2008年11月20日 星期四

透過 Samba 伺服器分享目錄及印表機

透過 Samba 伺服器分享目錄及印表機
透過Samba server 可以讓你的Unix 與windows 系統 透過『網路上的芳鄰』,來分享資源,互傳資料,真的很方便, 最近是因為之前workstation 上接了一台SCSI的CDwriter 掛了, 透過Samba 真的很方便又經濟。

Linux 上Samba 伺服器的設定
* Linux IP : 192.168.1.10 , hostname : linux10
* Windows IP : 192.168.1.31, hostname : pc31
* 工作群組: CADhome
* 分享目錄, Linux10:/usr/local/cadhome
* User : subby

1. Modify /etc/lmhosts
%vi /etc/lmhosts
127.0.0.1 localhost
192.168.1.10 linux10
192.168.1.31 pc31

2. Samba 的設定--修改 smb.conf 設定檔
接著請在 /etc/samba/smb.conf 設定檔中, 如下修改:
[global]
Client code page = 950 ç可以看見中文!
Workgroup = CADhome ç 須與PC的工作群組相同
Security = user ç 必須設定samba user
Encrypt passwords = yes
Smb passwd file = /etc/samba/smbpasswd ç samba user password

[cadhome ] 以下是參考原先 /tmp 分享目錄設定值, 所自行加上的內容
comment = Share Dir 此分享目錄的註解說明
path = /usr/local/cadhome 指定分享的目錄為 /usr/local/cadhome
readonly = no 不具有"唯讀"屬性,表示可寫入此目錄,此行設定亦可寫為"writable = yes"
public = yes 指定公開此目錄


分享唯讀的目錄:
如果您希望分享的目錄只開放讓使用者讀取, 但不能寫入, 則請編輯 /etc/samba/smb.conf 設定檔, 並如下修改:
. . .
[download]
comment = Readonly Dir
path = /download
readonly = yes ← 將唯讀屬性設定為 "yes", 此行設定亦可寫為 "writable = no"
public = yes
. . .

3. 測試 smb.conf 的語法
%testparm
Load smb config files from /etc/samba/smb.conf
Processing section “[cadhome]”
4. 啟動 Samba 伺服器
存檔後, 請執行以下指令, 重新啟動 Samba 伺服器, 即可使用分享的目錄:
[root@smb samba]# /etc/rc.d/init.d/smb start ←使用"restart"參數,重新啟動Samba伺服器

啟動 Samba 伺服器或重新載入設定檔後, 即可看到分享的目錄:

5. 開始設定 User Password
% smbpasswd –a subby ← add samba user
Notes: 此user 要與你PC 所用的username 一樣.

6. 確認分享目錄的權限
分享可讀寫的目錄, 使用者存取 Samba 分享資源的權限, 由以下兩者共同決定:
1. 該檔案或目錄在 Linux 中的權限。
2. 該檔案或目錄在 Samba 設定檔中的設定值。

因此若想分享可供所有使用者讀、寫的目錄, 則必須在 Linux 下先開啟所有使用者對該目錄的讀、寫權限, 並在 Samba 伺服器的設定檔中, 將其設定為可讀寫。例如筆者現有 /upload 目錄, 想將之分享出來, 可依照下列步驟操作。

確認分享目錄的權限
請在修改設定檔之前, 先確認一般使用者對此目錄具有讀取、寫入及執行的權限:
[root@smb /]# ls - l
總計 168
. . .
drwxr-xrwx 2 root root 4096 2007-08-01 01 17:12 cadhome
一般使用者對此目錄的權限
. . .

Windows 查尋『網路上的芳鄰』:
7.設定使用者有不同權限的群組
除了限制可以讓所有使用者讀取或寫入以外, 有時某個目錄可能需要設定有些使用者可以寫入, 而其他使用者只有讀取權限。
要達到此需求並不難, 只要搭配 Linux 的群組權限及檔案權限即可做到。例如筆者想要分享 Samba 分享 secret 目錄, 並限制只有 wyw、ywwang、candy、tony 四人可進入, 其中 wyw 與 ywwang 具讀寫權限, candy 與 tony 僅有唯讀權限。

此時需如下新增兩個群組:
[root@smb ~]# groupadd flagadmin 新增一個名為 flagadmin 的群組
[root@smb ~]# groupadd flaguser 新增一個名為 flaguser 的群組

筆者將設定 flagadmin 為管理群組, 在此群組中的使用者可以讀寫 secret目錄, 而 flaguser 群組的使用者則只能讀取 secret 目錄。所以接著如下為各個使用者設定群組:
[root@smb ~]# usermod -G flagadmin wyw 將 wyw 加入 flagadmin 群組
[root@smb ~]# usermod -G flagadmin ywwang 將 ywwang 加入 flagadmin 群組
[root@smb ~]# usermod -G flaguser candy 將 candy 加入 flaguser 群組
[root@smb ~]# usermod -G flaguser tony 將 tony 加入 flaguser 群組

然後新增 secret 目錄並設定權限:
[root@smb ~]# mkdir /var/secret 建立 /var/secret 目錄
[root@smb ~]# chgrp flagadmin /var/secret / 設定此目錄的群組為 flagadmin
[root@smb ~]# chmod 2775 /var/secret ← 設定 flagadmin 群組可讀寫此目錄, 權限最
前面的 "2" 表示設定 sgid 權限, 所有新增
的檔案將繼承此目錄的群組, 如此才能讀寫其他人建立的檔案
最後於 /etc/samba/smb.conf 新增 secret 目錄的分享設定:
. . .
[secret]
comment = secretspace
path = /var/secret
public = no
guest ok = no
forcecreatemode = 0775 設定所有新建檔案的權限為 775
validusers = @flagadmin , @flaguser 設定只有 flagadmin 與 flaguser 群組才可以進入此目錄
writelist = @flagadmin 設定只有 flagadmin 群組才可以寫入此目錄
readlist = @flaguser 設定 flaguser 群組只有唯讀權限
. .
完成後, 執行 /etc/rc.d/init.d/smb restart ; /etc/rc.d/init.d/nmb start 重新啟動 Samba, 使新設定生效, 如此 secret 目錄便可以依照不同使用者而給予不同的權限了。

