organized.
During the relevance ranking process the search engine uses
another algorithm to sort the retrieved information, often tens
of thousands of website listings, so that the ones it has
determined to be of the most value appear at the top of its list
of results.
Since search engines do not disclose the details of their relevance-
ranking process, no two search engines will retrieve and display
the same search results in the same order.
12 Civic 2.0 Instructor Guide
Once you have
entered your key
words… retrieval
software analyzes
your input and
figures out how to
process your search
14. Exercise 1 - The Results
The results for Exercise 1 yielded more than 2.5 million results.
Most researchers will not allow this much flexibility within their
searches. Let’s find out how researchers use Boolean Logic and
other advanced search tools to limit their search results…
Option #2 – Boolean Logic Search
There are no search rules that all search engines follow when
presented with multiple words in your simplified key word
search.
When you enter the words, “teenagers nutrition”, in your key
word search, it might be interpreted as teenagers and nutrition;
or as teenagers OR nutrition. It might even be processed as the
exact phrase teenagers nutrition. To clarify your meaning and to
reduce the chances of getting the wrong results, some search
engines and all professional online services allow you to narrow
your search by performing a Boolean Search.
Boolean logic places operators such as AND, OR, and NOT,
between keywords or data to narrow the results of a key word
search. For example, using AND between two keywords in a
search retrieves information that only shows both keywords on
the same webpage or within the same document.
14 Civic 2.0 Instructor Guide
16. This Venn diagram on the previous page shows:
• The intersection of sets "A AND B" (only the central space
shared by both circles),
• The union of sets "A OR B" (all circles),
• The exclusive NOT case "set A NOT B" (all except the
central space shared by both circles).
The "universe of information" is represented by all the area
composed of both circles
Exercise 2
Use Boolean logic in the following scenario to narrow down the
results from your search results from Exercise 1:
16 Civic 2.0 Instructor Guide
In this scenario, you are looking for information on nutrition
for teenagers. Use the following operators in three Boolean
searches:
AND – finds all pages containing both of the specified
words or phrases: teenagers and nutrition
OR – finds pages containing at least one of the
specified words or phrases: teenagers or nutrition
NOT – finds pages that have none of the specified
words or phrases: teenagers not nutrition
Go to your search engine (www.google.com) and enter your
Boolean searches. Write down how many items appear in
your search results this time.
Careful! Your operators must be entered in capital letters as
shown above
18. 4. Proximity Searching - Instructs retrieval software to look for
pages where key words appear in the same sentence.
Example: teenage same nutrition
This limitation instructs retrieval software to look for these
words within (x) words of each other and only in this order.
Example: teenage near5 nutrition
5. Wildcard - In some search engines this power tool uses the
asterisk to fill in the blanks between two words in a phrase or
string of words.
Example: Entering teenage * issues in * Illinois will return
pages with phrases or word strings that replace the asterisks
accordingly like teenage nutrition issues in Chicago Illinois.
6. Truncation - This power tool typically found in professional
online services uses the asterisk to look for any words that
begin with the truncated letters.
Example: Entering teen* will return pages with teen, teenage
and teenager.
7. Nested Logic - This complex Boolean logic instructs the search
engine to combine more than one of the power tools listed
above or others into the same key word search.
Language Filter - This instruction limits searches to records
written in the specified language.
8. URL, Site and Domain Searching - Limits the search engine
efforts to a specific URL, site or domain resulting in a complete
search of the selected location
9. File Type - This filter allows the researcher to identify the
types of file formats that should be searched
Example: .pdf, .ppt, .doc, .rtf and more.
10. Region - This instruction limits searches to records originating
in the specified region or country.
The screen capture on the following page illustrates some of
these advanced searching and power tools.
18 Civic 2.0 Instructor Guide
Get in the habit of
trying your searches
in both the basic and
advanced versions
and you will begin to
understand which
searches work well
with which search
tools
20. Exercise 3
Use Advanced Search power tools in the following scenario to
narrow down the search results again:
20 Civic 2.0 Instructor Guide
In this scenario, you are looking for information on nutrition
for teenagers again, but only in the titles of the materials
indexed.
Go to your search engine (www.google.com) and click on the
Advanced Search button next to the Key Word search field.
1. Enter teenage AND nutrition in the correct Boolean field.
2. Next, click the (+) to expand the ‘Date, usage rights…’
section of the form.
3. Click the drop down box in the ‘Where your keywords
show up field ‘to display options.
4. Select the ‘in the title of the page’ option and click on
Advanced Search to begin your first power tool search.
Write down how many items appear in your search results
this time.
Careful! Your operators must be entered in capital letters as
shown above
22. TThe MagPortal search engine allows sorting by relevance, date
the article appeared online, topic, or publication. Searches can be
confined to a specific topic or publication. Articles remain in the
index indefinitely.
One of the major drawbacks for using Open Web Directories is
that they do not offer the search option Power Tools that are
available from more popular search engines.
How Credible Are Your Search Results ?
Look at the URL address of the website. The URL address starts
with http://. Addresses ending in .gov, .us and .(STATE
ABBREVIATION) are reliable.
All other endings will require more investigation to know if they
are credible or not:
1. URL addresses that contain tildes (~) usually mean that an
individual published the site. Individual publishers unaffiliated
with a credible corporation can have their own agendas. These
sites may not have the most credible information.
2. Check the publishing date. Obviously, Internet pages that have
been published more recently are more credible.
3. Figure out the site's purpose. Sites that are selling you
something or asking you to sign up for something may not be
presenting you with neutral, unbiased information.
4. Check out the contact information and resources. Credible
websites should list contact information and resources.
5. Decide if the article is describing facts or the author's
opinions. Statements that start with "I think" or "From my
experience" are not as reliable as those that begin with
"Experts recommend" or "Research proves."
6. Ask yourself whether or not the article has answered all of
your questions after you have finished reading it. If the article
still leaves you with questions, it may not be the most credible
source.
22 Civic 2.0 Instructor Guide
26. Assessment and Knowledge Check
Let’s see what you have learned! There are two assessments in
this chapter. They include:
1. Structuring Your Search for Excellent Results
2. Multiple Choice and True/False
Lesson One: Structuring Your Search for Excellent Results
Type of Searches Used / Results:
Question: Which search method do you prefer? Why?
26 Civic 2.0 Instructor Guide
Scenario: You are writing a report on poverty amongst
children in the U.S., particularly local to your area. Use the
different types of searches that have been covered to research
and collect data for your report. Detail below the searches
that you used and list some of your results.