A Rose by any other name, would still be a Flower.

My DC element is Type and, admittedly, for this particular project it is a straightforward choice both in terms of our choice to keep it and in its usage for this application. DCMI provides a vocabulary for Type which can be reviewed here:

http://dublincore.org/documents/2010/10/11/dcmi-type-vocabulary/

Reviewing this vocabulary it is immediately obvious that for this application we will use the “Image” label for all of our photos. We may find the additional labels “StillImage” or “MovingImage” applicable to some of our material, but ultimately these two labels are to be used under the auspices of the broader label “Image”.

While the distinction in our application is very straightforward, it is easy to understand how this element can be more complicated in a diversified collection of objects. At around 12 labels, the DCMI vocabulary may seem succinct, but if you review the labels and what they are intended to encompass they really cover almost any object conceivable. In this element the effectiveness of the DCMI to allow simple description of objects is very prevalent.

Advertisements

If a picture is worth a thousand words, then…

I found the examination of image analysis helpful going into our discussion of what elements to keep for the image collection. I feel like two area examined were already something we have considered – namely “Levels of Analysis” and “Vocabulary” control. The other area of examination “The focus on relationships, processes” struck me as pertinent and unnoticed until I read this article. Quite simply it states that many instances of images derive their “aboutness” meaning not simply from the objects or subjects pictured, but from the relationship the two objects have between one another. In the example given in the article the picture considered is a stork carrying a baby elephant. Separate they have meaning, but the meaning they carry together and then the meaning is only understood culturally. Ins electing which elements to keep and those to dispose of it seem pertinent then that we consider all the information users would need to have for the correct contextual understanding of the image.

DC Type element: A Change of Heart

When we received our elements I at first considered I had made a folly in choosing Type. Since this collection is all images, what use would my element be? “It says Images in the title”, I thought to myself. In reading the DCMI definition of Type closely though I was struck by the advice, “…best practice to ensure interoperability is to include at least one general type term from the DCMIType vocabulary in addition to the domain specific type term(s)…” It occurred to me I was thinking only locally in my dismissive thoughts on Type and neglecting to consider that these images would be of interest to other institutions which may desire to utilize them within the parameters of their institutions policies. I believe now that utilizing DCMI Type vocabulary – in addition to any local descriptions of Type we may deem relevant and useful – will ensure that the collection can be integrated with outside systems efficiently and effectively. Further I think the Type terms “Image” and “Event” are both applicable to efficient utilization of the image collection. Before using the “Event” term though, further explication of proper usage would be necessary.

A Massive Social Experiment On You Is Under Way, And You Will Love It

I read this article in a recent issue of Forbes magazine. It discusses speaker manufacturer Jawbone and their foray into wearable technology. Their product line includes a wrist device that tracks the user producing information on steps taken and sleep patterns. Analyzing the collected data the company was able to determine it’s accuracy sufficient and started directing guidance to individual users to change their behavior patterns. The article goes on further to discuss the immense amount of resource put into studying behavior in an attempt at creating the most optimal design for the desired user behavior. In the previous post I was looking at the author railed on about the potential thought police/Big Brother effect of the government potentially using collected metadata to attempt to predict behavior, but big companies like Google are already doing this with the data freely given to them.

http://www.forbes.com/sites/parmyolson/2015/01/21/jawbone-guinea-pig-economy/

Metadata and The Birthplace of the Thought Police

This post is actually about two articles. I must admit when I first read them I was a little skeptical even though I agree that the measure in Australia is generally not a positive development. The point that is made in the second article though relates the idea that with such a vast hoard of metadata the government will be able to make predictions about behavior patterns and anticipate actions. At this point I am picturing a large warehouse of grey clothed workers at computer terminals assigning tags to phone numbers or website such as terrorist, criminal, et al and a list of people to observe based on their association with that phone number or website. In other words an anticipatory surveillance or suspicion of people based on the relation of their metadata to someone else’s metadata. While I think these articles may be taking an extreme leap somewhat and their tone is definitely editorial I think the concern they raise issue with is valid.

Article 1 http://www.techinsider.com.au/2015/03/metadata-government-steal-digital-freedom/

Article 2 http://www.techinsider.com.au/2015/03/metadata-birthplace-thought-police/

Controversial metadata laws to be debated in lower house

Here we have more news about the metadata political battle ongoing in Australia. I found it interesting that the cost for the program is described as $188 million to $319 million. This struck me because that is a huge gulf between already huge sums of money. Yet, again, no indication of how this data will be managed is given in detail other than to mention that passwords, PINs, et al will not be held by the telecommunication company which is tasked with retention of this data for a period of two years. In response it describes a campaign designed to attempt to flood the attorney general’s email inbox – ironic because this mimics a denial of service attack which is a commonly deployed illicit tactic. Further irony exists I think between the supposed reason for this measure – the prevention of cyber terrorism acts – and the fact that it creates a target for illicit groups in search of the information being retained for criminal reasons.

http://www.9news.com.au/national/2015/03/05/03/33/metadata-laws-to-be-debated-in-parliament

Building Controlled Vocabularies for Metadata Harmonization

I am transfixed with controlled vocabularies both their creation and their function. As such this overview was fascinating to me. Even a controlled vocabulary can become out of control, but the principles discussed here represent sound practice for this endeavor. I have made attempts at developing controlled vocabularies in the past and found this the most difficult task. Often I found myself becoming too specific and not, as a previous classmates blog post noted, maintaining a requisite level of ambiguity. I think this would be most difficult to achieve with digital preservation, particularly mass digitization at large scale.

http://www.asis.org/Bulletin/Dec-12/DecJan13_Zaharee.html

RE: A QUESTION TO MY CLASSMATES: “TECH” SKILLS?

Slistopher posed the following questions recently:

1. What do you define as “tech skills”?

2. Which types of “tech skills” (broadly defined) have you found to be particularly useful in your work environments?

3. What do you see as being the most useful technology skills for LIS professionals, in general?

4. Have you ever taken the time to learn a particular skill, only to find that it wasn’t helpful at all?

5. How important do you think “soft skills” (communication, interpersonal skills, etc.) are for LIS professionals?

6. If you were in the position of hiring a librarian/archivist/other LIS professional, which types of “tech” knowledge/experience would you expect a candidate to possess?

My responses:

1. ‘Tech skills’ fall into two categories: hardware and software. While some may be more adept at configuring hardware than others and likewise some may feel more competent with a certain program than others, essentially either of these areas of skill are learned and familiarity induced through interaction over time. Many people ask me personally (concerning building computers) “how did you learn all this stuff?” – and the answer is I have been building computers in some capacity for 18 years. Like most things in life, there is no replacement for experience.

2. Software skills are undoubtedly more valued and useful everyday. Understanding hardware is helpful, but not requisite for most everyday simple tasks. Understanding the essentially simple mechanics of programs makes learning foreign programs more expedient.

3. Programming languages. PERL, JavaScript, et al. Knowledge of multiple operating systems and how they function is also extremely useful. Other protocols such as CSS, HTML, et al are also important. Familiarity with CMS systems is lower priority, but a useful skill as well.

4. I cannot think of one. Learning any computer or tech skill is beneficial, typically it is the conceptual context of the skill that is the aspect with the most utility.

5. Extremely. Effective communication is often the most decisive factor in success or failure, in my experience.

6. I would look for the skills mentioned in answer #3, at the very bottom of the totem pole is at least adeptness with typical productivity software (MS Office, Adobe, et al).

That’s my two cents!

Original post: https://slistopher.wordpress.com/2015/02/28/a-question-to-my-classmates-tech-skills/

RE: Thank you, Captain Obvious: a librarian’s response – #LS566

This post about the much discussed “Where It All Went Wrong” speech makes a critical observation in the closing remark in my thoughts. It is imperative for libraries to do something they are not expressly trained and assigned to do, that is market themselves. Libraries must be enthusiastic about the services they offer and able to communicate them effectively to the community they serve in order to realize the potential of their capabilities. This may prove an arduous task when as mentioned in the referring post libraries typically have limited funding and specialized personnel to accomplish such tasks. The scenario remains however that librarians must become stewards of their renown and utilize all the tools available to them to familiarize the community with their presence.

https://rehelms.wordpress.com/2015/02/10/thank-you-captain-obvious-a-librarians-response-ls566/

RE: What else to include in image records?

This post does a fantastic job of synthesizing the referenced information concerning management of digital images. Alteration of digital objects is so easily achievable it is perilous to assume that all digital representations are true 1:1 copies of their physical counterparts. This could lead to the consideration that it is futile to digitize in the first place. However, obviously widespread dissemination is only reachable through digital distribution. Commercially in the video game market companies have realized this as well. A software company, Valve, launched a digital distribution service known as Steam in 2003 and quickly dominated sales of personal computer video games. In 2015 you will rarely ever find personal computer games sold at retail in physical manifestations due to the effect of Steams digital distribution. Obviously digital distribution allows reach to a wider audience at a very low cost compared to maintaining multiple physical locations. In the case of libraries many items are of course unique which further constitutes rational for digitization and circulation via electronic means.

http://librarysciblog.blogspot.com/2015/02/what-else-to-include-in-image-records.html