8.分享印表機
要設定透過 Samba 分享 Linux 主機上的印表機非常簡單, 與分享目錄的方式相同。請先在 Linux 主機上安裝好印表機, 接著在 /etc/samba/smb.conf 檔中加入以下內容 (存檔後需重新啟動 Samba):
[LaserJet5] 印表機顯示的名稱
path = /var/spool/samba 印表機的佇列, 一般指定此路徑即可
readonly = no 是否只能唯讀
guestok = yes 允許匿名存取
printable = yes 是否可列印
printername = hplj5 此為您在安裝印表機時所設定的印表機名稱

Windows 上的設定
* Linux 的 /etc/samba/smb.conf file 中, 設定的工作群組, 必須與你的Windows內的工作群組相同.
* 登入Windows 時, Login username 與password, 一定要使用smbpasswd檔案中有的username/password 相同.

呵呵, 這樣就OK了, 只要以透過『網路上的芳鄰』來連線及可共享資源.

2008年6月12日 星期四

Mining communities and their relationships in blogs: A study of online hate groups

1. Introduction
Blogs, or Weblogs, have become increasingly popular in recent years. Blog is a Web-based publication that allows users to add content periodically, normally in reverse chronological order, in a relatively easy way.Therefore, Many communities have emerged in the blogosphere. These could be support communities such as those for technical support or educational support. In addition, there are also hate groups in blogs that are formed by bloggers who are racists or extremists. The consequences of the formation of such groups on the Internet cannot be underestimated. Beacuse Young people are the major group of bloggers, are more likely to be affected and even ‘‘brainwashed’’ by ideas propagated through the Web as a global medium.

Facing the new trend in the cyberspace, our study has two objectives.First, we propose a semi-automated approach that combines blog spidering and social network analysis techniques to facilitate the monitoring, study, and research on the networks of bloggers, especially those in hate groups.Second, our study seeks insights into the organization and movement of online hate groups.

2. Web mining and social network analysis
Techniques based on both Web mining and social network techniques have been used in intelligence-and security-related applications and achieved considerable success.Web mining techniques can be categorized into three types: content mining, structure mining, and usage mining (Kosala and Blockeel, 2000).

  1. Web content mining refers to the discovery of useful information from Web contents, including text, images, audio, video, etc.
  2. Web structure mining studies the model underlying the hyperlink structures of the Web. It usually involves the analysis of in-links and out-links information of a Web page, and has been used for search engine result ranking and other Web applications.
  3. Web usage mining employs data mining techniques to analyze search logs or other activity logs to find interesting patterns.

3. Proposed approach
We propose a semi-automated approach for identifying groups and analyzing their relationships in blogs. The approach is diagrammed in Fig. 1. Our approach consists of four main modules: (a). Blog Spider, (b). Information Extraction, (c). Network Analysis, and (d).Visualization. The Blog Spider module downloads blog pages from the Web. These pages are then processed by the Information Extraction module. Data about these blogs and their relationships are extracted and passed to the Network Analysis module for further analysis. Finally the Visualization module presents the analysis results to users in a graphical display. In the following, we describe each module in more detail.

3.1. Blog spider
A blog spider program is first needed to download the relevant pages from the blogs of interest. Similar to general Web fetching. Alternatively, asynchronous I/O can be used for parallel fetching (Brin and Page, 1998). In either case, after a page is downloaded it can be stored into a relational database or as a flat file. In addition, the spider can use RSS (Really Simple Syndication) and get notification when the blog is updated.

3.2. Information extraction
After a blog page has been downloaded, it is necessary to extract useful information from the page. This includes information related to the blog or the blogger, such as user profiles and date of creation. This can also include linkage information between two bloggers, such as linkage, commenting, or subscription.

3.3. Network analysis
Network analysis is a major component in our approach. In this module we propose three types of analysis: topological analysis ,centrality analysis and community analysis.

  1. The goal of topological analysis is to ensure that the network extracted based on links between bloggers is not random and it is meaningful to perform the centrality and community analysis. We use three statistics that are widely used in topological studies to categorize the extracted network (Albert and Baraba’ si, 2002): average shortest path length, clustering coefficient and degree distribution.
  2. The goal of centrality analysis is to identify the key nodes in a network. Three traditional centrality measures can be used: degree, betweenness, and closeness.
  3. Community analysis is to identify social groups in a network. In SNA a subset of nodes is considered a community or a social group if nodes in this group have stronger or denser links with nodes within the group than with nodes outside of the group (Wasserman and Faust, 1994).

3.4. Visualization

The extracted network and analysis results can be visualized using various types of network layout methods.

4. Case study
4.1. Focus and Methods
We applied our approach to conduct a case study of hate groups in blogs. We chose to study the hate groups against Blacks. There are two reasons for the focus. First, the nature of hate groups and hate crimes is often dependent on the target "hated" group. By focusing on a type of hate groups it is possible to identify relationships that are more prominent. Second, among different hate crimes, anti-Black hate crimes have been one of the most widely studied (e.g., Burris et al., 2000; Glaser et al., 2002). Our approach consists of four main modules:

  1. Spiders were used to automatically download the description page and member list of each of these groups. A total of 820 bloggers were identified from these 28 groups. The spiders further downloaded the blogs of each of these bloggers.
  2. The extraction program also analyzed the relationship between these bloggers. In this study, two types of relationships were extracted:
    (1). Group co-membership: two bloggers belong to the same group (blogring).
    (2). Subscription: blogger A subscribes to blogger B. This is a directed, binary relationship.
  3. After collecting the blogs and extracting information from them, we performed demographical and network analysis on the data set in order to reveal the characteristics of these groups and ascertain whether any patterns exist.
  4. Visualization was then applied to present the results. We discuss the details of our analysis in the following sections.

