Searching for "personal storage"

best storage devices… locally and in the “cloud”

The advent of the CLOUD and the industry and our personal orientation to save pictures, videos and other data “out” in the “cloud” makes us think less of hard drives and other storage devices. However…

Best storage devices

Updated June 6, 2014 1:51 PM PDT

http://www.cnet.com/topics/storage/best-hard-drives-and-storage/

If you still think storage devices are passe and are looking firmly for “cloud” solution, here are the ten best, according to PC Magazine:

The Best Cloud Storage Solutions

By Jill DuffyApril 2, 2014

http://www.pcmag.com/article2/0,2817,2413556,00.asp

cloud computing

The Dangers of Trusting Cloud Computing Over Personal Storage

Security Concerns
Risk of Disruptions
Lack of Standardization
Accessibility Concerns
++++++++++++++++++++++++

more on cloud computing in this IMS blog
http://blog.stcloudstate.edu/ims?s=cloud

more on personal storage in this IMS blog:

http://blog.stcloudstate.edu/ims?s=personal+storage

blockchain and information professions

Blockchain: Recommendations for the Information Profession

Monday, September 24, 2018 12:00 pm
Central Daylight Time (Chicago, GMT-05:00)

Blockchain technology is being discussed widely, but without clear directions for library applications. The Blockchain National Forum, funded by IMLS and held at San Jose State University’s iSchool in Summer 2018, brought together notable experts in the information professions, business, government, and urban planning to discuss the issues and develop recommendations on the future uses of blockchain technology within the information professions. In this free webinar, Drs. Sandy Hirsh and Sue Alman, co-PIs of the project, will present the recommendations made throughout the year in the Blockchain blog, Library 2.0 Conference, Blockchain Applied: Impact on the Information Profession, and the National Forum.

157 – 200 participants in the workshop

 

 

 

 

Basics: What is Blockchain Technology?

IMLS funded project goal
San Jose State U School of Information awarded this grant: https://ischoolblogs.sjsu.edu/blockchains

Blockchain: Apps and Ideas

http://www.youtube.com/c/Library20

now what is blockchain, and not how to implement, but only certain issues will be discussed.

Issues: legal, security and standards and Applications: academic, public and archives

BLockchain and the Law bt Primavera De Felippi and Aaron Wright : http://www.hup.harvard.edu/catalog.php?isbn=9780674976429

Privacy: https://www.investopedia.com/terms/g/general-data-protection-regulation-gdpr.asp

Is Blockchain (BC) content or provider?

Q/S TO ASK: WHAT KINDS OF DATA AND RECORDS MUST BE STORED AND PRESERVES exactly the way they were created (provenance records, transcripts). what kinds of info are at risk to be altered and compromised by changing circumstances (personally identifiable data)

Security issues: https://www.technologyreview.com/magazine/2018/05/

515 rule: BC can be hacked if attacked by a group of miners controlling more than 50% of the network

Standards Issues: BC systems- open ledger technology for managing metadata. baseline standards will impact future options. can BC make management of metadata worth. Is it worth, or more cautious.

Potential Use cases: archives and special collections where provenance and authenticity are essential for authoritative tracking. digital preservation to track distributed digital assets. BC-based currencies for international financial transactions (to avoid exchange rates ILL and publishing) . potential to improve ownership and first sale record management. credentialing: personal & academic documents (MIT already has transcripts and diplomas of students in BC – personal data management and credentialing electronically).

public libraries: house docs of temporarily displaced or immigrants. but power usage and storage usage became problems.

Victoria Lemieux

a city south of Denver CO is build right now, and will be build on these principles.

benefits for recordkeeping: LOCKSS (lot of copies keeps stuff safe) – Stanford U; chain of custody (SAA Glossary); Trust and Immutability (BC) vs confidentiality and performance (dbase)

Libarians role: need to understand BC (how does it work and what can it do for us; provide BC education for users; use BC in various applications

recommendations from National Forum:

ASIS&T presentation in Vancouver, Nov. 2018; MOOC on BLockchain Basics; Libary Futures Series, BOok3 Alman & Hirsh

https://www.forbes.com/sites/tomvanderark/2018/08/20/26-ways-blockchain-will-transform-ok-may-improve-education/#3b2e442d4ac9

from Miriam Childs to All Participants:
Blockchain is suing Blockchain: https://nulltx.com/blockchain-is-suing-blockchain-things-are-getting-messy-in-crypto-world/

from Lilia Samusenko to All Participants:
Sounds like blockchain also can support the Library-Of-Things initiatives. What do you think?

 

+++++++++
more on blockchain in this IMS blog
http://blog.stcloudstate.edu/ims?s=blockchain

blockchain and higher ed

Blockchain in brief: Six ways it can transform higher education

by Danielle Yardy

https://www.eab.com/blogs/it-forum-perspectives/2018/01/blockchain-higher-education-uses

1. Using a blockchain for automatic recognition and transfer of credits

The decline in first-time, first-year student enrollments is having a real financial impact on a number of institutions across the United States and focusing on transfer students (a pool of prospects twice as large) has become an important strategy for many. But credit articulation presents a real challenge for institutions bringing in students from community colleges. While setting standardized articulation requirements across the nation presents a high hurdle, blockchain-supported initiatives may hold great promise for university and city education systems looking to streamline educational mobility in their communities.

2. Blockchains for tracking intellectual property and rewarding use and re-use of that property

If researchers were able to publish openly and accurately assess the use of their resources, the access-prohibitive costs of academic book and journal publications could be circumvented, whether for research- or teaching-oriented outputs. Accurately tracking the sharing of knowledge without restrictions has transformative potential for open-education models.

3. Using verified sovereign identities for student identification within educational organizations

The data footprint of higher education institutions is enormous. With FERPA regulations as well as local and international requirements for the storage and distribution of Personally Identifiable Information (PII), maintaining this data in various institutional silos magnifies the risk associated with a data breach. Using sovereign identities to limit the proliferation of personal data promotes better data hygiene and data lifecycle management and could realize significant efficiency gains at the institutional level.

Best practices to become data-driven 

4. Using a blockchain as a lifelong learning passport

Educational institutions and private businesses partner with online course delivery giants to extend the reach of their educational services and priorities. Traditional educational routes are increasingly less normal and in this expanding world of providers, the need for verifiable credentials from a number of sources is growing. Producing a form of digitally “verifiable CVs” would limit credential fraud, and significantly reduce organizational workload in credential verification.

5. Using blockchains to permanently secure certificates

The open source solution Blockcerts already enables signed certificates to be posted to a blockchain and supports the verification of those certificates by third parties.

When an institution issues official transcripts, obtaining copies can be expensive and burdensome for graduates. But student-owned digital transcripts put the power of secure verification in the hands of learners, eliminating the need for lengthy and costly transcripts to further their professional or educational pursuits. An early mover, Central New Mexico Community College, debuted digital diplomas on the blockchain in December of 2017.

6. Using blockchains to verify multi-step accreditation

As different accreditors recognize different forms of credentials and a growing diversity of educational providers issue credentials, checking the ‘pedigree’ of a qualification can be laborious. Turning a certification verification process from a multi-stage research effort into a single-click process will automate many thousands of labor hours for organizations and institutions

++++++++++
more on blockchain and higher ed in this IMS blog
http://blog.stcloudstate.edu/ims?s=blockchain+education

blockchain fixes

187 Things the Blockchain Is Supposed to Fix

Erin Griffith 

https://www-wired-com.cdn.ampproject.org/c/s/www.wired.com/story/187-things-the-blockchain-is-supposed-to-fix/amp
 
Blockchains, which use advanced cryptography to store information across networks of computers, could eliminate the need for trusted third parties, like banks, in transactions, legal agreements, and other contracts. The most ardent blockchain-heads believe it has the power to reshape the global financial system, and possibly even the internet as we know it.
 
Now, as the technology expands from a fringe hacker toy to legitimate business applications, opportunists have flooded the field. Some of the seekers are mercenaries pitching shady or fraudulent tokens, others are businesses looking to cash in on a hot trend, and still others are true believers in the revolutionary and disruptive powers of distributed networks.
 
Mentions of blockchains and digital currencies on corporate earnings calls doubled in 2017 over the year prior, according to Fortune. Last week at Consensus, the country’s largest blockchain conference, 100 sponsors, including top corporate consulting firms and law firms, hawked their wares.
 
Here is a noncomprehensive list of the ways blockchain promoters say they will change the world. They run the spectrum from industry-specific (a blockchain project designed to increase blockchain adoption) to global ambitions (fixing the global supply chain’s apparent $9 trillion cash flow issue).
 

Things Blockchain Technology Will Fix

  • Bots with nefarious intent
  • Skynet
  • People not taking their medicine
  • Device storage that could be used for bitcoin mining
  • Insurance bureaucracy
  • Electronic health record accessibility
  • Health record storage security
  • Health record portability
  • Marine insurance risk
  • Cancer
  • Earning money on personal data
  • Pensions
  • The burden of car ownership
  • Inability to buy anything with cryptocurrency
  • Better marketplaces for nautical shipping services
  • Better ways to advertise to your friends
  • Better ways to trade forex with your friends
  • Ownership shares in ancient sunken treasures
  • Poverty
  • Complying with Know Your Customer laws
  • Complying with Anti-Money-Laundering laws
  • Complying with securities laws in token sales
  • Censorship
  • A use for QR codes
  • Rewards for buying alcohol by subscription
  • Tracing water supplies
  • Dearth of emergency responders
  • High cost of medical information
  • Improved digital identity authentication
  • Managing real estate workflow
  • International real estate purchases
  • Physical branches for crypto banking
  • Physical branches for crypto exchanges
  • Private equity
  • Venture capital
  • AIDS, also online sales of classic Japanese domestic cars
  • Efficiency and transparency at nonprofits
  • Incorporating local preferences in decentralized banking options
  • Boosting sales for local businesses
  • A digital-only investment bank
  • Containers to transport sensitive pharmaceuticals and food
  • Protecting consumer information on mobile
  • Helping mobile phone users monetize their data
  • Not enough interconnection in the world
  • Complexity and risk in the crypto market
  • Expensive AI research
  • Counterfeit goods
  • Connecting “innovation players” and “knowledge holders”
  • Movie industry’s slow and opaque accounting practices
  • Global supply chain’s $9 trillion cash flow issue
  • Trust in the global supply chain
  • Economic crisis
  • Cash flow problems at small and medium-sized businesses
  • Improving the use of data in the transportation and logistics industries
  • Poverty among African farmers
  • Transparency in the food supply chain
  • Ad fraud
  • Fake news
  • False news
  • Settling payments faster
  • Speeding transactions
  • The unbanked
  • The underbanked
  • The bidding process in art and collectibles markets
  • Assessing the value of collectibles
  • Diamond industry’s high banking and forex fees
  • The illicit diamond trade
  • Availability of digital games
  • Currency for eSports
  • Currency for eSports betting
  • Currency for sports betting
  • Storing scholarly articles
  • Health insurance providers billing processes
  • Currency for healthcare providers
  • Shortage of workers with advanced tech skills
  • Lack of diversity in tech
  • Elder care
  • Rights management for photographers
  • Content rights management
  • Simplifying the logo copyrighting process
  • Ticketing industry’s “prevalent issues”
  • Crowdsourcing for legal dispute resolution
  • Securing financial contracts
  • Paper
  • Automation
  • Control of personal data
  • Control of personal credit data
  • No way to spend crypto
  • Advertising for extended reality environments
  • Human suffering
  • Security for luxury watches
  • Authenticity in cannabis sales
  • Crypto rewards for cannabis-focused social media site
  • Crypto payments for rating cryptoassets
  • Crypto payments for taking surveys, watching videos and clicking links
  • Crypto rewards for video game skills
  • Crypto rewards for time spent playing video games
  • Buying, selling and trading your social media friends
  • Crypto rewards for social media sharing
  • Free mobile data for watching ads
  • Crypto rewards for watching entertainment content
  • Gold-backed cryptocurrency
  • Crypto-backed gold
  • Metals-backed cryptocurrency
  • Precious metals-based cryptocurrency
  • “Tokenizing” real world items
  • Nashville apartment buildings
  • Monaco real estate
  • Financial infrastructure for trading within video games
  • Checking ID for purchases like alcohol
  • “Uber for alcohol” on blockchain
  • Inefficiencies in cargo delivery
  • Branded tokens for merchants to reward customers
  • Fraud and corruption among non-profits
  • Better transparency at non-profits
  • Better transparency around impact investing
  • Bitcoin mining uses too much energy
  • Home appliances mining for bitcoin while not in use
  • Bitcoin mining using hydropower
  • Large corporations’ carbon footprints
  • “Decarbonizing” electricity grids
  • Climate change
  • Trust in governments
  • Trust in corporations
  • Trust in social networks
  • Trust in media
  • Universal billing system for travel industry
  • Decentralized Uber and Lyft
  • Online gambling not fair
  • Online gambling sites take commission
  • Helping retailers hurt by Amazon
  • Online retail fraud
  • Paying for things with your face
  • Streamlining interactions among shoppers, retailers and brands
  • Linking content across computers, tablets and phones
  • Ranking apps by their value
  • Aligning creativity and recognition for content creators
  • Improving payments for artists on Spotify and Pandora
  • Online piracy
  • Improving the technology of the Russian gas industry
  • A blockchain equivalent of Amazon, Groupon and Craigslist
  • Too many non-value-added costs
  • Unregulated prison economies
  • Standardizing the value of advertisements
  • Advertising not transparent enough
  • Old real estate practices
  • Free public information from silos
  • Speeding the rendering of animated movies
  • Selling items for crypto instead of regular money
  • Borders
  • Man-in-the-middle hacks
  • Security sacrifices that come with innovation
  • Scams, fraud and counterfeits
  • Tools to build decentralized apps
  • Blockchain infrastructure
  • Removing barriers separating blockchains
  • Safety in buying and selling blockchain tokens
  • Improving privacy in online file storage
  • ICO projects could benefit from the “wisdom of the crowd”
  • Improving privacy of blockchain
  • Decentralized database for decentralized technologies
  • Improving trust and confidence in blockchain system
  • More cohesive user experiences across blockchain and the cloud
  • Democratizing gold trading
  • Giving investors more control of their assets
  • Simplifying the cryptocurrency transaction process
  • Trading indexes as tokens
  • Improving crypto safekeeping solutions
  • Simplifying ICO investment, trading and cryptocurrency
  • Improving institutional-grade crypto asset management
  • “Painstakingly slow” manual crypto wallet process
  • More open global markets
  • Easier way to invest in real estate
  • Easier way to invest in Swiss real estate
  • Easier way to combine smart contracts with crowdfunded home loans
  • Easier way to borrow against crypto holdings
  • Faster porn industry payment options
  • Lower porn industry payment fees
  • Identifying and verifying users in online dating
  • Improving traditional banking services for crypto world
  • Cryptocurrency based on Game Theory, IBM’s Watson, and other theories
  • Better social network + blockchain + AI + human touch
  • Improving content streaming on the blockchain
  • Supply chain transparency
  • Increasing public sector trust of cryptocurrencies
  • Education around blockchain technology
  • Blockchain not mainstream enough
 
++++++++++++++++++++++++++
more on blockchain in this IMS blog
http://blog.stcloudstate.edu/ims?s=blockchain

future of Internet

Can the Internet be saved?

https://mondediplo.com/outsidein/can-the-internet-be-saved
In 2014 Tim Berners-Lee, inventor of the World Wide Web, proposed an online ‘Magna Carta’ to protect the Internet, as a neutral system, from government and corporate manipulation. He was responding after revelations that British and US spy agencies were carrying out mass surveillance programmes; the Cambridge Analytica scandal makes his proposal as relevant as ever.

Luciano Floridi, professor of Philosophy and Ethics of Information at the Oxford Internet Institute, explains that grey power is not ordinary socio-political or military power. It is not the ability to directly influence others, but rather the power to influence those who influence power. To see grey power, you need only look at the hundreds of high-level instances of revolving-door staffing patterns between Google and European governmentsand the U.S. Department of State.

And then there is ‘surveillance capitalism’. Shoshana Zuboff, Professor Emerita at Harvard Business School, proposes that surveillance capitalism is ‘a new logic of accumulation’. The incredible evolution of computer processing power, complex algorithms and leaps in data storage capabilities combine to make surveillance capitalism possible. It is the process of accumulation by dispossession of the data that people produce.

The respected security technologist Bruce Schneier recently applied the insights of surveillance capitalism to the Cambridge Analytica/Facebook crisis.

For Schneier, ‘regulation is the only answer.’ He cites the EU’s General Data Protection Regulation coming into effect next month, which stipulates that users must consent to what personal data can be saved and how it is used.

++++++++++++++++++++++
more on the Internet in this IMS blog
https://blog.stcloudstate.edu/ims?s=internet

Privacy & Security in Today’s Library

Privacy & Security in Today’s Library by Amigos Library Services

The virtuality of privacy and security on the from Plamen Miltenoff

From: Jodie Borgerding [mailto:Borgerding@amigos.org]
Sent: Wednesday, July 05, 2017 3:07 PM
To: Miltenoff, Plamen <pmiltenoff@stcloudstate.edu>
Cc: Nicole Walsh <WALSH@AMIGOS.ORG>
Subject: Proposal Submission for Privacy & Security Conference

Hi Plamen,

Thank you for your recent presentation proposal for the online conference, Privacy & Security in Today’s Library, presented by Amigos Library Services. Your proposal, The role of the library in teaching with technology unsupported by campus IT: the privacy and security issues of the “third-party,” has been accepted. I just wanted to confirm that you are still available to present on September 21, 2017 and if you have a time preference for your presentation (11 am, 12 pm, or 2 pm Central). If you are no longer able to participate, please let me know.

Nicole will be touch with you shortly with additional details and a speaker’s agreement.

Please let me know if you have any questions.

Thanks!
___________________

Jodie Borgerding Consulting & Education Services Manager Amigos Library Services 1190 Meramec Station Road, Suite 207 | Ballwin, MO  63021-6902 800-843-8482 x2897 | 972-340-2897(direct) http://www.amigos.org | borgerding@amigos.org

+++++++++++++++++

Bio

Dr. Plamen Miltenoff is an Information Specialist and Professor at St. Cloud State University. His education includes several graduate degrees in history and Library and Information Science and terminal degrees in education and psychology.

His professional interests encompass social media, multimedia, Web development and design, gaming and gamification, and learning environments (LEs).

Dr. Miltenoff organized and taught classes such as LIB 290 “Social Media in Global Context” (http://web.stcloudstate.edu/pmiltenoff/lib290/) and LIB 490/590 “Digital Storytelling” (http://web.stcloudstate.edu/pmiltenoff/lib490/) where issues of privacy and security are discussed.

Twitter handle @SCSUtechinstruc

Facebook page: https://www.facebook.com/InforMediaServices/

The virtuality of privacy and security on the modern campus:

The role of the library in teaching with technology unsupported by campus IT: the privacy and security issues of the “third-party software” teaching and learning

Abstract/Summary of Your Proposed Session

The virtualization reality changes rapidly all aspects of learning and teaching: from equipment to methodology, just when faculty have finalized their syllabus, they have to start a new, if they want to keep abreast with content changes and upgrades and engagement of a very different student fabric – Millennials.

Mainframes are replaced by microcomputers, microcomputers by smart phones and tablets, hard drives by cloud storage and wearables by IoT. The pace of hardware, software and application upgrade is becoming unbearable for students and faculty. Content creation and methodology becomes useless by the speed of becoming obsolete. In such environment, faculty students and IT staff barely can devote time and energy to deal with the rapidly increasing vulnerability connected with privacy and security.

In an effort to streamline ever-becoming-scarce resources, campus IT “standardizes” campus use of applications. Those are the applications, which IT chooses to troubleshoot campus-wide. Those are the applications recommended to faculty and students to use.

In an unprecedented burgeoning amount of applications, specifically for mobile devices, it is difficult to constraint faculty and students to use campus IT sanctioned applications, especially considering the rapid pace of such applications becoming obsolete. Faculty and students often “stray” away and go with their own choice. Such decision exposes faculty and students, personally, and the campus, institutionally, at risk. In a recent post by THE Journal, attention on campuses is drown to the fact that cyberattacks shift now from mobile devices to IoT and campus often are struggling even with their capability to guarantee cybersecurity of mobile devices on campus. Further, the use of third-party application might be in conflict with the FERPA campus-mandated policies. Such policies are lengthy and complex to absorb, both by faculty and students and often are excessively restrictive in terms of innovative ways to improve methodology and pedagogy of teaching and learning. The current procedure of faculty and students proposing new applications is a lengthy and cumbersome bureaucratic process, which often render the end-users’ proposals obsolete by the time the process is vetted.

Where/what is the balance between safeguarding privacy on campus and fostering security without stifling innovation and creativity? Can the library be the campus hub for education about privacy and security, the sandbox for testing and innovation and the body to expedite decision-making?

Abstract

The pace of changes in teaching and learning is becoming impossible to sustain: equipment evolves in accelerated pace, the methodology of teaching and learning cannot catch up with the equipment changes and atop, there are constant content updates. In an even-shrinking budget, faculty, students and IT staff barely can address the issues above, less time and energy left to address the increasing concerns about privacy and security.

In an unprecedented burgeoning amount of applications, specifically for mobile devices, it is difficult to constraint faculty and students to use campus IT sanctioned applications, especially considering the rapid pace of such applications becoming obsolete. Faculty and students often “stray” away and go with their own choice. Such decision exposes faculty and students, personally, and the campus, institutionally, at risk. In a recent post by THE Journal (http://blog.stcloudstate.edu/ims/2017/06/06/cybersecurity-and-students/), attention on campuses is drawn to the fact of cyberattacks shifting from mobile devices to IoT but campus still struggling to guarantee cybersecurity of mobile devices on campus. Further, the use of third-party applications might be in conflict with the FERPA campus-mandated policies. Such policies are lengthy and complex to absorb, both by faculty and students and often are excessively restrictive in terms of innovative ways to improve methodology and pedagogy of teaching and learning. The current procedure of faculty and students proposing new applications is a lengthy and cumbersome bureaucratic process, which often render the end-users’ proposals obsolete by the time the process is vetted.

Where/what is the balance between safeguarding privacy on campus and fostering security without stifling innovation and creativity? Can the library be the campus hub for education about privacy and security, the sandbox for testing and innovation and the body to expedite decision-making?

http://blog.stcloudstate.edu/ims/2017/06/06/cybersecurity-and-students/

Anything else you would like to add

3 take-aways from this session:

  • Discuss and form an opinion about the education-pertinent issues of privacy and security from the broad campus perspective, versus the narrow library one
  • Discuss and form an opinion about the role of the library on campus in terms of the greater issues of privacy and security

Re-examine the thin red line of the balance between standardization and innovation; between the need for security and privacy protection a

++++++++++++++
presentation:
https://www.slideshare.net/aidemoreto/the-virtuality-of-privacy-and-security-on-the 

chat – slide 4, privacy. please take 2 min and share your definition of privacy on campus. Does it differ between faculty and students?  what are the main characteristics to determine privacy

chat – slide 5, security. please take 2 min and share your definition of security on campus regarding electronic activities. Who’s responsibility is security? IT issue [only]?

poles: slide 6, technology unsupported by campus IT, is it worth considering? 1. i am a great believer in my freedom of choice 2. I firmly follow rules and this applies to the use of computer tools and applications 3. Whatever…

chat –  slide 6, why third party applications? pros and cons. E.g. pros – familiarity with third party versus campus-required

pole, slide 6, appsmashing. App smashing is the ability to combine mobile apps in your teaching process. How do you feel about it? 1. The force is with us 2. Nonsense…

pole slide 7 third party apps and the comfort of faculty. How do you see the freedom of using third party apps? 1. All I want, thank you 2. I would rather follow the rules 3. Indifference is my middle name

pole slide 8 Technology standardization? 1. yes, 2. no, 3. indifferent

chat slide 9 if the two major issues colliding in this instance are: standardization versus third party and they have impact on privacy and security, how would you argue for the one or the other?

++++++++++++++++
notes from the conference

 

 

Measuring Library Vendor Cyber Security: Seven Easy Questions Every Librarian Can Ask

http://journal.code4lib.org/articles/11413

Bill Walker: http://www.amigos.org/innovating_metadata

 

+++++++++++++++
more on security in education in this IMS blog
http://blog.stcloudstate.edu/ims?s=security

more on privacy in education in this IMS blog
http://blog.stcloudstate.edu/ims?s=privacy

knowledge information

Information literacy: An exploration

https://www.academia.edu/33257496/Information_literacy_An_exploration

My notes: this is a 1997 article
the explosion of information is not accompanied by understanding of information.

p. 337 However, if one accepts a definition of information as a process rather than as a thing, then such policies can at best form a framework for the creation of mean- ing by the individuals or groups who are creating information by bring- ing their knowledge to bear on the data available to them

Data acquisition, maintenance and delivery are a vital part of organisational life, but problems arise when we fail to recognise the necessary links to knowledge.

p. 338 However, just teaching users the practi- calities of applications has been seen to be deficient. It leads to an exces- sive focus on ‘how’ to use a particular application rather than on ‘why’ it should be used 13.

p. 379 Information literacy is a stage above computer literacy, the latter usually implying the ability to use a personal computer . My note: some librarians assume that “computer literacy” is the same as “digital literacy” and were trying to convince me that information literacy is succeeding digital literacy, where it is the other way around

p. 380 There are those within the LIS community who warn that librar- ians should not stray into areas that are not appropriate. Behrens points out that the future is likely to see an increased emphasis on a part- nership between librarians and educators. My note  another glaring discrepancy between myself and the librarians at SCSU

p. 386 The phrase information literacy has some value in expressing what might need to be done if the aims of information policies are to be made concrete. It points to the need for an emphasis on the awareness of the individual using data of a range of issues. These are not, it has been argued, to be limited to issues of storage and retrieval but have, centrally, to be concerned with issues of definition and meaning. These issues might be tackled in this order: what are the issues in this field surround- ing the nature of knowledge (i.e. how do we formulate questions); how might data be best acquired, stored, etc. in order to answer these ques- tions? (this might well best be paralleled by training in computer literacy); and what factors, both social and individual, place constraints on our ability to use the data?

+++++++++++++++++++++
more on information literacy in this IMS blog
http://blog.stcloudstate.edu/ims?s=information+literacy

computers in library conference

computers in libraries conference

March 28-30 preconference workshops March 27 hyatt regency crystal city
arlington, va
http://conferences.infotoday.com/documents/221/CIL2017-Advance-Program.pdf

W5: Want Media Coverage? Add Press Room to Your Website

9:00 a.m. – 12:00 p.m.

Kathy Dempsey, Editor, Marketing Library Services newsletter Owner, Libraries Are Essential consultancy

Library marketers crave media attention and coverage, but most don’t know how to get it. The first step is having a Press Room as part of your library’s website. This workshop, led by a member of the media who’s also a library marketing expert, shows you how to build a Press Room that works. It includes how your library benefits from having an online Press Room, even if you don’t have a marketing department; where it belongs in your website hierarchy; what content members of the press expect to find there; SEO basics and PR tactics to lead reporters to your online Press Room; why building relationships with the media is vital; how press coverage affects your library’s usage, funding, brand recognition, and position in the community. Help ensure positive coverage by adding this strategic tool to your website.

W8: Video: Hands-On Learning & Practice

9:00 a.m. – 12:00 p.m.

Jennifer E. Burke, President, IntelliCraft Research, LLC

In this half-day workshop, a former advertising executive and trainer of strategic storytelling in marketing shares secrets on how to create video that has an impact on your community. Join her to shoot, edit, and polish a video while gathering tips, techniques, and strategies to create your own video-a medium which grabs communities in exciting new ways!

W10: Implementing an Internet of Things Infrastructure & Apps

9:00 a.m. – 12:00 p.m.

May Chang, Assistant Director, LibraryTechnology, East Carolina University
Mehdi Mohammadi, Graduate Assistant, Western Michigan University

The Internet of Things (IoT) is becoming widespread in academia as well as industry. It refers to connecting smart objects with built-in unique identifiers and sensors to communicate with each other autonomously. This enables actionable insights and ultimately makes the environment around us smarter. This workshop looks at how libraries can incorporate the IoT and reviews different aspects of developing an IoT infrastructure and creating your own application. It is based on four layers of IoT application architecture: the physical layer, the communications layer, application and services layer, and data analytics. Speakers discuss the potentials and challenges of IoT applications, including the footprint of IoT applications, i.e., a high volume of sensory data, the tools and methods for data analytics. As a case study, they focus on location-aware applications using iBeacons and smartphone sensors to show how all the IoT elements work together. Gain a better understanding of the usefulness of IoT in libraries, learn the main elements and underlying technologies of IoT applications, and understand the difference between a wide range of IoT devices, protocols and technologies to choose the right ones for your IoT application. Get budget and resource estimates and more. Come with a basic understanding of JavaScript/ HTML5/ CSS and your laptop for hands-on development practice. An instruction document will be provided for the attendees to prepare their system before the workshop.

W15: Tech Trends for Libraries in 2017 & Beyond

1:00 p.m. – 4:00 p.m.

David Lee King, Digital Services Director, Topeka & Shawnee County Public Library and Publisher, davidleeking.com

Technology has changed the face of libraries and is continuing to change how we work and how we deliver services to customers. This workshop introduces emerging technology trends and shows how those trends are reshaping library services. Examples are provided of how to incorporate these evolving trends into libraries. Attendees learn what trends to look for, find out the difference between a technology trend and a fad, and get ideas on how their library can respond to technology as it emerges.

 

W16: UX Design for Broader Discovery

1:00 p.m. – 4:00 p.m.

Stephanie Rosso, Principal Web Developer, Hennepin County Library
Amy Luedtke, Senior Librarian, Information Programs and Services, Hennepin County Library
Iain Lowe, BiblioCommons Inc.

While patrons have embraced using online technology to access their public library, most of these interactions are limited to borrowing transactions. If libraries are to be truly relevant in the digital world, we need to nudge patrons out of the well-worn pattern of log-in/transact /log-out and find ways to get them to linger long enough to discover the richness the library has to offer beyond borrowing items, while offering them opportunities to add their own voice to the library’s online community. This workshop explores design patterns and techniques for introducing content to patrons at appropriate moments in their learned workflows. It considers how to encourage patrons to add their voice to the library community and overcome concerns about privacy and security. It shares research and experience from BiblioCommons and Hennepin County Public Library’s efforts and looks at analogs from other domains. Workshop participants will be asked to participate actively in a hands-on session to solve a specific design challenge in teams.

My note: Ha. Even the public library understands that service goes beyond “borrowing items” and must have “patrons to add their voice.” Only in the academic library, prevails the opinion that librarians are those omnipotent and all-knowing lecturing types.

B103: Website Redesign: Techniques & Tools

1:15 p.m. – 2:00 p.m.

Dana Haugh, Web Services Librarian, Stony Brook University
Roy Degler, Associate Professor, Digital Library Services, Digital Resources and Discovery Services, Oklahoma State University
Emily R Mitchell, Librarian / Webmaster, SUNY Oswego

Join three web experts to learn about tips, tools, and techniques for taking the pain out of website redesigns. Haugh provides advice on the visual design of your next site and shows some examples of library web redesigns. Degler takes a look at why many libraries are using popular, free, CSS-based frameworks such as Bootstrap; explains how the grid layout works; and shows how the built-in responsive design layouts can deliver a site that works on desktop, smartphones, and tablets. Often the biggest challenge in redesign isn’t the visual design, content management system or coding. It’s the people and politics. Everyone thinks they know what the library website should look like, but no two people—let alone groups—can ever agree. How do you move ahead with a library redesign when you’re facing conflicting demands from the administration, co-workers, users, and stakeholders? Mitchell tackles this challenge head on and points out the weapons that we have at hand—from data to documentation; and discusses how to wield those weapons effectively to win (almost) any fight in order to build a great website. Grab lots of insights and ideas from this experienced panel.

C102: Digital Literacy & Coding Program Models

11:15 a.m. – 12:00 p.m.

Karen Walker, E-Services & Digital Access Manager, Jacksonville Public Library
Brandy McNeil, Associate Director – Tech Education & Training, The New York Public Library
Steven Deolus, Technology Training Program Coordinator, TechConnect (Technology Training Program Department), The New York Public Library

This session looks at how one library created a technology class and programming model that spans a 21-branch, 844-square-mile library system. It discusses mobile classrooms and how Chromebooks, MacBooks, tablets, and other equipment are used to create “classrooms” throughout the system. It shares how the library is focusing on members and programming for the community, for instance, the development of Spanish language, 50+ and immigrant/refugee programming. It looks at developing new programs and instructors using the 3D model from printer to pens, from tablets to coding, from core expertise to everyone. NYPL speakers discuss how coding is the new black! They discuss how to launch a coding program at your library, how to expand the age range of current coding programs, how to promote events related to your program to gain participants, how to get staff buy-in, how to educate staff, and how to create partnerships with some of the biggest names in the game. The NYPL Tech- Connect program will help you plan out all your needs to take your existing or non-existing coding programs further.

My note: one more proof that digital literacy is not “information literacy dressed in the new verbal cloth” of “digital literacy,” but entails way more topics, skills and knowledge. Information Literacy is a 1990s concept. Time to upgrade to 2016 concepts and recognize that digital literacy requires skills beyond handling information. Moreover, information today is way more complex then the skills being taught, since information from social media is more complex then information from news media and it entails technology skills, which one does not have to preside upon for handling news media

E104: From Textbook to Activism: Engaging Students in Social Issues They Care About

2:15 p.m. – 3:00 p.m.

Janie Pickett, Head Librarian, Eureka High School, Eureka, Mo.
Anna Gray, Social Studies Teacher, Eureka High School, Eureka, Mo.

recent collaborative effort between a high school social studies teacher and a school librarian transformed a “same-old” unit on social movements in the 20th century into a dynamic study of effective social activism—and how students can become effective activists. Using both primary and secondary resources, students learned to analyze social issues, then to identify the type of activism that proved effective for those issues. Next, students selected social situations important to them, analyzed the changes they sought to effect, and determined a means of activism to effect that change in practical—and often surprising—ways. The project’s design and implementation is straightforward and replicable. This session provides concrete steps to follow, specific patterns for locating learning resources, and reproducible forms that educators can carry back to their own campuses.

B202: Managing Tech & Innovation

11:45 a.m. – 12:30 p.m.

Jen Baum Sevec, Senior Metadata and Acquisitions Librarian, Library Of Congress
Brett Williams, Systems & Liaison Librarian, University of Toronto Mississauga

Sevec offers leaders at any level the opportunity to up their game by learning current management strategies for technology and innovation. Library leaders and constituents engage in the nearly constant interplay of enabling technology and innovations to explore a wealth of information and greater depth of data in the Information Age. A framework for managing this interplay is provided as well as an understanding of the dynamic lifecycle inherent in technological innovations and constituent demands. Williams provides an introduction to Wardley Value Chain Mapping, an innovative IT planning processes discussed by Simon Wardley on his blog Bits and Pieces. He shares specific examples of how this tool can be used by systems librarians, library administrators, and library IT decision makers.

B203: Finding Your Social Media Voice

1:45 p.m. – 2:30 p.m.

Meghan Kowalski, Head, Preservation, The Catholic University of America
Kirsten Mentzer, Technology Specialist, Northern Virginia Community College’s Medical Education Campus
Alexandra Radocchia Zealand, Web Editor, New Media Developer and Video Producer, Web Team, Arlington Public Library PLA, VLA, ALA, LLAMA
Lennea R. Bower, Program Specialist, Virtual Services, Montgomery County Public Libraries

This session provides an in-depth look at how to speak in social media. Each institution and organization’s social media accounts has a personality. How you say something is just as important as what you say and why you say it. Your voice on social media says a lot to your followers. If done well, your tone will help to attract and keep an audience. The wrong kind of voice will turn people away. Finding the right voice can be difficult and involves a lot of trial and error. Speakers provide tips for finding the right voice and presenting the best personality for your intended followers. Social media is no longer the “new kid on the block,” and the panel highlights the best ways to communicate content, being real, tone, and more. They showcase what kinds of tones can be used and how to find the “real voice” for your accounts, why those voices are (or are not) successful for those accounts; and how to make your chosen voice sustainable and consistent across your accounts.

C203: Migrating & Developing With Drupal

1:45 p.m. – 2:30 p.m.

June Yang, Senior Librarian, International Monetary Fund
Linda Venable, Systems Librarian, International Monetary Fund
Elizabeth Zoby, Information Specialist, PAE, National Institute of Corrections (NIC)
Billy Mathews, Web Developer, PAE, National Institute of Corrections (NIC)

Migrating to a new ILS system is not easy, and it is even more challenging when faced with a very tight deadline. Presenters share the recent experience of migrating from SirsiDynix Symphony to Alma within 5 months: what worked, what didn’t, lessons learned, and what to prepare in advance of the migration. They also share some insight about post migration work related to data cleanup, workflows review, etc. Zoby and Mathews share their development of the NIC micro-sites using Drupal, an open-source content management software, to create dynamic websites that make accessing material easy and user-friendly. Instead of having to download and shift through large PDF documents, users can access the content on easily searchable websites which can be edited by authorized users. See how the NIC Information Center is using these sites to help customers and the public access information in innovative ways.

D202: Funding Opps for Digital Library Initiatives

11:45 a.m. – 12:30 p.m.

Trevor Owens, Digital Archivist, Office of Strategic Initiatives, Library Of Congress
Nicole Ferraiolo, Program Officer, Scholarly Resources, Council on Library & Information Resources
Joel Wurl, Senior Program Officer, National Endowment for the Humanities

Discovering and deciphering guidelines for grant programs is a daunting and challenging process. This session provides an opportunity to directly hear from and ask questions about grant opportunities for digital libraries’ initiatives to program officers from different government and private funders. Following brief overviews of the relevant funding opportunities at their organizations, panelists discuss the kinds of projects that best fit their specific programs. Get suggestions on how to develop a competitive proposal and insights on the application and review process. Panelists consider themes and trends from the digital library projects that have received funding, such as digitization, open educational resources, linked data, crowdsourcing, open access publishing, emulation and virtualization, and data visualization. By bringing together representatives from different funders, this session offers a unique opportunity to connect directly with program officers and identify new opportunities and approaches for funding.

A301: Augmented Reality & Learning

10:45 a.m. – 11:30 a.m.

Ashley Todd-Diaz, Head, Special Collections & University Archives, Towson University
Earl Givens, Head, Systems & Technology, Catawba College
Art Gutierrez, Head, Technical Services, Emporia State University
Bethanie O’Dell, Virtual Learning Librarian, Emporia State University

Just when you thought the battle of augmented reality (AR) was over with Pokémon GO, libraries across the nation have been exploring additional AR options in order to meet the needs of the mobile learners walking through their doors. With the use of free AR software, four individuals team up to become the ultimate masters of AR. Hear from a panel of closely networked professionals, each with a unique story of embedding AR into specific library services directed for higher education. These stories range from embedding AR with liaison departments to incorporating AR into information literacy sessions (both online and face-to-face).

A304: Multimodal Learning: From Textbooks to Playlists

2:45 p.m. – 3:30 p.m.

Laurie Burruss, Professor, Pasadena City College

Colleges, universities, and libraries are considering adding video making, or visual literacy, as a core skill. Preparing individuals for a highly visual communication landscape requires critical thinking to offset consumerism as well as multimodal learning and cognitive skills. Researching, creating, and sharing video playlists are important ways to create personalized learning pathways and promote continuous learning. Explore a number of case studies that demonstrate the positive learning outcomes of multimodal learning in academic and corporate settings and discover how to create playlists that can be annotated, edited, and shared across teams.

B304: Raspberry Pi

2:45 p.m. – 3:30 p.m.

David Bennett, Systems Librarian, Robert Morris University

Raspberry Pi is an inexpensive computing tool that is ideal for new projects within libraries. It’s a powerful single board computer that plays high-definition video, yet it’s only the size of a credit card. The Raspberry Pi 3 was released in February of 2016, and the built-in networking options make it an exciting fit for library applications. Learn how Raspberry Pi can be used as a people counter, a dedicated OPAC, a social media tool, and more.

D302: Upping Our “Gamification”: Speaking Millennials’ Language

11:45 a.m. – 12:30 p.m.

David Folmar, Emerging Technology Librarian, Main Branch, Richmond Public Library Author, Game It Up! Using Gamification to Incentivize Your Library

Be tech-smart and culture-savvy by using game-design thinking and gaming activities to connect with current users in a fun way and draw in new ones. Hear from a library communicator who literally wrote the book on this topic. Online games are incredibly popular; libraries, book apps, and learning institutions are leveraging this to bring in new audiences and engage with existing ones in new ways. Why are they doing this, what is the benefit, and how do you make it work to promote your library? Get the answers here!

D303: Library Story in Video

1:45 p.m. – 2:30 p.m.

Jennifer E. Burke, President, IntelliCraft Research, LLC

Video is a powerful, emotional storytelling medium that plays well in social media, and its use is still fast-growing. Video can spread your library’s story, and you can do it without hiring an expensive pro. A tech-savvy info pro shares basic video facts, along with her favorite tools, tips, and techniques that almost anyone can use for creating short, compelling videos to promote library services, staffers, and resources.

My note: my mouth ran dry to repeat this to the SCSU library. In vain. 1. make a low-cost social-media type of movie of 30 sec each week/month. 2. post on a prominent place on the library web page. 3. Have web form harvest info from patrons on the issu[s] reflected in the video 4. mirror video on the social media 5. aim as ultimate goal patrons (students, faculty, staff) furbishing the video footage instead of library staff
Why is it soooo difficult to comprehend?

E302: Zero to Maker: Invention Literacy & Mobile Memory Lab

11:45 a.m. – 12:30 p.m.

Dominique China, Information Services Librarian, Brampton Library
Colleen Dearborn, Adult Services Librarian, Alsip-Merrionette Park Library, Alsip, Ill.

Invention literacy is not just about understanding how a thing is made or how it works; it is also the ability to use that knowledge to bring one’s own ideas into reality. China gives examples of how one public library is empowering children, teens, and adults to become “invention-literate” through its maker programming. Find out how a combination of high- and low-tech equipment, safe and accessible learning environments, and a unique community partnership is nurturing invention, creative confidence, innovation, and entrepreneurship. Sparked by the CIL 2016 Hawkins and Mears talk about personal digital archiving and the DCPL Memory Lab, Dearborn shares her library’s inexpensive journey to create a mobile memory lab program. She discusses the acquisition of equipment and technology, the demo classes, lesson plans about personal archiving, outreach to other community organizations, and providing classes on related topics, such as saving and uploading images, backing up files and using cloud storage, writing and self-publishing memoirs, conducting oral interviews with veterans and other family memories, coding and saving memories on a website, etc. Future plans include digitizing local history documents, a community website with links to these documents, as well as to our patrons’ digitized images, videos, interviews and memoirs.

+++++++++++++++++++++
more on technology in library in this IMS blog
http://blog.stcloudstate.edu/ims?s=technology+library

code4lib

Code4Lib Proposed Preconference Workshops

http://2017.code4lib.org/workshops/proposed-workshops.html

Introduction to functional programming principles, including immutability, higher-order functions, and recursion using the Clojure programming language. This workshop will cover getting started with the Clojure REPL, building programs through function composition, testing, and web-development using ClojureScript.

Proposed by: Sam Popowich

This workshop will do a deep dive into approaches and recommend best practices for customizing Blacklight applications. We will discuss a range of topics, including styling and theming, customizing discovery experiences, and working with Solr.

Proposed by: Chris Beer, Jessie Keck, and Jack Reed

We all encounter failure in our professional lives: failed projects, failed systems, failed organizations. We often think of failure as a negative, but it has intrinsic value — and since it’s inevitable that we’ll eventually experience failure ourselves, it’s important to know how to accept it, how to take lessons from it, and how to grow from it professionally. Fail4Lib, now in its 5th year, is the perennial Code4Lib preconference dedicated to discussing and coming to terms with the failures that we all face in our professional lives. It is a safe space for us to explore failure, to talk about our own experiences with failure, and to encourage enlightened risk taking. The goal of Fail4Lib is for participants to be adept at failing gracefully, so that when we do fail, we do so in a way that moves us forward. This half-day preconference will consist of case studies, round-table discussions, and, for those interested in sharing, lightning talks on failures we’ve dealt with in our own work.

Proposed by: Andreas Orphanides and Bret Davidson

Intro to programming in Ruby on Rails

Proposed by: Carolyn Cole and Laney McGlohon

Amazon Web Services currently offers 58 services ranging from the familiar compute and storage systems to game development and the internet of things. We will focus on the 20-some services that you should be aware of as you move your applications to their cloud.

The morning session will be mostly overview and the afternoon session will be more practical examples and discussion. This could be broken into two sessions.

Proposed by: Cary Gordon, t/b/d, and t/b/d

FOLIO is a library services platform — infrastructure that allows cooperating library apps to share data. This workshop is a hands-on introduction to FOLIO for developers of library apps. In this tutorial you will work with your own Vagrant image through a series of exercises designed to demonstrate how to install an app on the platform and use the data sources and design elements the platform provides.

REQUIREMENTS Laptop (4GB) with Vagrant installed.

Proposed by: Peter Murray

Have an idea for an app? Want to work with FOLIO developers and others in the community on the FOLIO platform to make it happen. Come to this half-day hack-a-thon! Ideas for new developers will be posted in the project Jira, or bring your own concepts and work with others to make them reality.

REQUIREMENTS Laptop (4GB) with Vagrant installed. Attending the FOLIO Tutorial is recommended, but not required.

Proposed by: Peter Murray

Google Apps script is a server-side implementation of JavaScript which supports API calls to Google Services. This can provide an excellent platform for developing simple library applications. The libraries at Georgetown University and the University of Dayton have successfully deployed applications built with Google App Script.

In this workshop, we will step through the various types of applications that can be built with Google Apps Script.
(1) Custom cell formulas
(2) Spreadsheet Add On Functions (menu items, time based triggers)
(3) Google Apps Script as a Web Service
(4) Google Apps Script Add-Ons that can be shared globally or by domain

In this workshop, we will build sample instances of each of these types of applications (wifi-permitting) and spend some time brainstorming additional applications that would be useful for the library community.

Sample Applications: http://georgetown-university-libraries.github.io/#google-sheets

Proposed by: Terry Brady and Craig Boman

Calls to mindfulness and self care can have mixed reception in our field. While some view this important work as navel-gazing or unnecessary, it is integral to being present and avoiding burnout. Often this skewed attention to output comes at the expense of our personal lives, our organizations, our health, our relationships, and our mental well-being. Learning to prioritize self-care is an ongoing project among those who perform emotional labor. While some view the work of mindfulness as self-indulgent, it has proven to keep many on the track of being present and avoiding burnout.*

The purpose of this preconference is to provide a short introduction to self care and mindfulness with practical work we can use regardless of setting. We’ll discuss microaggressions and allyship (microaggressions being the brief and commonplace verbal, behavioral, or environmental indignities that marginalized people of various groups experience daily and allyship referring to the powerful role that individuals from privileged groups can play in supporting marginalized individuals). We will then transition to a modified unconference setting where participants can practice scenarios and learn practical solutions. Each of the presenters has different set of skills and experiences that allow for many techniques and strategies to be explored. Preconference attendees will participate in sessions like “Mentor Speed Dating” where they get to talk to and question potential mentors/mentees. They may be coached through a guided meditation or walked through a calming breathing exercise. For those looking to a more physical space, office yoga and stretching techniques may be shared depending on the outcomes of the unconference interest.

Foundational materials and articles will be shared with the registrants prior to the meeting with the option of further discussion at the workshop. An open access guide to all the resources and readings will be available after the preconference, and people will be encouraged to share additional their tools on a website.

Suggested Hashtag #c4lselfcare

* Abenavoli, R.M., Jennings, P.A., Greenberg, M.T., Harris, A.R., & Katz, D.A. (2013). The protective effects of mindfulness against burnout among educators. Psychology of Education Review, 37(2), 57-69

Proposed by: Carmen Mitchell, Lia Friedman, and Torie Quinonez

In this preconference, participants will be introduced to Virtual Reality uses in library settings, notably, by way of the VR Reading Room. Within the VR Reading Room prototype, users can collaboratively explore digital collections (e.g. HathiTrust) by way of VR headsets. Participants of this workshop will have the opportunity to experience HTC Vive functionality. The system will be setup with a prototype e-book experiment in order to model several VR affordances. Once attendees have been introduced to the HTC Vive hardware and sample project, groups of participants will have an opportunity to further brainstorm novel uses cases.

Proposed by: Jim Hahn

Python[1] has become one of the dominant languages in scientific computing and is used by researchers around the world. Its popularity is due in large part to a rich set of libraries for data analysis like Pandas[2] and NumPy[3] and tools for exploring scientific code like Jupyter notebooks[4]. Join us for this half-day workshop on the basics of using Pandas within a Jupyter notebook. We will cover importing data, selecting and subsetting data, grouping data, and generating simple visualizations. All are welcome, but some familiarity with Python is recommended, e.g. the concepts covered in the Codecademy[5] or Google[6] Python courses.

[1] https://www.python.org/
[2] http://pandas.pydata.org/
[3] http://www.numpy.org/
[4] http://jupyter.org/
[5] https://www.codecademy.com/learn/python
[6] https://developers.google.com/edu/python/

Proposed by: Bret Davidson and Kevin Beswick

Learn about the features and capabilities of Sufia, a Hydra-based repository solution. Attendees will participate in a hand-on demonstration where they deposit content, edit metadata, create collections, and explore access control options. Attendees should bring laptops with Chrome, Firefox, or Safari installed. Please plan on bringing at least one image, document, or other digital content that you’re comfortable uploading and using for demo and experimentation purposes 🙂

Proposed by: Mark Bussey and Justin Coyne

The web can be a trove of openly accessible data, but it is not always readily available in a format that allows it to be downloaded for analysis and reuse. This workshop aims to introduce attendees to web scraping, a technique to automate extracting data from websites.

Part one of the workshop will use browser extensions and web tools to get started with web scraping quickly, give examples where this technique can be useful, and introduce how to use XPath queries to select elements on a page.

Part two will introduce how to write a spider in Python to follow hyperlinks and scrape several web pages using the Scrapy framework. We will conclude with an overview of the legal aspects of web scraping and an open discussion.

You don’t need to be a coder to enjoy this workshop! Anyone wishing to learn web scraping is welcome, although some familiarity with HTML will be helpful. Part two will require some experience with Python, attendees unfamiliar with this language are welcome to stay only for part one and still learn useful web scraping skills!

Proposed by: Thomas Guignard and Kim Pham

Paper prototyping is a low-cost, structured brainstorming technique that uses materials such as paper and pencils to better understand the way users interact with physical, visual, and textual information. It can help us learn how to better think through workflows, space design, and information architecture. Session attendees will learn about the ways low-fidelity prototyping and wireframing can be used to develop ideas, troubleshoot workflows, and improve learning and interaction.

In the first half of the workshop, participants will step through activities in icon design, persona development, and task development. In the second half they will develop a low fidelity prototype and step through a guerilla usability testing process with it.

Proposed by: Ekatarina (Eka) Grguric and Andreas Orphanides

1 2