SlideShare une entreprise Scribd logo
1  sur  22
Living in the Cloud How Using Online Services Can Let You Soar Heather Braum, Sharon Moreland, Liz Rea Northeast Kansas Library System
 
Hosted Automation Systems KLOW (web hosting services) Online Office Software Data Backup  SlideShare Flickr, Photobucket Social Networking YouTube Meebo, Mibbit (IRC)
Easily share your photos and documents  with your friends and peers, without e-mail. Share and Collaborate
Lots of libraries are already doing it...
Use Social Networking to...  handle all kinds of social situations... Stay In Touch
No More Removable Media! Patrons will always know where their data is.
Your data lives here.
Not here.
Wherever there is Internet... You have access.
Easy to Use Interfaces are usually very similar to desktop applications, and similar to each other.
All you need is a web browser and an Internet connection. Requires Less Powerful Hardware
How will I get to the cloud? Netbooks Nettops ("Net Desktops") Mobile Devices: BlackBerry, iPhone, Cell Phone, iPod Touch ...and your regular computer.
Concerns... "(An) important role for libraries right now is to teach users about these types of services, in no small part so that we can help them understand the potential consequences. Because if you teach a patron to use an online documents site and she puts her resume there and something goes wrong with it, that’s a very real data loss for that person." - Jenny Levine
What happens to your data in the event of a catastrophic failure of your cloud provider?
Failure is always a possibility. ,[object Object],[object Object]
Best Practices
Choose good passwords and keep them safe. Example: Myfr13nd80B You are Only as Secure as Your Password.
Choose Reliable Providers The bigger the company the better. Google Apps Gmail YouTube Amazon  Yahoo ! Flickr delicious.com Yahoo Chat ... anything  well known and heavily used.
Read the Terms of Service
But How Will It Affect My... Software Purchasing?        Hardware Purchasing?            Software on Computers?             Security Concerns?
QUESTIONS? E-mail, IM, Twitter (we like friends): Heather Braum - hbraum@nekls.org - @hbraum Sharon Moreland - smoreland@nekls.org - @lybrarian Liz Rea - lrea@nekls.org - @wizzyrea See more articles and info at our blog:  http://blog.nekls.org

Contenu connexe

Tendances (20)

Internet advantages and disadvantages
Internet advantages and disadvantagesInternet advantages and disadvantages
Internet advantages and disadvantages
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 
Introduction to World Wide Web
Introduction to World Wide WebIntroduction to World Wide Web
Introduction to World Wide Web
 
West Chester - Tech Training Session 11
West Chester - Tech Training Session 11West Chester - Tech Training Session 11
West Chester - Tech Training Session 11
 
Unit 4: Communicating online
Unit 4:  Communicating onlineUnit 4:  Communicating online
Unit 4: Communicating online
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Rockets isys363
Rockets isys363Rockets isys363
Rockets isys363
 
Internet based communication
Internet based communicationInternet based communication
Internet based communication
 
Rockets isys363
Rockets isys363Rockets isys363
Rockets isys363
 
All about email
All about emailAll about email
All about email
 
Understanding Kids in the Digital World
Understanding Kids in the Digital WorldUnderstanding Kids in the Digital World
Understanding Kids in the Digital World
 
Advantages and drawbacks of the Internet
Advantages and drawbacks of the InternetAdvantages and drawbacks of the Internet
Advantages and drawbacks of the Internet
 
Week 4 internet overview
Week 4 internet overviewWeek 4 internet overview
Week 4 internet overview
 
Empowerment technology
Empowerment technologyEmpowerment technology
Empowerment technology
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Internet
InternetInternet
Internet
 
Information Searches
Information SearchesInformation Searches
Information Searches
 
Email
EmailEmail
Email
 
Types of cyber crimes
Types of cyber crimesTypes of cyber crimes
Types of cyber crimes
 

Similaire à Cloud Computing

Living in the Cloud: 
How Using Online Services Can Let You Soar
Living in the Cloud: 
How Using Online Services Can Let You SoarLiving in the Cloud: 
How Using Online Services Can Let You Soar
Living in the Cloud: 
How Using Online Services Can Let You SoarNortheast Kansas Library System
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson planQuennith
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology reportMarq2014
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineTodd Stanfield
 
IS Undergrads Class 4
IS Undergrads Class 4IS Undergrads Class 4
IS Undergrads Class 4Joao Cunha
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereBlake Carver
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Bruce Wolfe
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Parent engagement cvps
Parent engagement cvpsParent engagement cvps
Parent engagement cvpsjeygenraam
 

Similaire à Cloud Computing (20)

Living in the Cloud: 
How Using Online Services Can Let You Soar
Living in the Cloud: 
How Using Online Services Can Let You SoarLiving in the Cloud: 
How Using Online Services Can Let You Soar
Living in the Cloud: 
How Using Online Services Can Let You Soar
 
What Is Spam
What Is SpamWhat Is Spam
What Is Spam
 
Internet 1 lesson plan
Internet 1 lesson planInternet 1 lesson plan
Internet 1 lesson plan
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
 
Untangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe OnlineUntangling the Web: Keeping Your Family Safe Online
Untangling the Web: Keeping Your Family Safe Online
 
IS Undergrads Class 4
IS Undergrads Class 4IS Undergrads Class 4
IS Undergrads Class 4
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
An Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & AnywhereAn Introduction To IT Security And Privacy In Libraries & Anywhere
An Introduction To IT Security And Privacy In Libraries & Anywhere
 
EMPOWERMENT.pptx
EMPOWERMENT.pptxEMPOWERMENT.pptx
EMPOWERMENT.pptx
 
Grant 2011.0918
Grant 2011.0918Grant 2011.0918
Grant 2011.0918
 
Who's that knocking on my firewall door?
Who's that knocking on my firewall door?Who's that knocking on my firewall door?
Who's that knocking on my firewall door?
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Malware
MalwareMalware
Malware
 
Parent engagement cvps
Parent engagement cvpsParent engagement cvps
Parent engagement cvps
 
Essay About Surfing The Internet
Essay About Surfing The InternetEssay About Surfing The Internet
Essay About Surfing The Internet
 

Plus de smoreland

Making connections
Making connectionsMaking connections
Making connectionssmoreland
 
Northeast kansas history final
Northeast kansas history finalNortheast kansas history final
Northeast kansas history finalsmoreland
 
Nekls tech toy box
Nekls tech toy boxNekls tech toy box
Nekls tech toy boxsmoreland
 
Nekls tech toybox
Nekls tech toyboxNekls tech toybox
Nekls tech toyboxsmoreland
 
Nekls tech toy box
Nekls tech toy boxNekls tech toy box
Nekls tech toy boxsmoreland
 
Reportsfest revised
Reportsfest revisedReportsfest revised
Reportsfest revisedsmoreland
 
Web site tour
Web site tourWeb site tour
Web site toursmoreland
 
Speaking the language of cataloging
Speaking the language of catalogingSpeaking the language of cataloging
Speaking the language of catalogingsmoreland
 
Getting ready for_ils_migration
Getting ready for_ils_migrationGetting ready for_ils_migration
Getting ready for_ils_migrationsmoreland
 
Gators Using an aggregator
Gators Using an aggregatorGators Using an aggregator
Gators Using an aggregatorsmoreland
 

Plus de smoreland (12)

Making connections
Making connectionsMaking connections
Making connections
 
Northeast kansas history final
Northeast kansas history finalNortheast kansas history final
Northeast kansas history final
 
Nekls tech toy box
Nekls tech toy boxNekls tech toy box
Nekls tech toy box
 
Nekls tech toybox
Nekls tech toyboxNekls tech toybox
Nekls tech toybox
 
Nekls tech toy box
Nekls tech toy boxNekls tech toy box
Nekls tech toy box
 
Reportsfest revised
Reportsfest revisedReportsfest revised
Reportsfest revised
 
Web site tour
Web site tourWeb site tour
Web site tour
 
Speaking the language of cataloging
Speaking the language of catalogingSpeaking the language of cataloging
Speaking the language of cataloging
 
Reports
ReportsReports
Reports
 
Getting ready for_ils_migration
Getting ready for_ils_migrationGetting ready for_ils_migration
Getting ready for_ils_migration
 
Whatpolicy
WhatpolicyWhatpolicy
Whatpolicy
 
Gators Using an aggregator
Gators Using an aggregatorGators Using an aggregator
Gators Using an aggregator
 

Dernier

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 

Dernier (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 

Cloud Computing

  • 1. Living in the Cloud How Using Online Services Can Let You Soar Heather Braum, Sharon Moreland, Liz Rea Northeast Kansas Library System
  • 2.  
  • 3. Hosted Automation Systems KLOW (web hosting services) Online Office Software Data Backup SlideShare Flickr, Photobucket Social Networking YouTube Meebo, Mibbit (IRC)
  • 4. Easily share your photos and documents with your friends and peers, without e-mail. Share and Collaborate
  • 5. Lots of libraries are already doing it...
  • 6. Use Social Networking to... handle all kinds of social situations... Stay In Touch
  • 7. No More Removable Media! Patrons will always know where their data is.
  • 10. Wherever there is Internet... You have access.
  • 11. Easy to Use Interfaces are usually very similar to desktop applications, and similar to each other.
  • 12. All you need is a web browser and an Internet connection. Requires Less Powerful Hardware
  • 13. How will I get to the cloud? Netbooks Nettops ("Net Desktops") Mobile Devices: BlackBerry, iPhone, Cell Phone, iPod Touch ...and your regular computer.
  • 14. Concerns... "(An) important role for libraries right now is to teach users about these types of services, in no small part so that we can help them understand the potential consequences. Because if you teach a patron to use an online documents site and she puts her resume there and something goes wrong with it, that’s a very real data loss for that person." - Jenny Levine
  • 15. What happens to your data in the event of a catastrophic failure of your cloud provider?
  • 16.
  • 18. Choose good passwords and keep them safe. Example: Myfr13nd80B You are Only as Secure as Your Password.
  • 19. Choose Reliable Providers The bigger the company the better. Google Apps Gmail YouTube Amazon Yahoo ! Flickr delicious.com Yahoo Chat ... anything well known and heavily used.
  • 20. Read the Terms of Service
  • 21. But How Will It Affect My... Software Purchasing?        Hardware Purchasing?            Software on Computers?             Security Concerns?
  • 22. QUESTIONS? E-mail, IM, Twitter (we like friends): Heather Braum - hbraum@nekls.org - @hbraum Sharon Moreland - smoreland@nekls.org - @lybrarian Liz Rea - lrea@nekls.org - @wizzyrea See more articles and info at our blog: http://blog.nekls.org