4.2. Discussion
a. What are the structural properties of the social networks of bloggers in the hate groups?
Ans : Similar to the network of white supremacist Web sites (Burris et al., 2000), the network of bloggers in hate groups is decentralized.
b. Are there bloggers who stand out as leaders of influence in these groups?
Ans : Burris et al. (2000) found that the decentralized white supremacist groups had different centers of influence.
c. What is the community structure in these groups?
Ans : Communities, However, these communities are not composed of Web sites but individual bloggers. Communities provide an environment for its members to exchange their ideas and opinions and reinforce the shared ideology.
d. What do the structural properties suggest about the organization of the hate groups?
Ans : As mentioned in point (a), the structure of the network suggests that the hate groups in blogosphere have not formed into centralized organizations.
e. What are the social and political implications of these properties?
Ans :Burris et al. (2000) commented that extremist groups are a type of social movement which has profound social and political implications.

5.Conclusion and future directions
In this paper, we have discussed the problems of the emergence of hate groups and racism in blogs. Our contributions are twofold. First, we have proposed a semi-automated approach for blog analysis. Our approach consists of a set of Web mining and network analysis techniques that can be applied to the study of blogosphere. Such techniques as network topology analysis. We believe that the approach can also be applied to other domains that involve virtual community analysis and mining, which we believe would be an increasingly important field for various applications.


Second, we applied this approach to investigate the characteristic and structural relationships among the hate groups in blogs in our case study. Our study not only has provided an approach that could facilitate the analysis of law enforcement and social workers in studying and monitoring such activities, but also has brought insights into the structural properties of online hate groups and helped broaden and deepen our understanding of such a social movement.

2008年6月9日 星期一

先進網際服務系統--Homework6-2008-05-03

Read Papers 12, 13, and 14. Write a brief summary within 200 words for each paper.

Paper 12 --Empirical analysisof online social networksin the ageofWeb 2.0
Today the World Wide Web is undergoing a subtle but profound shift to Web 2.0, to become more of a social web. The use of collaborative technologies such as blogs and social networking site (SNS) leads to instant online community in which people communicate rapidly and conveniently with each other. Moreover, there are growing interest and concern regarding the topological structure of these new online social networks.

In this paper, we present empirical analysis of statistical properties of two important Chinese online social networks—a blogging network and an SNS open to college students. They are both emerging in the age of Web 2.0. We demonstrate that both networks possess small-world and scale-free features already observed in real-world and artificial networks. In addition, we investigate the distribution of topological distance. Furthermore, we study the correlations between degree (in/out) and degree (in/out), clustering coefficient and degree, popularity (in terms of number of page views) and in-degree (for the blogging network), respectively.

We studied the frequency of shortest path length, demonstrating that the famous law “six degrees of separation” is present in both the networks. We confirmed that for both networks, the clustering coefficient’s dependence on degree is nontrivial, further suggesting some level of hierarchy in topological organizations. Finally, we examined the mixing pattern, We found that the blogging network shows disassortative mixing pattern in general, while Xiaonei network is an assortative one. Our case study might help us to understand the topological features of online social network in the age of Web 2.0.

Paper 13-- A short walk in the Blogistan
In the paper, To explain `blogs’ differs from traditional Web pages both in characteristics and potential to applications. And to explore three aspects of the blogistan : its overall scope and size, identification of emerging hot topics of discussion and link patterns, and implications both to blogs and applications such as search.we develop a general methodology of mining evolving networks and connections. we develop a general methodology of mining evolving networks and connections. The first part of our study is longitudinal—based on a five-week continuous fetch of a seed collection of nearly 10,000 blog URLs. The second part is based on a successive crawl of pages suspected to be blogs leading to a larger collection of several million URLs. The collection is examined for a variety of properties. We characterize blogs and study different facets of the link structure in blogs and its evolution over time, attributes of servers and domains that host many of the blogs including their IP addresses, and how blogs behave with respect to various HTTP/1.1 protocol issues. Inferences from our in-depth exploration are relevant to applications ranging from mining to hosting of blogs and other issues of relevance to the measurement community.

An important contribution of our work is the methodology we developed to identify emerging interests by mining hyperlinks in blogs and their change over time. The methodology constitutes a general approach to mine evolving interconnection networks that we believe can have applications well beyond the Blogistan. By canceling out “repeated patterns” we are able to identify emerging ones.

Paper 14-- Analysis of User Relations and Reading Activity in Weblogs
This paper focuses on the relationships among blogs and analyzes how great an effect blog relationships have on the reading behavior of the user. First, it is examined whether there is a correlation indicating that users often visit blogs with strong relationship. Various definitions for the relationship are considered, based on factors such as comments and trackbacks, in order to analyze what relationship is the most effective for the purpose. Second, the Authors analyze whether blogs that are read frequently by the users can be identified from blog relationships. If such identification is possible, it will be possible to construct effective recommendation services based on blog relationships.

This paper has analyzed blog networks focusing on unique relationships. The range of 2-hop connection from a blog is considered, and an attempt is made, by using the index, to reveal the reading behavior of users, such as strength and kind, on the basis of the number of routes. It is evident that bookmarks have a strong effect, and that users circulate around the bookmarks in a blog network. A tendency is found that users who repeatedly read a blog with a given interest also tend to repeatedly read other blogs that are targets of action by the owner of that blog. This tendency will provide a basis for information recommendations.

