Monday, October 16, 2017
Are you interested in trademarks? The linguistic podcast, Talk the Talk, has an episode on trademarks which become general terms for the products they represent. The discussion on “genericide” begins at the 10:30 minute mark.
Wednesday, October 11, 2017
This is a worth reading story about a Tlingit Killer Whale Hat and it is replica. I don't want to give away any of the details, but it is interesting to read about the use of the replica. This video provide use visuals about the digitization process.
Monday, October 09, 2017
On Sept. 29, the Acting Register of Copyrights Karyn Temple Claggett released an updated version of the Compendium of U.S. Copyright Office Practices, Third Edition. The Compendium is the administrative manual of the Register of Copyrights concerning the mandate and statutory duties of the Copyright Office under Title 17 of the United States Code. Quoting the Compendium:
It provides instruction to agency staff regarding their statutory duties and provides expert guidance to copyright applicants, practitioners, scholars, the courts, and members of the general public regarding institutional practices and related principles of law.21 sections of the Compendium were revised. Information on those revisions is in the Federal Register. A complete list of all sections that have been added, amended, revised, or removed is posted on the Office’s website. In addition to the revisions, the Compendium has been reformatted for readability and access to linked information.
Monday, October 02, 2017
|Coffee and Beignets|
- Oct. 17 - Attending "NDP at 3: Envisioning the next 3 years of the National Digital Platform" hosted by IMLS, Arlington, VA. (Part of the IMLS Focus Series.)
Description: As IMLS concludes its third year of NDP funding through the National Leadership Grants for Libraries Program and the Laura Bush 21st Century Librarian Program, we will revisit what has been accomplished so far and explore future directions for this work. Meeting attendees will include a broad range of representatives of the country’s libraries, museums, and affiliated organizations. We hope to capture input that will help us move forward together, and to highlight areas where federal investment can most effectively support broad access to digital materials for the American people. We aim to identify concrete insights, including priority areas for funding, topics for future research, opportunities for collaboration, and other tangible outcomes.
- Nov. 9-11, New York Library Association Annual Conference, Saratoga Springs, NY
- Nov. 10, 11:00 a.m.-12:00 p.m. - Presenting "Recruit, Retain, Repeat...Again" with Barbara Stripling.
Description: The number of school librarians available is not keeping pace with the need. Enrollment in graduate programs leading to school media certification has substantially declined over the last decade, but school library vacancies are abundant throughout NYS. During NYLA 2016, participants noted many barriers to recruiting prospective school librarians and suggested courses of action. This session will provide an update on efforts since then. Participants will brainstorm additional ideas that can be used to recruit school librarians. Participants will also discuss possible advocacy efforts which might have a positive impact on the pathways to certification.
- Nov. 11, 9:30-10:30 a.m. - On a Women's Leadership Panel to discuss "Nevertheless, She Persisted" with Lauren Comito, Carol Anne Germain, Mary Fellows, and Sandra Michele Echols.
Description: A forum for women in all areas of librarianship to discuss their experiences and challenges in the profession, and how to empower the next generation of female library leaders.
- Nov. 15, 12:00 p.m. ET - Presenting "Getting the most out of your MSLIS program" (webinar) for the Syracuse University iSchool.
Description: Congratulations, you are now in a Master’s of Library and Information Science program and working quickly towards becoming a professional librarian. The time you are spending in your MSLIS/MLIS/MLS program will go by quickly. What do you need to be doing to ensure that you get the most from it? This one-hour webinar will give you actions to take to position yourself for success in your program and afterward as an LIS professional. By the end of the webinar, you will have a series of tried and true steps on which to embark.
- Dec. 6, 2:00 p.m. ET - Co-presenter of “Oops: Embracing Training Failures and Learning From Them” (webinar) for Southwest Florida Library Network. I'm pleased to be presenting with T is for Training colleagues Maurice Coleman and Paul Signorelli.
Description: While every one of us who serves as a trainer-teacher-learner in our library settings dreads that moment when something goes wrong, we also know that what goes wrong often leads to something tremendously right: effective learning. In fact, we realize that failure is an integral part of the learning process. In this highly-interactive webinar focusing on the importance of “failure” in learning, the panelists will discuss real-world common and uncommon training mishaps and pitfalls; encourage participants to focus on what has come out of their own failures and those of their learners; and help participants walk away with concrete strategies to implement as they prepare their next learning sessions.
Saturday, September 30, 2017
This fall, the SU iSchool has begun to offer Graduate Immersion Milestone Seminars. The first one is on the topic of "You and the Internet of Things." Graduate students across the iSchool's graduate programs are in attendance, including MSLIS students.
From my perspective, the the pros, cons and pitfalls of Internet of Things (IoT) is not a topic that is widely discussed in library circles. Yes, we recognize that devices are capturing information, but:
- Do we think deeply about what data is being captured by or in the library?
- Have we thought about how the Internet of Things can make libraries better?
- Have we thought about how the collected data is being stored and secured in the cloud?
- Have we thought about what could happen if our data is hacked?
The speakers this morning were not focused on libraries, but that doesn't mean we can't apply their topics to our library environment. Below you'll see I've inserted some "library thinking" into my notes. Please add comments if you have information to add or questions to ask.
Megan Snyder - Internet of Things and Cyber Security
"Things" can live long, software does not.
- New vulnerabilities are addressed with new software
- While you might replace your phone, for example, every two years, it will receive several software updates during that period. Of course, people might not apply all of the updates, which could leave a security gap.
- Imagine people being able to hack into a car or other things, which could be used to do harm
Things with sensitive data are connected
- While you immediately think of banks, there are low tech devices which can capture sensitive data
- Securing sensitive data
- proactive ethical data stewardship
- end to end security processes
- innovate with new technologies
Things are making decisions
- Think about smart locks, smart homes, and smart grids
- need built-in monitoring and then identifying of risks
- There have been attacks on infrastructure worldwide, which was done by attacking the software
The future of securing IoT
- Both customers and businesses need to focus on this
- Need to look at the entire supply chain
While Snyder did not talk about libraries, consider that libraries are using software which is stored in the cloud or software as a service (SaaS). That software could be storing information on library users/patrons, including private information such as books borrowed. A security breach could make that information public. Or a security breach could be used o alter the user data or alter the information on the library's collection.
Is the personal data stored in libraries a vulnerability that needs more attention?
- Imagine a child changing his/her personal information so the person can check out adult books.
- Imagine someone hacking an library system and wiping out fines.
- Imagine a library's collection information being altered or deleted.
- Imagine the software being delivered as SaaS being altered at the source, rendering all of its implementations useless.
Snyder noted that the U.S. Is behind in passing laws which would cause non-for-profits to pay attention to their cyber security concerns.
Are the implications that we as consumers are not aware of, in terms of cyber security?
IoT is not a single technology, it is a combination of sensors, devices, networks, and software that work together to unlock valuable, actionable data. If you are interacting with any part of that ecosystem, you should be concerned with cyber security.
Garg asked if people use Dropbox and then asked if people know where the data is actually stored. We use Dropbox to store a variety of different data, but we have no idea where that data really is and how it is being secured.
Data in the cloud can be used by the cloud service to learn about you, and then use that data, for example, to send you advertisements.
IoT dilemma - the information collected by sensors can be used for services that benefit and simplify people's lives, or it can be used for data mining and other use cases that raise security and privacy concerns.
Imagine the habits that your sensors know about you.
Garg noted that a sensor may only collect data, but then transmit the data to the cloud where it can be analyzed, shared, used, and abused. Once the data is in the cloud, you have no idea what third parties that data might be shared with.
Although we do anonymize data, data gathered on a person from different sources may contain enough information to de-anonymize all of the data.
Can we collect less data? Is there a minimal amount of data that is needed for a specific function?
While Garg talked about sensors, it occurred to me that video cameras in our cities and buildings are collecting our images. Software can be used to identify people in those videos and it can be done automatically. Software can also then track where people are traveling and when. Imagine combining that information with sensor data, which could disclose more about your state/health when you were traveling through and between locations.
Both Garg and Snyder noted that the privacy rules in the EU are better than in the U.S. The EU rules do affect U.S. residents because of U.S. companies doing business in Europe and needing to comply with EU policies.
In the U.S., state and federal laws are not harmonized on what is personal data. We need to harmonize our laws in the U.S. and then harmonize our laws with the EU.
Next steps for organization in IoT ecosystem include:
- privacy by design
- privacy notice and transparency
Garg ended by talking about the right to be forgotten, which has been written into EU law.
Kim Rose - How hospitals are embracing IoT
Rose talked about privacy legislation related to healthcare, such as the HITECH Act.
Medical devices inside the hospital
- vital sign monitor
- surgical procedures
- intelligent bed
- medical imaging
Outside the hospital
- home sleep study
- CPAP machine
- cardiac monitor
- diabetes blood sugar monitor
IoT has changed how medicine is being practiced.
Rose didn't connect her talk to libraries, but I can imagine a patient opting in to having their medical data shared with the hospital's medical library. That would allow the library to deliver information to a patient which relates to the person's reason for being in the hospitals. Yes, that would raise huge privacy concerns. Would the benefits outweigh the risks?
The talks this morning have made we wonder about cyber security, the Internet of Things (IoT), and libraries. Is this an area that we're really talking about? Who are the library leaders in this space? What conferences are talking about this?