Tehnici de cautare in bazele de date
24 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Dinut Dragos Daniel from Library 2.0
Scoop.it!

Managing Social Media in Libraries, by Troy Swanson #libraries #socialmedia #books

Managing Social Media in Libraries, by Troy Swanson #libraries #socialmedia #books | Tehnici de cautare in bazele de date | Scoop.it
Managing Social Media in Libraries, published by Woodhead Publishing. ISBN 978 1 84334 711 8. E-ISBN 978 1 78063 377 0. Book. Swanson.

 

"Provides practical ways of thinking about social media for library managers and leaders
- provides examples of policies, workflows, and uses of social media tools for library managers and leaders
- defines organizations as coordinated systems and discusses how social media tools can emphasize the benefits of coordination
- presents a context for social media in libraries

Web 2.0 first created a scramble among librarians to participate in Facebook, YouTube, blogs, and other social media applications, and the turn is now towards management and consolidation. Managing Social Media in Libraries explores the developing information environment, the collaboration among library organizations, and the ways social media may convert the loose connections between library staff members. The book takes librarians beyond the mechanics of using social media, and establishes a framework to move library managers and leaders toward making social media effective. Managing Social Media in Libraries is structured around key topics in this area, including: refocusing after the first use of Web 2.0; library organisations as loosely coupled systems; social media within such systems; defining a purpose for the use of social media; connecting messages and tools; and integrating social media into standard websites."


Via Karen du Toit, lmalita
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from Library 2.0
Scoop.it!

Answering some Questions about Social Media | Who in your library has the responsibility? David Lee King

Answering some Questions about Social Media | Who in your library has the responsibility? David Lee King | Tehnici de cautare in bazele de date | Scoop.it
Once in awhile, some of you guys ask me questions via email. Usually, I just answer back in another email.

Via Patrick Provencher, lmalita
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from Library 2.0
Scoop.it!

social media for...libraries | What's On - City Of Sydney

social media for...libraries | What's On - City Of Sydney | Tehnici de cautare in bazele de date | Scoop.it
Libraries are providing social media classes to the community but how do they actively engage with it themselves?

Via lmalita
more...
Anne Muntean's curator insight, May 23, 2013 5:58 AM
“Google can bring you back 100,000 answers, a librarian can bring you back the right one.” Neil Gaiman
Rescooped by Dinut Dragos Daniel from OSINT News
Scoop.it!

Aurora attackers were looking for Google's surveillance database

Aurora attackers were looking for Google's surveillance database | Tehnici de cautare in bazele de date | Scoop.it
When in early 2010 Google shared with the public that they had been breached in what became known as the Aurora attacks, they said that the ...

Via Paulo Félix
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from @NewDayStarts
Scoop.it!

Ipswich: Police investigator charged with illegally obtaining personal details from Suffolk Constabulary database

Ipswich: Police investigator charged with illegally obtaining personal details from Suffolk Constabulary database | Tehnici de cautare in bazele de date | Scoop.it

Via @NewDayStarts
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from Cloud Central
Scoop.it!

Rackspace Woos Developers, Fights Sagging Revenue -- InformationWeek

Rackspace Woos Developers, Fights Sagging Revenue -- InformationWeek | Tehnici de cautare in bazele de date | Scoop.it
Rackspace adds support for SDKs and APIs to its OpenStack Cloud, hoping to encourage developers to use its service.

Via Peter Azzopardi
more...
Peter Azzopardi's curator insight, May 22, 2013 1:26 PM

Competition is beginning to bite.

Rescooped by Dinut Dragos Daniel from Plant Breeding and Genomics News
Scoop.it!

Rice FOX Database

Rice FOX Database | Tehnici de cautare in bazele de date | Scoop.it

Rice is one of the most important crops worldwide, both as a staple food and as a model system for genomic research. In order to systematically assign functions to all predicted genes in the rice genome, a large number of rice mutant lines, including those created by T-DNA insertion, Ds/dSpm tagging, Tos17tagging, and chemical/irradiation mutagenesis, have been generated by groups around the world. In this study, we have reviewed the current status of mutant resources for functional analysis of the rice genome. A total of 246 566 flanking sequence tags from rice mutant libraries with T-DNA, Ds/dSpm, orTos17 insertion have been collected and analyzed. The results show that, among 211 470 unique hits, inserts located in the genic region account for 68.16%, and 60.49% of nuclear genes contain at least one insertion. Currently, 57% of non-transposable-element-related genes in rice have insertional tags. In addition, chemical/irradiation-induced rice mutant libraries have contributed a lot to both gene identification and new technology for the identification of mutant sites. In this review, we summarize how these tools have been used to generate a large collection of mutants. In addition, we discuss the merits of classic mutation strategies. In order to achieve saturation of mutagenesis in rice, DNA targeting, and new resources like RiceFox for gene functional identification are reviewed from a perspective of the future generation of rice mutant resources.


Via Plant Breeding and Genomics News
more...
Plant Breeding and Genomics News's curator insight, May 22, 2013 7:48 PM
Mutant Resources for the Functional Analysis of the Rice Genome http://mplant.oxfordjournals.org/content/6/3/596.short
Rescooped by Dinut Dragos Daniel from leapmind
Scoop.it!

Phys.Org Mobile: New technique may open up an era of atomic-scale semiconductor devices

Phys.Org Mobile: New technique may open up an era of atomic-scale semiconductor devices | Tehnici de cautare in bazele de date | Scoop.it

Via LeapMind
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from leapmind
Scoop.it!

Advance in Nanotech Gene Sequencing Technique | ZeitNews

Now, a team led by University of Pennsylvania physicists has used solid-state nanopores to differentiate single-stranded DNA molecules containing sequences of a single repeating base.


Via LeapMind
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from Littlebytesnews Current Events
Scoop.it!

Ploy for US to spy on citizens? Chinese Hackers Gained Access To Database With Massive Files on U.S. Intelligence Targets

Ploy for US to spy on citizens? Chinese Hackers Gained Access To Database With Massive Files on U.S. Intelligence Targets | Tehnici de cautare in bazele de date | Scoop.it

Excerpted from WAPO

Chinese hackers who breached Google’s servers several years ago gained access to a sensitive database with years’ worth of information about U.S. surveillance targets, according to current and former government officials.

The breach appears to have been aimed at unearthing the identities of Chinese intelligence operatives in the United States who may have been under surveillance by American law enforcement agencies.

It’s unclear how much the hackers were able to discover. But former U.S. officials familiar with the breach said the Chinese stood to gain valuable intelligence. The database included information about court orders authorizing surveillance — orders that could have signaled active espionage investigations into Chinese agents who maintained e-mail accounts through Google’s Gmail service.

“Knowing that you were subjects of an investigation allows them to take steps to destroy information, get people out of the country,” said one former official, who, like others interviewed for this article, spoke on the condition of anonymity to discuss a highly sensitive matter. The official said the Chinese could also have sought to deceive U.S. intelligence officials by conveying false or misleading information.

Although Google disclosed an intrusion by Chinese hackers in 2010, it made no reference to the breach of the database with information on court orders. That breach prompted deep concerns in Washington and led to a heated, months-long dispute between Google and the FBI and Justice Department over whether the FBI could access technical logs and other information about the breach, according to the officials.

Google declined to comment for this article, as did the FBI.

Last month, a senior Microsoft official suggested that Chinese hackers had targeted the company’s servers about the same time that Google’s system was compromised. The official said Microsoft concluded that whoever was behind the breach was seeking to identify accounts that had been tagged for surveillance by U.S. national security and law enforcement agencies.

“What we found was the attackers were actually looking for the accounts that we had lawful wiretap orders on,” David W. Aucsmith, senior director of Microsoft’s Institute for Advanced Technology in Governments, said at a conference near Washington, according to a recording of his remarks.

“If you think about this, this is brilliant counterintelligence,” he said in the address, which was first reported by the online magazine CIO.com. “You have two choices: If you want to find out if your agents, if you will, have been discovered, you can try to break into the FBI to find out that way. Presumably that’s difficult. Or you can break into the people that the courts have served paper on and see if you can find it that way. That’s essentially what we think they were trolling for, at least in our case.”

Microsoft now disputes that its servers had been compromised as part of the cyberespionage campaign that targeted Google and about 20 other companies. Aucsmith, who cited that campaign in his remarks, said in a statement to The Washington Post that his comments were “not meant to cite any specific Microsoft analysis or findings about motive or attacks.”

The U.S. government has been concerned about Chinese hacking since at least the early 2000s, when network intrusions were discovered at U.S. energy labs and defense contractors. The FBI has for years led a national security investigation into Chinese cyberespionage, some of which has been linked to the Chinese military.

The Chinese, according to government, academic and industry analysts, have stolen massive volumes of data from companies in sectors including defense, technology, aerospace, and oil and gas. Gen. Keith B. Alexander, the director of the National Security Agency, has referred to the theft of proprietary data as the “greatest transfer of wealth in history.”

The Chinese emphatically deny that they are engaged in hacking into U.S. computer systems and have said that many intrusions into their own networks emanate from servers in the United States.

“The Chinese government prohibits online criminal offenses of all forms, including cyber attack and cyber espionage, and has done what it can to combat such activities in accordance with Chinese laws,” a Chinese Embassy spokesman, Yuan Gao, said in an e-mail. “We’ve heard all kinds of allegations but have not seen any hard evidence or proof.”

Experts said an elaborate network of interconnected routers and servers can make the Internet tailor-made for the shadowy work of spying and counterspying. It stands to reason, they said, that adversaries would be interested in finding vulnerabilities in the networks of the companies that authorize surveillance on behalf of the government.

“It is an absolute rule of thumb that the best counterintelligence tool isn’t defensive — it’s offensive. It’s penetrating the other service,” said Michael V. Hayden, a former director of the National Security Agency and the CIA, who said he had no knowledge of the incidents. Hacking into a surveillance database, he said, “is a form of that.”

Google’s crisis began in December 2009, when, several former government officials said, the firm discovered that Chinese hackers had penetrated its corporate networks through “spear phishing” — a technique in which an employee was effectively deceived into clicking a bogus link that downloads a malicious program. The hackers had been rooting around insider Google’s servers for at least a year.

Alarmed by the scope and audacity of the breach, the company went public with the news in January 2010, becoming the first U.S. firm to voluntarily disclose an intrusion that originated in China. In a blog post, Google chief legal officer David Drummond said hackers stole the source code that powers Google’s vaunted search engine and also targeted the e-mail accounts of activists critical of China’s human rights abuses.

As Google was responding to the breach, its technicians made another startling discovery: its database with years of information on surveillance orders had been hacked. The database included information on thousands of orders issued by judges around the country to law enforcement agents seeking to monitor suspects’ e-mails.

The most sensitive orders, however, came from a federal court that approves surveillance of foreign targets such as spies, diplomats, suspected terrorists and agents of other governments. Those orders, issued under the Foreign Intelligence Surveillance Act, are classified.

Google did not disclose that breach publicly, but soon after detecting it, the company alerted the FBI, former officials said. Bureau officials told FBI Director Robert S. Mueller III, who briefed President Obama.


Via littlebytesnews
more...
littlebytesnews's curator insight, May 21, 2013 2:17 AM

Is this a real security threat or one that is being exaggerated so that Obama can take control of the Internet? It's hard to trust this admin with security threats when half of them they don't take seriously, such as the intel on the Boston bombers and then they go after law abiding, citizens with the IRS and AP/Fox doing their job and claim it was due to a security breach. 

 

If this is true, which China is known for hacking....I hope it's not used as a way to restrict our Internet freedoms more than they already are. However, under this admin nothing is private anymore....so perhaps rather than restricting our use of the Internet they will just use it as an excuse to spy on citizens more??

Rescooped by Dinut Dragos Daniel from The MarTech Digest
Scoop.it!

Google Analytics Lets Analytics Premium Users Join Big Data in Google Cloud - Search Engine Watch

Google Analytics Lets Analytics Premium Users Join Big Data in Google Cloud - Search Engine Watch | Tehnici de cautare in bazele de date | Scoop.it
At Google I/O, Google Analytics introduced a new feature that's quite a big deal to Premium Analytics users. Google is now giving Analytics Premium users the ability to use Google BigQuery to crunch their analytics data and other offline data sets.

 

Announced at Google I/O 2010, Google BigQuery is a web-based service where you can analyze immensely massive data sets using Google's servers to crunch the numbers. How massive? Up to trillions of rows of data. By using Google's computing power, you can get insights from that kind of big data in seconds, as opposed to hours or days.

 

Specifically, Google Analytics Premium users can have their unsampled session-level and hit-level analytics data sent directly into Google's BigQuery cloud platform to crunch our all kinds of great information really quickly.


Via marketingIO
more...
marketingIO's curator insight, May 22, 2013 8:02 AM

This is interesting, and perhaps a means by which Marketing can free itself somewhat from the IT infrastructure, pending security issues. If you have a marketing technologist at hand, this is one that you'll want to investigate.


  • See the article at searchenginewatch.com
  • Receive a daily summary of The Marketing Automation Alert directly to your inbox. Subscribe here (your privacy is protected).
  • If you like this scoop, PLEASE share by using the links below.
  • iNeoMarketing drives more revenue and opportunities for B2B companies using marketing technologies. Contact us
Rescooped by Dinut Dragos Daniel from Data Nerd's Corner
Scoop.it!

Big Data Tool Mimics Human Problem Solving Technique

Big Data Tool Mimics Human Problem Solving Technique | Tehnici de cautare in bazele de date | Scoop.it
Case-based reasoning compares real-time information with past cases to provide companies with the best course of action, says Norwegian firm Verdande, maker of CBR product Edge.

Via Carla Gentry CSPO
more...
Carla Gentry CSPO's curator insight, May 22, 2013 9:34 AM

In a world awash in big data -- with much more on the way -- Verdante hopes its case-based approach to problem solving will prove popular with businesses, particularly those in highly regulated industries where mistakes can lead to costly fines or more serious consequences.

Rescooped by Dinut Dragos Daniel from NoSQL Databases
Scoop.it!

May 2013: Hadoop+

May 2013: Hadoop+ | Tehnici de cautare in bazele de date | Scoop.it
Hadoop combined with other skills pop on hiring managers' radars.

Via Adrian Carr
more...
Adrian Carr's curator insight, May 22, 2013 11:10 AM

The annual Dice Salary Survey puts Hadoop as the largest in demand skill followed by Java.

NoSQL is 4th.

I am not sure what "Big Data" is as a skill and how it differs from Hadoop/NoSQL etc.

Rescooped by Dinut Dragos Daniel from Techy Stuff
Scoop.it!

An Overview of Excel 2010's Database Functions - For Dummies

An Overview of Excel 2010's Database Functions - For Dummies | Tehnici de cautare in bazele de date | Scoop.it
You can use Excel 2010's database functions to calculate statistics, such as the total, average, maximum, minimum, and count in a particular database field when the

Via Patty Ball
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from Library 2.0
Scoop.it!

Every Library Should Come With This Built-In Slide

Every Library Should Come With This Built-In Slide | Tehnici de cautare in bazele de date | Scoop.it
It's no secret how the recently built Panorama House, which stretches along the hilltop like a beautiful, stone accordion, got its name.

Via Tom D'Amico (@TDOttawa) , lmalita
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from Library 2.0
Scoop.it!

A library revolution, started in part by Jane McGonigal’s TED Talk | TED Blog

A library revolution, started in part by Jane McGonigal’s TED Talk | TED Blog | Tehnici de cautare in bazele de date | Scoop.it
Libraries are generally where you go to check out books; not where you go if you want to write one. This is an old assumption that Librii...

Via Fernando de la Cruz Naranjo Grisales, lmalita
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from Metaglossia: The Translation World
Scoop.it!

Google Hangouts To Support Voice Calls -- InformationWeek

Google Hangouts To Support Voice Calls -- InformationWeek | Tehnici de cautare in bazele de date | Scoop.it
An enhanced Google Hangouts offers video chat, texting and photo sharing for free on multiple devices. More change is en route.

Via Charles Tiayon
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from Digital Marketing
Scoop.it!

Social Success via Search

Social Success via Search | Tehnici de cautare in bazele de date | Scoop.it
One of the biggest things an organization can do is leverage social to propagate its materials throughout the web and add weight to them in organic search.

Via Bill Cosgrove
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from iGeneration - 21st Century Education (Pedagogy & Digital Innovation)
Scoop.it!

Gooru | A Free Search Engine for Learning - new website


Via Tom D'Amico (@TDOttawa)
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from The MarTech Digest
Scoop.it!

Google+ in the SERPs Increasing; Authorship Adoption High [Data] - Search Engine Watch

Google+ in the SERPs Increasing; Authorship Adoption High [Data] - Search Engine Watch | Tehnici de cautare in bazele de date | Scoop.it
A new analysis suggests establishing Google authorship has moved past the early adopter stage and those marketers who have not yet established authorship and who are not regularly sharing content on Google+ would be wise to do so.

