Sunday, December 13, 2009

Yugatech Great Gadget Giveaway


It's Christmas time once again and one of the blogs that i religiously follow Yugatech, is giving away gadgets and other prizes for all of us!

Want to join? Check out the details below:

1) Blog about the “YugaTech Great Gadget Giveaway”. Include the photo I posted here and link to this contest page.

2) Don’t forget to include in your post the mechanics for the Twitter contest above.

3) Leave a comment here with the URL of your entry.

You could also join via twitter, here's how:

1) Follow @abeolandres and @talk2globe on Twitter.

2) Post a tweet “Just entered to win a Modu Phone. Quick! Go follow @abeolandres and @talk2globe and retweet: http://bit.ly/6e2q7O #thanks2yugatech”


Thanks to Abe, Globe and other sponsors for all this gadget giveaways! Goodluck Guys!

Friday, October 2, 2009

The Green Library Movement: an overview and beyond

Source: Antonelli, Monika. “The Green Library Movement: an overview and beyond” Electronic Green Journal vol. 1, issue : 2008. http://repositories.cdlib.org/cgi/viewcontent.cgi?article=1648&context=uclalib/egj

Abstract:

The article started with a basic definition of what is green and the meaning of sustainable. Various related-literatures about the topic were also presented as well as a detailed definition of Green Libraries. Also discussed in the article is the importance of building a green library. Several green library programs were enumerated as well as different green library associations. Lastly, future steps on greening the library were presented and a call for action was discussed.

3 Things That I Learned:

1. Building a green library is actually affordable and could be done using conventional budgets.
2. Through this article I learned a very detailed definition of Green Library.
3. Simple use of environmentally friendly cleaning products in your library is one step towards going green.

Reflections:

At this modern age where environmental challenges such as energy depletion, climate change, and global warming are rapidly ascending and doing damage, it is very important that various institutions in this case the library make proper steps and decisions to help lessen the effects of this environmental challenges. The future is really about “going green”, and together with other librarians and libraries as well as cities, towns, colleges, university campuses, students, and other individuals we should all commit in supporting this great environmental cause.

Friday, September 25, 2009

Computer Health Hazards

Source:
Chua, Philip C. “Computer Health Hazards.” Malaya 11 November 2001: 5. DVD

Abstract:
This newspaper article tackles the different health hazards that an individual might experience by using the computer for a long period of time. One specific health injury explained in the article is called Carpal Tunnel Syndrome, which is a condition linked to extensive computer (typing) job. Typical symptoms of the condition were enumerated as well as several techniques to avoid this computer related injury. The article also discusses some myths and fallacies on computer use, as well as social and intellectual effects of computers to individuals.

3 Things That I Learned:
1. I already heard about the Carpal Tunnel Syndrome in the past, but through this article I was able to learn more about this condition and also discover different techniques on how to avoid the problem.
2. That chronic exposure to computer will not lead to Cancer
3. That it is really possible for an individual to develop impatience if they are exposed to a computer while they are young or if they use it for a long period of time.

Reflections:
What is good about this week RA is that the learning focused more on the health aspect. Although the topic is still about Computers and Information Technology, it definitely benefited us more on our awareness to the various health problems related to prolonged use of computers. Like in our case as a Librarian, we are usually exposed in computers for possibly 6-8 hours per day or even longer. Through this article I become aware on how to evade the various computer-health related problems and cleared my mind on some computer myths and fallacies that have been surrounding us for a time now.

Friday, September 18, 2009

Courts Confront Admissibility of Text and Instant Messages

Source:
Stevenson, Karen L. "Courts Confront Admissibility of Text and Instant Messages." Litigation News 33.3 (Mar. 2008): 4-5. Academic Source Complete. EBSCO. [Library name], [City], [State abbreviation]. 17 Sep. 2009 .

Abstract:
The article discusses the admissibility of text and instant messages as electronic evidence in a number of court trials in the United States. The value of these evidences was discussed in the articles as well as the various problems on unreliability, type of format and ambiguity. A couple examples of court cases with Text and IM’s as electronic evidence were given. One case accepted the technologies as legal and right evidence due to its traceability element. The other case on the other hand found that the use of text and instant messaging as evidence was deemed unreliable since the implementation or use of these technologies can always be done anonymously. Lastly, the article explains how Litigators, Judges, Juries, and other Court Officials should learn the new trends in Technology and familiarize themselves on the different terms, definitions, functions, and operations involve.

