Copy Link
Add to Bookmark
Report

Current Cities Volume 12 Number 11

eZine's profile picture
Published in 
Current Cities
 · 25 Apr 2019

  


Current Cites

Volume 12, no. 11, November 2001
Edited by [2]Roy Tennant

The Library, University of California, Berkeley, 94720
ISSN: 1060-2356 -
http://sunsite.berkeley.edu/CurrentCites/2001/cc01.12.11.html

Contributors: [3]Charles W. Bailey, Jr., [4]Margaret Gross, [5]Shirl
Kennedy, [6]Leo Robert Klein, Jim Ronningen, [7]Roy Tennant

Ciccone, Karen, editor. [8]"Virtual Reference: Today and Tomorrow
[9]Information Technology & Libraries 20(3) (September 2001)
(http://www.lita.org/ital/ital2003.html). - In this theme issue of
ITAL, the emerging field of network-based library reference service is
covered. Most of the articles are descriptions of specific projects
and their experiences forging new paths in providing real-time patron
assistance remotely. In addition to case studies, one piece describes
the different roles in digital reference transactions, and another
identifies desired enhancements to software that supports virtual
reference encounters. Given the very early stage in developing
network-based reference services, this theme issue is a welcome
addition to the growing literature on this topic. - [10]RT

Ditlea, Steve [11]"The Electronic Paper Chase" [12]Scientific American
285(5) (November 2001)
(http://www.sciam.com/2001/1101issue/1101ditlea.html). - We are
witness to a persistent dichotomy -- the vision and the reality -- in
the diffusion of information. There is the proliferation of computing
devices, huge propagation of digitized data, and the promise of a
paperless society. Ironically the reality has been a veritable
explosion of published paper, primarily because it is accessible,
convenient and easy to use. Based on future e-paper, this is about to
change. In presenting an overview of two competing technologies, Steve
Diltea recounts the story of two visionaries, who for three decades,
albeit sporadically, have been developing technologies that aim to
replace conventional ink-on-paper with paper-like electronic displays.
The main advantage touted, is that these devices can be erased and
reused. The two scientists are Nicholas K. Sheridon, working at XEROX
Palo Alto Research Park (PARC), and Joseph Jacobson of the MIT Media
Lab. Each of these organizations has spun off startup companies,
Gyricon Media in Palo Alto CA, and E Ink Corporation in Cambridge, MA,
respectively. Gyrocon's process employs microscopic two-tone plastic
beads, rotated by an electrical charge to produce either white or
black dots onto the viewing plane, thus producing lettering.
Jacobson's process uses transparent polymer microcapsules containing a
blue liquid dye along with white particles. Depending on the
electrical charge images can be produced on a white background, or
reversed onto a dark background. Both technologies have been test
implemented in retail establishments. The article concludes with
several related links: Information about Electronic Reusable Paper is
available on the Xerox PARC Web site at
[13]www.parc.xerox.com/dhl/projects/gyricon/ - Information about
SmartPaper is available on the Gyricon Media Web site at
[14]www.gyriconmedia.com/smartpaper/index.asp - What Is Electronic
Ink? Available on the E Ink Web site at [15]www.eink.com/technology/ -
"The Last Book", Joseph Jacobson in IBM Systems Journal 36(3) (1997),
available at [16]www.research.ibm.com/journal/sj/363/jacobson.html -
[17]MG

Gordon, Rachel Singer. "A Course in Accidental Systems Librarianship"
[18]Computers in Libraries 21(10) (Nov/Dec 2001): 24-28. - The first
generation is always such an ad hoc situation. Ford got his automotive
smarts, at least initially, while still down on the farm. The Wright
Brothers had their bicycle shop. Afterwards, the specialization and
degrees come but until then, trailblazers are pretty much on their
own. There is no course of study for becoming a Systems Librarian or
if there is, the author of this piece, a self-taught systems librarian
from a suburban library system didn't take it. What she then imagines
is a series of courses which highlight those characteristics of the
job which she has found to be important. Included are plentiful
examples, many of them delightful, from her own experience. - [19]LRK

