IS 585 Brueland Anjanae Assignment 3 Points: 100 Due: Nov. 13, 11:59 pm. 1. Mobile Learning 1. What are the four key problems associated with mobile-Learning discussed in “Mobile Learning using Mobile Phones in Japan” article? (4) 1. Technology 2. Content design 3. Uniqueness of device 4. Psychological issues 2. Do you think the same problems are applicable to the US? If yes, why? If no, why not? (4) Yes. Well, one of the projects took place in Stanford University in California with similar results. But mainly because the key problems are universal, not limited to culture or geographic location. 3. Present any mobile-Learning application used by libraries in the US. Make sure to give screenshots and list key features of the application. (4) Tutor.com used by Sevier County Public Library System is mobile. Available on the iPad, iPod and iPhone. Key Features are: Study resources – Lessons, worksheets, study guides and videos Test prep resources – ACT, SAT, etc Career resources One to one tutor sessions from 12pm to 12am EST everyday Ability to upload documents and photos Ability to save past sessions Screenshots of some of the features of Tutor.com Screenshot of inside Study Resources Search: Math/Elementary/Number Facts; displaying the resource results. 2. Library 2.0 & Social Media 1. Illustrate six essential steps for transforming traditional libraries to Library 2.0. (12) 1. Identify what is going wrong – Issues; Challenges 2. What does the community want and need 3. Requires change in mission and the handling of authority – Unfreezing – Showing needs, implementing change, Freezing – Institutionalization the change 4. Is the technological agility available 5. What financial resources are available, if any 6. What is currently being done 2. Illustrate any four Web 2.0 technologies that can be used in the library setting of your choice. (8) 1. Make sure to give key background information about the library setting of your choice. (2) Sevier County Public Library System is a level 5 library system with a service population of ~89,000. It consists of three libraries and one satellite. The location, hours and services offered by each library is shaped by the local community it serves. This input is received via surveys, community forums, assessment of services already in place and staff interaction with the community. Approximately four years ago the system adopted the tag line to ‘…its about more than books’ as the need to change the perception and increase our methods of interacting/engaging with our community. Since then we have secure more of the technological agility needed to implement these changes through our hiring practices and requirements. Every year a budget is allocated to further develop how we reach and engage our community as well as maintain our networks. Currently we make use of the web 2.0 technologies blogging, Facebook, Pinterest and youTube. Our blog is used to capture and showcase the events that have taken place at the library. Facebook is used notify users of all upcoming events, general notices, book clubs post questions for discussion and other points of interest with the system as its main focus. Our Pinterest account provide another way to connect to our community via crafts, quotes and other general interests. Our youTube channel is used to provide video clips on “How to” or a library tour. We plan to have video so patrons can listen to a story time if they cannot be there. These are just a few ways we are using some of the web 2.0 technologies in our library system. 3. Cloud, Parallel, and Distributed Computing in Information Environments 1. Discuss any three key features of Hadoop. (6) Three key features of Hadoop are its accessibility, robustness and simplicity. Hadoop runs on large clusters of commodity machines or on cloud computing services making is accessible. Hadoop is robust in that it is intended to run on commodity hardware (Computer hardware that is affordable and easy to obtain). It is architected with the assumption of frequent hardware malfunctions therefore handling most such failures. Finally Hadoop’s simplicity allows users to quickly write efficient parallel code. 2. What are the three distinct types of cloud computing services? (6) 1. Private cloud – functions solely for one organization on a private network and is highly secure. 2. Public cloud – is owned by the cloud service provider and offers the highest level of efficiency of shared resources. 3. Hybrid cloud – is a combination of the private and public cloud deployment models. In a hybrid cloud specific resources are run or used in a public cloud and others are used or run in a private cloud. This provides increase efficiency and security where needed most. 3. Define parallel computing and give any two advantages of it. (4) 1. Parallel computing is when a task is given to multiple processors within one computer. Two advantages of parallel computing are high speed processing and reduction in power consumption. 4. Define distributed computing and give any two disadvantages of it. (4) 1. Distributed computing is when a problem is divided into many tasks, each of which is solved by one or more computers, which communicate with each other by message passing. Two disadvantages of distributing computing can be the difficulty in troubleshooting and security issues due to the number of remote nodes and/or the connections of these nodes. 4. IT Outsourcing & Programming 1. Discuss two advantages and two disadvantages of outsourcing library services. (8) ADVANTAGES: Outsourcing library services can provide expertise not in employee pool such as IT. For example, this can allow for the organization to have a website designed and maintained without the expense of having the developer on staff. This has a value added advantage that it can provide a freeing up of time and resources with regards to management, as they can notify the ‘expert’ of the issue and then move on the next item at hand. DISADVANTAGES: Outsources can be viewed by employees of the organization in a negative manner. Some may perceive that outsourcing is a reflection on the financial strength of the organization. That cuts are needing to be made and that jobs may be on the line. It is important that management address this with employees before the outsourcing begins. Another concern many may have is with the security of the information that will be handled. It needs to be addressed who and how personal data will be handled. 2. Explain any three paradigms of programming languages using examples. (9) 1. Imperative (or procedural) paradigm – Emphasizes linear steps that provide the computer with instructions on how to solve a problem or carry out a task. Examples are BASIC, Pascal, COBOL, Fortran, and Ada. 2. Applicative (or functional) paradigm – Emphasizes the evaluation of expressions, called functions. Examples are LISP, Scheme and Haskell. 3. Object-oriented paradigm – Formulates programs as a series of objects and methods that interact to perform a specific task. Examples are Smalltalk, C++, Java and Scratch. 5. Software Security & Piracy 1. Explain the following terms with examples. 1. Botnet (3) – A group of bots (intelligent agents that autonomously execute commands behind the scenes) under the remote control of a botmaster, used to distribute spam and denial-of-service attacks. EXAMPLE – Kelihos Botnet - also known as Hlux, is a botnet mainly involved in the theft of bitcoins and spamming. 2. Shrink-wrap license (3) - A legal agreement printed on computer software packaging, which becomes binding when the package is opened. EXAMPLE – 3. Malware (3) – Malware is short for "malicious software." Malware is any kind of unwanted software that is installed without your adequate consent. EXAMPLE - Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware. 4. Trojan (3) - Trojan may give a hacker remote access to a targeted computer system. EXAMPLE - Zeus is a Trojan horse that steals banking information by Man-in-the-browser keystroke logging and Form Grabbing. Zeus is spread mainly through drive-by downloads and phishing schemes. 5. Worm (3) - A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. EXAMPLE - The Morris worm or Internet worm of November 2, 1988 was one of the first computer worms distributed via the Internet. 6. Quarantine (3) - To move an undesired file such as a virus-infected file or spyware to a folder that is not easily accessible by regular file management utilities. The quarantine option is available in antivirus software so that companies can keep a record of which users have been infected, where the file came from and to possibly send the virus to the antivirus vendor for inspection. EXAMPLE – Norton Antivirus has the ability to quarantine suspected virus-infected files. 7. Zombie (3) – A computer that has been compromised by malware that allows it to be controlled by a remote user. EXAMPLE - Zombies can be used to conduct distributed denial-of-service attacks, a term which refers to the orchestrated flooding of target websites by large numbers of computers at once. The large number of Internet users making simultaneous requests of a website's server are intended to result in crashing and the prevention of legitimate users from accessing the site. In 2000, several prominent Web sites (Yahoo, eBay, etc.) were clogged to a standstill by a distributed denial of service attack mounted by a Canadian teenager. 6. See “Issue: How Serious is Software Piracy?” on page 170 of recommended text 1. Do you believe that software piracy is a serious issue? Why? (2) Before reading the article, I did not feel that software piracy was an issue that affected me in any real way. Now, I am not so sure. Software needs to be affordable and shared. Sharing of information and resources is important for me. I will wonder however if the next time I am on hold for tech support if one of the reasons I am on hold is because the company’s lost revenues meant another CS rep could not be hired. I guess my need for sharing the information and resources out ways profit, therefore I do not see it as a ‘serious’ issue. 2. Do you know any instances of software piracy? (2) Probably. In my university days I can remember sharing music. The thought of piracy never crossed my mind. I wanted to share the music and so it made sense to let people borrow the CD, but I never asked them or told them that they could not rip the CD. 3. Do you think that most software pirates understand that they are doing something illegal? (2) I think it depends of education and technical level. My son is 6 and knows about piracy. I do not think piracy registered with me until my late twenties. 4. Should software publishers try to adjust pricing for local markets? (2) This may prove to be helpful. For the instances of privacy in the US I would say that a good deal would be around high school and college student where expense plays a big role in the decision. Not to mention ease. Another consideration would be ease. If the student needs the software now and only for one or two projects that perhaps paying for a 90 day download that provides full functionality. Afterwards they can view the work only.