I’m working with some colleagues at the Library of Congress on the on the description of complex analog and digital resources. In that research, we want to get a better sense of what people who read DLTJ call a “mash-up.” We invite readers to provide examples (in any medium) of what they think are mash-ups of different resources in the comment area of this post. If you nominate a web-accessible mash-up, please provide a link for it. If you nominate an analog mash-up (they do exist!), please provide a reasonable citation. If it is a hybrid – do your best! Also helpful would be a short statement as to why you think the example is a mash-up, and whether you like the results.
My place of work has installed a VPN that moderates our access to the server network using the OpenVPN protocol. This is a good thing, but in its default configuration it would send all traffic — even that not destined for the machine room network — through the VPN. Since most of what I do doesn’t involve servers in the machine room, I wanted to change the configuration of the OpenVPN client to only send the machine room traffic through the VPN and everything else through the (original) default gateway. As it turns out, this involves tweaking the routing tables.
Tom emphasized the need to have an activity that is relevant to the technology. As he put it, “Use the technology to ampliy the activity.” In this specific case, the 2-D barcodes pointed to text, pictures, and videos that provide additional background to the components depicted in the World War II Memorial. As participants mentioned in the video, it is a way add context to the experience of walking through the memorial.
Most e-mail messages I send are digitally signed using a process called “Pretty Good Privacy“, or PGP. In e-mail applications that don’t understand PGP, this digital signature will show up either as an attachment called “PGP.sig” or as a part of the message starting with “BEGIN PGP SIGNATURE” at the bottom of the e-mail. This file — containing gibberish to the human eye — is used by PGP-aware programs to verify that the message actually came from me. If you are using PGP, I could also sent you a message that only you could read (e.g. “encrypted”). This page gives some background on PGP and why I consider it important.
It is the start of a new year1, and it seems like a good time to update my public encryption key. My previous one — created in 2004 — is both a little weaker, cryptographically speaking, than the ones newly created (1024-bit versus 2048-bit) and also an uncomfortable mixing of my professional and personal lives. For my previous key, I attached all of my professional and personal user ids (e.g. e-mail addresses) to the same key. This time I decided to split my work-related user ids from my other ones. My reasoning for the split is that I might be compelled by my employer to turn over my private key to decrypt messages and files sent in the course of my work. If my personal user ids are also attached to that private key, my employer (and who ever else got ahold of that key), would be able to decrypt my personal messages and files as well. That is not necessarily a good thing. So my solution was to create two keys and cross-sign them. I’ve outlined the process below.
These keys are part of a computer standard and software algorithm called “Pretty Good Privacy“, or PGP. If you are interested in more of a background about PGP, see a companion post on why I digitally sign my e-mail.
- Some have even said it is the start of a new decade, but of course that isn’t true. We won’t start a new decade until 2011, just like we didn’t actually start a new millennium until 2001. [↩]
OCLC announced on Monday the availability of a new
There is an final report as submitted to the Mellon Foundation. This version of the report has minor corrections in the text and now includes information about the group of libraries that have committed to the build phase of the project. Those libraries are:on the OLE Project site that links to the
- Indiana University (lead)
- Florida Consortium (University of Florida, Florida International University, Florida State University, New College of Florida, Rollins College, University of Central Florida, University of Miami, University of South Florida, and the Florida Center for Library Automation)
- Lehigh University
- Triangle Research Libraries Network (Duke University and North Carolina State University participating)
An interesting thing happened at my place of work (OhioLINK) today. We recently added links to our central catalog pointing to manifestations in Google Books. The way it was decided to set it up, though, was to only point to Google Books if the full text was available. We tweeted about it to let our community know that this option was now available. The tweet included a link to a particular record that showed (at the time) an example of this change: Mark Twain’s Life on the Mississippi.
NISO voting members are currently considering two new work items: a statement of best practices for the physical delivery of library resources and formalizing the NLM journal article DTD de facto standards. The Physical Delivery and Standardized Markup for Journal Articles proposal documents are openly available for download.