3 Things That I Learned:
1.How the Judicial System taken in to account the importance of different technologies as evidence in many court trials. It is remarkable to see that they even made a published glossary guide of leading IT terms that will help Court Officials learn the leading and latest terms on technology.
2.The use of electronic evidence really depends on a case-by-case basis. It may be used in one trial but entirely not possible in another.
3.Was able to give me an update on the different factors of IM’s and text messages such as traceability, flexibility, how it can be done anonymously, etc.

Reflections:
Technology really has come a long way. Now it can be used as electronic evidence in different court cases. When it comes to the usage of these technologies in Court Trials, I definitely agree with what the article is saying, which is the “case-by-case basis”. Court Officials who has the greater knowledge on the law field should carefully examined the presence of these kinds of evidences and make sure that they are properly utilize. With the factors such as traceability, flexibility, anonymous sending, multiple usage, and ambiguity and confusion problems, the use of these electronic evidences can either lead to a fair judgment or totally screw things up.

Friday, September 11, 2009

Considering Open Source Software

Source:

Balas, Janet L. "Considering Open Source Software." Computers in Libraries 24.8 (Sep. 2004): 36-39. Education Research Complete. EBSCO. [Library name], [City], [State abbreviation]. 12 Sep. 2009 .

Abstract:
The Article discusses the definition of open access as well as the reasons why individuals should be interested with it. One place to learn about Open Source is through the Open Source Initiative Website. According to the article, OSI is a non-profit corporation dedicated to managing and promoting the Open Source definition. The article also discusses why Librarians and Libraries should consider adopting Open Source Software. Lastly, a discussion was given about using Open Source Software in Digital Libraries.

3 things that I learned
1. Learned additional knowledge on the definition of Open Source, particularly Open Source Software.
2. How Open Source Software can be used in Digital Libraries.
3. Learned the importance of WebJunction.

Reflections:

Reading the article just shows the great potential of Open Source Software. By merging Open Source Software with Open Standards and Open Access, it can actually create an application that can be used by Libraries or any other learning institutions. One example of this is the creation of a web compilation of Open Access Journals available in the Internet. Librarians can actually start by simply making web pages and adding the URL of Open Access Journals, from there he/she can actually utilize the potential of Open Standards and Open Source Software to create a hybrid web application that can serve as a platform to view the different Open Access Journals available in the Internet.

Friday, September 4, 2009

Field Trip to IRRI: a blow by blow account

As part of the requirement in our LIS 260 class, we were required to join the class field trip. Our main destination is the International Rice Research Institute (IRRI). The main goal of this trip is to experience how a library utilizes its Integrated Library System and also learn the various services, programs and activities of this chosen institution.

I was really excited for this trip since this will definitely be a learning experience and at the same time it is nice to at lease get a break from work and from usual day-to-day activities.

Here is a rundown on what happened the entire day:
• 5:00 am – Probably some of my classmates were already at the meeting place and some were already on their way. Unfortunately I was still lying on my bed…sleeping.
• 5:30 am – Got up from bed and immediately realize that the call time is 6:00 am. Had a quick bath, no more breakfast then off I go. My throat is really sore that morning so I needed to have a quick detour to the nearest drugstore in our area to buy some strepsils and water. I knew I will be late and was really nervous since it was clearly mentioned in class that if you are not at the meeting place by 6 am you will have to go by yourself to IRRI, and trust me I do not have any idea on how to go there.
• 6:10 am – Arrive at the meeting place, I was late but fortunately I was not the last one to arrive, which means I was safe.
• 6:20 am – 8:30 am (I think) – Travel time from Manila to Los Banos. We encountered heavy traffic along C5 road and SLEX, fortunately the endless “kwentos” that we shared during the ride was enough to divert my attention to almost 2 hours of travel time.
• 9:30 am – We arrived at IRRI and had a quick breakfast at their Cafeteria. Food was good and cheap in the pocket. There was a nice selection of meals and pastries to choose from. I ate their “pansit” and “pannacotta”, which is a custard-based dessert topped with blueberry jam. I was tempted to buy their sumptuous cake but we were in a hurry since our call time at the IRRI library is 10 am. Perhaps next-time.
• 10:00 am – We arrived at the IRRI library and was joyfully greeted by Mrs. Mila Ramos, the chief librarian. We were ushered at their conference place and the presentation/orientation about the IRRI library started. Ma’am Mila presented a short orientation of the Library, while Ms. Ems and Ms. Lea shared their knowledge on IRRI’s Integrated Library System and their various electronic resources collection.

Things that I learned:
1. The different features of the Millennium ILS.
2. The possibility of renewing a loaned book online.
3. Online recall notices of loaned library materials.
4. Use of Skype as a tool for Reference Service.
5. An example of a Document Delivery Service software (ARIEL)
6. Other titles of Open-Access Journals.

• 11:00 am – We were given a tour of the entire IRRI Library. Our class was divided in two, and our group was accompanied by Ms. Ems. In my opinion, the IRRI library was really a showcase library. Their facilities were really great and the way their arranged their furniture, library materials, and equipments was topnotch. One will definitely experience relax, quiet, and stimulating atmosphere inside the library.
• 11:30 am – Class pictures together with the IRRI staff. Special thanks to one of the staff of the library who graciously took the responsibility of acting as our photographer despite the extreme heat outside.
• 12:00 pm – We left IRRI and went to the “Kamayan sa Palaisdaan at they bay” for our well-deserved lunch.
• 12:30 pm – Eating time! Loads of “liempo” was delicious.
• 1:30 pm – We went to UP Los Banos DTRI to buy some dairy products. Their yogurt was cheap and delicious. We also took this opportunity to buy some Rambutans and Buko Pies to bring home to our respective families in Manila.
• 2:30 pm – We left Los Banos and heads back to Manila.
• 4:30 pm – We finally arrived at UP Diliman.

Learning new technologies on how library services can be greatly improved, getting the opportunity to experience hands-on was what presented in our previous class discussions such as web 2.0 applications, Information Retrieval, Integrated Library Systems, Multimedia materials, etc, and travelling along my classmates who I feel much more closer now, was really the best “pasalubong” that I received from this field trip.

Friday, August 14, 2009

The IFLA/UNESCO Internet Manifesto

Source:
IFLA Internet Manifesto: http://www.ifla.org/III/misc/internetmanif.htm

Abstract:

The IFLA Internet Manifesto establishes the principles of freedom of access to information via the Internet. It also aims to highlight the “unhindered” access to information in order to help individuals and communities to attain freedom, equality, global understanding and peace. This manifesto was made coherent to the Article 19 of the United Nations Universal Declaration of Human Rights, which states that “everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and idea through any media and regardless of frontiers”.

Things I learned:

1. As mentioned in the Manifesto, some of the information found in the Internet are incorrect, misleading and may be offensive. This statement has just made me realize how important the role of Librarians in this current age of information. One of our “many” jobs is to help in filtering and evaluating information.
2. Policies on access should accompany the implementation of this Manifesto.
3. Equality on the access to information should always be the main priority.

Reflections:

As part of the LIS 260 class, I think that reading through the IFLA Internet Manifesto brings back the issues, concerns, and past R.A topics that was discussed in our class. Nobody can disagree that access to information available in the Internet should be free, equal and unlimited. But as we look back on those issues discussed such as digital divide, the availability of open access, violations on the Intellectual Property code, presence of software piracy, etc it tells us that although access to information “should” be free and equal, in reality sometimes it is not. In my opinion, the IFLA Internet Manifesto serves as a reminder to us users of the Internet that it is our right and privilege to have an equal access to the available information in the Internet. However certain restrictions such as fee-based access, following the copyright law, the unethical use of pirated software, the economic gap problem, etc should be considered. We must remember that access to information in the Internet is free, the type and extent of access is always the problem.

Friday, August 7, 2009

open open Sesame or opening Pandora's Box?

