Schilit Key Ideas Dl

Total Page:16

File Type:pdf, Size:1020Kb

Schilit Key Ideas Dl Exploring a Digital Library through Key Ideas Bill N. Schilit and Okan Kolak Google Research 1600 Amphitheatre Parkway, Mountain View, CA 95054 {schilit,okan}@google.com ABSTRACT "I had thought each book spoke of the things, Key Ideas is a technique for exploring digital libraries by human or divine, that lie outside books. Now navigating passages that repeat across multiple books. From I realized that not infrequently books speak of these popular passages emerge quotations that authors have books: it is as if they spoke among themselves." copied from book to book because they capture an idea See also: intertextuality, Umberto Eco, Adso particularly well: Jefferson on liberty; Stanton on women's Appears in 18 Books from 1989 to 2005 rights; and Gibson on cyberpunk. We augment Popular Pas- sages by extracting key terms from the surrounding context Figure 1: One of 700-plus popularly quoted pas- and computing sets of related key terms. We then create an sages appearing under the key term \intertextual- interaction model where readers fluidly explore the library ity." Tens of millions of quotations emerge from a by viewing popular quotations on a particular key term, and clean-slate data mining algorithm that takes a dig- follow links to quotations on related key terms. In this paper ital library of scanned books as input. The reader we describe our vision and motivation for Key Ideas, present follows \See also" links to explore related quotations an implementation running over a massive, real-world dig- or \Appears in n Books..." links to read the quote ital library consisting of over a million scanned books, and in context in primary and secondary source books describe some of the technical and design challenges. The (example modified slightly for readability). principal contribution of this paper is the interaction model and prototype system for browsing digital libraries of books using key terms extracted from the aggregate context of pop- ularly quoted passages. online encyclopedia? Information technology's progress to- wards \an increasing democratization or dissemination of Categories and Subject Descriptors power" (Landow [10]) requires a ready supply of authorita- tive voices. Expanding access to these knowledge sources H.5.4 [Information Interfaces and Presentation]: Hy- is extremely important in a world where technology broad- pertext/Hypermedia; J.5 [Arts and Humanities]: Litera- casts one voice to many, authors are anonymous, credibility ture; H.4.3 [Information Systems Applications]: Com- is ambiguous, views are potentially biased, and where \we munications Applications|Information browsers have people who are trying to repeatedly abuse our sites" (Wales [13]). General Terms Our larger aim is to expose the general population to the Algorithms, Design, Human Factors great ideas and the connections between ideas that lie within books. Mining and linking ideas are both significant chal- lenges. Mining requires that we distinguish words about Keywords \ideas" from other words that appear in books, and, at the digital libraries; quotations; humanities research; data min- surface, all words look alike. Recognizing relations between ing; key phrases; hypertext; great ideas. ideas is difficult because there is no common classification system. Author's use the same words to name different 1. INTRODUCTION ideas, and different words to name the same idea. Acknowl- In our research we pose the question: How can we help edging the large problem scope and extensive efforts that people engage online books in a style similar to browsing preceded ours, the research presented here should be taken as a report on a new path we have been exploring rather than a complete solution. Umberto Eco writes that \books speak of books: it is as if Permission to make digital or hard copies of all or part of this work for they spoke among themselves" (see Figure 1). With apolo- personal or classroom use is granted without fee provided that copies are gies to Postermodernists, this sums up our approach. We not made or distributed for profit or commercial advantage and that copies developed a language-independent data mining capability bear this notice and the full citation on the first page. To copy otherwise, to to extract quotations1 from books. Data mining provides republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. 1 JCDL’08, June 16–20, 2008, Pittsburgh, Pennsylvania, USA. A quotation is a passage, of a certain length, repeated Copyright 2008 ACM 978-1-59593-998-2/08/06 ...