two notes about twitter

1. I saw the Providence Public Library’s Twitter feed today and I like it. A mix of library information and links to their very amusing tech blog. I like it.
2. I just noticed Phil Bradley’s list reprinted over at Tame the Web. I’m in a weird position on Twitter because I’m followed by librarians, MetaFilter members and at least a good handful of real life friends and family. I follow maybe a ninth of the number of people who follow me. My feed is open so anyone can read it, but I can only follow so many people (and I do stay up to date on my Twitter feed pretty much always so this is important to me). Here is my version of Phil’s guidelines and there’s a sort of flow chart in effect here.
a) Do they Tweet in English (or possibly Romanian but I’ve never seen this happening yet)? If yes, go to b.
b) Are they spammers or hypesters (following over 5000 people? pushing a product?)? If not go to c.
c) Do they update more than ten times a day? If so, they’re too high traffic for me. If not, go to d.
d) Is their Twitterstream just an automated version of their RSS feed? If yes, subscribe. If no, go to e.
e) Do they @reply to people as the bulk portion of their tweets? If so, they’re likely not interesting to me (for me Twitter is like a news ticker, not a conversation). If not, go to f, g and h and choose one. If none of these apply, then don’t follow.
f) Do I know them or know why they’re following me?
g) Do I find them amusing, astute, informative or otherwise intriguing?
h) Do I want to direct message with them and find that I can’t because I’m not following them

In short, my sister’s Twitter feed is one of my favorites, followed sharply by a few bloggers I barely know and a few random librarians who amuse the heck out of me. Then there are 200 other people and all told I probably scan through 600-1000 tweets per day. This helps me feel less like I’m up here in the fortress of solitude when I’m in rural Vermont and helps me stay in touch with a lot of plugged in people in the profession. I send all of my Twitter-related “soandso added you as a contact” email to a special folder and scan through it weekly. If I’m not following you and you think maybe I might like to, please feel free to drop me a note and/or a comment. I’m not suggesting this approach for anyone else, but it works well for me.

How long do you forgive bad tech? What do you do next?

I’m aware that accessing someone’s conference planner is not the same level of hackery as stealing their credit cards or breaking into their email account. However, I would just like to say that having an event planner where the password is not only the same for every user (until it’s changed) but also printed right there on the web page, turns the whole idea of having a password or any sort of security into a big joke. How do we teach librarians what good technology looks like if this is how we make them interact with us? For the record, using just the ALA Staff list, I was able to log in to someone else’s event planner in under a minute. The vendors get their password in an email, not much better.

I went to this page from Nicole’s post (I’m not going to the conference) just to see if it was really true that the page claims it is “best viewed in IE” which is yet another “tech don’t” in the world of 2008 browsers so much so that it calls into question all the rest of the site.

I don’t belong to ALA anymore. I did my time, paid my dues, donated a lot of service time to the organization and tried to be gentle and patient as they steered a big organization through the minefield of technological change. The Event Planner has been an outsourced, broken and insecure tool since they started using it. I’d like to see ALA do better, but my optimism that this will happen is flagging.

A few links to kick off 2009

I’ve been working on keeping my inbox pretty well empty which has meant no linkhoarding this week. Here are a few things worth pointing out that I’ve kept around.

me-generated content – my course handouts

I teach a bunch of little “Getting Started with X” night classes at the local vocational high school. They’re fun. I’ve been doing them for years now. They’re the sort of classes you’d teach at a library if you had a computer lab, but the libraries here don’t have computer labs. They’re usually 8-12 hours broken down into two hour classes. Given that, you might be surprised how little we cover, but we go slow, do a LOT of review, and do a lot of things together so that everyone can keep up.

I’m lucky to have access to the computers in the lab, so I can put documents and example spreadsheets on them ahead of time. One of the most important things in teaching novice users is that they’re often bad typists so saying “Type a few paragraphs and then we’ll edit them” is a recipe for disaster and frustration. I usually have them work from some standard text like The Gift of the Magi or something I’ve copied from Wikipedia. I’m also very clear about what sorts of things on the computers are customizeable and what are functions of how the computers work. For new users, they can’t tell what’s a setting — all those annoying pop-up warnings using Internet Explorer when you go to a secure site for example — and what’s something you can’t easily edit — how the cursor behaves. One of the biggest thigns I had to learn is that a lot of my students have no idea what the word “default” means, so when you say “Oh that’s just the way MS Word is set as a default…” that’s not a sense-making sentence to them. We spend half a class just adjusting the settings, turning off grammar-checker, adding and removing toolbars, so they know how to do that if they ever get a computer at home.

It’s fun work and I really enjoy it. Over the years people have emailed me asking for advice so I’ve zipped up my class handouts and sample documents and made them available here. Please feel free to use them in your classes in any way you’d like to. If you do, please remove my name and email address first :)

Enjoy!