Source:

Ojala, Marydee. "open open Sesame or opening Pandora's Box?." EContent 28.6 (June 2005): 30-35. Education Research Complete. EBSCO. [Library name], [City], [State abbreviation]. 6 Aug. 2009 http://search.ebscohost.com/login.aspx?direct=true&db=ehh&AN=17216644&loginpage=Login.asp&site=ehost-live&scope=site.

Abstract:
This article focuses on the various issues related to Open Access. Particularly, it discusses the various misconceptions and misunderstandings that surrounds the OA term. Users frequently assume that OA is similar to the concept of the Open Web, Open Source and Open Archive. However these terms are certainly different from the concept of Open Access. Another issue discussed in this article is whether Open Access points out either concepts of “Open Sesame” or Opening up Pandora’s Box. According to the article, it is “Open Sesame” since OA provides free scholarly articles to the research community and ordinary individuals, plus the idea of sharing is emphasized. However, the Open Access Initiative also brings out several economic and legal issues that may greatly affect the society. So in this case, it is like Opening up “Pandora’s box” and all unforeseen troubles will come out. Finally, since Open Access articles are sometimes difficult to search, this article suggested different searching tools such as Scirus, DOAJ, OAIster, Google Scholar, etc that will aid the individual in searching for free scholarly and peer-reviewed articles in the Internet.

Three things that I learned from this article:
1. Sometimes I also associate the Open Access term to Open Source and other related terms. This article served as a clearer of ambiguities and confusions about the definition and concept of OA.
2. Learned other searching tools that I can use to search and retrieve free full-text articles in the Internet.
3. The Open Access Initiative does not point out either “Open Sesame” or “Opening-up Pandora’s Box concepts. It actually points out both.

Reflections:
We all know that the concepts mentioned above both exist for Open Access. Certainly with the presence of Open Access Journals, the publishing industry would be affected since there would be fewer subscriptions to journals databases. As a librarians’ point of view however, I think that the economic and legal problems that might come out through the advent of Open Access should only be secondary. We must always remember the numerous advantages and benefits that OA is providing to the community. The issue on Digital Divide should always be considered. Like here in the Philippines, not all Libraries and Learning and Resource Centers have the capacity to subscribe to the high cost of journal databases offered by prominent publishers of scholarly content. Therefore, the access to various Open Access journals and databases should not be at all questioned.

Friday, July 24, 2009

Google Library Project: Following the Copyright Debate

4th Reading Assignment:

Kaushik, Anant, and Nishant Prakash.. "Google Library Project: Following the Copyright Debate." ICFAI Journal of Intellectual Property Rights 8.1 (Feb. 2009): 74-80. Academic Source Complete.
EBSCO. [Library name], [City], [State abbreviation]. 21 July 2009 http://search.ebscohost.com
/login.aspx?direct=true&db=s8h&AN=36350168&loginpage=Login.asp&site=ehostlive&scope=si te.

Abstract:

The Google Library Project is an effort by Google to scan and make the collection of several major libraries namely Harvard, Standford, Oxford, Michigan, and the New York Public Library searchable in the Internet. Bibliographic information will be available together with “snippets” which are few lines of the book in conjunction with the search query. Full-text of books out of copyright will also be available for free download. Unfortunately, due to the confidential nature of this project, Google was slapped with two copyright lawsuits. This article presents the background of the Project and checks the events that lead to the lawsuits filed against Google. The “fair use” doctrine along with the four non-exclusive factors is also discussed. This doctrine was the defense use by Google to counteract the copyright infringement claim against them. The Project’s Opt-Out Approach was also explained and some suggestions were given to highlight the importance of authors who are the main complainants of the project. Finally, it presents conclusion which directs on suggestions to further enhance the current copyright legislation.

Three things I learned:

1. I was able to be familiarized with the “fair use” doctrine and the four non-exclusive factors. Also through this article, I was able to learn additional information about the Copyright Law.

2. That the Google Library Project is an ambitious yet a very useful project. If ever this project pushes through I think it can be considered as a “Universal OPAC”.

3. Also discussed in the article are various cases on copyright infringement which is very similar to the case against Google. It is interesting to know about this cases and how they use the “fair use” doctrine as a defense against possible copyright infringement.