Guthrie, Kevin M. [20]"Archiving the Digital Age: There's a Will, But
is There a Way?" [21]EDUCAUSE Review (November/December 2001): 56-65
(http://www.cause.org/ir/library/pdf/erm0164.pdf). - In this article,
the President of [22]JSTOR, the initiative to archive e-journals,
takes on questions of persistence. As he rightly identifies,
"archiving is not, and never has been, an issue fundamentally about
technology; rather, it is about organizations and resources." He first
frames the issue, then uses JSTOR's experience to illustrate some of
the economic issues of long-term archiving. He concludes by pointing
out that "local motivations that have been the foundation of the
current paper archive do not naturally generate the scale of resources
that will be required to establish the more centralized model
necessary for the preservation of electronic documents." Nonetheless,
he points out that since the Internet makes centralized repositories
easily available to a wide range of institutions, such costs can be
spread out to such a degree that they can be less expensive and more
effective than the costs of preserving print material. - [23]RT

Heins, Marjorie and Christina Cho. [24]Internet Filters: A Public
Policy Report National Coalition Against Censorship (Fall 2001)
(http://www.ncac.org/issues/internetfilters.html) - In the spring and
summer of this year, the Free Expression Policy Project of the
National Coalition Against Censorship (NCAC) rounded up all the
studies and tests it could find that described and evaluated 19
products or services commonly used to filter out "objectionable" Web
content. This report, intended as a resource for both policymakers and
the general public, summarizes and expands on what the investigators
found -- mainly, that nearly every test "revealed massive overblocking
by filtering software." The main problem, of course, is that the size
and the ever-changing nature of the Web mandate heavy reliance on
"mindless mechanical blocking" that checks for certain words and
phrases while ignoring context. Even worse -- "Where human judgment
does come into play, filtering decisions are based on different
companies' broad and varying concepts of offensiveness,
'inappropriateness' or disagreement with the political viewpoint of
the manufacturer." The report offers some sad, scary, and downright
humorous examples of erroneously blocked sites, e.g., "Net Nanny,
SurfWatch, Cybersitter, and BESS, among other products, blocked House
Majority Leader Richard 'Dick' Armey's official Website upon detecting
the word 'dick.'" A bibliography of online and print sources is
included, as are two appendices: (A) Blocked Sites by Subject:
Artistic and Literary; Sexuality Education; Gay and Lesbian
Information; Political Topics/Human Rights; Censorship; and (B)
Blocking Categories for Different Filters Defined. - [25]SK

Hilton, James. [26]"Copyright Assumptions and Challenges" [27]EDUCAUSE
Review (November/December 2001): 48-55
(http://www.cause.org/ir/library/pdf/erm0163.pdf). - In this direct,
clearly stated piece Hilton slays some common but dead wrong
assumptions about copyright. Perhaps the biggest of these is the myth
that "Copyright was created primarily to protect an author's
intellectual property." As Hilton ponits out, the United States
Constitution clearly states that the purpose of affording a limited
set of rights to creators is to "promote the Progress of Science and
the useful Arts". The primary right afforded creators is a monopoly on
their work for a limited time that began at fourteen years in early
legislation, and has steadily increased ever since until we are now
faced with a monopoly that extends far beyond the life of the author.
Hilton urges academicians to use and fight for the principle of Fair
Use as an essential component of copyright law, a cherished liberty,
and that which underpins the academic enterprise. Without Fair Use, he
asserts, a number of common academic practices become impossible.
Hilton makes specific recommendations about what academic institutions
should do to protect their rights to "promote the Progress of Science
and the useful Arts". His call to arms comes none too soon, as in this
"copyright war" we've already lost most of the battles. - [28]RT

Litman, Jessica. Digital Copyright. Amherst, NY: [29]Prometheus Books,
2001. ISBN: 1-57392-889-5. - The prospect of reading a new book on
copyright rarely makes the pulse pound with excitement. Rather, in
spite of the best intentions of authors, the average treatise quickly
induces a strong desire for a nap. That's too bad. There are few
topics of more vital importance to information professionals, and, as
electronic information becomes the headliner in libraries rather than
the opening act, it will be essential that we become more ardent about
copyright. If not, the halcyon days of ownership and fair use
(whatever they were) will fade in the twilight, and, in their place,
will be the bright new days of negotiated access rights and content in
encrypted digital "lockboxes" (where have I heard that before?). We'll
ask questions (Can I view it? Can I store it? Can I print it? Can I
quote it? How much of it? How long can I do it?) and get answers that
depend on how fat our wallets are. We'll be amazed at how many
licensing permutations there can be when publishers can truly control
access to every byte. Reading Litman's book could help stave off
information dystopia. With chapters such as "Copyright Lawyers Set Out
to Colonize Cyberspace" and "Just Say Yes to Licensing!," it's clear
that this book is more lively and readable than the typical tome.
Rather than just reciting facts, Litman tries to give the reader a
feel for the dynamics of copyright politics and the motivations behind
the whole crazy mess. And, as you might infer from the chapter titles,
she definitely has a point of view. Quick, read it while it's still in
print format. - [30]CB

[31]"The New Rules of Engagement" themed issue, [32]Wired 9(12)
(December 2001) (http://www.wired.com/wired/archive/9.12/). - Before
we get to the meat of this review, a lesson from art history class: in
tracking cultural changes, watch for the transition from a classical
to a mannerist style. The former is characterized by a need for
expression of new ideas finding an effective medium for doing so,
resulting in works which capture the zeitgeist, while the latter is
characterized by imitation (executing "in the manner of") which adds
nothing to, even dilutes, the classical period's accomplishments. This
kind of change has been happening to Wired, which is turning from a
unique window on a new world into a kind of style guide: buy this
stuff and repeat these buzzwords and you can live the Wired life. (I
propose that the transformation be completed by selling the mag to
that absolute dictator for lifestyle, Martha Stewart. She recently
announced that she's going to come out with her own single issue on
the subject of high tech in the home, so if the response is good this
could be a branding match made in heaven. Martha Stewart Wired
Living!) That off my chest, I recommend looking at the December Wired
if you have a morbid fascination with how info tech publications are
exploiting our post-Sept. 11 paranoia. Let's face it -- geeks and
wannabe geeks get a technothrill from topics like surveillance, netwar
and swarming theory, and can nod knowingly as easy targets like
cumbersome military apparatus are shot down in print. This issue is
such a mix of yellow journalism, unworkable schemes and recycled
notions which long-time Wired readers will recognize, that I'm loathe
to admit that there are also some intriguing ideas. That, and the fact
that the mag still has a relatively large readership to influence,
makes it worth watching, warily. - JR

Olsen, Florence. [33]"Colleges Experiment With Routing On-Campus Phone
Calls Over the Internet" [34]The Chronicle of Higher Education
(October 23, 2001)
(http://www.chronicle.com/free/2001/10/2001102301t.htm) - Using the
Internet to make phone calls, aka IP telephony, has long been one of
those "sounds great, works lousy" ideas. It may, however, be finally
coming into its own. One example discussed in this article is what
happened after students at Columbia University tried to call friends
and family in the wake of the September terrorist attacks, but were
unable to get through because Manhattan's telephone system was
"overwhelmed." Within hours of the attack, network specialists in the
university's School of Engineering and Applied Science, managed to set
up a conference room where students could make calls -- both
nationally and internationally -- over the Internet. "Specialized
telephones had been hastily configured to route outbound calls through
several Internet gateways to the public telephone network." Other
academic institutions are sticking their toes into the waters of IP
telephony; some, in fact, are diving in headfirst. The article goes on
to describe the ins and outs of campuswide IP phone networks,
advantages and disadvantages, and potential cost savings. - [35]SK

SANS Institute. [36]The Twenty Most Critical Internet Security
Vulnerabilities (Updated): The Experts' Consensus (November 15, 2001)
Version 2.501 (http://www.sans.org/top20.htm) - If you had even the
slightest doubt that the Internet is becoming more, not less, like the
Wild West, consider that last year's version of this document was
called "The Ten Most Critical Internet Security Vulnerabilities." At
the top of this year's list? "Default installs of operating systems
and applications." Why? Because hackers/crackers are well aware of all
the unpatched services, open ports, etc. Also included are foibles
such as bad passwords, incomplete or non-existent backups, logging and
address filtering failures, vulnerable code (e.g., CGI), buffer
overflows, and unpatched Swiss Cheese Microsoft products. The
document, compiled in conjunction with the FBI's National
Infrastructure Protection Center, is valuable because "the majority of
successful attacks on computer systems via the Internet can be traced
to exploitation of security flaws on this list." Note that this is a
"living document" that "includes step-by-step instructions and
pointers to additional information useful for correcting the flaws."
The document is updated and expanded as new information becomes
available. - [37]SK

Schnapp, Marilyn. [38]"Are Tech Book Sales a Leading Economic
Indicator?" [39]O' Reilly Network (November 16, 2001)
(http://www.oreillynet.com/pub/a/webservices/2001/11/16/indicator.html
) - The short answer is yes, according to this author, who ran
O'Reilly's research department in 2000-2001. She compared "sales
trends of some of O'Reilly & Associates' technical books with other
economic indicators, including the NASDAQ index." The article includes
some intriguing charts and graphs which illustrate, for example, that
sales of O'Reilly tech books at Amazon.com closely track the level of
the NASDAQ, and that sales of O'Reilly Linux titles at Barnes & Noble
rise and fall almost in tandum with the price of Red Hat stock. As Hal
Varian -- Dean of the School of Information Management and Systems,
University of California, Berkeley -- explains, "(T)he belief that IT
was going to be a very profitable investment...drove investor behavior
in the stock market and knowledge workers' investment in technical
books." The findings discussed in this article, says the author,
"suggests that segmenting book sales data along economic sectors might
be useful in gauging future economic downturns of other sectors of the
economy." - [40]SK