 

Digest...

 

A data analysis of the search results for queries containing 500 of the world's top tech writers' names using Conductor's Searchlight enterprise SEO platform (disclosure: I work for Conductor) – shows that Google is surfacing Google+ accounts for personal brand searches with increased frequency. From January 2012 to May 2013 the percentage of writers that have Google+ results appear on page increased from 33 percent to 43 percent.

 

The analysis showed almost 75 percent of authors with a Google+ account had linked their content to their profile and their authorship appeared in the SERPs. This high percentage of authors who have gone through one of the two steps to establish authorship suggests the importance to natural search visibility they (or their publishers) now assign Google authorship.

 


Via marketingIO
more...
marketingIO's curator insight, May 22, 2013 8:14 AM

Seriously, do you need further proof? Gettoit!


  • See the article at searchenginewatch.com
  • Receive a daily summary of The Marketing Automation Alert directly to your inbox. Subscribe here (your privacy is protected).
  • If you like this scoop, PLEASE share by using the links below.
  • iNeoMarketing drives more revenue and opportunities for B2B companies using marketing technologies. Contact us
Rescooped by Dinut Dragos Daniel from Peer2Politics
Scoop.it!

Facebook Ranks Top 'Enterprise' Collaboration Platform - InformationWeek

Facebook Ranks Top 'Enterprise' Collaboration Platform - InformationWeek | Tehnici de cautare in bazele de date | Scoop.it

Businesses beware: Employees prefer using Facebook to SharePoint and other IT-driven collaboration platforms, finds global study by Avanade U.K.


Via jean lievens
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from One Of My Collection of Webpages that Gives More Information and Really Amazing designs
Scoop.it!

How to Learn

Does SEO. But by not utilizing this powerful strategy I was leaving tons and tons of money on the table…and letting HUNDREDS of leads per week go by. I couldn’t afford that anymore. Luckily I found a video that reveals the keys to POWERFUL SEO in a way that even I can understand… and sucking in over 100 leads per day…


Via Welda Weng
more...
No comment yet.
Rescooped by Dinut Dragos Daniel from Transformational Teaching and Technology
Scoop.it!

Simple Techniques for Applying Active Learning Strategies to Online Course Videos | Faculty Focus

Simple Techniques for Applying Active Learning Strategies to Online Course Videos | Faculty Focus | Tehnici de cautare in bazele de date | Scoop.it
From Web-enhanced face-to-face courses to MOOCs, flipped, blended, and fully online courses, videos are an integral component of today’s educational landscape—from kindergarten all the way through higher education.

Via Rosemary Tyrrell, Ed.D., Mark Smithers, Chris Carter
more...
Rosemary Tyrrell, Ed.D.'s curator insight, May 20, 2013 2:08 PM

Some great tips!

Chris Carter's curator insight, May 21, 2013 9:20 PM

This is important!

Chris Carter's comment, May 24, 2013 2:19 AM
Agreed! Thank you for sharing, Rosemary! Also, Olgy, Di ut, Mark, and Mark!
Rescooped by Dinut Dragos Daniel from Visual Studio ALM
Scoop.it!

Continuous Deployment on Windows Azure with Database projects

Continuous Deployment on Windows Azure with Database projects | Tehnici de cautare in bazele de date | Scoop.it

Via Gian Maria Ricci
more...
Gian Maria Ricci's curator insight, May 22, 2013 3:36 AM

I’ve already blogged about Deploying on Azure Web Site with Database Project in the past, but in that article I showed how to accomplish it with customization of the Build Template. That technique is useful because quite often you need to run custom scripts or tools to do additional deploy related procedures to the site, but if your need is simply deploying schema change to an Azure Database with a Database Project you can accomplish it even without the need to touch the Build Workflow

Rescooped by Dinut Dragos Daniel from NoSQL Databases
Scoop.it!

May 2013: Hadoop+

May 2013: Hadoop+ | Tehnici de cautare in bazele de date | Scoop.it
Hadoop combined with other skills pop on hiring managers' radars.

Via Adrian Carr
more...
Adrian Carr's curator insight, May 22, 2013 11:10 AM

The annual Dice Salary Survey puts Hadoop as the largest in demand skill followed by Java.

NoSQL is 4th.

I am not sure what "Big Data" is as a skill and how it differs from Hadoop/NoSQL etc.