December 17th, 2014
A few weeks ago, The Financial Times reported that Facebook plans to build a version of Facebook for workplace communication, called simply “Facebook at Work.” While the FT report garnered a lot of attention, this news was leaked as long ago as last June and is now just being reported with Facebook’s blessing. The many reactions to the news in the technology media gravitated toward two different opinions: Facebook at Work could either have a big impact on the workplace of the future, or it could be a miserable failure.
- How ‘Facebook at Work’ could alter the social enterprise landscape (CIO | Matt Kapko) “Social media has slowly percolated into business life, but for the most part it remains a separate function and utility during working hours. No company has successfully made the leap from consumer to enterprise and combined the two together at any scale even remotely similar to Facebook’s 1.35 billion monthly users. Facebook at Work will reportedly look and operate like the traditional version of Facebook, but it will allow users to chat with colleagues, connect with professional contacts and collaborate on documents in a space that’s separate from their personal identities and activities.”
- ‘Facebook at Work’ could target Google and LinkedIn (MarketWatch | Quentin Fottrell) “With only 322 million users, LinkedIn is still a minnow compared to Facebook’s Leviathan. Facebook is also a fun social network where people have learned about their own personal brand and how to present themselves online for job hunters who investigate their digital footprint, and could usurp LinkedIn much in the same way a more intuitive iPhone replaced the BlackBerry for both work and play….”
- Facebook developing ‘Facebook at Work’ service, says report (Wired | Issie Lapowsky) “The Financial Times reports that although users of Facebook at Work will be able to keep their personal accounts separate, the site will include Facebook staples, including groups and News Feed. And yet, it may be a challenge for Facebook, a company intent on tapping user data for advertising purposes, to convince businesses that their internal documents and conversations will remain confidential on the site.”
- Facebook at Work? Not so fast. (Re/Code | Kurt Wagner) “Even though the new product will be separate, Facebook’s tools aren’t associated with many workplace environments. In the financial services industry, for example, the use of Facebook and even personal email accounts is forbidden for both security and productivity reasons. Facebook will need to convince businesses it can be trusted with sensitive information that’s passed around company discussion boards. That’ll be a challenge as Facebook’s trove of user data often rubs people the wrong way — they’ve made a business out of our personal information, after all.”
Articles from Ohio Web Library:
December 10th, 2014
It seems like every day brings news of another major Internet hack, some so huge and cunning that they are blamed on government-sponsored “armies” of hackers. According to one recent report, 82% of U.S. companies were hit last year by at least one online attack, and though libraries may think nobody would bother to attack them, they, too, are increasingly coming under attack. And there is also almost daily news of surveillance of Internet traffic (sometimes in preparation for a hack). No doubt about it, the Internet has become scary. Last month, to combat this trend, the Internet Architecture Board (IAB) recommended that most Internet traffic be encrypted by default, rather than using encryption only in special circumstances.
- Q&A: Internet encryption as the new normal (Dark Reading | Kelly Jackson Higgins) “The Internet Architecture Board (IAB), which oversees the Internet’s architecture, protocols, and standards efforts, officially called last month for encryption to be deployed throughout the protocol stack as a way to lock down the privacy and security of information exchange. It was a bold and important statement from the IAB, and it likely will be the general blueprint for new protocol efforts by the Internet Engineering Task Force (IETF), which creates the protocol specifications that run the Internet and devices and systems connected to it.”
- IAB statement on Internet confidentiality (IETF mail archive | Russ Housley) “The IAB urges protocol designers to design for confidential operation by default. We strongly encourage developers to include encryption in their implementations, and to make them encrypted by default. We similarly encourage network and service operators to deploy encryption where it is not yet deployed, and we urge firewall policy administrators to permit encrypted traffic. We believe that each of these changes will help restore the trust users must have in the Internet.”
- IAB urges designers to make encryption the default (Threatpost | Dennis Fisher) “The statement by the IAB is a direct response to the events of the last couple of years and the revelations by Edward Snowden of the NSA’s massive surveillance on the Internet. Internet companies and technology vendors have responded to the NSA revelations by increasing their use of encryption, especially on links between data centers. But the Internet itself was not designed with security in mind. Rather, openness and interoperability were the main goals of the network’s designers. The IAB believes that ubiquitous encryption can help address the shortcomings of the original design and protect users from attackers and surveillance.”