Reflections:

I believe that Google have clean intentions in creating this library project. Although there is no doubt that there would be financial gains through advertisements and sponsorships I think at the end of the day, of all this will be overshadowed by the help that this project will give to its potential users. In my opinion, this project should have not been filed with two lawsuits if Google did not use the Opt-Out approach. According to this approach, copyright holders included in the project shall notify Google if they do not want their work to be included in the project. We should remember how important royalties are to writers of copyrighted materials. By virtue of doing this type of approach as well as other vital reasons certainly legal actions would be filed.
Just an update, as of now the Google Library Project is still in its beta stage. Google is currently awaiting the verdict of the legislators on the cases filed against them.

Friday, July 17, 2009

Library 2.0 Theory: Web 2.0 and its Implications for Libraries

3rd Reading Assignment

Maness, Jack M. “Library 2.0 Theory: Web 2.0 and its Implications for Libraries” Webology
vol. 3, no. 2. 15 July 2009. http:www.webology.ir/2006/v3n2/a25.html.

Abstract:

The article introduces “Library 2.0” by providing a clarified definition and theory about the term, as well as discussing who coined it, how it evolved and its impact on the current and future practice of Librarianship. These data were also provided in order to eliminate the ambiguity about the term which was brought by various discussions that are often broad and extensive. Furthermore, in order to support the theory, different web technologies and applications such as synchronous messaging, blogs, wiki’s, streaming media, social networks, RSS feeds, and mashups are presented.

3 Things that I learned:

1.Because of this article, I have acquired a more in depth knowledge on Library 2.0.

2.Prior to reading this article I never knew that there is a social networking site called “LibraryThing”.

3.I learned new web technologies and applications such as Mashups and Tagging.

Reflections:

It was just fascinating to experience how the World Wide Web has evolved over the years, and how it continues to affect the different fields of study. In the case of Librarianship, we started automation by using the simple OPAC with limited features and capabilities. Now, we already have some OPAC using some web 2.0 technologies and applications. Change is never constant; it will come and should always be welcomed.

Friday, July 10, 2009

Hard Facts about Software Piracy

2nd reading assignment

Source:
Crittenden, William F., Christopher Robertson, and Victoria Crittenden. "Hard facts about software piracy." Business Strategy Review 18.4 (Winter2007): 30-33. Business Source Complete. EBSCO. [Library name], [City], [State abbreviation]. 10 July 2009 http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=27448322&loginpag e=Login.asp&site=ehost-live&scope=site.

Abstract:
This article discusses the growing problem of Intellectual Property on Computers, particularly focusing on Software Piracy. It also tackles the cost associated with piracy as well as identifying who does it the most and how this problem can be controlled. The different types of Software Piracy are discussed and a definition on the main topic is also presented. One of the highlights of the article is the discussion on “pirates versus buccaneers”. Software Piracy is definitely illegal and should not be tolerated in any ways. However “Buccaneers” or the supporters of the free era software movements believe on software sharing and the limitation of copyright protection. Legalities on software piracy are also discussed as well as the variation of piracy levels in different regions of the world. Finally, preventive measures such as legal actions, education programmes, copy protection techniques which can decrease software piracy are presented.

Things that I learned from the article:
1. That software piracy has different types.
2. That using pirated software increases risk of virus attacks and corruption
to computer system. Lack of technical support, warranties, and inadequate
documentation are also the drawbacks of using illegal software.
3. That not only economic factor increases the level of piracy in a country.
Culture should also be seen as one cause. According to the article, if people
around you use pirated software most likely you will also be using the same
software.
4. Countries who are advocate of open source or free software also have higher
levels of Software Piracy. Corrupt countries also have relatively high
rate/levels of piracy.
5. Information about recreational piracy and end-user software buccaneering.

Reflections:
Software Piracy has been one of the major problems worldwide, and I believe that Filipinos are pretty much aware of it. Of all the topics on computer ethics, I think that the violation on Intellectual Property particularly on Software Piracy is a critical and sensitive topic to discuss. It is critical since software piracy is illegal. However if one considers the notion of “everybody does it”, “recreational piracy” or “end-user software buccaneering”, then they might have a point in legitimately using the software. At the same time, this topic is also sensitive because any opinions against or in support of it might immediately give you a head turn or a raised eyebrow, especially if you are in the Philippines.

Overall I agree with the closing statement of this article where it suggests that issuing global standards is not the only way to reduce software piracy. One must also consider the economical and cultural ideological differences. Studying the philosophical framework affecting software piracy might eventually lead us to the most effective way of eradicating this global problem.

Thursday, July 2, 2009

1st Reading Assignment

Topic: Information Retrieval


"Information discovery and retrieval tools"

by: Michael T. Frame


Source:


Frame, Michael T. “Information discovery and retrieval tools” Information Services & Use

24.4 (2004) : 187-193. EBSCOHost. EBSCOHost Connection. 01 July 2009

http://search.ebscohost.com/.


Exact URL of the article:

http://web.ebscohost.com/ehost/detail?vid=7&hid=104&sid=7136e648-868b-4f35-b857-77d4641f3ed5%40sessionmgr2&bdata=JmxvZ2lucGFnZT1Mb2dpbi5hc3Amc2l0ZT1laG9zdC1saXZlJnNjb3BlPXNpdGU%3d#db=ehh&AN=16872295

EBSCOHost is part of the online database subscription of the Ateneo de Manila University, from where I viewed and downloaded the article. You might not be able to access the full-text version if you do not have the required subscriptions.

_____________________________________________________________________________________


Abstract:

In 2004 it was estimated that 10 billion web pages exist on the World Wide Web. With that huge number, it is very evident why users particularly those who have casual knowledge in using the Internet find it very difficult to search and retrieve relevant and accurate information. One of the many solutions to this problem is the effective use of different search engines available in the web. This article focuses on how search engines works, as well as enumerating different features and capabilities of the tool. Tips on how web developers and creators can improve the discovery of their web content were also discussed. One of the aims of this discussion is to prevent the web developers in doing intentional tricks such as search engine spamming, which will only brought problem to web searches of users. Furthermore, various terminologies such as SPAM, metatags, and spidering methodology were also introduced along with the presentation of simple search techniques for Internet users. All of this was provided to minimize the problem of populated search results as well as improve the search experiences and information retrieval of World Wide Web users.


Reflections:

I think that the article that I selected actually help me to be familiarized with some of the various terminologies related to web search and retrieval. What is interesting about this article is that it gives us a more detailed look on search engines, which is one of the tools use in information retrieval. Yes, we do use google, yahoo, altavista, askjeeves, etc practically all the time. But do we know what is happening behind the search? probably not.

We casual Internet users might find this question uninteresting or irrelevant since what we ultimately want is to search the web and retrieve the information we need. But after reading the article and learning the discussions on spam, metatags, a search engine model and how a search engine actually sees a search, it made me realize the importance of acquiring technical knowledge on web retrieval tools and also how it can actually help casual users in their search and retrieval experience.

We actually do not need to be technical expert on this field. Being able to distinguish the difference of a spam page to an actual relevant web page is already a big leap for all of us.


Three things I learned from the article:

  1. Honestly, my knowledge on SPAM is very limited. Usually I encounter SPAM on electronic mails which take form into different advertising and promotional messages. After reading the article, I learned that there are actually SPAM in web pages and that web developers are actually using it to increase the number of hits on their page. This is a tricky way to improve Internet Business. As well all know the number of hits usually gives a site more popularity and thus more revenues. This is one of the primary reasons why we always encounter a number of irrelevant results during a web search.


  1. How search engine works and its different features and capabilities that can be use to retrieve the right information. Some of the features are the use of case sensitive and insensitive searching, Boolean search capabilities, result weighting feature, simple search interface, use of remote indexing, etc.

    Today, Internet users are provided with so many search engines and that selecting the effective one becomes a problem. But if we take into account these features and capabilities, we will surely be successful in choosing the right one.


  1. Importance of metatags and why it should be embedded in an HTML document. I also learned a different kind of metatag, called “Common name”. It is a custom meta-tag that can actually help further narrow an already narrowed search results.


Conclusions:

This article focuses more on the tools and terminologies important in Information Retrieval and not directly on techniques that can be utilized to improve one’s search. However, upon reading the article, readers will certainly know how to effectively use search engines and select which tool to use based on the presence of different features and capabilities. In the end, all this information will surely lead the user to successful Internet Retrieval.