Action Science Approach to Experimenting Nonprofit Web 2.0 Services for Employment of Individuals with Mental Impairments

Introduction
This research is interested in applying Web2.0 to employment services for people with mental disabilities. Web2.0 gives Internet users a chance to easily publish their work on the Web and introduce it to the world. In this paper, we study the processes how to unleash the power of Web2.0 to assist people with mental disabilities and their caregivers.

Methodology
Action research is an established research method in use in the social and medical sciences since the mid-twentieth century. The method produces highly relevant research results, because it is grounded in practical action, aimed at solving an immediate problem situation while carefully informing theory. Action researchers are among those who assume that complex social systems cannot be reduced for meaningful study. They believe that human organizations, as a context that interacts with information technologies, can only be understood as whole entities.

WEB 2.0 Solutions
We built a Web 2.0 based architecture for nonprofit organizations (Fig.1). It includes: (1) multimedia database, (2) discussion forum, (3) introduction website, and (4) anywhere portal. In the domain we study, mission-specific database is employment service database. Multimedia database gives the caregivers a space to manage all kinds of information about the mentally disabled persons. The data is kept in private with technology such as identity management, end-to-end encryption, public key infrastructure. A discussion forum platform enables the caregivers to share knowledge and feelings which extend connections to other caregivers. The introduction website is aimed to extend the public relations to the people who may care the organization. The main components are aggregated with an “anywhere portal.”

Conclusions
We used the technology of Web2.0 in an employment services system for individuals with mental impairments to make their organizational operation more efficient, which we call Nonprofit 2.0. In the beginning, we devoted ourselves in the way of thinking how a job coach accomplishes her helping tasks.
Guided by principles of action science in 4 months of organized participant observations, in-depth interviews, field work, and focus group studies, a working prototype has been built and tested by the job coaches with significant success.

2008年6月8日 星期日

Mobile Computing for Indoor Wayfinding Based on Bluetooth Sensors for Individuals with Cognitive Impairments

In this paper, The Authors propose a novel personal guidance system based on Bluetooth for individuals with cognitive impairments.

For an adult with mental disorder may want to lead a more independent life and be capable of getting trained and keeping employed, but may experienced difficulty in using public transportation to and from the workplace. The growing recognition that assistive technology can be developed for cognitive as well as physical impairments has led several research groups to prototype way finding systems.

Bluetooth is an industrial specification for wireless personal area networks (PANs). Bluetooth provides a way to connect and exchange information between devices such as mobile phones, laptops, PCs, printers. In this paper, Bluetooth is used for personal way finding purposes where Bluetooth beacons and ID scanning are used. Bluetooth operated in this discovery mode saves power, eliminate manual passkey challenges, and reduce privacy and security concern as the use does not expose her ID. Based on the Bluetooth beacon received, the position where the user is can be identified at the remote server and enable the way finding sequences.

Prototype Design:

The Bluetooth beacons trigger downloading of photos with directional instructions, thus eliminating the need of a shadow support team behind the user. Route personalization is accomplished by the system identifying the user and the destination set ahead of time. Therefore, even sensing the same beacon on the same spot, different users may receive different directional instructions. It works indoors where GPS signals cannot reach. The design draws upon the psychological models of spatial navigation, usability studies of interfaces by people with cognitive impairments, and the requirements based on interviews with nurses and job coaches at rehabilitation hospitals and institutes.

A PDA is carried by the individual who has difficulty in indoor way finding or taking public transit to and from work. The PDA shows the just-in-time directions and instructions by displaying photos, triggered by Bluetooth beacons sensed by the PDA’s built-in reader. The photos have to be prepared ahead of time.

Although the routes are preset, very few patients can hook up the PDA to a networked PC so that photos can be stored on PDA and invoked immediately when needed. Alternatively, downloaded photos are locally cached for future use. This could potentially save communications energy and cost, while reducing response time.

Conclusions
This paper present a wayfinding prototype system based Bluetooth sensors for individuals with cognitive impairments. The design draws upon the cognitive models of spatial navigation and consists of wayfinding devices and a navigation system. The prototype is implemented and tested with routes in the campus. The results show the prototype is user friendly and promising with high reliability. The success ratio can depend on the extent to which participants suffer from mental disabilities, the complexity of routes, the degree of received training and self-practices, and the distractions the participants may encounter.

2008年4月12日 星期六

Social Network Analysis to Blog-based Online Communities

1. Introduction
Blog
create a context for dialogues between bloggers and readers.Most blog platforms provide a personal writing space that is easy to publish, sharable.Blogs can combine solitary and social interaction in the learning processes .Considerable research has been carried out on the educational use of blogs (Richardson, 2006;Williams and Jacobs, 2004; Oravec, 2002;Dailey 2006).
Social Network Analysis (SNA) is used as a research vehicle to investigate the structural patterns of blogging communities.SNA is a sociological methodology for analyzing patterns of relationships and interactions between social actors in order to discover the underlying social structure .

2.Blogs as Learning
Social Learning
The intrinsic structure of blogs enables social learning.Blogs is a form of Social Media.Blogs have the potentials to upgrade personal learning to social learning.
Social construction of knowledge through social media such blogs help explain why assessing other’s work may be conducive to social learning.In this sense, blogs have the potentials to upgrade personal learning to social learning. For the purpose of promoting critical and analytical thinking, after a student has read another’s posting, she is asked to leave comment to that posting. We call it the creation of “dialogue links” that are different from the trackback links (Figure 1).
The “comments on comments” may even sometimes create a long sequence of dialogues in terms of discussions or debates involved by more and more people as the dialogues proceed. Fortunately, these dialogues can be tracked by RSS easily, thanks to the feature that many blog platforms added recently to make possible the tracking of comments in addition to the posting.

Figure 1. The formation of social learning circles by creating not just trackback links but also dialogue links in blogs.

3.Social Media Experiments
Sample : There are 36 undergraduate students enrolled in an introductory computer science course at a university in a metropolitan area.

Platform : The Blog in our study is based on the platform of Blogger at http://www.blogger.com/ which is now a property of Google.

Procedure: First of all, student took a tour to a local science fair.A short essay was written by each student .After the essay was finished, each student was asked to browse their peers’ work and make at least 3 comments on others’ essays(Figure 2) .Conducting social network analysis to investigate the student behaviors in terms of social learning.


Figure 2. participant i left a comment on participant j by Social network analysis.
Results
We investigated the blogs of N=36 participanting students and chased the links of comments one by one. Table 1 summarizes the statistics of the comments found in the study. A distribution of number of comments is shown in Figure 3.

Table 1 : Metrics of Social Learning



Figure 3: Distribution of numbers of comments versus counts.

To calculate the tranitive closure and the distance between ordered pairs of participants in terms of hops where the hop count Cij is the number of clicks required to traverse from Participant i to Participant j. The distribution of numbers of hops is shown in Figure4.


Figure4:The distribution of numbers of hops versus counts.

Limitations
The results reported are limited as following reasons .
  1. The sample size was small
  2. The context of learning was narrowly define.
  3. Blogging acted as a supplement to a traditional face-to-face course.
  4. The social network analysis measures the online community of practice from a structure point of view.

Therefore, We conduct a survey study on a larger sample and collect data regarding non-structural issues .

4. User Survey
Sample Three undergraduate classes, namely Electronic Commerce, Java Programming Language and Programming for Internet Applications, with 23, 38 and 36 students respectively.
Divided into D-Group with 48 samples and S-Group with 23 samples.
Procedure
D group emphasizes the use of blog as an express lane of delivering finished work for the instructor to check out immediately.
S group sees the blogs as idea sharing platform, namely encourages students to read peer blogs and make comments. The questionnaire was poised by a score on a 5-point scale.
All the questionnaires are administrated anonymously by a third party without the instructor on the spot. The following five hypotheses are coded in the questionnaire and tested in the survey administrated to the two groups.
Hypothesis 1: Blogging helps students feel more connected and interactive with classmates.
Hypothesis 2: Blogging helps students more engaged and interested in the subjects covered by the courses .
Hypothesis 3: Blogging improved the quality and experience of learning .
Hypothesis 4: Students take a look at people’s homework first when they don’t have a clue to the problems.
Hypothesis 5: Students uphold the principle of honesty and make no duplicates of people’s homework, although students may read it at times.
4.1Summary of Survey

According to Table 2., the mean of Hypothesis 1 is greater then 3, and the other four hypotheses receive means with value greater then 4. The effects of blogging on learning are supported.
Table 2. Survey results regarding the tree classes.



Table 3 : t-test results of S-Group and D-Group

Further conduct the t-testto assess whether the means of the two groups are statistically different from each other. The results are summarized in Table 3.

Regarding Hypotheses 1, 2 and 3, blogs of the S-Group as tools for social construction help build more sense of community , and better improve experiences of learning than those in D-Group.
Except for Hypothesis 4, the means of two groups are statistically different . For Hypothesis 4, the difference in two groups is not significant. It indicates that no matter which of the two ways the blogs are used to support learning acitvities, both groups recognize the possibility of blogs as repository of clues to solve problems.
For Hypothesis 5, both groups show positive signs regarding the principle of honesty .It is worth of noting that the S group is more aware of the ethics issues than the other group.

Conclusions
Using blogs is found to simplify the tasks of reducing piracy.
Blogs are a viable platform for ideas to flat and grow.
Blags are easy to maintain, low cost, easy to deploy, and simple to get started.

Social Network Analysis to Blog-based Online Community


1. Introduction

Blogs have found their use in education. For example, blogs often serve as a digital portfolio of students’ assignments and achievements. Most blog platforms provide a personal writing space that is easy to publish, sharable, and automatically archived and empower users to form learning communities by way of inter-linkages. blogs can combine solitary and social interaction in the learning processes.

2. Methodology
First of all, the instructor creates a blog for the lab class at the outset(Figure1). Instructor blogs are they serve to deliver lab sheets and hand-outs in electronic version. Students are encouraged to read the instructor blog before class meets so that they can get themselves prepared.
When finishing a lab in class, students are asked to submit their results at their own blogs immediately and make a notice by placing a link at the instructor's blog where the lab is made public. students can to check into their classmate’s blogs to see what other people have written.
Figure 1. Instructor blogs are for posting lab materials in the curriculum.
Student-Centric
The blogging approach works in an individual way: not only instructors but also students own blogs. The ownership holds no matter whether the class ends or not. The sense of ownership helps build incentives for students to contribute to and participate in the class while taking the course (Figure 2).

Figure 2. Each student posts lab results on her or his blog instead of the instructor blog.
Social Learning
To create deeper dialogues and further the opportunities of social learning, the students who receive comments from his classmates are asked to do two things next. For one thing, they are asked to say thanks, by leaving a comment below the received ones, to the people who have made the comments to their works. For the other, further comments about the subjects commented by their peers are asked in response. The “comments on comments” may even sometimes create a long sequence of dialogues in terms of discussions or debates involved by more and more people as the dialogues proceed (Figure 3). Fortunately, these dialogues can be tracked by RSS easily, thanks to the feature that many blog platforms added recently to make possible the tracking of comments in addition to the postings.


Figure 3. Students learn from peers by creating dialogues or “comments on comments” with each other.