- Internet Society commends Internet Architecture Board recommendation on encryption-by-default for the Internet (The Internet Society) “Like the IAB, the ISOC Board of Trustees recognizes that implementing this aspiration raises a number of practical issues and technical challenges. In addition to network management, intrusion detection, and spam prevention, we expect there will be economic and policy challenges. As the organizational home for the IETF, the Internet Society will take an active role in facilitating and participating in the conversations required to address these challenges going forward.”
Articles from Ohio Web Library:
December 3rd, 2014
How many times have you had a library patron say, “I once read a really good book, it had a red cover with a bicycle on the front [or some other cover description] — can you find that for me again?” That kind of request to basically find a described image (the book cover) doesn’t just happen in libraries anymore. As the content of the Internet continues to shift from text to graphics, accurately searching for images based on a general description becomes more and more important to some of the biggest Internet companies. In the past couple of weeks, researchers at both Google and Yahoo (owner of Flickr) have posted some interesting news about their recent work to improve image searching.
- A picture is worth a thousand (coherent) words: Building a natural description of images (Google Research Blog | Oriol Vinyals, Alexander Toshev, Samy Bengio, and Dumitru Erhan) “But accurately describing a complex scene requires a deeper representation of what’s going on in the scene, capturing how the various objects relate to one another and translating it all into natural-sounding language. Many efforts to construct computer-generated natural descriptions of images propose combining current state-of-the-art techniques in both computer vision and natural language processing to form a complete image description approach. But what if we instead merged recent computer vision and language models into a single jointly trained system, taking an image and directly producing a human readable sequence of words to describe it?”
- Image search, analysis emerge as powerful tools, privacy threat (eWeek | Mike Elgan) “In a nutshell, these systems identify objects in a photograph—say, a boy, a dog, a ball, a tree, a park, a bird, some clouds and so on—then use sophisticated artificial intelligence to understand that the boy is throwing the ball for the dog to chase in a park and that the bird isn’t involved in the main action of the photo. Combine this technology with face recognition and anyone with access (which will be everyone) will be able to search the Web for people doing things or involved with or associated with some activity.”
- Science powering product: Yahoo Weather (Yahoo Labs | David A. Shamma, Jia Li, Lyndon Kennedy, and Bart Thomée) “But even more difficult than finding a stunning photo that accurately reflects the weather in a given location is the challenge of finding what the Flickr community believes is an interesting weather photo. A little while before we set out to surface our one million photos, we made an observation about how people designate photos on Flickr as ‘favorites.’ Something as simple as favorites and likes on social network sites are rich social signals that can be used to surface themes of images.”
- Finding an image with an image and other feats of computer vision (Ars Technica | Megan Geuss) “Yahoo’s efforts to make photo search better has a simple mantra: ‘more relevant photos for users, not just the most popular photos,’ as Li put it. To that extent, Flickr tries to improve general search while also improving search relevance within a person’s likely-massive online photo album. Shamma noted that batch upload and the gigabytes and terabytes of storage offered to customers at relatively cheap prices have changed how we photograph things. Accordingly, storage and recall of photographs has to adapt to fit the morphing definition of photography. ‘The practice of photography is changing very quickly, using photos for communication has been growing,’ Shamma said.”
Articles from Ohio Web Library:
November 26th, 2014
This may not have much to do with library technology — not yet, anyway — but it’s a cool story nonetheless. Libraries have always been involved with efforts to open the world of books to those who have vision impairment, of course, but it seems like new technologies that could be useful are often around for years before someone adapts them for the blind. Wearable technology, like Google Glass, easily could have become another example of new technologies ignoring the visually impaired; but now Microsoft is testing some wearable technology that has the potential to significantly enrich the lives of the blind.
- Microsoft’s bone-conducting headset guides the blind with audio cues (Endgadget | Mariella Moon) “Microsoft, for one, is currently testing a new headset (developed with help from UK charity Guide Dogs) that uses 3D soundscape technology to guide its users with audio cues along the way. That bone-conducting headset can’t work alone, though: it needs to be connected to a smartphone, as well as to receive information from Bluetooth and WiFi beacons placed in intervals throughout the roads users take.”
