ter

REDDNET and Digital Preservation in the Open Cloud: Research at Texas Tech University Libraries on Long-Term Archival Storage

In the realm of digital data, vendor-supplied cloud systems will still leave the user with responsibility for curation of digital data. Some of the very tasks users thought they were delegating to the cloud vendor may be a requirement for users after all. For example, cloud vendors most often require that users maintain archival copies. Beyond the better known vendor cloud model, we examine curation in two other models: inhouse clouds, and what we call "open" clouds—which are neither inhouse nor vendor. In open clouds, users come aboard as participants or partners—for example, by invitation. In open cloud systems users can develop their own software and data management, control access, and purchase their own hardware while running securely in the cloud environment. To do so will still require working within the rules of the cloud system, but in some open cloud systems those restrictions and limitations can be walked around easily with surprisingly little loss of freedom. It is in this context that REDDnet (Research and Education Data Depot network) is presented as the place where the Texas Tech University (TTU)) Libraries have been conducting research on long-term digital archival storage. The REDDnet network by year's end will be at 1.2 petabytes (PB) with an additional 1.4 PB for a related project (Compact Muon Soleniod Heavy Ion [CMS-HI]); additionally there are over 200 TB of tape storage. These numbers exclude any disk space which TTU will be purchasing during the year. National Science Foundation (NSF) funding covering REDDnet and CMS-HI was in excess of $850,000 with $850,000 earmarked toward REDDnet. In the terminology we used above, REDDnet is an open cloud system that invited TTU Libraries to participate. This means that we run software which fits the REDDnet structure. We are beginning to complete the final design of our system, and starting to move into the first stages of construction. And we have made a decision to move forward and purchase one-half petabyte of disk storage in the initial phase. The concerns, deliberations and testing are presented here along with our initial approach.




ter

Mobile wallet payments - a systematic literature review with bibliometric and network visualisation analysis over two decades

The study aims to review the literature on mobile wallet payment and align research trends using a systematic literature review with bibliometric and network visualisation analysis over two decades. It uses bibliometric analysis of the literature research retrieved from the Web of Science database. The study period was from 2001 to 2021, with 1,134 research papers. It also provides the indicators like citation trends, cited reference patterns, authorship patterns, subject areas published on the mobile wallet, top contributing authors, and highly cited research articles using the database. Furthermore, network visualisation analysis, like the co-occurrence of author keywords and keywords plus terms, has also been examined using VOSviewer software. The bibliometric analysis shows that the Republic of China dominates mobile wallet payment, and India is a significant contributor. Furthermore, the constructions of the network map using a co-citation analysis and bibliographic coupling shows an interesting pattern of mobile wallet payment.




ter

International Journal of Enterprise Network Management




ter

The role of shopping apps and their impact on the online purchasing behaviour patterns of working women in Bangalore

The study aims to analyse the impact of shopping applications on the shopping behaviour of the working women community in Bangalore, a city known as the IT hub. The research uses a quantitative analysis with SPSS version 23 software and a structured questionnaire survey technique to gather data from the working women community. The study uses descriptive statistics, ANOVA, regression, and Pearson correlation analysis to evaluate the perception of working women regarding the significance of online shopping applications. The results show that digital shopping applications are more prevalent among the working women community in Bangalore. The study also evaluates the socio-economic and psychological factors that influence their purchasing behaviour. The findings suggest that online marketers should enhance their strategies to improve their business on digital platforms. The research provides valuable insights into the shopping habits of the working women community in Bangalore.




ter

International Journal of Networking and Virtual Organisations




ter

Towards Egocentric Way-Finding Appliances Supporting Navigation in Unfamiliar Terrain




ter

Human-Computer Interaction Gearing Up for Work




ter

The Usage of E-Learning Material to Support Good Communication with Learners




ter

Towards an Interactive Learning Environment for Object-Z




ter

Are All Learners Created Equal? A Quantitative Analysis of Academic Performance in a Distance Tertiary Institution




ter

The Evaluation of a Computer Ethics Program




ter

A Computer Hardware/Software/Services Planning and Selection Course for the CIS/IT Curriculum




ter

Enterprise Applications Portfolio Management Utilizing COTS




ter

A Contribution to Defining the Term ‘Definition’




ter

A New State Model for Internetworks Technology




ter

Computer Use and Immersion in a Non-IT Course




ter

Behavioural Issues in Software Development: The Evolution of a New Course Dealing with the Psychology of Computer Programming




ter

Working in a Group before Meeting Face-to-Face – A Case of International Student Online Project




ter

Information Quality: The Relationship to Recruitment in Pre-Tertiary IT Education




ter

Customer Service Factors Influencing Internet Shopping in New Zealand




ter

Integrating E-Learning Content into Enterprise Resource Planning (ERP) Curriculum




ter

Online Handwritten Character Recognition Using an Optical Backpropagation Neural Network




ter

The Digital Divide and K-12 Student Computer Use




ter

Use of a Class Exercise to Maximize Student Interest in an Introductory MIS Course




ter

The Effects of Reading Goals on Learning in a Computer Mediated Environment




ter

A Profile of Digital Information Literacy Competencies of High School Students




ter

Computer Network Simulation and Network Security Auditing in a Spatial Context of an Organization




ter

Formative Assessment Visual Feedback in Computer Graded Essays




ter

ICT Experiences in Two Different Middle Eastern Universities




ter

Advanced Data Clustering Methods of Mining Web Documents




ter

Information Retrieval Systems: A Perspective on Human Computer Interaction




ter

Journey to the Center of the Core: Computers and the Internet in the Core Curriculum  




ter

A Second Opinion on the Current State of Affairs in Computer Science Education: An Australian Perspective




ter

What Makes Valuable Pre-experience for Students Entering Programming Courses?    




ter

Practical IT Education. Deepening of Technology, Expansion of Work, and Development into Headwaters: A Systematic Effort to Achieve Higher Levels




ter

Getting Practical With Learning Styles In “Live” and Computer-based Training Settings 




ter

Interactive On-line Formative Evaluation of Student Assignments




ter

Workflows without Engines: Modeling for Today’s Heterogeneous Information Systems  




ter

Will It Work? An Initial Examination of the Processes and Outcomes of Converting Course Materials to CD-ROMs




ter

Navigating the Virtual Forest: How Networked Digital Technologies Can Foster Transgeographic Learning




ter

Mobile Learning, Cognitive Architecture and the Study of Literature




ter

Multi-Criteria Spatial Analysis of Building Layouts




ter

PersistF: A Transparent Persistence Framework with Architecture Applying Design Patterns




ter

A Multi-Criteria Based Approach to Prototyping Urban Road Networks




ter

Finger Length, Digit Ratio and Gender Differences in Sensation Seeking and Internet Self-Efficacy




ter

The Interface between Technological Protection Measures and the Exemptions to Copyright under Article 6 Paragraph 4 of the Infosoc Directive and Section 1201 of the Digital Millennium Copyright Act




ter

An Exploration of How a Technology-Facilitated Part-Complete Solution Method Supports the Learning of Computer Programming




ter

An Architecture of a Computer Learning Environment for Mapping the Student’s Knowledge Level




ter

Users’ Learning of Principles of Computer Operations




ter

Befriending Computer Programming: A Proposed Approach to Teaching Introductory Programming