background preloader

Best Free Reference Web Sites Combined Index, 1999-2015 RUSA ETS: Emerging Technologies Section

Best Free Reference Web Sites Combined Index, 1999-2015 RUSA ETS: Emerging Technologies Section
AARP ( American Association of Retired People.Reviewed: MARS Best 2004 Abbreviations.com ( STANDS4 LLCReviewed: MARS Best 2010 About.Com ( About.Com.Reviewed: MARS Best 2000 Ad*Access ( Duke University LibrariesReviewed: MARS Best 2010 AdViews: A Digital Archive of Vintage Television Commercials, ( Duke University LibrariesReviewed: MARS Best 2012 Africana.com ( Africana.com Inc.Reviewed: MARS Best 2001 NOTE: Renamed Black Voices: African American and Black Culture Community (2006) AF: Acronym Finder ( Mountain Data Systems, LLCReviewed: MARS Best 2006 AFI Catalog of Feature Films (www.afi.com/catalog) American Film Institute (AFI)Reviewed: MARS Best 2015 AIDSInfo ( U.S. NOTE: Now AOL Black Voices (January 2006) AJR Newslink ( and ( AJR and NewsLink Associates.Reviewed: MARS Best 2001 All-Music Guide ( Matrix Software, Inc.Reviewed: MARS Best 1999 All Recipes ( Allrecipes.com.Reviewed: MARS Best 2005 AltaVistas Babel Fish ( Overture Services, Inc.Reviewed: MARS Best 2005 Ben's Guide to the U.S.

http://www.ala.org/rusa/sections/mars/marspubs/marsbestindex

Related:  Useful stuffeduLibrary Projects

Color Theory Refresher In 2015, Print is celebrating 75 years. Enter your work into the Regional Design Annual today for a chance to be spotlighted in the pages of our milestone issue. “Color is slipperier than you think. Learn everything about ethical hacking tools and skills Details Skills allow you to achieve your desired goals within the available time and resources. As a hacker, you will need to develop skills that will help you get the job done. These skills include learning how to program, use the internet, good at solving problems, and taking advantage of existing security tools. In this article, we will introduce you to the common programming languages and skills that you must know as a hacker. We will also look at tools that you can use to identify and exploit security weaknesses in computer systems.

Worcester Art Museum - REdesign: Libraries Kulapat Yantrasast, a native of Thailand, is the co-founder and principal of wHY Architecture which he founded with fellow architect Yo-ichiro Hakomori in 2003 in Los Angeles, and opened with a New York location in the spring of 2012. Newsweek magazine's recent article on architecture noted wHY Architecture as one of the most innovative architectural practices of the new generation, and their philosophy of integration of creative thinking with timeless design, along with their focus on intelligent and high-quality construction, have gained them a reputation for their architectural works and projects for the arts and culture all over the United States. In 2007, wHY Architecture completed the Grand Rapids Art Museum, which became the first new art museum in the world to receive the LEED certification for environmental design.

The World Factbook The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA). We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us. 99 Resources to Research & Mine the Invisible Web College researchers often need more than Google and Wikipedia to get the job done. To find what you're looking for, it may be necessary to tap into the invisible web, the sites that don't get indexed by broad search engines. The following resources were designed to help you do just that, offering specialized search engines, directories, and more places to find the complex and obscure. Search Engines Whether you're looking for specific science research or business data, these search engines will point you in the right direction. Turbo10: On Turbo10, you'll be able to search more than 800 deep web search engines at a time.

Windows 10 Preview, Release Date, News & Features: 10 Reasons to Upgrade to Windows 10 Everybody can finally exhale a sigh of relief: Windows 8 is going away, and it's once again safe to upgrade your PC's version of Windows. Windows 10 is nearly here, and a major thrust of its design is to be more familiar to users of pre-8 versions of Windows. It's a chance for everyone who missed out on all the performance and feature advances in Windows 8 and 8.1—and believe it or not there are plenty, many of which are included in this list—to get caught up. Not only that: It's free! You can't upgrade to Windows 10 quite yet (unless you want to be a guinea pig and install the Technical Preview), but you can already make a decision to start the process rolling. How?