- Independence Day: A new pilot program sets people with sight loss free to experience cities like never before (Microsoft/Stories | Jennifer Warnick) “Microsoft designers worked incredibly closely with Guide Dogs — its employees, mobility experts and users like Bottom and Brewell — to genuinely understand the challenges of traveling to and fro with vision loss. The engineers and designers from Microsoft and mobility experts and users from Guide Dogs spent countless hours in the field together. In rain and wind, they patiently tried various half-baked ideas, experimented with different approaches to hardware and software, and gave essential feedback to help shape the technology every step of the way.”
- Blind Microsoft director offers bold new vision w/ help from father of multi-touch (Daily Tech | Jason Mick) “After all, dogs can’t tell you where the closest spot to grab a bite to eat is. A smartphone might tell you that. But even they fall short. A local public transit authority might offer vision impaired auditory clues, for example, and/or release a well-integrated smartphone app that tells riders exactly what bus is arriving when. But many city services lack these kind of accessibility efforts. And even those that have them, may be unable to save a vision impaired person from getting on the wrong bus, if the scheduled bus on the route is running late, and a different route is running early.”
- Microsoft had to blindfold me so I could hear the future (The Verge | Tom Warren) “The real magic of this system is the 3D audio technology that gives you a real sense of direction. One feature on the headset allows you to push a button and hear a list of nearby places of interest. They’re processed through the headset dependant on the direction you’re facing so that when a store is read aloud you’ll be able to hear the direction of where it’s located. That might be in the rear left or out in front, but the audio gives you a clear sense of where that store is along a route through just sound alone.”
Articles from Ohio Web Library:
November 19th, 2014
A couple of weeks ago, a paper was published on arXiv.org, hosted by the Cornell University Library, regarding a study of how often older scholarly papers that have been digitized and put online are cited in new scholarly papers. The paper (“On the shoulders of giants,” first link below) presents data indicating that citing older papers is becoming more common recently, as more of them are available online. The paper itself cites older studies, including one of OhioLINK database usage, and briefly discusses some library tools for assessing the usefulness of older journals. You could argue that this study supports the value of libraries purchasing databases of journal articles, but you should keep in mind that the authors of the paper work for Google.
- On the shoulders of giants: The growing impact of older articles [pdf] (arXiv.org | Alex Verstak et al.) “For most fields, retrospective digitization as well as inclusion in a broad-based search service with relevance ranking occurred in the second half of the period of study. As mentioned earlier, this is also the period that saw a larger growth in the fraction of older citations. Now that finding and reading relevant older articles is about as easy as finding and reading recently published articles, significant advances aren’t getting lost on the shelves and are influencing work worldwide for years after.”
- Older papers are increasingly remembered—and cited (Science | John Bohannon) “For a study to mark Google Scholar’s 10th anniversary celebration, its researchers analyzed scientific papers published between 1990 and 2013. They divided the papers into nine broad research areas and 261 subject categories. Then they compared the publication dates of the papers cited in all those papers. (Google Scholar is universally acknowledged to index more scientific documents than anyone else, but as usual, the researchers are keeping the size of their data set secret.)”
- The extraordinary growing impact of the history of science (Medium | The Physics arXiv Blog) “There are one or two interesting wrinkles in the data. These trends appeared in 231 out of 261 subject areas. But many of the subject areas that experienced a decline in older citations were part of two broader areas: chemical and materials sciences, and engineering. Consequently, these broad disciplines show almost no increase in old citations.”
- Digitization is increasing the accessibility of old scientific papers, and of history (SelfAwarePatterns | Mike Smith) “Will this make history more relevant for everyone? I think it will make history more accessible. But history has always been relevant. I wish I could say it will make people more likely to check history, but I have to admit that I doubt it. Despite the incredible amount of information available at people’s finger tips these days, I can’t say that I’ve noticed that, in general, they are really any more informed than they were before the internet.”
Articles from Ohio Web Library:
November 12th, 2014
A few weeks ago, we considered doing a 4cast about emoji. Emoji are not really new, however – we’re just hearing more about them lately – and frankly, some of you guys out there probably know more about them than we do. But last week, the Unicode Consortium, which is working on guidelines for making emoji characters that can be used across a wide variety of platforms, released a new draft of those guidelines that included a section on diversity. Now emoji are becoming a richer “language” that might be used for some serious communication.
- Unicode wants to fix emoji’s ethnicity problem (ReadWrite | Lauren Orsini) “The Unicode Consortium notes that emoji were originally intended to have a ‘a more generic (inhuman) appearance, such as a yellow/orange color or a silhouette,’ but Japanese carriers soon set a light skinned precedent, intending the emoji to look like the Japanese people who first used them. Since emoji use has long since spread from Japan to the rest of the world, emoji diversity is overdue.”
- Proposed changes to emoji standard would allow for more diversity, increased selection of skin tones (TechCrunch | Sarah Perez) “They weren’t encoded into the Unicode Standard until 2010, but having originally grown out of a smaller geographic region, the ‘generic’ images being used didn’t accurately reflect the diversity found elsewhere in the world. Over time, things have progressed … slowly. Apple updated its emoji collection in 2012 to include a lesbian and homosexual couple, for example. But even then, people wanted to know, where were the black emoji?”
- Unicode proposes a way to let an emoji black man and white woman hold hands (Ars Technica | Casey Johnston) “To introduce diversity, the developers propose introducing five color swatch emojis of skin tones that, when combined with an existing person emoji, would render as a single ‘emoji presentation’ with the skin color in question. So for instance, a font could take a boy face plus brown swatch and render a boy with a brown skin tone and darker hair.”
- Proposed draft Unicode technical report #51: Diversity (Unicode Consortium | Mark Davis and Peter Edberg, eds.) “There are several emoji for multi-person groups, such as COUPLE WITH HEART. The emoji modifiers affect all the people in such characters. However, real multi-person groupings include many in which various members have different skin tones. For representing such groupings, users can employ techniques already found in current emoji practice, in which a sequence of emoji is intended to be read together as a unit, with each emoji in the sequence contributing some piece of information about the unit as a whole.”
Articles from Ohio Web Library:
November 5th, 2014
We’ve blogged about the Federal Communication Commission’s E-Rate reforms in an earlier 4cast, so you may remember that one of the big changes is a push to use more E-Rate money to support the management and operation of Wi-Fi in schools and libraries, including installation, activation, and initial configuration of eligible components. The FCC’s “push” will come in the form of $2 billion of new E-Rate funding over the next two years for Wi-Fi upgrades, which of course has the attention of Wi-Fi vendors. Now we’re starting to see some vendors take an advantage in the rush for the new money, through their involvement with the President’s ConnectED initiative, which prepared the ground in many ways for the FCC’s E-Rate reforms.
- Apple’s ConnectED program participation brings Macs, iPads and more to underserved schools (TechCrunch | Darrell Etherington) “Apple’s program will put an iPad in the hand of each student at these  schools, give both an iPad and a Mac to every teacher and admin staff, and put an Apple TV in each classroom. It’s truly a full-coverage approach, and it should mean that these schools, at least from a technological perspective, get to stand on more equal footing with some of their better-funded peers.”
- Apple details how its $100 million pledge to Obama’s ConnectED will help schools (The Verge | Chris Welch) “Apple wants to see things through with its pledge to ConnectED, and that extends beyond simply passing its products around. The company says each school will be assigned a dedicated Apple Education Team that will help educators integrate the technology in lessons and ensure they can make the most of what they’ve been given.”
- Apple picks Aerohive for ConnectED program (Network Computing | Lee Badman) “Aerohive Networks announced today that it’s been selected as the sole WiFi infrastructure provider for ConnectED as part its relationship with Apple, which is expected to be a major provider of devices to the program. Apple plans to provide $100 million in resources to the initiative, including client devices (iPads and AppleTVs) and the Aerohive network switches and APs that will form the new infrastructure for ConnectED schools.”
- Aerohive Networks teams with Apple to drive Obama’s ConnectED program (CRN | Kristin Bent) “[Bill] Hoppin [vice president of business development at Aerohive] said all of Aerohive’s ConnectED implementations will be done by its partner and managed service provider, Education Networks of America (ENA). He said in addition to helping deploy Aerohive’s technology, ENA will provide schools with ENA Air, a turnkey managed services offering for wireless infrastructures.”
Articles from Ohio Web Library:
October 29th, 2014
Sometimes new tech ideas that might be of interest to libraries do not happen quickly and make a big splash, but rather slip slowly and quietly into practice. Animated GIFs – short, repetitive animations done in Graphics Interchange Format – came to be known years ago as a defining characteristic of less-than-serious websites and are the technology behind many of those annoying ads that border web pages, so they are not exactly quiet and unobtrusive. But it seems they do have a more serious side that is not as splashy and can possibly be useful to libraries. Is your library using any animated GIFs for online library “how-to” guides or other instructional materials?
- Animated GIFs: From gimmick to gestalt (University of Alaska Fairbanks eLearning Instructional Design Team blog | Christen Bouffard) “GIFs are well suited for illustrating sequential processes. Many explanations we may want to share with others do not require all the time involved in shooting a video or creating a screencast. Sometimes these explanations can be most effectively conveyed in just a handful of frames, free of audio narration, excessive bandwidth usage, and extraneous media players.”
- Using animated GIF images for library instruction (In the Library with the Lead Pipe | Karl Suhr) “One initial attraction to exploring the use of animated GIFs was as an alternative to video. Given a choice between a video, even a short one, and some other media such as a series of captioned images or simple text, in most cases I will opt for the latter, especially if the subject matter demonstrates or explains how to do something. Some of this is merely personal preference, but I suspected others had the same inclination. In fact, a study by Mestre that compared the effectiveness of video vs. static images used for library tutorials indicated that participants had a disinclination to take the time to view instruction in video form.”
- How to use GIFs to enhance your visual content marketing strategy (Everypost | Fernando Cuscuela) “GIFs that function as how-tos, product demos, or instructional guides are a great way to convey a lot of information efficiently, and can be even better than blog articles or long-form social media posts.… What’s more, the GIF version is much more visually appealing, memorable, useful and therefore shareable.”
- Why aren’t animated gifs used for more practical purposes? (Replicator | Joseph Flaherty) “So why aren’t these miniature animations used more widely for practical purposes? Do any ecommerce sites use animated gifs to show off the unique features of a product? How about replacing turgid instructional guides with gif-tastic help pages? Animated images are a perfect midpoint between static images and full on video content, but are rarely used for productive purposes, with a few exceptions.”
Articles from Ohio Web Library:
October 22nd, 2014
At its latest meeting, the OPLIN Board discussed making a substantial financial commitment to protecting OPLIN participants from Distributed Denial of Service (DDoS) attacks. DDoS attacks send so much traffic to a victim’s web server – often a company or organization big enough to have made enemies in the hacker community – that the victim’s Internet connection or web server cannot handle it all, and their website becomes inaccessible to legitimate traffic: a “denial of service.” The “distributed” part of the name refers to the fact that a single computer cannot generate enough traffic to overwhelm most systems, so the traffic comes from an automated collection of computers that have been infected with malware – a “botnet” – that is under the control of a bot master. Botnets are also used for ad fraud, spam, and testing stolen credit cards. OPLIN staff were mystified as to who would go to the trouble and expense of launching a DDoS attack at a library, but then we learned how cheap and easy it is to rent a botnet these days.
- DDoS in 2014: The new Distributed Denial of Service attacks and how to fight them (Continuum MSP blog| Steven J. Vaughan-Nichols) “Other DDoS attacks go after your Web servers themselves rather than the Internet connection by devouring server resources. With these, if you even had infinite bandwidth, a site could still be taken down. DDoS Botnets used to be made up almost entirely of malware-infected Windows PCs. Now, even poorly secured mobile devices are getting into the act. The process is not particularly complicated or technical. You can rent a botnet suitable for launching a DDoS attack for a few bucks an hour.”
- Renting a zombie farm: Botnets and the hacker economy (Symantec Security Insights Blog | Tim G.) “Similar to Amazon Web Services renting cloud capacity to any number of applications, a bot master will often lease their bot out to subsequently commit other cybercrimes. This means individuals with little or no skill in creating a botnet can rent one capable of crippling a major website with a DDoS attack for as little as $100-200 USD per day.”
- You don’t have to be an evil hacker genius to bring down PlayStation (Businessweek | Dune Lawrence) “Incapsula’s chief business officer and a co-founder Marc Gaffan calls DDoS ‘the weapon of choice’ for hackers these days, in part because technology is making it increasingly convenient and powerful (sound familiar?). It doesn’t take much money to inflict a costly headache on a business. An attacker can rent a ‘botnet’—a network of infected zombie computers controlled by cyber criminals—to mount a DDoS campaign for less than $10 an hour, according to Verizon’s most recent Data Breach Investigations Report (PDF).”
- DDoS attacks can take down your online services (TechPro Essentials | Dr. Bill Highleyman) “Botnets are readily available for rent on the darknet, private networks where connections are made only between trusted peers. Hackers form a community of trusted peers and can gain access to botnet rentals. The cost for botnets is relatively modest given the damage they can inflict. For instance, the following botnet rentals are advertised on the darknet: 10,000 PCs – 10 gbps – $500 per month; 100,000 PCs – 100 gbps – $200 per day.”
Articles from Ohio Web Library:
October 15th, 2014
A couple of weeks ago, the Federal Communications Commission fined the Marriott hotel chain $600,000, charging that they “…intentionally interfered with and disabled Wi-Fi networks established by consumers in the conference facilities of the Gaylord Opryland Hotel and Convention Center in Nashville, Tennessee, in violation of Section 333 of the Communications Act.” In plainer English, Marriott was sending signals that disabled the cellular mobile hotspots that people at the conference facility were trying to set up for use by their group, thus getting around paying steep fees charged by Marriott for using their in-house Wi-Fi. (If you’re curious about how steep these fees can be, OPLIN just paid the Greater Columbus Convention Center $10,000 for Wi-Fi access for OLC Convention attendees last week.) While most media reported this story as an example of a hotel getting caught being greedy, the FCC’s action raised ticklish questions for some technicians responsible for maintaining Wi-Fi networks.
- Marriott fined $600,000 by FCC for blocking guests’ Wi-Fi (CNN | Katia Hetter) “Marriott issued the following statement Friday afternoon defending its actions: ‘Marriott has a strong interest in ensuring that when our guests use our Wi-Fi service, they will be protected from rogue wireless hot spots that can cause degraded service, insidious cyber-attacks and identity theft,’ the statement said. ‘Like many other institutions and companies in a wide variety of industries, including hospitals and universities, the Gaylord Opryland protected its Wi-Fi network by using FCC-authorized equipment provided by well-known, reputable manufacturers.’”
- Understanding FCC decision regarding Wi-Fi containment at Marriott (Mojo Wireless | Hemant Chaskar) “In this case, it seems FCC reached the conclusion that rogue containment was used in a manner to disrupt rightful communications of users even though they did not pose security threat to the Marriott network. I think everyone would agree with the FCC position here. Some may bring up the hotel Wi-Fi performance degradation issue due to personal hot spots, but Wi-Fi operates in the public spectrum and does not guarantee performance in the first place.”
- Prudence in the wake of the FCC’s ruling on Marriott jamming WiFi (IT Connection | Mike Fratto) “On the other hand, Marriott – and any organization running a WiFi network – has good reason to monitor its airspace in order to provide good service. If you look at the airspace at any public venue, it is a mess of access points overlapping channels and degrading WiFi access for everyone, and there is no way for a venue owner to provide good service in that environment. However, protecting unwitting guests from ‘insidious cyber-attacks and identity theft’ is a specious argument and not one you should make unless you have tangible proof.”
- FCC-Marriott WiFi blocking fine opens Pandora’s box (Network Computing | Lee Badman) “Many of us have bought into the fact that WLAN can be as good and secure as Ethernet, and the WLAN industry says we shouldn’t hesitate to include WiFi in our critical infrastructures. But we need the FCC to provide some clarity. Even if it’s not OK to ‘jam’ in whatever form that may take, it ought to be OK to have ‘Thou shalt not use’ policies for our own spaces. The FCC didn’t say that’s acceptable, but it really needs to at this point.”
Articles from Ohio Web Library: