You are a SPECIAL Librarian! You are a Military Librarian!

Archive | Feature stories

DMIL programming at SLA 2014

Are you ready for SLA 2014 in Vancouver?

March 7th 2014

June is approaching quickly and now is the time to start planning. Here is a brief overview of DMIL’s programming at this years annual conference in Vancouver, beautiful British Columbia!

 Sunday, June 8th 2014

The Evolving Information Professional:  Changing Roles, New Opportunities.

1:30 to 3:00 p.m. 

Presented by the Government Information Division and co-hosted by the Knowledge Management Division, the Petroleum & Energy Resources Division, the Museums, Arts & Humanities Division, and the Military Libraries Division

The definition and role of a librarian has changed dramatically over the past 20 years. At the same time, new information-related fields have emerged, offering new opportunities. Our panel will look at where these changes have taken us professionally and where they see them leading us in the future. 

How Not to Run a Meeting: Facilitation Skills 101 for Librarians

3:30 to 5:00 p.m. 

Presented by the Military Libraries Division and co-hosted by the Petroleum & Energy Resources Division

 Why Facilitation Matters: A Comedy of (Meeting) Errors. Remember the best (and worst) meetings you’ve ever attended? This humorous set of interactive skits will show you why some meetings and events are truly awful, and why the best ones are often the ones that are most skilfully (and sometimes very subtly) facilitated. Our speaker Dave Pollard retired from paid work in 2010, after 35 years as an advisor to small enterprises, with a focus on sustainability, innovation, and understanding complexity.   

Monday June 9th

Military Libraries Division Networking Breakfast

7:30 to 9:00 a.m.

 The Military Libraries Division invites all interested attendees to join us for a breakfast buffet paired with good conversation and excellent company. Meet Division members and learn about the various services provided to the military by our librarians. 

Finding Those Who Don’t Want to Be Found Using Social Media and Other Cyber Tools

10:00 to 11:30 a.m. 

Presented by the Social Science Division – Public Policy Section, co-hosted: Military Libraries Division and Competitive Intelligence Division

 We have all seen the crime shows where with a few clicks using social media—a key piece of evidence in finding someone who doesn’t want to be found turns up, but how hard is this to do in real life?  Come find out from one of the principals of a leading investigative agency in Canada!  Our speaker will discuss how they use social media and other cyber tools to discover this type of information.  Emphasis will be placed on resources, tips and techniques that you can add to your research toolkit.

 Tuesday June 10th

Military Libraries Division Networking Breakfast

7:30 to 9:00 a.m. 

The Military Libraries Division invites all  interested attendees to join us for a breakfast buffet paired with good conversation and excellent company. Meet Division members and learn about the various services provided to the military by our librarians.

Military Libraries Division Open House

6:00 to 9:00 p.m. 

Always a popular event – Please join the Military Libraries Division for an evening of fun! Take the opportunity to unwind, meet Division members and work on  our customary puzzle. One of the last events of the conference. 

For registration and hotel information click here. Early bird registration closes on April 11th! 

We are looking forward to seeing you there!

 

Christine Marshall
SLA DMIL – Director – 2014 Conference Planner
613-851-5898
cbeam026@alumni.uottawa.ca

Posted in !MLD News!, Feature storiesComments Off

Beyond Borders: Connect and Collaborate Internationally

 #SLAtalk and #UKlibchat are pleased to co-present a Twitter conversation like no other!
 
 
Using Twitter, our two groups will explore the challenges and opportunities when it comes to working as an info pro as well as networking with others in our profession across geographic and cultural boundaries.

Use both hashtags of #SLAtalk and #UKlibchat for our conversation.
 
When:
Tuesday, 3 December from 18.30-20.30 GMT (1:30 pm – 3:30 pm EST)
What time is that where you are? http://time.is/compare
 
Important information unique to this session:
·         The first hour (18.30-19.30 GMT) will be in the style of #SLAtalk. Check out How to #SLAtalk and the latest #SLAtalk Roundups, as well as #SLAtalk explained via PowToon.
·         The second hour (19.30-20.30 GMT) will be in the style of #UKlibchat. See http://uklibchat.wordpress.com/2013/11/26/3rd-december-2013-agenda-beyond-borders-connect-and-collaborate-internationally/ for full details.
 
Discussion Questions:
 
Q1 – [18.30-18.45] – What tools or technologies do you use to assist you in today’s global workplace? Describe a success story and share the impact of the project.
 
Q2 – [18.45-19.00] – Have you successfully performed research using another country’s resources or researched in another language?
 
Q3 – [19.00-19.15] – Share a challenge caused by working beyond your own borders, and how you overcame it.
 
Q4 – [19.15-19.30] – What skills do you think make you more successful in working and collaborating in a multinational environment? How can you better network beyond your borders?
 
* * * * *
 
You may also be interested to know that the Diversity Leadership Development Program Committee (DLDP) will host its first webinar on diversity next week – find more details and registration via the link below:
 
Title:     Understanding Diversity and the Culture of Inclusiveness: Why It Matters for Our Profession and the Future of SLA 
Date:     Tuesday, December 10, 2013 1:00 – 2:00 pm EDT

Posted in Feature stories, NewsComments Off

Monthly Cyber Tips: Cyber Monday and Online Shopping Season: What You Need to Know to Protect Yourself

 

 November 2013

 

 

Volume 8, Issue 11

Cyber Monday and Online Shopping Season: What You Need to Know to Protect Yourself
Online holiday shopping continues to grow in popularity. According to American Express, for the first time, more people are expected to shop online on Cyber Monday than visit brick and mortar stores on Black Friday.[1]  Shoppers are expected to spend nearly $62 billion online throughout the holiday season this year, up more than 15% from 2012. The use of mobile devices for online shopping (mcommerce) is projected to reach almost $10 billion for the 2013 holiday season[2], as more consumers are using these devices to compare prices, research products, locate stores, and make purchases to a larger degree than ever before.Whether you’ll be conducting transactions from your desktop, laptop or mobile device, keep these tips in mind to help protect yourself from identity theft and other malicious activity on Cyber Monday, and throughout the year: 

  • Secure your computer and mobile devices.  Be sure your computer and mobile devices are current with all operating system and application software updates. Anti-virus and anti-spyware software should be installed, running, and receiving automatic updates. Ensure you use a strong password and unique password, which is not used for any other accounts. Set a timeout that requires authentication after a period of inactivity.
  • Use mobile applications with caution. As devices such as smartphones and tablets, continue to gain popularity for online shopping, so too will the volume of attacks against them.  Malware could be downloaded onto the device from seemingly legitimate shopping apps that can steal credit card and other sensitive information for transmission to cyber criminals. Update all apps when notified and disable Bluetooth and Near Field Communications when not in use to reduce the risk of your data—such as credit card number—being intercepted by a nearby device.
  • Know your online merchants.  Limit online shopping to merchants you know and trust. Only go to sites by directly typing the URL in the address bar. If you are unsure about a merchant, check with the Better Business Bureau or the Federal Trade Commission.  Confirm the online seller’s contact information in case you have questions or problems.
  • Consider using an online payment system or credit card.  Where available, you may want to use online payment services, which keep your credit card information stored on a secure server, and then let you make purchases online without revealing your credit card details to retailers.  If you do pay online directly to the retailer, use a credit, not debit card.  Credit cards are protected by the Fair Credit Billing Act and may reduce your liability if your information is used improperly.
  • Look for “https” before you click “Purchase.” Before you submit your online transaction, make sure that the webpage address begins with “https.” The “s” stands for secure, and indicates that communication with the webpage is encrypted.  A padlock or key icon in the browser’s status bar is another indicator.  Also, make sure your browser is current and up-to-date. 
  • Do not respond to pop-ups.  When a window pops up promising you cash, bargains, or gift cards in exchange for your response to a survey or other questions, close it by pressing Control + F4 on Windows devices, or Command + W for Macs.
  • Do not use public computers or public wireless access for your online shopping.  Public computers and Wi-Fi hotspots are potentially insecure. Criminals may be intercepting traffic on public wireless networks to steal credit card numbers and other sensitive information. Care should be taken that the settings on your computer or device prevent it from automatically connecting to Wi-Fi hotspots.
  • Secure your home Wi-Fi.  Make sure you control who has administrative access, and that any users on your network authenticate with a strong password. Encryption settings should be enabled and strong – using WPA2 is recommended.
  • Be alert for potential charity donation scams. Cyber criminals try to take advantage of people’s generosity during the holiday season and can use fake charity requests as a means to gain access to your information or computer/device. Think before clicking on emails requesting donations. Don’t give your financial or personal information over email or text.   Contribute by navigating to the trusted address of the charity, never through a link in an email.  To check if an organization is eligible to receive tax-deductible charitable contributions, visit the IRS website.

 Contact the seller or the site operator directly to resolve any issues. You may also contact the following:

For More Information:

 For additional information about safe online shopping, please visit the following sites:

The information provided in the Monthly Security Tips Newsletters is intended to increase the security awareness of an organization’s end users and to help them behave in a more secure manner within their work environment.  While some of the tips may relate to maintaining a home computer, the increased awareness is intended to help improve the organization’s overall cyber security posture. This is especially critical if employees access their work network from their home computer. Organizations have permission and are encouraged to brand and redistribute this newsletter in whole for educational, non-commercial purposes.

 



[1] http://amexspendsave.mediaroom.com/index.php?s=34135&item=22#assets_123

[2] http://www.emarketer.com/Article/Mobile-Devices-Boost-US-Holiday-Ecommerce-Sales-Growth/1010189

Posted in Feature stories, Web/TechComments Off

Warren Commission Report Available on GPO’s Federal Digital System

 

As Americans observe the 50th anniversary of President John F. Kennedy’s assassination, the U.S. Government Printing Office (GPO) has made the official, digital version of the Warren Commission Report available on the agency’s Federal Digital System (FDsys). The commission was created by President Lyndon Johnson and chaired by Chief Justice Earl Warren to investigate President Kennedy’s assassination. The 900-page report is available on FDsys, a one-stop site to authentic, published information on the three branches of the Federal Government. The report contains numerous photos, maps and diagrams from the scene in Dallas, TX. Georgetown University’s Lauinger Library, a Federal depository library, provided a copy of the report for digitization.

GPO produced the Warren Commission Report in 1964. The report is backed up by 26 volumes of hearings conducted by the Commission, which GPO also printed. Altogether, GPO’s work for the Commission resulted in nearly 235,000 copies of the report and nearly 5,600 sets of the hearings. All of these materials were made available to the public through distribution to Federal depository libraries nationwide and sales via GPO’s bookstores.

“The publication and dissemination of the Warren Commission Report is an example of how GPO has adapted to technological changes during the last half century,” said Public Printer Davita Vance-Cooks. “GPO’s presses first printed the report in 1964. Through partnerships with the Library of Congress and the Lauinger Library, GPO is now able to make the report available digitally on the anniversary of this tragic event.”

The post President Kennedy assassination audio tape recordings of conversations between various individuals in Washington, DC and Air Force One pilots and officials on board during the flight from Dallas to Andrews Air Force Base are also available on FDsys.

Link to Warren Commission Report: http://www.gpo.gov/fdsys/pkg/GPO-WARRENCOMMISSIONREPORT/pdf/GPO-WARRENCOMMISSIONREPORT.pdf

GPO’s Federal Digital System:  www.fdsys.gov

Link to post assassination audio tape recordings: http://www.gpo.gov/featured/Kennedy.htm

Posted in Feature stories, NewsComments Off

Oyster Books: Worth the Price of Admission?

Oyster is a new IOS app being hailed as the Netflix for books. It involves paying a monthly subscription fee of $9.95 per month to gain unlimited access to over 100,000 eBook titles.  The service is only available on an Apple iPhone or iPad.  An Android app may be released in the future, but no release date has been announced.

The service launched on September 5, 2013 to a start-up company based in New York. Currently there are 8 employees, none of which are librarians.

This new service has over 100,000 books from a small handful of publishers, HarperCollins, Houghton Mifflin Harcourt, Workman and Smashwords. They are adding new titles frequently.

Continue Reading

Posted in Feature stories, Guest PostsComments Off

Blog Archives