Emily Clasper of the Suffolk County Library. This sounded like a really great idea because it is an out-of-band (e.g. something that doesn’t rely on OhioLINK infrastructure for reporting downtimes) way to get messages to member staff and users. But I didn’t get a chance to work on my implementation for a while, so for over a year ideas have bubbled around in my head about ways to apply this technique and improve on it. I finally carved out some spare time to actually work on it, and came up with my take on the concept. The result is the OhioLINK Status-Via-Twitter service.
At the ALA Annual Conference exhibit floor I got my first chance to see the RDA Toolkit. RDA is “Resource Description and Access” — the new standard for bibliographic description of content. So this was the first time I really got to look at the RDA Toolkit. (By the way, you can look at it, too, during an open trial access period that runs through the end of August by signing up for it.) What really struck in me the demonstration, though, was that the site is as much a subscription to access the content of the RDA standard as it is a subscription to a delivery service with functions and features that go beyond the text of the standard itself. The text of the standard will be available in printed form, but one cannot get an electronic copy of the standard itself. This strikes me as sort of weird, so this blog post talks through that weirdness feeling.
Ron Murray and Barbara Tillett, both from the Library of Congress, are presenting their research in thinking about bibliographic information as networks of interrelated nodes at ALA Annual. This is a continuation of their “paper tool” work which was presented at the Library of Congress last year.
Back in the early days of this blog, I had a post on Buzzwords Galore and Bandwidth that May Rival Your Station Wagon. The topic was a “hybrid optical and packet network” being deployed by Internet2 in 2006, and in the tail end of the post text I explained the reference to the station wagon part of the post title:
When you think you have a really zippy network connection, someone will (should?) bring up an old internet adage which says “Never underestimate the bandwidth of a station wagon full of tapes.”
I’m working with some colleagues at the Library of Congress on the on the description of complex analog and digital resources. In that research, we want to get a better sense of what people who read DLTJ call a “mash-up.” We invite readers to provide examples (in any medium) of what they think are mash-ups of different resources in the comment area of this post. If you nominate a web-accessible mash-up, please provide a link for it. If you nominate an analog mash-up (they do exist!), please provide a reasonable citation. If it is a hybrid – do your best! Also helpful would be a short statement as to why you think the example is a mash-up, and whether you like the results.
My place of work has installed a VPN that moderates our access to the server network using the OpenVPN protocol. This is a good thing, but in its default configuration it would send all traffic — even that not destined for the machine room network — through the VPN. Since most of what I do doesn’t involve servers in the machine room, I wanted to change the configuration of the OpenVPN client to only send the machine room traffic through the VPN and everything else through the (original) default gateway. As it turns out, this involves tweaking the routing tables.
Tom emphasized the need to have an activity that is relevant to the technology. As he put it, “Use the technology to ampliy the activity.” In this specific case, the 2-D barcodes pointed to text, pictures, and videos that provide additional background to the components depicted in the World War II Memorial. As participants mentioned in the video, it is a way add context to the experience of walking through the memorial.
Most e-mail messages I send are digitally signed using a process called “Pretty Good Privacy“, or PGP. In e-mail applications that don’t understand PGP, this digital signature will show up either as an attachment called “PGP.sig” or as a part of the message starting with “BEGIN PGP SIGNATURE” at the bottom of the e-mail. This file — containing gibberish to the human eye — is used by PGP-aware programs to verify that the message actually came from me. If you are using PGP, I could also sent you a message that only you could read (e.g. “encrypted”). This page gives some background on PGP and why I consider it important.
It is the start of a new year1, and it seems like a good time to update my public encryption key. My previous one — created in 2004 — is both a little weaker, cryptographically speaking, than the ones newly created (1024-bit versus 2048-bit) and also an uncomfortable mixing of my professional and personal lives. For my previous key, I attached all of my professional and personal user ids (e.g. e-mail addresses) to the same key. This time I decided to split my work-related user ids from my other ones. My reasoning for the split is that I might be compelled by my employer to turn over my private key to decrypt messages and files sent in the course of my work. If my personal user ids are also attached to that private key, my employer (and who ever else got ahold of that key), would be able to decrypt my personal messages and files as well. That is not necessarily a good thing. So my solution was to create two keys and cross-sign them. I’ve outlined the process below.
These keys are part of a computer standard and software algorithm called “Pretty Good Privacy“, or PGP. If you are interested in more of a background about PGP, see a companion post on why I digitally sign my e-mail.
- Some have even said it is the start of a new decade, but of course that isn’t true. We won’t start a new decade until 2011, just like we didn’t actually start a new millennium until 2001. [↩]
OCLC announced on Monday the availability of a new