Ed Summers, librarian, metadata expert, teacher, and computational expert, delivers an insighful lesson on the Persistent Uniform Resource Locator. PURLs were developed to make URLs more resilient and persistent over time. You could put a PURL into a catalog record and if the URL it pointed to needed to change you changed the redirect on the PURL server, and all the places that pointed to the PURL didn’t need to change. It was a beautifully simple idea, and has influenced other approaches like DOI and Handle. But this simplicity depends on a commitment to keeping the PURL up to date.
Librarians, researchers, journalists, teachers and students are continually confronted with what can be described as a kind of information miasma when using online sites, databases, resources, images and social media. No sector or discipline is immune to misinformation, disinformation, hoaxes, lack of data quality, and biased research. This guide by Marcus Zillman highlights actionable resources to evaluate and identify online malfeasance, as well as sources to verify information and data quality that is critical to our professions. These two efforts often intersect, and require vigilance and continuing education respective to effectively confronting the challenges they present.
This guide by Marcus Zillman identifies a wide range of free and fee based resources from which to choose to conduct people searches as well as brand and company reputation research, for business or personal reasons. It is important to note that the largest and most prominent data aggregators resell their content to other sites. In addition, data on free and some fee based sites may not be cleansed and can include inaccuracies that range from minor to critical. Also, many sites offer free search but charge a fee to review the results. It is therefore advisable to use multiple sources in your research and compare and contrast results before pursuing the use of these data.
Investigative Reporter Adrianne Jeffries and Investigative Data Journalist Leon Yin document how the online giant gives a leg up to hundreds of house brand and exclusive products that most people don’t know are connected to Amazon.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Apple’s App Tracking Transparency Feature Doesn’t Stop Tracking; New Chrome feature can tell sites and webapps when you’re idle; Bye Google: 7 privacy-first search engines everyone should try; and Troll farms reached 140 million Americans a month on Facebook before 2020 election, internal report shows.
Technology has significantly changed our concept of privacy as well as our ability to maintain it. The are a wide spectrum of tools, services and strategies available to assist you in the effort to maintain a sliding scale of privacy in an increasingly porous, insecure online environment. Whether you are browsing the internet, using email or SMS, encrypting data on PCs or mobile phones, trying to choose the best VPN, or working to secure your online services from cybercrime, hacking or surveillance, Marcus Zillman has identified a wide range of sources for you to consider. The foundational issue regarding privacy is that you must be proactive, diligent and persistent in evaluating and using multiple applications for email, search, file transfer, and social media. There is no “one size fits all” solution, and your vigilance and willingness to remain flexible in applying effective solutions are part of an ongoing process.
Marcus Zillman’s new guide provides a wealth of information to enhance your efforts in conducting expert research on a wide range of subject matters. The guide is also another reminder that Google should not be your go-to subject search engine by demonstrating how choosing to use reliable topic specific sources can deliver greater scope, breath and depth of information for your analysis and reporting. These sites include metasearch, semantic and Deep Web search, with many sources offering advanced search functionality, unique and comprehensive data sets and repositories, dashboards and tools from around the world, all of which are updated and curated effectively and consistently. These sources represent the work of academic, government, consortium, firms and industry.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Here’s How Amazon Third-Party Sellers Reportedly Hound Customers Who Leave Bad Reviews; Microsoft Edge’s ‘Super Duper Secure Mode’ Does What It Says; The Ethics of Data: Anonymity Vs Analytics; and Apple Can Scan Your Photos for Child Abuse and Still Protect Your Privacy – If the Company Keeps Its Promises.
Jerry Lawson highly recommends Ann Walsh Long’s new book, A Short & Happy Guide to Advanced Legal Research. Long’s book offers good ideas about balancing quality, speed and expense, as well as a wealth of other insights on improving online legal research.
In his review Jerry Lawson recommends Internet Legal Research on a Budget: Free and Low-Cost Resources for Lawyers, 2nd Edition as the single best resource he knows for lawyers interested in exploring how to cut legal research expenses by trying and using free or inexpensive legal information.