Observations and interviews in the study resulted in a model of different ways of finding library materials using and combining different types of convergent (goal-directed) and divergent (explorative) information behaviour. Data from observations and interviews were transcribed and analysed in an iterative process of categorization and condensation. Naturalistic observation of users' information behaviour was supplemented with qualitative interviews with 113 users including think-aloud sessions with eleven users. The study took place at two Danish public libraries during 10 months in 2006. The overall aim of the study was to develop a conceptual framework including models to describe users' interaction with library spaces. Special focus was on what dimensions in the physical library may affect possibilities for serendipity. Outlines an exploratory study concerned with the types of information behaviour users employ to find materials in a public library.
Xscope interface cannot open device series#
For instance, if a series of prototypes functions as a set of smaller arguments within a larger debate, it might be more appropriate to fund the sequence rather than treating each project as an individual proposal. We also outline some implications for funding agencies interested in supporting researchers who are designing experimental computer prototypes. Is the prototype itself an original contribution to knowledge? Is the prototype part of a series of prototypes with an identifiable trajectory?ĭoes the prototype address possible objections?
Is the argument reified by the prototype contestable, defensible, and substantive?ĭoes the prototype have a recognizable position in the context of similar work, either in terms of concept or affordances? We suggest a checklist for subjecting prototypes directly to peer review: Building on this premise, we explore theoretical affinities shared by recent design and book history scholarship, and connect those theories to the emerging practice of peer-reviewing digital objects in scholarly contexts. I can only assume Cisco is not aware of this problem yet and will address this vulnerability ASAP.In this article, we argue that, just as an edition of a book can be a means of reifying a theory about how books should be edited, so can the creation of an experimental digital prototype be understood as conveying an argument about designing interfaces. Yes in some browsers i can simply ignore the error and move on, does that mean Cisco has no obligation to plug this security hole in their hardware? My firmware version: v4.2.3.06 (17:20:13)Ĭlearly this firmware suffers from the well known and documented Logjam Attack (Diffie-Hellman key exchange weakness) The connection to the server was reset while the page was loading. (Error code: ssl_error_weak_server_ephemeral_dh_key) SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message.
The security certificate for this site doesn’t match the site’s web address and may indicate an attempt to fool you or intercept any data you send to the server.Īn error occurred during a connection to. We recommend that you close this webpage and do not continue to this website. There is a problem with this website’s security certificate