$5.00. across books. A passage that is short is more likely a col- 177 the text of each quotation, all the books where the quota- experience. We then present algorithms for extracting key tion appears, as well as the context (surrounding text) of terms from quotation context and computing related key each use. We use quotations to create links between book terms. We conclude with a broad discussion on what we passages thereby giving readers the ability to jump between learned building the prototype, what works, and where we pages where quotations occur. see opportunities for further work. Linking book passages is only one benefit of mining quota- tions. In general when one author employs another's words 2. MOTIVATION & RELATED WORK we can say the following: (1) the passage reflects an idea This work falls within the research area of information or describes an event particularly well (or, by and large, seeking and, like much of the field, follows from Vannevar better than passages not-quoted); (2) the text introducing Bush's vision of Memex. Bush popularized the idea that and following the quote{the context{likely describes some people can collaboratively organize and share knowledge: facet of the quotation. The first observation says that there \Wholly new forms of encyclopedias will appear, ready-made might be ways to distinguish ideas from other words; the sec- with a mesh of associative trails running through them..." ond that commonly used descriptions may emerge without [5]. In many ways the vision has come to pass with large a commonly used classification system. amounts of hyper-linked information in the World Wide Furthermore, when one author quotes a passage from an- Web, digital libraries, and online encyclopedias. However, other they are crediting importance to the passage. In the researchers continue to point out that people, especially aggregate this behavior can be seen as a \wisdom of crowds" those lacking domain expertise, struggle to navigate infor- [15] effect where authors' repeated re-use of one another's mation spaces. words call out popular and seminal passages. In other words, There are numerous reasons why navigating information we found that mining surface similarity exposes deep seman- is still a challenge. In our own encounters with a digital li- tics, i.e., the ideas, in books. The Key Ideas technique is brary of books we saw that the size of information chunks based on these observations. is fundamental. Following the \mesh of associative trails" One major aspect of the emergence of popular and sem- and landing on a 400 page book slows down exploration. inal ideas based on usage of quotations across books is the People like to see concise bits of information and then de- size and nature of the collection. The digital library in our cide whether they want to learn more or navigate to other inquiry is over a millions books that comprise Google Book information. Search2. This collection contains books from 28 libraries in the United States, Europe and Asia, content from over 2.1 Popular Passages 10,000 publisher partners, and books in many dozens of lan- Our experience with Book Search led us to look for ways guages. to connect readers to smaller, more interesting bits within books. We developed Popular Passages to help readers dis- 1.1 Existing Quotation Collections cover passages shared across books, and provide a way to Quotation collections are fairly popular in print and on the explore the corpus by pivoting on these passages. The pas- Web. Two well known examples are Familiar Quotations by sages that authors decided worth repeating were mostly at- John Bartlett [4], and the Columbia World of Quotations [2] tributed quotations between 1-8 sentences in length, and oc- which contain 25,000 and 65,000 quotations respectively and curing in tens, hundreds, or sometimes thousands of books. 3 are also available online . Both these and other collections Mining quotations is related to but different from plagiarism are generally well organized and excellent source books. and duplicate detection. For technical details on quotation In developing our prototype we chose not to start from mining see [9]. manually prepared quotation collections for a number of rea- Although our system mines all types of repeated passages, sons. First, we were interested in quotations based on their our focus is not on shallow bon mots but rather on passages \real world" use by authors and this is not the criteria used that authors re-use because they are relevant to a point be- in edited collections. We also wanted as inclusive a collection ing made and describe an idea well. These passages tend as possible across many languages and disciplines. Finally, to be longer than a phrase but shorter than a page. For we wanted not just the quotation text, but the collection of example, we find this passage frequently used in the field of books in which they are used as well as the context of use, environmental politics: something not available in existing online collections. Further, searching from a large database of quotations The concept of sustainable development does im- is not a solution given the variations of use and numerous ply limits - not absolute limits but limitations im- scan errors in our corpus.
Recommended publications
  • A Celebration of the Contributions of Dr. Mortimer J. Adler
    A Celebration of the Contributions of Dr. Mortimer J. Adler August 19-21,1994 Aspen, Colorado Contents (interactive) Mortimer J. Adler: Philosopher at Midday- Jeffrey D. Wallin...................51 MJA, POLITICS: Summary - John Van Doren............................................76 Mortimer Adler: The Political Writings - John Van Doren........................79 Remarks – Mortimer J. Adler.......................................................................93 From the Editor’s Desk - Sydney Hyman...................................................95 Mortimer Adler and The Aspen Institute - Sidney Hyman........................99 Authors........................................................................................................118 51 Mortimer J. Adler: Philosopher at Midday Jeffrey D. Wallin ortimer J. Adler has made an unusual number of difficult M ideas accessible to “everybody.” Perhaps that is why he has been so uncharitably dismissed as a “popular” philosopher by his critics, a good number of whom come from that narrow breed of specialists once dismissed by Nietzsche as equipped at best to study the lives of a single species of insect, say, the leech, or that being too broad, perhaps only the leech’s brain. Adler is not a spe- cialist. He speaks to broad issues, issues of importance to all of us as men and women. Even more surprising, he speaks without jar- gon, evasion or irony. Unlike the owl of Minerva, which is said to begin its flight at dusk, this is one philosopher who learns and teaches in direct sunlight. Among the most important topics Adler has shed light upon are liberal education, democracy and human nature. Adler favors all of them, by the way. And nothing could further distance him from the strongest trends in American education. * * * In early May 1994 The New York Times carried a story about a controversy raging in Lake County, Florida.
    [Show full text]
  • [email protected] the Email Address Really Works! TRY IT!!
    [email protected] The email address really works! TRY IT!! Privacy Library Online Notes Morrison & Foerster’s Privacy Library, available I bet a lot of you are like me, you deal with a great at <http://www.mofoprivacy.com>, is a convenient deal of unstructured information all day – a phone one-stop shop for nearly everyone’s privacy concerns number here, and snippet from a web site there, or an around the world. important idea out of the blue! Using an online note- The library links to the privacy laws, regulations, taking tool may be just the organizational tool that reports, multilateral agreements and government you’ve been looking for. Check out a few of the major authorities on the federal level, all 50 states plus players in the field listed below. territories, and more than 90 countries around the My favorite is the Google Notebook. It is very user world. Still under construction are links to key court friendly, allows you to export to Google Docs and is cases, enforcement actions and decrees on the federal backed up by a good name. So we will begin there. and state levels. Google Notebook has been up and running for about a Each state includes links to the state’s governing year and a half now so it has most of the “kinks” body in charge of privacy issues, usually the Attorney worked out of its system and functions very General, its privacy laws and regulations, concerning smoothly. 4 With Google Notes you can: a wide variety of topics including: identity theft, • Clip useful information.
    [Show full text]
  • A Clustering-Based Approach to Summarizing Google Search Results Using CHR
    German University in Cairo Faculty of Media Engineering and Technology Computer Science Department Ulm University Institute of Software Engineering and Compiler Construction A Clustering-based Approach to Summarizing Google Search Results using CHR Bachelor Thesis Author: Sharif Ayman Supervisor: Prof. Thom Fruehwirth Co-supervisor: Amira Zaki Submission Date: 13 July 2012 This is to certify that: (i) The thesis comprises only my original work toward the Bachelor Degree. (ii) Due acknowledgment has been made in the text to all other material used. Sharif Ayman 13 July, 2012 Acknowledgements First and above all, I thank God, the almighty for all His given blessings in my life and for granting me the capability to proceed successfully in my studies. I am heartily thankful to all those who supported me in any respect toward the completion of my Bachelor thesis. My family for always being there for me, and giving me motivation and support towards completing my studies. Prof. Thom Fr¨uhwirth for accepting me in ulm university to do my bachelor, and for his supervision, patience and support. My co-supervisor, Amira Zaki, for her constant encouragement, insightful comments and her valuable suggestion. My Friends in ulm for all the fun we had together. III Abstract Summarization is a technique used to extract most important pieces of information from large texts. This thesis aims to automatically summarize the search results returned by the Google search engine using Constraint Handling Rules and PHP. Syntactic analysis is performed and visualization of the results is output to the user. Frequency count of words, N-grams, textual abstract, and clusters are presented to the user.
    [Show full text]
  • Big Data and Open Data As Sustainability Tools a Working Paper Prepared by the Economic Commission for Latin America and the Caribbean
    Big data and open data as sustainability tools A working paper prepared by the Economic Commission for Latin America and the Caribbean Supported by the Project Document Big data and open data as sustainability tools A working paper prepared by the Economic Commission for Latin America and the Caribbean Supported by the Economic Commission for Latin America and the Caribbean (ECLAC) This paper was prepared by Wilson Peres in the framework of a joint effort between the Division of Production, Productivity and Management and the Climate Change Unit of the Sustainable Development and Human Settlements Division of the Economic Commission for Latin America and the Caribbean (ECLAC). Some of the imput for this document was made possible by a contribution from the European Commission through the EUROCLIMA programme. The author is grateful for the comments of Valeria Jordán and Laura Palacios of the Division of Production, Productivity and Management of ECLAC on the first version of this paper. He also thanks the coordinators of the ECLAC-International Development Research Centre (IDRC)-W3C Brazil project on Open Data for Development in Latin America and the Caribbean (see [online] www.od4d.org): Elisa Calza (United Nations University-Maastricht Economic and Social Research Institute on Innovation and Technology (UNU-MERIT) PhD Fellow) and Vagner Diniz (manager of the World Wide Web Consortium (W3C) Brazil Office). The European Commission support for the production of this publication does not constitute endorsement of the contents, which reflect the views of the author only, and the Commission cannot be held responsible for any use which may be made of the information obtained herein.
    [Show full text]
  • Political Science 5 Comparative Government Course Syllabus – Spring, 2015
    POLITICAL SCIENCE 5 COMPARATIVE GOVERNMENT COURSE SYLLABUS – SPRING, 2015 Course Sections, Reedley College: Instructor: Dr. Tellalian 55511: MW, 2:00 – 3:15 P.M., CCI-200 Email: [email protected] Office Hours: Tuesdays, 9:00 – 10:00 A.M. Fridays, 10:00 – 10:30 A.M., 1:00 – 2:30 P.M., and by appointment. Course Description: This course provides an introduction to the basic workings of various political systems throughout the world, with an emphasis on both the formal (i.e., governmental institutions, political processes) and informal (i.e., cultural exchanges) dimensions of politics. Students will engage in comparisons of these political systems using some of the basic concepts of political analysis. Course Objectives: In the process of completing this course, students will: 1. analyze political and governmental systems by using the comparative method, including, but not limited to representative democracies, parliamentary democracies, totalitarian systems, and authoritarian systems. 2. examine the political philosophies and historical cultural values of selected governments. 3. survey the variables that influence the governmental direction of transitional states. 4. examine the impact of regional, economic, historical, and cultural factors on political institutions and behavior within a country. 5. explore the forms of political participation, including individual actions and pluralist influences. 6. analyze the economic systems of the selected countries and how these relate to their systems of government and geopolitical standing. 7. evaluate the functioning of various political and governmental systems in light of current events. 8. appraise the liberties and rights of people living under various political/governmental regimes. 1 Required Texts: Lord, Carnes, trans.
    [Show full text]
  • Google Overview Created by Phil Wane
    Google Overview Created by Phil Wane PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 30 Nov 2010 15:03:55 UTC Contents Articles Google 1 Criticism of Google 20 AdWords 33 AdSense 39 List of Google products 44 Blogger (service) 60 Google Earth 64 YouTube 85 Web search engine 99 User:Moonglum/ITEC30011 105 References Article Sources and Contributors 106 Image Sources, Licenses and Contributors 112 Article Licenses License 114 Google 1 Google [1] [2] Type Public (NASDAQ: GOOG , FWB: GGQ1 ) Industry Internet, Computer software [3] [4] Founded Menlo Park, California (September 4, 1998) Founder(s) Sergey M. Brin Lawrence E. Page Headquarters 1600 Amphitheatre Parkway, Mountain View, California, United States Area served Worldwide Key people Eric E. Schmidt (Chairman & CEO) Sergey M. Brin (Technology President) Lawrence E. Page (Products President) Products See list of Google products. [5] [6] Revenue US$23.651 billion (2009) [5] [6] Operating income US$8.312 billion (2009) [5] [6] Profit US$6.520 billion (2009) [5] [6] Total assets US$40.497 billion (2009) [6] Total equity US$36.004 billion (2009) [7] Employees 23,331 (2010) Subsidiaries YouTube, DoubleClick, On2 Technologies, GrandCentral, Picnik, Aardvark, AdMob [8] Website Google.com Google Inc. is a multinational public corporation invested in Internet search, cloud computing, and advertising technologies. Google hosts and develops a number of Internet-based services and products,[9] and generates profit primarily from advertising through its AdWords program.[5] [10] The company was founded by Larry Page and Sergey Brin, often dubbed the "Google Guys",[11] [12] [13] while the two were attending Stanford University as Ph.D.
