Tuesday, April 24, 2012

Chapter 7 The Internet, One Giant Catalog

The days of purchasing products through catalogs such as Brand Names and Sears are a distant memory. Does anyone still have or collect Green Stamps? The Internet has done amazing things for business. For firms it allows small business to compete with the large companies, especially if they have a particular niche.
                                                                                             
You can buy just about everything online from insurance, books, movies, to equipment and medicine. many companies have sprung as intermediaries that brings the buyers to the sellers. An example of this is Amazon. What has made e-commerce so successful is that it eliminates geography and time. You can buy or sell a product anywhere or anytime. Several business models are used  which include most commonly,  business to consumer, business to business , consumer to consumer.There are more ways that companies generate revenue besides selling it's products. "For example, an e-business's primary e-business model might emphasize selling products or services directly to consumers; however, the e-business also might generate revenues by one or more of the following:

                                       Offering subscription-based at its web site
                                       Earning advertising space at itsWeb site
                                       Selling proprietary e-business technologies to other companies
                                       Providing s channel for business partners to sell their products
                                       Participating in an affiliate marketing program   "(Shelly,Napier, Rivers 2010).
                                                                               

There are different payment methods used for e-business. Mist commonly used is through use of credit card.
Just as there are interments for selling products, there are third party collectors like Paypal for which payments can be made in secure fashion. "To more than 50 million users, PayPal used to signify a peer-to-peer payment exchange that relied largely on email notifications. Not anymore. While PayPal still stands as one of the most recognized brands in the e-commerce world, it’s no longer a single payment system: It's a suite of different payment options that can assist merchants to start accepting payments online or enhance their existing payment functions"(Arrigoni 2007).
                                                                        
                                                                                 


Selling products and services on the Internet is now easier  than ever. The partnerships have evolved to allow small business by use of e-commerce; to take advantage of cheaper marketing, advertising and payment collection methods and compete with the "the big boys" Find a niche and you can sell it anytime and anywhere.


Works Cited
Arrigoni, Massimo. "Analysis: The New PayPal | Practical ECommerce." Resources for Online Business Owners. Practical E-Commerce, 26 Apr. 2007. Web. 24 Apr. 2012. <http://www.practicalecommerce.com/articles/469-Analysis-The-New-PayPal>.
Shelly, Gary B., H. Albert Napier, and Ollie N. Rivers. Discovering the Internet:Complete Concepts and Techniques. Boston, Mass: Course Technology/Cengage Learning, 2010. Print.
Images Cited
http://www.google.com/imgres?hl=en&biw=1258&bih=588&gbv=2&tbm=isch&tbnid=sK54FwL7xw4MTM:&imgrefurl=http://www.bkpextranet.com/tips/amaz
http://www.systemdesignstudio.bigcartel.com/img-src-smiley-gif-alt-smiley-face-height-42-width-42

Monday, April 23, 2012

Chapter 6 Keeping Information Safe and Secure

Business relies more and more on technology today than ever before.  Whether it is the banking system or educational system, technology use for business will only increase in the future. The future technological advances also mean challenges exist on how to protect the assets of a company. The assets know as intellectual property.It is crucial for a company to protect the equipment  and data from threats. "Threats to network and Web site security can originate both internally from within the organization and externally from outsiders( Shelly,Napiers, Rivers 2021).

Internal threats can come from carelessness with security procedures or from former employees looking for a little payback. External threats come from others wishing to access the network by hacking or guess passwords form those who already have access.                        

Strong policies and procedures can help to keep networks secure.  Here is a list of 15 habits to keep a secure network.http://www.itworkers-alliance.org/15-habits-to-keep-a-secure-business-network-secure.html

Since I work for the federal government, I understand how networks must be protected. We must have photo ID just to have access to an area. I order to get that ID , security clearances are performed. Our ID cards are also our smart cards that are encrypted with certificates that also use bio-metrics and access code number in order to gain access to the government computer access. The government , like a business cannot afford to slow down or have the system crash all together. We are required to have annual training in order to make sure we stay compliant with security policies.

Computer viruses  form external threats can be reduced or eliminated by secures passwords, installing firewalls, and most of all having policies that employees follow and are enforced. Hackers are always looking for ways to gain access to networks such as through emails and internet sites. Software must be kept up to date because hackers  are continuously looking to find a way in.

Simply put, network security is the responsibility of everyone!!!

                                                                                   
Works Cited
"15 Habits to Keep a Secure Business Network Secure." Technology Network. Web. 23 Apr. 2012. <http://www.itworkers-alliance.org/15-habits-to-keep-a-secure-business-network-secure.html>.


Shelly, Gary B., H. Albert Napier, and Ollie N. Rivers. Discovering the Internet:Complete Concepts and Techniques. Boston, Mass: Course Technology/Cengage Learning, 2010. Print.


Images Cited
http://wirelesstradein.org/tag/wireless-network-security

Sunday, April 22, 2012

Chapter 5 Getting More Out of the Internet

The internet has become more and more part of our daily lives. What was used first just to send emails has not developed into a communication and information phenomenon. We can use the internet for researching, such as information for this blog , use a site citation service, or checking medical facts from a medical portal like WebMD. We have the ability to search stock information and do our banking online, Want to plan a trip, no problem there is a portal for that.                  


There are thousands of special interests sites that cater to our hobby interests or simply "do it your self sites" like how to cook or putting together a DJ sound system ( Very challenging..Is there a book "How to DJ for dummies").  Whatever your interest is, chances are there is a portal to help you. For example, "For the beginner it can be a bit much to take on the wild world of DJing when you don't have a clue and even if you do you may be skeptical of spending so much money for something you may only do as a hobby"(HousePlanetDJ).


                                                                                     Image Courtesy of Technics/ Panasonic

"If you are interested in learning about your families history, the Internet is an amazing resource"(Shelly, Napier, Rivers).


The possibilities are endless, you just have to look.

Works Cited

http://www.houseplanet.dj/index.php/Articles/DJ-equipment-tips-for-beginners.html

Shelly, Gary B., H. Albert Napier, and Ollie N. Rivers. Discovering the Internet: Complete Concepts and Techniques. Boston, Mass: Course Technology/Cengage Learning, 2010. Print.





Saturday, April 21, 2012

SoundCloud Experience

Well finally after many tries, I now have SoundCloud to use for my social media projects. It is a fun and interesting site and what makes this site interesting is that you can upload a track and then do voice overlays to record your own production. The best part, it stores it for you and therefore not using your precious memory, hence the name SoundCloud.                

 You can upload your own remixes( watch out for copyright infringement) and people can leave you feedback for your remix or any other audio you wish to share. I believe this could be very helpful for my new business, Ultimate Event. I plan to record some of my gigs then use Soundcloud to embed them in a blog fr my web page.

 Here is one of my favorite tracks from summertime, "All Summer Long" by Kid Rock.  Enjoy!!!


References

http://soundcloud.com/tracks/search?q%5Bfulltext%5D=all+summer+long++kid+rock
http://www.google.com/imgres?hl=en&biw=1366&bih=667&gbv=2&tbm=isch&tbnid=qEYc5AMtX2fp6M:&imgrefurl=http://soundcloudpromotion.com/soundcloud-contests/&docid=NQeVB0u-DxLlrM&imgurl=http://soundcloudpromotion.com/wp-content/uploads/2012/03/sou

Wednesday, April 11, 2012

Chapter 4 Social Networking

Social networking is not a new phenomenon. We have been engaging in social networks our entire lives. We start with our family, classmates, and associates at work. Now that the internet has expanded its usefulness, there are many way to engage in social networking like never before. We can connect with people around the world and share information with others that have similar interests. " Social networking sites use members' profiles s hubs for members' personal networks"(Shelly, Napier, Rivers 2010).

The profiles tell people who we are and what we are interested in.By connecting through social networking sites we can learn information from others as well as sharing valuable information. .By joining groups, members can post blogs and reply to others. Building networks takes time but can be very rewarding. When used in business it helps connect buyers with sellers and allows one of the most important things for business, that being feedback.


There is a downside to social media. Sometimes we allow ourselves to divulge to much information and social networking sites, which are usually free, feed off our tendencies. Does social networking cause us to give up some of our privacy?
"According to Consumer Reports' 2010 State of the Net analysis more than half of social network users share private information about themselves online, opening themselves up to a variety of online dangers. The key findings of the report include the following:
  • 25 percent of households with a Facebook account don't use the site's privacy controls or weren't aware of them.
  • 40 percent of social network users posted their full date of birth online, opening themselves up to identity theft.
  • 9 percent of social network users dealt with a form of abuse within the past year (e.g., malware, online scams, identity theft or harassment)"(  2010).
Social networking can be a good thing providing precautions are taken. People need to be aware of how to protect against identity theft. Social networking sites need to be sure they follow FOIA laws and make sure that those advertising on their sites  do not cross the line by sharing private information.

Works Cited

Shelly, Gary B., H. Albert Napier, and Ollie N. Rivers. Discovering the Internet: Complete Concepts and Techniques. Vol. 3rd. Boston, Mass: Course Technology/Cengage Learning, 2010. Print.

Widerlund, Jonny. "Social Media: The Privacy and Security Repercussions." Search Engine Watch. Incisive Interactive, June-July 2010. Web. 11 Apr. 2012. <http://searchenginewatch.com/article/2065928/Social-Media-The-Privacy-and-Security-Repercussions>.

Images Courtesy of Google Images

Tuesday, April 10, 2012

Chapter 4 Communicating with Social Media: To text or not to Text

There are many other ways of communicating with others, especially when a person or group wishes to send messages to a mass. "Newsgroups are online bulletin boards first made available  in the 1980's over the distributed Usenet network"(Shelly, Napier, Rivers 2010). Newsgroups are a great way to find information because they specialize in a particular area of interest. Other  groups are for discussion where  people exchange ideas and information. These  groups are an excellent form of education.



Because of the internet, information is instantaneous and readily available. Communication has been upgraded from the telephone , to cell phones, to now text messaging. Texting allows people to send short messages that don't require instant response.
                                                                         

 But is all this technology good for communication? Just as the meaning can get lost in email messages , so too can text messages and would not be practical for business other than to notify a college of someones whereabouts or a quick message to ask a colleague a question. One of the bigger problems is how much today's youth uses texting to communicate. The younger generation spends very little time reading and enjoying other pleasures in life and instead are busy texting or playing video games. The long term affects are causing teens to fall behind in their language and literacy skills. "According to the results of the Organization for Economic Cooperation and Development’s most recent Program for International Student Assessment, the gap in reading ability between the 15-year-olds in the Shanghai district of China and those in the United States is now as big as the gap between the U.S. and Serbia or Chile"(Fergusson2011).


What books are on your kids shelves and how much time do they spend reading even just a newspaper. Too of a good thing can be bad  and the case of our fast pace lives, technology can actually work against us and development of our youth.


                                                                             


Works Cited
Ferguson, Niall. "Texting Makes U Stupid." The Daily Beast. 11 Sept. 2011. Web. 10 Apr. 2012. <http://www.thedailybeast.com/newsweek/2011/09/11/how-will-today-s-texting-teenagers-compete.html>. 



Shelly, Gary B., H. Albert Napier, and Ollie N. Rivers. Discovering the Internet:Complete Concepts and Techniques. 3rd ed. Boston, Mass: Course Technology/Cengage Learning, 2010. Print.

Images Cited
Children's Hospital Of LA




Sunday, April 8, 2012

Chapter 4 Junk Mail AHHH!! What do I do?


                                                                       

As more and more businesses and individuals join the internet world either for private use or for business, everyone has to deal with being followed and tracking tendencies. In other words "big brother is watching". Junk or spam mail continues to be a problem for everyone from individuals to organizations and business.                                                                   
                                                                           
                                             

Unable to display content. Adobe Flash is required.


What do we do with all this junk mail?  Well it is no different than when you open your regular mailbox. You sort through and throw out unwanted mail in the trash. For email it is a little different. Most email software packages including those on  those through the cloud, have by default blocking filters that sort the junk mail. Remember junk mail can carry viruses, trojans, and unwanted cookies that cause your computer to run slower. It is important to keep junk email in check. "Additionally, businesses can install spam filtering software for their networks , and individuals can install spam filtering software on their home computers(Shelly,Napier,Rivers 2010).  

Problems can and will eventually  cause major problems and much of it is related to spam."Receiving a flood of emails from "Postmaster" is bad news. It means that your email address has been harvested by hackers. These hackers use your email address as the "reply to" and send out spam, bulk emails and junk email. When the email address they send to has been discontinued, the postmaster sends an automated message to the "reply to" address--yours. That is why you are getting emails from the postmaster. Take steps to both stop the emails and prevent hackers from using your email address again"(Hanley).  Follow these steps to help manage junk email.


Read more: How to Get Rid of Emails From the Postmaster | eHow.com http://www.ehow.com/how_5900234_rid-emails-postmaster.html#ixzz1rSkXrZQu 

Works Cited
Hanly, Samantha. "How to Get Rid of Emails From the Postmaster Read More: How to Get Rid of Emails From the Postmaster | EHow.com Http://www.ehow.com/how_5900234_rid-emails-postmaster.html#ixzz1rSmFzk9a." Web log post. Ehow. Web. 8 Apr. 2012. <http://www.ehow.com/how_5900234_rid-emails-postmaster.html>.

Shelly, Gary B., H. Albert Napier, and Ollie N. Rivers. Discovering the Internet: Complete Concepts and Techniques. 3rd ed. Boston, Mass: Course Technology/Cengage Learning, 2010. Print.
Images Courtesy of Google Images


                                                 



Chapter 4 Email Get Organized

There are many functions to help you deal with numerous emails that we receive on a daily basis. When setting up an email, account it is important to remember what the email account will be used for. Some may use email for personal mail while others use certain accounts for business only, and others may use a hybrid account for both business or personal. Regardless of what you use the email for, you will want to organize incoming messages for the purposes of developing a history  and verification that things were done. In business we call this "cover your butt with toilet paper".  

                                                                                 

Whether your using an email account from software like Microsoft Outlook or through the cloud Yahoo Mail, email programs have the tools to keep you organized and looking professional. For example, "With Windows Mail you can create folders in which you can store your messages, access options for deleting messages, and create rules by which incoming messages automatically are moved into specific folders. You also can flag incoming messages for follow-up and  mark message conversations- multiple messages on the same topic- as watched conversations"(Shelly,Napier,Rivers 2007). Most email software has junk email identification built right in. It is important for you to check the junk folder or spam folder periodically to make sure important emails are mistakenly deleted because they are in the junk folder. Certain key words classify them as junk even though they are not.

Another great feature of most email software is the ability to make groups within your address book that allow you to send mass emails to selected individuals.  Managing your contacts will help you to get through emails quickly and more efficiently. There are many tips that can help to make email easier to use. For instance, "Many people have the habit of reading all the emails before actually replying to them. Sometimes they might even wait a couple of hours before getting back to these previously read emails"..."What would be a better approach? Simple, whenever you read an email, answer to it right away"(Skellie2007).


Works Cited
Shelly, Gary B., Abert H. Napier, and Ollie Rivers. Discovering the Internet Complete Concepts and Techniques. 3rdrd ed. Boston: Cengage Learning, 2010. 184. Print.



Skellie, . "10 Tips for Managing Email Effectively." Daily Blog Tips. N.p., Nov. 2007. Web. 8 Apr. 2012. <http://www.dailyblogtips.com/10-tips-for-managing-email-effectively>.
Calvin College Hekman Library openURL resolver

Sunday, March 25, 2012

Google Forms - Using the Cloud

Acquiring and sending data has now been taken to another level. Welcome to the cloud, welcome to Google Docs. The race is on to see what software company can make the most impact with regards to cloud computing. Google has set the mark with Google Docs and Google Forms.  
                                                                                                     



"“To the extent that the industry is moving toward an on-demand business model, it poses a threat to Microsoft,” said Kenneth Wasch, president of the Software and Information Industry Association and a longtime Microsoft adversary "(Markoff 2007).   Game on!!!

Now associates can work simultaneously on a project, get instant updates. A project manager has a perfect tool to handle any major project and save valuable time. Meetings can be more meaningful, because everyone can now easily be on the same page, or they maybe be eliminated do to everyone having access to the project.

Whether a firm is planning the yearly company picnic and forms a committee to handle the event planning to major construction jobs,  by using the cloud updating is at your finger tips.

Surveys are a great way to get feedback from customers. When feedback is shared, everyone benefits from the information that is collected.


Check out my little survey I put together on the Buffalo Sabres.



https://docs.google.com/spreadsheet/viewform?formkey=dFRQMjB2VHA5UEE0UnlNN2N2dlA2UVE6MQ


Works Cited



Markoff, John. " Software via the Internet: Microsoft in 'Cloud'computing." pbworks.com. pbworks, 3 Sept. 2007. Web. 25 Mar. 2012.
Images Cited
Buffalo Sabres Logo- Trademark of the Buffalo Sabres

Google Docs - Google Images
Calvin College Hekman Library openURL resolver

Sunday, March 11, 2012

Linking My Career - LinkedIn


As part of my personal learning network, I need to be connected with people that mater most. Networking will always be an important part in developing a career. Linkedin is the free tool that will do that. Remember the key to any successful  networking is to be noticed. By displaying your experiences and qualification we can be "linked " to other that  share the same interests but on a professional level.

"Most people use LinkedIn to “get to someone” in order to make a sale, form a partnership, or get a job. It works well for this because it is an online network of more than 8.5 million experienced professionals from around the world representing 130 industries"(Kawasaki).


                                                                             


There are many benefits to using LinkedIn. Probably one of the most important is the more you develop your profile and  connections, the higher your name will be displayed on searches on search engines like Google. I have added my contacts from outlook at home and will and contacts from outlook at work. I have also added the link to my signature in outlet so that I can gain even more contacts.


Users also have the ability to ask questions and get useful answers from professionals in their network. Check out the tens ways to get the most from LinkedIN by Guy Kawasaki.
                                                                              

Any negatives  such as spam or privacy issues are minor compared with the benefits. So get connection and watch our connections in your profession grow. To explore and get more out of LinkedIn checkout How to Dominate LinkedIn by Garin  Kilpatrick. http://smartonlinesuccess.com/dominate-linkedin/

Works Cited

Kawasaki, Guy. blog.guykawasaki.com. N.p., 4 Jan. 2007. Web. 11 Mar. 2012. <http://blog.guykawasaki.com/2007/01/ten_ways_to_use.html#axzz1oopNW7OO>.
Images Cited
Kilpatrick, Garin. How To: Dominate LinkedIn. 2012. Smart Online Success. Web. 11 Mar. 2012. <http://smartonlinesuccess.com/dominate-linkedin/>.
Murphy, Patrick. Five ways to Improve Your Presence in 2012. 2012. Silicon Cloud Blog. Web. 11 Mar. 2012. <http://www.siliconcloud.com/blog/bid/80739/5-Ways-To-Improve-Your-LinkedIn-Presence-in-2012>.



Calvin College Hekman Library openURL resolver

My Personal Learning Network

My personal learning network is always going to be a work in progress. Using the tools of Facebook, Twitter, Linkedin, You Tube and blogging I will be able to express my thoughts while providing and obtaining valuable information.  To do this I plan to stay organized and use Symbaloo as my organizer for all of my leaning needs. The objective is to stay organized and focus on material that matters.Leaning does not stop because I am finished with college. IT continues to grow , change, and evolve into a well defined " data server" for advancement of my career.

                                            

http://teachersusingtech.weebly.com/personal-learning-networks.html

My goal is to progress into a management position in either procurement or facility maintenance by using my experience, make new connections in the same field in order to learn from them and express my ideas. This continuous development will make me stronger in my field and layout a road map guiding me as I establish myself in my career field.

Connecting all of the social media types and posting blogs will allow me to increase my presence and bring more information to me. By using readers like Google reader, I can subscribe to those blogs that will keep my in the loop of information that is necessary in my career field.

 My path will change form time to time and I must be ready to adapt to these changes. By staying organized and on top of my personal information library, I can move with the changes rather than play catch up. This is so important in today's fast pace global environment.

Saturday, March 10, 2012

Separating Business from Pleasure

As the world gets smaller from the increase in technology that continues to explode the information age,  the way information is researched, downloaded and shared, business and the government in particular, has the task of trying to stay current with these technologies while maintaining high security in a post 911 environment.
                                                                             


I see the tight security first hand since I work for a government contractor. The don'ts far out number the do's when using electronic devices. We are not allowed to use flash drives or connect to the system with other unapproved computer devices. However, as technology continues to evolve, the government , just like business, can either adjust to technology or simply fall behind. Luckily, security technology is catching up with the different devices.

Many companies have concerns of allowing its employees mix " business with pleasure". Firms are trying to keep certain data confidential. Firms also are concern with safety issues regarding such  as texting while driving.
Companies have developed guidelines for its associates to follow. These guidelines include : "

Don't:

  • Allow mobile devices to have free access to all sensitive corporate data, unless strong security measures (VPNs, authentication and encryption) are in place.
  • Leave mobile devices in areas where they can be seen or easily taken.
  • Share or leave password information in places where unauthorised users can find it"(Business Link).
                                                                                  

As for the government, keeping personal data separate from secured government systems was the best way to protect the sensitive material.  That is until recent developments in technology."
This spring, Korean manufacturer LG -- not a device maker known for security-savvy smartphones -- will deploy Android smartphone prototypes for U.S. federal government testing that run two separate operating systems, one managed by the user and one by the government"(Gruman).   By having separate operating systems, users can have their personal data on one and high security for the government on the other. 

If the future is like the past, business will gain follow government innovation  for development of technology necessary to help organize and keep business separate from pleasure.

 Works Cited
EasiShare - Secure "dropbox" for Enterpr. You Tube. Web. 10 Mar. 2012. <http://www.youtube.com/watch?v=yWRLVKvyusA>.


Gruman, Galen. "Business smartphone, personal smartphone: One device." Info World. Info World, 28 Feb. 2012. Web. 10 Mar. 2012. <http://www.infoworld.com/d/mobile-technology/business-smartphone-personal-smartphone-one-device-185908>.



"Managing the Use of Mobile Devices." Business Link. Business Link, n.d. Web. 10 Mar. 2012. <http://www.businesslink.gov.uk/bdotg/action/detail?itemId=1074298309&type=RESOURCES>.

Images Cited
IT and Computing. Deakin University, n.d. Web. 10 Mar. 2012. <http://www.deakin.edu.au/current-students/it-support/email/mobile/index.php>.
Calvin College Hekman Library openURL resolver

Research Alternatives to Search Engines

There are more ways to obtain information than uses the regular search engine method. "For in-depth or scholarly research,  a more effective strategy is to access specialized collections of electronic resources"(Shelly, Napier, Rivers). These sites include..."well known services such as  LexisNexis, IgentraConnect,FindLaw, Hoover's, Dun & Bradstreet, and Dialog"(Shelly, Napier, Rivers).

Whether your looking for news or historical documentation, LexisNexis offers many sources for research. IngentaConnect lists over 10,000 from professional and academic sources.Small and large business owners turn to Hoover's and Bradstreet for business information and stock information.  

                                                            

Another great reference tool is the Library of Congress's THOMAS which gives legislative information.  Unlike THOMAS, Thomas Registry gives users the ability to find vendors of particular products.

                                                      

http://www.thomasnet.com/?cov=NA&heading=0000000&pslpid=0000000&WT.mc_t=PPC&WT.mc_n=mcgoog&WT.sem_engine=mcgoog&WT.srch=1&WT.z_sem_account=1&mctoken=none&WT.sem_keyword=thomas%2520register

Works Cited

Shelly, Gary B., Albert H. Napier, and Olilie Rivers. Discovering the Internet Complete Concepts and Techniques. 3rdrd ed. Boston: Cengage Learning, 2010. 149. Print.


Images Cited



Lexis Nexis. Advertisement. Wikipedia. Wikapedia, 13 Dec. 2008. Web. 10 Mar. 2012. <http://www.google.com/imgres?hl=en&gl=us&biw=1600&bih=756&tbm=isch&tbnid=mkR9IkziZG_O6M:&imgrefurl=http://en.wikipedia.org/wiki/File:LexisNexis_logo.png&docid=tRWyShKQVt1CEM&imgurl=http://upload.wikim>.
Calvin College Hekman Library openURL resolverThomas Register. Advertisement. Useful CAD Links. MyCadSite.com, n.d. Web. 10 Mar. 2012. <http://www.we-r-   here.com/cad_07/links/index.htm>.
Calvin College Hekman Library openURL resolver

Advanced Internet Searching

One of the nice features that internet search box has  on Internet Explorer, is the ability to add new search engines to the quick pick menu. This id done through the Add-ons Gallery. Searching specific information an a web page can  take place by using  the find bar to sift through all the information on a page and help quickly locate the exact topic your looking for.  Another  nice feature is the ability to use the Research Explorer Bar to search online reference tools.


                                                                                 


A great Shortcut in internet searching is that a user can narrow down the results simply by use a search engine that is more specialized in that particular area."Searching for people, news,magazine or journal articles, video, blogs ans other social media, products  or services can be made easier when you use specialized search engines"(Shelly, Napier, Rivers).


For example searching the government for various form and tools can be cumbersome to say the least."The U.S. government generates a wealth of useful and interesting information. Despite excellent government-oriented search engines like USA.gov and Data.gov, government information isn't always easy to find. That’s why if you use government information it’s important to put together your own toolkit of specialized government-related search engines. Here’s a roundup of several new search tools that have come online in the couple of weeks"(Price). http://searchengineland.com/a-roundup-of-new-u-s-government-search-tools-109408?utm_source=sel&utm_medium=scap&utm_campaign=email

Works Cited

Shelly, Gary B., Albert H. Napier, and Olilie Rivers. Discovering the Internet Complete    Concepts and Techniques. 3rdrd ed. Boston: Cengage Learning, 2010. 140. Print.



Price, Gary. Search Engine Land. Third Door Media, 30 Jan. 2012. Web. 10 Mar. 2012. <http://searchengineland.com/a-roundup-of-new-u-s-government-search-tools-109408?utm_source=sel&utm_medium=scap&utm_campaign=email>.

Images Cited
Local Internet Search via mobile helps customers find your business. 2011. Business Video Fast. Web. 10 Mar. 2012. <http://www.businessvideofast.com/2011/01/local-internet-search-via-mobile-helps.html>.
Calvin College Hekman Library openURL resolver

Calvin College Hekman Library openURL resolver

Tuesday, March 6, 2012

Power Up your Browsing

Searching the internet can be a cumbersome job resulting in searching through thousands of web pages. But thanks to advanced searching techniques and shortcuts , searches on the internet can lead to the results you expect. Many search engines have build in Boolean operators that uses conjunction like and , or and not.



 Also when performing a search, it is best to try to be as precise as possible in order to narrow down the search results. " For example, suppose you are researching an answer to the following question: How many college students play sports and why? After selecting the search engine to use, the next task is to formulate the search query by selecting the keywords that will perform the search most efficiently - college and students and sports"(Shelly,Napier, Rivers).

Shortcuts are also was to get the fastest results while searching web pages. For example, if looking for maps while on Yahoo, simply type " map! (city your looking for)"   Bing and Google both offer short cuts for currency conversion and weather respectively.

Google Chrome offers unique and easy way to search web sites. Partial typing of keywords loads possible results and use of tab key allow uses to quickly move to what they need. "Chrome makes it much easier to add search engines than other browsers, as it automatically adds new search sites as you perform searches on various sites across the web"(Guay). http://www.howtogeek.com/howto/24227/complete-guide-to-keyword-shortcuts-to-search-sites-in-google-chrome/ 

                                                                              

The easy for searching the internet is continuously evolving and its a good thing because the number of new users continuously increasing as well. What will the next great search engine lead us?

Images Cited

Google Images

Works Cited

Shelly, Gary B., Albert H. Napier, and Ollie Rivers. Discovering the Internet Complete Concepts and Techniques. 3rd ed. Boston: Cengage Learning, 2010. 123. Print.

Guay, Mathew. "Shortcuts to Search Sites in Google Chrome." How to Geek. N.p., n.d. Web. 6 Aug. 201. <http://www.howtogeek.com/howto/24227/complete-guide-to-keyword-shortcuts-to-search-sites-in-google-chrome/>.