“This is not just a database,” said Ram, professor of management information systems and director of the INSITE: Center for Business Intelligence and Analytics in the UA’s Eller College of Management. “We’re building a knowledge discovery system that integrates multiple archaeological databases and various artifacts and objects, and we’re trying to figure out relationships that aren’t already known. People can query the website and it’ll show them various data and how they’re related to each other, and they’ll be able to run large-scale network analysis and statistical analysis that will support various stakeholders, including researchers and students, as well as the public.”
Hosted on the Open Science Framework – here is our presentation from the 2016 Digital Library Federation conference in Milwaukee.
After traveling across Massachusetts, the Best Of Mass. judges reveal the Top 10 french fry rankings.
ALA asks advocates to ask their Representatives to sign two “Dear Appropriator” letters: one urging full funding for LSTA and the second for IAL program.
You can help!
raising awareness of threats to publicly available data; exploring the power dynamics of data creation, sharing, and retention; and teaching ways to make endangered data more accessible and secure
The government hacking into phones and seizing computers remotely? It’s not the plot of a dystopian blockbuster summer movie. It’s a proposal from an obscure committee that proposes changes to court procedures—and if we do nothing, it will go into effect in December.
Books checked out from a library and terms searched on library computers can reveal a teenager’s questions about sexual orientation, a neighbor’s religious leanings, or a student’s political interests. Libraries across the country, particularly public libraries, make it part of their mission to serve the most vulnerable and underserved user groups, including users who are homeless, unemployed, or recent migrants or refugees.