    [Show full text]
  • Twitter Bot Detection
    ISSN (Online) 2278-1021 IJARCCE ISSN (Print) 2319-5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 10, Issue 4, April 2021 DOI 10.17148/IJARCCE.2021.10417 Twitter Bot Detection Jison M Johnson1, Prince John Thekkadayil2, Mansi D Madne3, Atharv Nilesh Shinde4, N Padmashri5 Student, Computer Department, Fr. Conceicao Rodrigues Institute of Technology, Navi Mumbai, India1-4 Asst. Professor, Computer Department, Fr. Conceicao Rodrigues Institute of Technology, Navi Mumbai, India5 Abstract: Today, social media platforms are being utilized by a gazillion of people which covers a vast variety of media. Among this, around 192 million active accounts are stated as Twitter users. This discovered an increasing number of bot accounts are problematic that spread misinformation and humor, and also promote unverified information which can adversely affect various issues. So in this paper, we will detect bots on Twitter using machine learning techniques. A web application where we can verify if the account is a bot or a genuine account. We analyze the dataset extracted from the Twitter API which consists of both human and bot accounts. We analyze the important features like tweets, likes, retweets, etc., which are required to provide us with good results. We use this data to train our model using machine learning methods Decision Trees and Random Forest. For linking our model with the web content, we used the flask server. Our result on our framework indicates that the user belongs to a human account or a bot with reasonable accuracy. Keywords: Machine learning, Twitter, bot detection, Random forest. I. INTRODUCTION Twitter is a social networking site which has one of the most rapidly growing user base.
    [Show full text]
  • Cloud Computing Bible
    Barrie Sosinsky Cloud Computing Bible Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2011 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-90356-8 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services.
    [Show full text]
  • I. Searching Tips II. Google Tools – Google News, Google Scholar, Google Book, Google Notebook II
    I. Searching tips II. Google tools – Google News, Google Scholar, Google Book, Google Notebook II. Assessing relative authority of web sites III. Bluebook form for web sources I. SEARCHING TIPS 1. Google limitations Can’t find what you need? Sometimes the problem lies with Google, not your search. A. Google does not index every page or document on the web. B. Even for those pages and documents that are indexed by Google, the search engine does not necessarily index every word. There is a size limit, variously reported as being between 101 and 500kb. Consequently, if your search term does not occur in the indexed portion of the document (say, the first 50 pages), the document will not appear in your search results. 2. More results from . link To prevent domination of the results list by any single web site, Google displays no more than two results from each site. When you see two results from the same site, they are listed successively, the second one is indented, and – if there are further relevant results – there will be a More results from . link. See example below. Follow this link to a separate results screen, which is a complete listing of all the pages from that web site containing your search terms. Query: exonerated dna . 3. Search specific web site or domain Why search the entire web – and clutter up your results list – if what you want is at a specific site or at least a domain? Query: dna exoneration site:gov [no space after site:] Query: site:www.pbs.org dna exoneration These searches will retrieve all pages or documents from the web site or domain that match the query.
    [Show full text]
  • Programming the Cloud: the Internet As Platform
    Programming the Cloud: the Internet as Platform Gregor Hohpe Software Engineer www.EnterpriseIntegrationPatterns.com © 2008 Google, Inc. All rights reserved, Who’s Gregor? • Distributed systems, asynchronous messaging, service-oriented architectures • MQ, MSMQ, JMS, ESB’s • Software engineer at Google • Book: Enterprise Integration Patterns •Site: www.eaipatterns.com • Write code every day. Share knowledge through patterns. • “Starbucks does not use 2-phase commit” featured in Joel Spolsky’s Best Software Writing. © 2008 Google, Inc. All rights reserved, 2 1 Internet as a Platform: The Good Falling cost of Ubiquitous Democratized storage and broadband tools of computing connectivity production power © 2008 Google, Inc. All rights reserved, 3 Internet as a Platform: The Challenges Architect’s Dream Developer’s Nightmare •Loosely coupled •NO Call Stack •Extensible •NO Transactions •Standards-based •NO Promises •Fault tolerant •NO Certainty •Unlimited computing •NO Ordering power Constraints •Ubiquitous © 2008 Google, Inc. All rights reserved, 4 2 Isn’t This What Distributed Transactions Are For? •Require coordinator •Even 2 Phase Commit has windows of uncertainty •Not practical for long running interactions • Locks not practical / economical • Isolation not possible / practical •Usually not supported •Don’t scale “Life“Life BeyondBeyond DistributedDistributed TransactionsTransactions –– anan Apostate’sApostate’s Opinion”Opinion” --Pat Helland © 2008 Google, Inc. All rights reserved, 5 Still An Issue With HTTP •Hardware failure •Network
    [Show full text]
  • Doing Scholarship from a Faith Perspective: Reading the Sacred As Sacred Encounter
    Doing Scholarship from a Faith Perspective: Reading the Sacred as Sacred Encounter Ismael Velasco When Moses, walking through the desert, came upon Mount Horeb, he beheld God speaking from within a flame of fire amidst a burning bush, ablaze, yet unconsumed, and calling out to him: “Moses! Moses!” To which he unhesitatingly replied: “Here am I.” Whereupon he was commanded, “Draw not nigh hither: put off thy shoes from off thy feet, for the place wherein thou standest is holy ground.”1 Today no man can claim to have seen the burning bush; but the voice of the Transcendent calls still in accents of absolute authority in the Holy Writ of the religions of the world. A reader who would venture to such formidable and self-sufficient mountains, whereon millions hear, even today, the voice of God or truth supreme, and seek with reason and study to gain a glimmer of that spot wherein Moses stood, such a one, believer or not, would do well, like Moses, to halt for thought, and first put off his sandals in respect, else reverence, for the sheer magnitude of his purposed subject. For in approaching scripture, it will be readily acknowledged, one is dealing with a text extraordinary in the most palpable way. No other text outside of scripture carries so profoundly in every word a million and a million life-trajectories; no other category of text has so deeply shaped or shapes today so many identities in such far-reaching ways. To say “this word means this” of a part of sacred scripture is, wittingly or unwittingly, to pronounce on the meaning of unnumbered lives whose hopes and yearnings are, were or will be built around a given understanding of the very words one is pronouncing on - peripheral or irrelevant though they might seem to the commentator.
    [Show full text]
  • By Chris Murphy
    Microsoft-Skype: A very big if 10 | FBI goes agile 12 | Google’s notebook as a service 18 | Java is real-time ready 35 | Cisco CIO’s practical plan 46 May 30, 2011 Innovation Atrophy Time for IT leaders to pump up the Big Ideas p.23 By Chris Murphy [PLUS] IPv6 SECURITY Done wrong, it can open holes p.31 Copyright 2011 UBM LLC. Important Note: This PDF is provided solely as a reader service. It is not intended for reproduction or public distribution. For article re- prints, e-prints and permissions please contact: Wright’s Reprints, 1-877-652-5295 / [email protected] COTHE BUSINESS VALUENT OF TECHNOLOGY ENMay 30, 2011 Issue 1,301 TS [QUICKTAKES] 16 SAP Making Progress Vital proof points are just ahead in mobile, in-memory, and cloud 18 Google’s Chromebook Gamble Service combines notebook with 23 new OS for Web software COVER STORY 19 VMware Manages The Cloud Innovation Atrophy Offering lets companies manage Too many IT pros have lost the private and public cloud resources fire for new ideas and new technology. IT leaders must Dropbox Challenge pump them back up. FTC complaint questions service’s security and privacy practices 20 A Call To The Enterprise Microsoft’s next Windows Phone OS release gets enterprise features Health Driver Ford experiments with in-car health applications 21 Hadoop Is Hot EMC is offering its own version, signaling an analytics arms race 16 informationweek.com May 30, 2011 1 [CONTENTS] 4 Research And Connect Will IPv6 Make Us Unsafe? Reports from InformationWeek Maybe, if you ignore buggy code, motivated
    [Show full text]