Experiences of Adopting In-class Blogs in the Teaching of Hands-on

1.Methodology Blogs have found their use in education. It further concludes that blogging has the potential to be a transformational technology for teaching and learning.

  1. First of all, the instructor creates a blog for the lab class at the outset. Every student of the class is required to create a blog for the lab when the semester begins.
  2. Instructor blogs are they serve to deliver lab sheets and hand-outs in electronic version.
  3. Students are encouraged to read the instructor blog before class meets so that they can get themselves prepared.
  4. When finishing a lab in class, students are asked to submit their results at their own blogs immediately and make a notice by placing a link at the instructor's blog where the lab is made public.
  5. students can to check into their classmate’s blogs to see what other people have written.

The blog is so responsive that instructors can make quick and informed judgments on which students to walk to and initiate further interactions with.

Dialogue-Based

Getting student feedback in a lab setting helps engage with students and creates a real dialogue.

Status Tracking

Blogs are a versatile administrative tool to track the status of the computer-based lab students conduct. Blog posts replace the paper sheets for students to turn in their lab works.

Figure 1. The formation of social learninig circles by creating not just trackback links but also dialogus links in blogs.

Social Learning
- The intrinsic structure of blogs enables social learning.
- Blogs is a form of Social Media ,Share opinions, experiences, viewpoints and Collaborative Learning .
-Blogs have the potentials to upgrade personal learning to social learning.
-Social construction of knowledge through social media such blogs help explain why assessing other’s work may be conducive to social learning.
-For the purpose of promoting critical and analytical thinking, after a student has read another’s posting, she is asked to leave comment to that posting. We call it the creation of “dialogue links” that are different from the trackback links.


2. Survey Results

Sample :
two undergraduate classes, namely Java Programming Language and Programming for Internet Applications, with 38 and 35 stduents respectively

Result :

48% respondents agree that the blog helps interactions among students enrolled in the same class , 18 % don’t agree and 34% have no opinions.

79% respondents agree that the use of in-class blogs helps keep the students interested and motivated in learning, while the remaining 21% have no opinions.

As to the impact of in-class blogging on learning effectiveness, 86% respondents think it is positive while 1% think it is negative and 13% have no opinions.

As to read classmates’ blogs when a take-home assignment problem is hard, 84% respondents answer positively while 3% answer no and the remaining 13% have no opinions.

Student uphold the principles of respecting intellectual property and refuse to duplicate, 79% responds positively while 6% confess they do duplicate at least some of others’ ideas that are posted on their classmates’ blogs and the remaining 15% have no opinions.

2008年4月11日 星期五

先進網際服務系統--Homework5_2008-03-29

1. Read the abstract of Paper 3, 6 and 7. If possible, skim the whole paper.
Summarize the papers briefly.

paper 3
paper 6
paper 7

2. According to Chap. 6 of Textbook. what is a functional architecture of e-commerce systems?
A2: the system architecture is the way it decomposes the system into functional units. The specification of these functional units and the interfaces between them defines the architecture of the system. For analysis of architecture, we have found it convenient to consider four primary components of Internet commerce systems.


  1. Client : The client is a computer system, typically a personal computer, connected to the Internet either directly, through an Internet service provider (ISP), or indirectly, through a corporate network. The buyer uses the client computer for browsing and purchasing.
  2. Merchant : The merchant is the computer system or systems that contain the seller’s electronic catalog and, in the case of online goods, products for over-the-Net fulfillment.
  3. Transaction system : The transaction system is the computer system or systems that process a particular order and that are responsible for payment, record keeping, and other business aspects of the transaction.
  4. Payment gateway : The payment gateway is the computer system that routes payment instructions into existing financial networks such as for credit card authorization and settlement.

Various architectures use these four components in different ways. In some systems, some of these components are combined into a single computer system, whereas in others these four system components are implemented by separate computer systems.


3. Lab: PageRank
PageRank is a tool for measuring the importance of websites. Given every URL, there is a PageRank value for it.
Install PageRank on your Firefox. Perform the measurements in terms of PageRank the following websites:


New York Times http://www.nytimes.com/



CNN http://www.cnn.com/

2008年3月25日 星期二

先進網際服務系統--Homework4_2008-03-15

1. Read Paper 1 & Paper 2. Provide a summary for each of the paper.
Paper1
Paper2

2. Read Chap. 4 of the textbook. What is the Business-to-business model?
A2 : Business-to-business (or B2B for short) model is a marketing strategy which involves the transaction of goods or services between businesses, and the exchange of goods, services and information between companies. Business-to-business electronic commerce is companies buying from and selling to each other electronically, but it has evolved to include supply chain management.

3. Digital goods can be distributed over the Internet but physical goods have to be delivered logistically. What are digital goods? What are the differences between the two?
A3: "Digital goods " are a combination of signals, electronically represented as 0 and 1. As such they build a system of information which can express different contents, for example music, texts, pictures, numbers or algorithms. The existence of such immaterial content is not new, but rather the form in which it can be expressed now. So, a digital good is a result of the development of the information and communication technology. The new quality of this technology is that not only can the information be transformed into data, but it can also be sent through the world wide internet and it is a characteristic of these goods that they increase and don't decrease when they are passed on. What I want to say is that they double when reproduced which is normal in copying processed but in the case of digital goods they double without a loss in quality and they double to almost zero costs. One can say that through the new technologies the productivity in reproducing information could be raised dramatically supply is potentially infinite .

differences between physical goods and Digital goods :
  1. Digital goods can be distributed over the Internet but physical goods have to be delivered logistically.
  2. digital goods are intangible but physical goods are tangible .
  3. digital goods reproduced only to do copy file and almost zero costs and without a loss in quality but physical goods thereagainst.

4. Using RSS to track many blogs at one time.
What is the RSS feed that Google Reader takes in? List the URL of these RSS feeds.

A4: RSS stands for "Really Simple Syndication". It is a way to easily distribute a list of headlines, update notices, and sometimes content to a wide number of people. It is used by computer programs that organize those headlines and notices for easy reading.

RSS works by having the website author maintain a list of notifications on their website in a standard way. This list of notifications is called an "RSS Feed".

List the URL of these RSS feeds:
iapblog.blogspot.com :
http://www.google.com/reader/view/#stream/feed%2Fhttp%3A%2F%2Fiapblog.blogspot.com%2Ffeeds%2Fposts%2Fdefault
New York Times :
http://www.google.com/reader/view/#stream/feed%2Fhttp%3A%2F%2Fwww.nytimes.com%2Fservices%2Fxml%2Frss%2Fnyt%2FHomePage.xml
g9677609.blogspot.com/feeds/comments/default
http://www.google.com/reader/view/#stream/feed%2Fhttp%3A%2F%2Fg9677609.blogspot.com%2Ffeeds%2Fcomments%2Fdefault

2008年3月14日 星期五

先進網際服務系統-Homework3 3-8-2008

Q1. Track your comments at a focal point
A1: was done.

Q2. Using personal portal.
A2: was done.
















Q3. Make your blog organized by adding labels.
A3: was done.


Q4. Reading Assignments: Read Chap 3. Answer the following questions.
What are the commercial values of Internet?
A4-1:

  1. transforming customer Relationship.
  2. Displacing or alter traditional sources of business value.


List some business strategies for online commerce.
A4-2:

  1. Channel Master strategy: the company using the internet to re-build deeper relationships with customers in order to sell one’s traditional goods and services. for example : Cisco system, hp and sun.. etc. -- provider of internet software, hardwre, and services.
  2. Customer magnet strategy : using the internet to integrate the value chains of multiple suppliers into one customer-facing whole. for example : Yahoo , Google.. etc.--Started as a directory of Web sites,
  3. Value Chain pirate strategy : use the commerce value chain to support new relationships directly between suppliers and buyers. for exapmle : Autoweb displaces part of the value chain of car dealerships by selling cars directly to consumers.
  4. Digital Distributor strategy : can be efficiently delivered through the internet. for example: Monster.com -- began by offering online employment advertising for high-technology job.

2008年3月5日 星期三

先進網際服務系統--Homework2

Q1. According to the book by Treese and Stewart, what is the commerce value chain? Why not see them on an individual basis?

A1: The development of a system for internet commerce in terms of the value chain needed by the business.


  1. The value chain will be related to that of the underlying business.
  2. The value chain required by doing business online.
  3. The value chain from a third perspective-- in terms of all the customer-facing activities of a business.

According to the book It's a very general value chain for Internet commerce, as shown in Figure1-1. This value chain is focused on the interactions of a business with its customers. The components of this general value chain are as follows :

  1. Attract customers. ==> Marketing--get and keep customer interest.
  2. Interact with customers. ==> Sales --turn interest into orders(generally content).
  3. Act on customer instructions. ==> Order management -- order capture, payment, fulfillment.
  4. React to customer requests.==> Customer service, technical support.

Figure 1 . The Commerce Value Chain

The value chain is as a cycle of continuing interactions with customers . Therefore, It is unable to bring a effective value on an individual basis .

Q2. Is the Internet different from other media? Why?
A2:
Yes, Internet is different from any other conventional media.The internet provide a interactive platform for everyone. It doesn’t have a hard boundary for end user and provider, And Does not have the temporal and the spatial limitation. it’s emphasizes personal service.

Q3 :Convert one of your Word document using Google docs.
A3: This is My word file at Google Docs.

2008年2月28日 星期四

先進網際服務系統--Homework1

1. List the companies Google acquired year by year.Briefly describe the strategic implications of each acquisition.

--This is a listing of Google's corporate acquisitions, including acquisitions of both companies and individual products.

