Thursday, September 24, 2009

10th Reading Assignment

Title: PERSONAL COMPUTERS: Steps to Avoid Physical Strains of Computer Use
Author: Peter H. Lewis
Source: http://search.yahoo.com/search?p=personal+computers%3A+how+to+avoid+physical+strains&toggle=1&cop=mss&ei=UTF-8&fr=yfp-t-701

Abstract:

Using a computer can be a pain in the neck, the back, the arms, the wrists, the shoulders, the knees, the eyes and virtually every other part of the body. It doesn’t have to be that way. The jury is still out over the long – term health risks of using personal computers, at least regarding low-level electromagnetic radiation from the computer monitor. For most PC users not much can be done about possible exposure to such radiation beyond limiting the time spent in front of a computer and avoiding sitting behind a monitor, the most likely source of electromagnetic emissions. This appears to be especially prudent for women who are pregnant.


Things I learned:

1. Follow the 20-20 rule: keep your face at least 20 inches from the screen and pause every 20 minutes or so to took around the room, allowing the eyes to focus on distant objects.

2. Get a glare screen. It should block glare without making the characters on the monitor screen appear fuzzy. Glare is the hidden cause of variety of physical ailments. Also, if possible, reorient the computer screen to avoid reflections from windows or artificial lights.

3. Get a stable, comfortable, adjustable chair. Avoid those “ergonomically designed” backless stools that pull all the weight on your knees, unless you enjoy walking like a chimpanzee.

Applications/ Implications:

I encountered all the pains given in the abstract, neck pain, especially back pain and eyes. I used to use my computer everyday and every hour. Using computer is part of everyday living. I can’t have my job/ task done without my computer. And by reading this article, I was informed on how to avoid those pains that I encountered.

Thursday, September 17, 2009

9th Reading Assignment

Title: Digital Forensics in the Twenty- First Century
Author: Gavin W. Manes
Source: The Forensic Examiner 16.4 (Winter 2007)

ABSTRACT:

Digital forensics experts are called on to collect and analyze digital information from electronic devices such as computer hard drives and cell phones. Electronic Evidence is used in a wide variety of cases, ranging from corporate espionage to employee separation or divorce. Recent changes to the Federal Rules of Civil Procedure have legitimized the use of digital evidence in court, making this new field of forensics more relevant than ever.


Three things I learned:

The digital forensic experts must be employed to carefully gather pertinent evidence when digital evidences or digital information will be used in the courses of an investigation or discovery process.
The production of digital documents during court proceedings is important to ensure all necessary information has been preserved.
Digital communications seen anonymous, but quite the opposite is true. Experts are able to investigate user activity through such applications as email, instant messaging, text messaging, and eve Internet telephone conversations.

Implications:

When information is deleted from a digital device, the file itself is not erased but rather, the computer’[s reference point for the file is erased. It is like removing a card from the library’s card catalog, but not taking the book off the shelf. The computer then marks the space containing the file as available. If a large amount of data is added to the drive, there is a chance that the “deleted” file can be overwritten. However, the use of very large hard drives in most current computers makes the chance of overwriting unlikely, and fragments of documents can often be found even a year after normal computer use.

8th Reading Assignment

TITLE: The Emergence of Open- Source Software in China
AUTHOR: Guohua Pan and Curtis J. Bonk
SOURCE: International Review of Research in Open and Distance Learning,
Volume 8, Number 1. March 2007

ABSTRACT:

The open- source software movement is gaining increasing momentum in China. Of the limited numbers of open – source software in China, Red Flag Linux stands out most strikingly, commanding 30 percent share of the Chinese software market. Unlike the spontaneity of open- source movement in North America, open- source software development in China, such as Red Flag Linux, is an orchestrated activity wherein different levels of China’s government play a vital role in sponsoring, incubating, and using open- source software, most conspicuously, Red Flag Linux. While there are no reports on open- source course management system in China, there are reports on the study and us of Western open- source management systems for instruction and learning in Chinese higher education institutions. This paper discusses the current status of open- source in China, including open- source course management software and associated tools and resources. Importantly, it describes the development model of Red Flag Linux, the most successful open- source software initiative in China. In addition, it explores the possibility of Chinese higher education institutions joining efforts to develop China’s own open- source course management system using the open- source development model established in North America. A timeline of current and major open- source projects of significance in China is provided. The paper concludes with a discussion of the potential for applying the open- source software development model to open and distance education in China.

THINGS I LEARNED:
Gift culture and distributed development enable the success of open- source software such as Linux and the birth and growth of open- source courseware projects such as CORE and OOPS. Gift culture and distributed development might simultaneously help build and consolidate a community of practice of open- source software developers within higher education; especially related to online learning tools and resources including instructional designers, online educators, and virtual students. This gift culture and distributed development also can be mirrored open and distance learning practices by building and reinforcing a community of open and distance learners, online instructors, instructional designers, and other educational professionals who lend insights into their needs, as well as potential directions of the open- source movement, that can benefit online learning in higher education and other sectors.

IMPLICATIONS:
Given the potential for enormous demands for online learning in China, if and when that happens, the influence of China in the open- source movement will be extensive and potentially relentless. As that occurs, no longer will the thrust within the open- source movement be from North America to China, but instead, it will be pushing, and not too gently, from China back to North America and all other parts of the world. This reverse migration of open- source ideas, tools, and resources is something, of course, which the entire world of higher education will be intently watching.

Thursday, September 3, 2009

7th Reading Assignment

An Educational Tour to IRRI

Three things I learned:

1. Organizing their collections (Print and Non- Print). They have a very systematic way on how
to organize their collections whether it is print or non- print.
2. Enriching their collections by subscribing e- journals and e- references and also by
downloading those open access journals.
3. Techniques in arranging the list of their electronic journals (subscribed and open access)


Trip to IRRI is so challenging. In the first place we (Aisa and me) really don’t know how to go to IRRI, but by just asking for the directions, we’ve made it, we were able to locate the place.
It’s believable that IRRI library is one of the best libraries. It is due to their library system Millennium, though it is so expensive but they’re able to depend it by serving their clients, even abroad with satisfaction. They’re been very resourceful in enriching their collections.
Really can’t forget this tour in IRRI, there’s so much fun.