Wednesday, January 13, 2010

Some Cool Stuff I Was Guided Into


photo courtesy B Tal

While checking out David Lee King's blog I ran across a post that linked to a recent interview Helene participated in. I read it and then checked out some of the links on that page. I recommend checking out Ideas Are Awesome and the Library Journal article "The E-Memory Revolution", if you haven't already.


Saturday, November 21, 2009

Pivot: The Gears of Discovery Keep Turning



Mary sent a link to this video to me the other day. Think about all of the wonderful repercussions this type of technology has on libraries, particularly when using touch tech with it. While I'm not the biggest fan of Microsoft (prices, policies, procedures), with stuff like this and Project Natal, they're really pushing tech in some good directions, IMO. Wonder if they're turning into another Sony? Creating new stuff only to have it bettered or not adopted, then deciding to scrap it.

Thanks, Mary


Thursday, November 12, 2009

You Can't Do That In The Library - Pictures Edition

I was trawling David Lee King's website and came across a post dealing with photography and/or video in the library. David included a link to a similar topic from Librarian.net. Definitely read/skim the comments for each. Thoughts?


Tuesday, November 10, 2009

From on line Library Journal

I came across this article,

New mission for librarians: knowledge creation in their communities, that led to a link to a Blog that I linked to this Blog. :) Thought you may want to read this. Check out the audio/slides.


Wednesday, November 4, 2009

Computer Security Maxims

I regularly download and listen to a computer security podcast called Security Now with Leo Laporte and Steve Gibson. The podcast is available on the Security Now website in a variety of formats including transcripts. Recently (episode 215), they discussed humorous Security Maxims courtesy of Roger Johnston. Thought you might be interested in reading or listening. Here's a few to chew on:

Infinity Maxim: There are an unlimited number of security vulnerabilities for a given security device, system, or program, most of which will never be discovered (by the good guys or bad guys).
Comment: We think this, because we always find new vulnerabilities when we look at the same security device, system, or program a second or third time, and because we always find vulnerabilities that others miss, and vice versa.

Thanks for Nothin’ Maxim: A vulnerability assessment that finds no vulnerabilities or only a few is worthless and wrong.

Arrogance Maxim: The ease of defeating a security device or system is proportional to how confident/arrogant the designer, manufacturer, or user is about it, and to how often they use words like “impossible” or “tamper-proof”.

Be Afraid, Be Very Afraid Maxim: If you’re not running scared, you have bad security or a bad security product.
Comment: Fear is a good vaccine against both arrogance and ignorance.