  • Acquisition Date --Company/Product --Business Area
  1. September, 2001=>Deja's Usenet archive--Google Groups.
  2. September, 2001=>Outride, Inc.--Spin-off from Xerox PARC.
  3. February, 2003=>Pyra Labs--Blogger.
  4. April, 2003=>Neotonic Software--CRM technology.
  5. April, 2003=>Applied Semantics--Advertising technology.
  6. September 30, 2003=>Kaltix--Search engine technology.
  7. October, 2003=>Sprinks--Paid listings unit of Primedia.
  8. October, 2003=>Genius Labs--Blogging
  9. May 10, 2004=>Ignite Logic--Website creation technology.
  10. June 23, 2004=>Baidu (2.6% stake)--Chinese language search engine.
  11. July 13, 2004=>Picasa--Photo management software.
  12. October 27, 2004=>Keyhole, Inc.--Mapping software; used in Google Earth.
  13. October 2004=>Where2--Mapping software; used in Google Maps.
  14. Sept.-Dec., 2004=>ZipDash--Used in Google Ride Finder.
  15. 2005=>2Web Technologies--Web-based spreadsheet.
  16. 2005=>Phatbits--Widget engine.
  17. March 28, 2005=>Urchin Software Corporation--Web analysis.
  18. May 12, 2005=>Dodgeball--Social networking.
  19. July, 2005=>Reqwireless--Web browser and Mobile email.
  20. July 7, 2005=>Current Communications Group--Broadband internet.
  21. August 17, 2005=>Android (mobile phone platform)--Software for Handheld devices. November,
  22. 2005=>Skia--Graphics software.
  23. Novembe 17, 2005=>Akwan Information Technologies--Latin American internet operations.
  24. December,2005=>allPAY GmbH, bruNET GmbH--Mobile Solution Provider, Germany.
  25. December 20, 2005=>AOL (5% stake)--Internet.
  26. January 17, 2006=>dMarc Broadcasting--Radio advertising software and platform.
  27. February 14, 2006=>Measure Map--Blog analysis.
  28. March 9, 2006=>Upstartle--Writely, online word processing.
  29. March 14, 2006=>@Last Software--SketchUp, 3-D modeling.
  30. April 9, 2006=>Orion--Advanced search method.
  31. August 15, 2006=>Neven Vision--Computer vision
  32. October 31, 2006=>JotSpot--Website applications
  33. November, 2006=>YouTube--Video sharing (San Bruno, CA)
  34. December, 2006=>Endoxon--Mapping solutions
  35. January, 2007=>Xunlei (partial acquisition)--Network, file-sharing.
  36. February, 2007=>Adscape--Video game advertising
  37. March, 2007=>Trendalyzer--Software
  38. April, 2007=>Tonic Systems--Presentation software
  39. April, 2007=>Marratech video conferencing software--Video conferencing (Stockholm, Sweden)
  40. April 13, 2007=>DoubleClickOnline Advertising
  41. May 11, 2007=>GreenBorder Technologies--Desktop enterprise security
  42. June 1, 2007=>Panoramio--Geospatial Photo-sharing Service
  43. June 3, 2007=>FeedBurner--RSS Feeds (Chicago, IL)
  44. June 5, 2007=>PeakStream--Parallel Processing
  45. June, 2007=>Zenter--Presentations Software
  46. July 2, 2007=>GrandCentral--VOIP Phone Aggregation (Fremont, CA)
  47. July, 2007=>ImageAmerica--High resolution aerial cameras July 9, 2007=>Postini--Communications Security (San Carlos, CA)
  48. September, 2007=>Tusli--Google Blogger Api Engineering Team
  49. September, 2007=>Zingku--Mobile social network and communication platform
  50. October, 2007=>Jaiku--An activity stream and presence sharing service that works from the Web and mobile phones (Helsinki)

reference to : List of Google acquisitions by Wikip web site

--strategic of the companies Google acquired :

  1. expanding the web2.0 correlative development
  2. merge the company of competitor

2. Summarize the What is Web 2.0 by Tim O'Reilly in one page.


Design Patterns and Business Models for the Next Generation of Software by Tim O'Reilly 09/30/2005

The concept of "Web 2.0" began with a conference brainstorming session between O'Reilly and MediaLive International.

1. The Web As Platform
















--Figure 1 shows a "meme map" of Web 2.0 that was developed at a brainstorming session during FOO Camp, a conference at O'Reilly Media. It's very much a work in progress, but shows the many ideas that radiate out from the Web 2.0 core.
--At the first Web 2.0 conference, in October 2004, John Battelle and I listed a preliminary set of principles in our opening talk. The first of those principles was "The web as platform." Yet that was also a rallying cry of Web 1.0 darling Netscape, which went down in flames after a heated battle with Microsoft. What's more, two of our initial Web 1.0 exemplars, DoubleClick and Akamai, were both pioneers in treating the web as a platform.

2. Harnessing Collective Intelligence

--Network effects from user contributions are the key to market dominance in the Web 2.0 era.
l Blogging and the Wisdom of Crowds.
--One of the most highly touted features of the Web 2.0 era is the rise of blogging.
--A blog is just a personal home page in diary format. But as Rich Skrenta notes, the chronological organization of a blog "seems like a trivial difference, but it drives an entirely different delivery, advertising and value chain."

3. Data is the Next Intel Inside

--Every significant internet application to date has been backed by a specialized database: Google's web crawl, Yahoo!'s directory (and web crawl), Amazon's database of products, eBay's database of products and sellers, MapQuest's map databases, Napster's distributed song database. As Hal Varian remarked in a personal conversation last year, "SQL is the new HTML." Database management is a core competency of Web 2.0 companies, so much so that we have sometimes referred to these applications as "infoware" rather than merely software.

4. End of the Software Release Cycle

--One of the defining characteristics of internet era software is that it is delivered as a service, not as a product. This fact leads to a number of fundamental changes in the business model of such a company: Operations must become a core competency.
--Users must be treated as co-developers, in a reflection of open source development practices.

5. Lightweight Programming Models

--Support lightweight programming models that allow for loosely coupled systems.
--Think syndication, not coordination.
--Design for "hackability" and remixability.
--Another key web 2.0 principle, which we call "innovation in assembly.", we believe that Web 2.0 will provide opportunities for companies to beat the competition by getting better at harnessing and integrating services provided by others.

6. Software Above the Level of a Single Device

--One other feature of Web 2.0 that deserves mention is the fact that it's no longer limited to the PC platform. In his parting advice to Microsoft, long time Microsoft developer Dave Stutz pointed out that "Useful software written above the level of the single device will command high margins for a long time to come."
--But as with many areas of Web 2.0, where the "2.0-ness" is not something new, but rather a fuller realization of the true potential of the web platform, this phrase gives us a key insight into how to design applications and services for the new platform.

7. Rich User Experiences

--The competitive opportunity for new entrants is to fully embrace the potential of Web 2.0. Companies that succeed will create applications that learn from their users, using an architecture of participation to build a commanding advantage not just in the software interface, but in the richness of the shared data.

Summarizing the Core Competencies of Web 2.0 Companies:

.--Services, not packaged software, with cost-effective scalability
.--Control over unique, hard-to-recreate data sources that get richer as more people use them
.--Trusting users as co-developers
.--Harnessing collective intelligence
.--Leveraging the long tail through customer self-service
.--Software above the level of a single device
.--Lightweight user interfaces, development models, AND business models