I’m pleased to announce that the Fall 2010 issue of NISO‘s International Standards Quarterly (ISQ) is done and available online to NISO members and ISQ subscribers. Print copies are scheduled to be mailed on December 28th. The individual issue is available for purchase (see the form link to on the issue homepage), and some of the articles are freely available on the NISO website. The theme for the issue is resource sharing, and I was privileged to be the guest editor for the issue. Included below is my introduction letter to whet your appetite for the full issue.
You are using lockdown security cables to protect your PCs, but your accessories — keyboards, mice, and other cables — are still vulnerable to theft. You can use one of these specially built products to lock down the cables, or you can use a 20¢ flat washer from the hardware store to protect these components from minor mischief.
First, sorry about this getting posted prematurely through the DLTJ blog. I was trying the post-from-Flickr function, and it was telling me that the posting wasn’t working. So, it got posted here twice. And it got posted before I was ready; I was hoping it would land in the draft queue so I could edit it with further commentary. Oh, well; live and learn.
Joshua Kim, senior learning technologist and an adjunct in sociology at Dartmouth College, recently had a series of posts about working with software vendors. Although Joshua’s focus is with learning technologies (course management systems, lecture capture systems, etc.), these are general enough to be useful in a variety of library environments as well. His posts, hosted by Inside Higher Ed, were:
- “A Manifesto for Vendor Webinars” (January 31, 2010)
- “5 Questions Your Company Must Answer” (March 4, 2010)
- “Toward a Product Evaluation Framework” (March 7, 2010)
Here are descriptions or excerpts from each of the posts.
Ron Murray, a colleague at the Library of Congress (and no known relation to me), sent me a note about the history of the term
1859D. BOUCICAULT Octoroon I. 13 He don’t understand; he speaks a mash up of Indian, French, and Mexican.
I have to give the creator of the blog spam below points for trying. This is what I found in my WordPress spam queue this morning, embedded here as an image so as not to give Google juice to the spammer:
Honorable mention? Yes. An approved comment? Sorry.
Okay, I know this is starting to seem like an obsession, but I can’t figure out why someone(s) would be constructing tweets that consist of my blog post headlines and links back to my postings. I’m wondering how wide spread this problem is, so I constructed a list of URLs to blog posts based on the Planet Code4Lib Atom feed and pointed them to the Ubervu service. Ubervu has a view into the Twitter firehose, and constructs reports of Twitter mentions of URLs. For instance, I can see all of the for my previous postings through this service. I can then easily scan through the list for other people that seem to be affected by this strange phenomenon.
The following may not be news to those who regularly hang out in Twitter-land, but the extent of the problem recently became clear to me: there is a bunch of spam in Twitter. More specifically, there appear to be robots that do nothing but scan the web for keywords and create tweets with links back to them. There appear to be some that value this service (judging by the number of followers of these Twitter users), but for me it just adds to the general clutter I find in Twitter.
My place of work has moved to office space in downtown Columbus. If you have saved contact information for me, please update it. Those connected to me via Plaxo will get updated information automatically.
These Parts Have Changed
Work address: 35 E. Chestnut St, 8th Floor, Columbus, OH 43215-2541
Phone number: 614-485-6725
These Parts Haven’t Changed
E-mail address: peter@OhioLINK.edu
I usually don’t post about the act of blogging itself (I wonder how many middle-aged blogs have a similar post), but the confluence of a couple of things caused me to look at DLTJ with a critical and curious eye. The first was the work by David Pattern in a post by Leslie Carr on the effect of Google users in finding information.. The second was