Kali Linux Howto's Windows users may be used to the “Recycle Bin” being on their Desktop, and I admit that it is very convenient. So here’s a simple four step way to make that well-known Trash icon appear on Kali’s desktop. Step OneClick “Applications” on the toolbar, then hover on “System Tools” for a second then click on “dconf Editor.” Step Two On the window that opens, click on the plus symbol next to “org,” then click the symbol next to “gnome” in the left pane. Home - 9) Cite Sources - LibGuides at University of Lethbridge Citing your sources is critical in academic writing. Not citing your work can result in an academic offence (see Plagiarism). Why cite? —Lets your readers know that certain material in your work came from another source, giving credit where it's due. Not doing this constitutes plagiarism—Gives your readers (and you) the information necessary to find that source again, including:—Author’s name—Title of the work—Date of publication—Name and location of the company that published the work—Page numbers of the material you are usingShows your arguments are based on researchDemonstrates the quality of your sources to your instructorAll in the most relevant - but briefest - way possible. With most citation styles, you need two pieces for a complete citation: the in-text portion, where you refer to the work; and the full citation in your References list at the end of the paper.

Virtual Reference Shelf - Ask a Librarian Abbreviations Back to Top Almanacs & Fast Facts 10 Ingenious Bookmarklets To Make You a Google Power User If you love all that Google has to offer, but are not particularly fond of the browser extensions available, then this list is for you. Here are 10 great bookmarklets for Google that range from search options to very specific tasks. To use them, drag the bookmarklet link into your bookmarks toolbar. Then you can rename it to whatever you want just like any other bookmark. Then just click it whenever you need it — Simple!

Top 10 Websites To Learn Ethical Hacking Hacking is very interesting and always very attractive. You really know how many people want to become a hacker.They read books, attend seminar, training,they search hacking tutorials,tips and tricks on google and youtube to learn “How To Become A Hacker!” Hacking is not wholly illegal. Basically, there are two types of hacker:first is black-hat hacker and second is white-hat hacker or ethical computer hacker.hacking is a process and its take time.great hackers uses basics and focus on it. To learn hacking, you need to have a sharp mind and passions . Hacking can be utilized for enhancing or breaching the security. Citation Analysis - Measuring Your Impact: Impact Factor, Citation Analysis, and other Metrics - Research and Subject Guides at University of Illinois at Chicago Web of Science Web of Science provides citation counts for articles indexed within it. It indexes over 10,000 journals in the arts, humanities, sciences, and social sciences. To find the citation counts to your own articles:Enter the name of the author in the top search box (e.g. Smith JT). Select Author from the drop-down menu on the right.To ensure accuracy for popular names, enter Univ Illinois in the middle search box, then select “Address” from the field drop down menu on the right.

How to verify information from tweets: Check it out Journalists should treat information we gather on social media the same way we treat information gathered any other way, or an assurance from Mom that she loves you: Check it out. My #twutorial series hasn’t been updated since late October, but I always planned to do a post on verifying information gathered in social media. Given the errors some journalists made in reporting on the Sandy Hook massacre and in the original reporting on Manti Te’o’s fake girlfriend, this feels like a good time to stress accuracy and verification. The most simple and important advice I can give is that Twitter is like any other information source — documents, anonymous tips, news releases, press conferences, interviews, databases — it can provide valuable information or deliberate lies or innocent errors. Your job is to verify the information that looks useful. As with all the other information you gather, you can verify lots of different ways, and no single technique works for everything.

Installing Python Modules — Python 2.7.9 documentation This document describes the Python Distribution Utilities (“Distutils”) from the end-user’s point-of-view, describing how to extend the capabilities of a standard Python installation by building and installing third-party Python modules and extensions. Introduction Although Python’s extensive standard library covers many programming needs, there often comes a time when you need to add some new functionality to your Python installation in the form of third-party modules. This might be necessary to support your own programming, or to support an application that you want to use and that happens to be written in Python. In the past, there has been little support for adding third-party modules to an existing Python installation.

Related: