throbber
Information Technology
`and Collection
`Management for Library
`User Environments
`
`Joseph Walker
`IT Consultant, USA
`
`A volume in the Advances in Library and
`Information Science (ALIS) Book Series
`
`

`
`Managing Director:
`Production Editor:
`Development Editor:
`Acquisitions Editor:
`Typesetter:
`Cover Design:
`
`Lindsay Johnston
`Jennifer Yoder
`Erin O’Dea
`Kayla Wolfe
`Deanna Jo Zombro
`Jason Mull
`
`Published in the United States of America by
`Information Science Reference (an imprint of IGI Global)
`701 E. Chocolate Avenue
`Hershey PA 17033
`Tel: 717-533-8845
`Fax: 717-533-8661
`E-mail: cust@igi-global.com
`Web site: http://www.igi-global.com
`
`Copyright © 2014 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in
`any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.
`Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or
`companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.
`
`Library of Congress Cataloging-in-Publication Data
`
`
`
`Walker, Joseph, 1981-
` Information technology and collection management for library user environments / by Joseph Walker.
` pages cm
` Includes bibliographical references and index.
` ISBN 978-1-4666-4739-8 (hardcover) -- ISBN 978-1-4666-4740-4 (ebook) -- ISBN 978-1-4666-4741-1 (print & perpetual
`access) 1. Collection management (Libraries) 2. Libraries--Space utilization. 3. Libraries--Information technology.
`4. Libraries--Special collections--Electronic information resources. I. Title.
` Z687.W35 20
` 025.2’1--dc23
` 2013027878
`
`
`This book is published in the IGI Global book series Advances in Library and Information Science (ALIS) (ISSN: 2326-
`4136; eISSN: 2326-4144)
`
`British Cataloguing in Publication Data
`A Cataloguing in Publication record for this book is available from the British Library.
`
`All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the
`authors, but not necessarily of the publisher.
`
`For electronic access to this publication, please contact: eresources@igi-global.com.
`
`

`
`Introduction
`
`behalf of their clients over the network; in other
`words, server computers execute an application
`for their network connected clients and then send
`that data to them upon request, so these shared
`applications do not have to run on each individual
`client. There are hybrid variations of this simple
`model, with some services executing partly on the
`server and partly on the client. Java applications
`and derivate technologies such as ActiveX as
`well as many others are a perfect example of this
`model, but no matter which ones you focus on,
`the basics are essentially the same. Whether these
`are services that we use on a regular basis such
`as file sharing, print service, or a Web service,
`i.e. hosting and sending a Webpage’s content to
`those who request it over the Internet, this layout
`is much like a centralized computing hub within
`the spider Web-like networking topography that
`we commonly see all across the Internet. This
`centralized structure model allows easy control
`of content and its flow, hardware and software
`maintenance, and monitored uptime for each of
`the services offered on the network. The down-
`side is the drastically increased cost of specialized
`hardware and software capable of providing such
`extensive services to potentially tens of thousands
`of client devices at once along with the massive
`bandwidth and support personnel needed to run
`and maintain them. It is not uncommon for com-
`panies to invest tens of millions of dollars in their
`networks and data centers–centralized clusters of
`server computers and file storage. With the great
`leaps in client computing power, this layout does
`not tap into the latent networking and processing
`power of these computers and peripheral devices.
`Like any centralized system, it is weaker against
`hacking and outages, including physical destruc-
`tion such as natural disasters, requiring more
`security and stricter operating procedures along
`with increase infrastructure.
`These individual clients and private networks,
`via their servers, exchange information over a net-
`work in different ways, using what the information
`technology industry calls ‘protocols’–standardized
`
`forms of digital communication between com-
`puters that can be transmitted over every known
`carrier signal. The Internet being the foundation,
`a series of networks have been developed, some
`more popular than others. The most popular is the
`World Wide Web (a.k.a the Web), followed up by
`email and the syndication protocols. Before we
`discuss the Web, let us review some of the first
`networks that brought the Internet to the world
`scene. In 1969, the Advanced Research Projects
`Agency Network (ARPANET) became the world’s
`first operational packet switching network (Figure
`3) which led to them developing and using by
`1983 the TCP/IP (Transmission Control Protocol
`and Internet Protocol) suite of protocols. Its net-
`work and concepts, particularly the TCP/IP suite,
`became the core of the embryonic Internet and
`eventually to follow-up networking technologies
`such as email and the Web. Funding for the network
`was provided by the Defense Advanced Research
`Projects Agency (DARPA) of the United States
`Department of Defense to expand communica-
`tions between the universities and laboratories
`conducting military research around the country.
`In 1980, a couple of Duke University graduate
`students patched together a few networking pro-
`tocols and developed the Usenet, which quickly
`developed into a worldwide distributed Internet
`discussion system. Usenet resembles a bulletin
`board system (BBS) in many respects, and is the
`precursor to the various online forums that are
`widely used today–including those integrated into
`blogs, social networking sites, and RSS news
`feeds. As with all information technology, new
`technology was built on the shoulders of the
`legacy technology that came before it, if not nec-
`essarily on the hardware or coding, then in con-
`ceptualization. On the Usenet, users read and post
`messages called articles or posts, and collec-
`tively termed news to one or more categories,
`known as newsgroups propagated over intercon-
`nected Usenet servers. The protocol allows for a
`quick propagation of the articles throughout the
`network, so even though clients access the Usenet
`
`19
`
`

`
`Introduction
`
`Figure 3. The birth of the Internet–the ARPANET logical network map in March 1977 showing the net-
`work nodes (rectangles) and the networking types (lines connecting rectangles) connecting them. Notice
`the combined wired and wireless networking types (wired cabling with the straight lines and the satel-
`lite circuit with the squiggle lines). Modern extranets of large organizations and the Internet in general
`still maintain similar typographies–though in the case of the modern Internet, it is a million-fold more
`complex and dispersed over the world (Copyright in the US public domain [CHM, 2010]).
`
`through different servers controlled by different
`organizations, or in some cases, people’s own
`servers, they can all read and comment on the
`same article. This is different from a social net-
`
`working site or personal blog where all the serv-
`ers with the stored information are controlled by
`a single domain or company–a very centralized
`model mimicking a decentralized type of network-
`
`20
`
`

`
`Introduction
`
`than the heyday of the first Hollywood films.
`Instead of hundreds of feature movies shown in
`theaters or on home media like VHS and DVD–or
`in the music industry, people listening to their ra-
`dios or going down to the music store to purchase
`albums, tapes, and compact disc from their favorite
`artist–there are literally millions of short personal
`clips and music files uploaded into the Internet
`and shared via hundreds of public and private
`Websites and peer-to-peer networks; all using the
`Internet as its communication foundation. Along
`with this generation of multimedia content driven
`network traffic comes the establishment of new
`and more efficient digital information formats to
`accommodate this music and video consumption.
`A more in-depth survey of these technologies will
`be conducted in later chapters. With increased
`information dissemination due to these informa-
`tion technologies, such as networking and freely
`available data formats and players, we have seen
`for the first time in history multimedia over-taking
`textual information consumption in the public sec-
`tor; so much so, that the multimedia forms have
`become cheaper to produce than the textual forms.
`This information consumption shift has markedly
`been notice in Website development, where the
`first Websites were largely text oriented with a few
`visual accents, much like in books, but are now
`fantastical multimedia portals with minimalist
`attitudes towards use of textual content. It is true
`that new technology and applications made this
`paradigm shift possible, but let us not place the cart
`before the donkey–the technology was developed
`because of the need, not the other way around.
`
`REFERENCES
`
`Advanced Research Projects Agency Network
`(ARPANET). (1968). Request for quotations:
`Interface message processors for the advanced
`research projects agency (ARPA). Washington,
`DC: Department of the Army – Defense Supply
`Service.
`
`The Internet stops where your private network
`begins, whether that is your client computer
`desktop, laptop, or peripheral device such as
`smartphones, or home and business network. In the
`IT industry, your network gateway and firewalls,
`usually a router for a multi-client network and in
`the case of a single client on an open network the
`device’s NIC (network interface card), acts as the
`delineator in the two communication broadcast
`domains. Everything on your side of the network
`fence is yours and under your control–we call
`this the LAN (Local Area Network). Privacy is
`assured on a level equal to your use of proper
`networking security, firewalls, and due diligence.
`On the other side of the networking fence–the
`WAN (Wide Area Network)–is a public arena
`where there cannot be an expectation of privacy
`except in very few situations and through the use
`of additional technologies. Though individual
`content may be protected under copyright laws
`written by the over 200+ nations and jurisdic-
`tions that have them, access to the information
`is publically made available; sort of like if you
`went outside and started shouting out all your
`private information for everyone on the street to
`hear. There are special protocols and applications
`that help to provide a secured level of privacy,
`via encryption algorithms and authentication
`certificates, for information temporary travelling
`through the Internet, such as SSL/TLS (secured
`socket layer/transport layer security) and VPNs
`(virtual private networks), but these are used in
`special circumstances and are not the traditional
`forms of communication and storage in the larger
`network. It is important for all users to understand
`the basic security differences between the public
`networks that make up the Internet and your own
`private network and your information that resides
`on both areas. Information privacy and Internet
`security will continue to grow exponentially as
`networks play a more important tool in our work
`and private lives.
`With the rise of public networking, the growth
`of multimedia has seen an explosion much greater
`
`22

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket