Significance of Web 2.0 Technology and its Application in Academic Libraries
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 5
Abstract
The objective of this paper is to provide information of web 2.0 technology in context of academic libraries. Web 2.0 technologies have seen the sudden increase of social networking sites or tools, which provide a medium to connect with commonplace people. There are some social software applications are recent time are the most up-to-date properties of the internet users. In libraries the key ones include Social networking sites, wikis, IM, RSS, Blogs, Book marking etc. web 2.0 or Library 2.0 has changed the usual way of thinking regarding the occupation wherever academic library merely fit into place in creating the content as well as services in favor of user shifted to the area of user where librarian determination facilitate user to create them on behalf of themselves. The changes in web technologies have enabled libraries to produce novel interactive services such as virtual reference services, personalized interfaces and audio-visual media with the intention of be able to be downloaded by the user (group of people) irrespective of their substantial locations. In consequence these up-and-coming web based i.e. web 2.0 features are opportunity innovative avenues and giving libraries the facility to propose the enhanced customer services to the user communities.
Authors and Affiliations
Rashmi S. Tarade , Nilu Singh
Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment
Cloud computing is an emerging technology in distributed computing which facilitates pay per model as per user demand and requirement. Cloud consist of a collection of virtual machine which includes both computational an...
Novel Design and Implementation of Topology and Orchestration Specification for Cloud Applications to enable Portability
In this paper we provide a novel design and implementation of toplogy and orchestration specification for cloud applications to enable portability
Novel Implementation of O-Pass Security Model Design of User Authentication for Password Stealing and Reuse Attacks
Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users’ passwords are prone to be stolen and compromised under different threats and vulnerabilitie...
Automatic Database Clustering: Issues and Algorithms
Clustering is the process of grouping of data, where the grouping is established by finding similarities between data based on their characteristics. Such groups are termed as Clusters. Clustering is an unsupervised lear...
Improving the Efficiency of Call Admission Control in Wireless Cellular Communication Networks by Frequency Sharing Techniques
In this paper, a two-tier cellular communication wireless network is characterized by overlapping the service area for managing the new calls users having different mobility speed. The overlapping property of the two-tie...