Simons, Barbara. "Viewpoint: The ACM Declaration in Felten v. RIAA".
[41]Communications of the ACM 44(10) (Oct. 2001): 23-26. - This is the
FAQ explaining ACM's decision to submit a declaration in support of
the litigants in the Felten case. Questions are asked and answered in
a sober manner and range from background information to what ACM hopes
to achieve through its action. At the very least, one suspects, ACM is
out to avoid the nightmare scenario where, in the words of this
article, it will need to "hire attorneys to review conference and
journal submissions that could possibly be in violation of the
anticircumvention provisions of the DMCA." [42]Text of the declaration
itself can found at the ACM site at
http://www.acm.org/usacm/copyright/felten_declaration.html. [Addendum:
CNET reports that the judge has dismissed the case. The judge's ruling
is not yet available.
(http://news.cnet.com/news/0-1005-200-8010671.html)] - [43]LRK
_________________________________________________________________

Current Cites 12(11) (November 2001) ISSN: 1060-2356
Copyright © 2001 by the Regents of the University of California All
rights reserved.

Copying is permitted for noncommercial use by computerized bulletin
board/conference systems, individual scholars, and libraries.
Libraries are authorized to add the journal to their collections at no
cost. This message must appear on copied material. All commercial use
requires permission from the editor. All product names are trademarks
or registered trade marks of their respective holders. Mention of a
product in this publication does not necessarily imply endorsement of
the product. To subscribe to the Current Cites distribution list, send
the message "sub cites [your name]" to
[44]listserv@library.berkeley.edu, replacing "[your name]" with your
name. To unsubscribe, send the message "unsub cites" to the same
address.

References

1. http://sunsite.berkeley.edu/cgi-bin/imagemap/cc
2. http://escholarship.cdlib.org/rtennant/
3. http://info.lib.uh.edu/cwb/bailey.htm
4. http://www.cam.org/~mgross/mgross.htm
5. http://web.tampabay.rr.com/hooboy/
6. http://leoklein.com/
7. http://escholarship.cdlib.org/rtennant/
8. http://www.lita.org/ital/ital2003.html
9. http://www.lita.org/ital/index.htm
10. http://escholarship.cdlib.org/rtennant/
11. http://www.sciam.com/2001/1101issue/1101ditlea.html
12. http://www.sciam.com/
13. http://www.parc.xerox.com/dhl/projects/gyricon/
14. http://www.gyriconmedia.com/smartpaper/index.asp
15. http://www.eink.com/technology/
16. http://www.research.ibm.com/journal/sj/363/jacobson.html
17. http://www.cam.org/~mgross/mgross.htm
18. http://www.infotoday.com/cilmag/ciltop.htm
19. http://leoklein.com/
20. http://www.cause.org/ir/library/pdf/erm0164.pdf
21. http://www.cause.org/pub/er/erm.html
22. http://www.jstor.org/
23. http://escholarship.cdlib.org/rtennant/
24. http://www.ncac.org/issues/internetfilters.html
25. http://web.tampabay.rr.com/hooboy/
26. http://www.cause.org/ir/library/pdf/erm0163.pdf
27. http://www.cause.org/pub/er/erm.html
28. http://escholarship.cdlib.org/rtennant/
29. http://www.prometheusbooks.com/site/index.html
30. http://info.lib.uh.edu/cwb/bailey.htm
31. http://www.wired.com/wired/archive/9.12/
32. http://www.wired.com/wired/
33. http://www.chronicle.com/free/2001/10/2001102301t.htm
34. http://www.chronicle.com/
35. http://web.tampabay.rr.com/hooboy/
36. http://www.sans.org/top20.htm
37. http://web.tampabay.rr.com/hooboy/
38. http://www.oreillynet.com/pub/a/webservices/2001/11/16/indicator.html
39. http://www.oreillynet.com/
40. http://web.tampabay.rr.com/hooboy/
41. http://www.acm.org/cacm/
42. http://www.acm.org/usacm/copyright/felten_declaration.html
43. http://leoklein.com/
44. mailto:listserv@library.berkeley.edu

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT