AgendaIn this meeting we will look at the Video Streaming Service project. In-progress project presentations are open meetings, anyone may attend. Please feel free to share the invitation with anyone you feel is interested in the topics discussed.
On Wednesday, May 4th from 8-11 PM, the Writing Center at Middlebury College will join 75 other colleges and universities who sponsor a Write-In between the weeks of April 24-May 5. Supported by CTLR, the Writing Program and the Library, the Write-In fosters a writing community by creating a calm time and space in LIB 201, LIB 145 and the Harman Reading Room for students to write together. A Peer Writing Tutor and a Research Librarian will be on hand in LIB 201 to provide support. During the Write-In, students may work on academic papers, do personal writing, or brainstorm writing for fellowships, internships, and jobs. We’ll provide snacks and prizes. See Swarthmore’s International Write-In page for more information.
Why come to a Write-In?
Writing can be lonely, solitary work. Joining a group of other student writers can be motivating, productive, and calming.
How will this work?
- Come to Davis Family Library 201 any time between 8-11 PM. Stay from 15 minutes to 3 hours.
- Sign in to receive prizes
- If you want, we’ll give you a pen and a pad.
- Have some tasty snacks (Cheese and Crackers, Chicken Satay, Rice Krispie Treats, Brownies)
- Meet with a Peer Writing Tutor or Research Librarian.
- Stay in Lib 201, or go to one of our two reserved quiet spaces: Lib 145 and the Harman Reading Room.
What kind of writing should I do?
- Academic writing (Start your end of the semester papers this week!) (We’ll provide some research questions.)
- Personal writing (No idea where to start? We’ll provide some writing prompts.)
- Brainstorm writing for fellowships, internships, and job applications (We have a handy worksheet to get you started.)
Who is making this great event happen?
You may not realize it, but you are a phishing target at school, at work, and at home. Phishing attacks are a type of computer attack that use malicious emails to trick targets into giving up sensitive information. Ultimately, you are the most effective way to detect and stop phishing scams. When viewing email messages, texts, or social media posts, use the following techniques to prevent your passwords, personal data, or private information from being stolen by a phishing attack.
- Verify the source. Check the sender’s email address to make sure it’s legitimate. Remember that the name of the sender is not the important part. The sender’s email address is what you are really looking for. If in doubt, forward your message to firstname.lastname@example.org.
- Read the entire message carefully. Phishing messages may include a formal salutation, overly-friendly tone, grammatical errors, urgent requests, or gimmicks that do not match the normal tone of the sender.
- Avoid clicking on erroneous links. Even if you know the sender, be cautious of links and attachments in messages. Don’t click on links that could direct you to a bad website. Hovering your mouse over a link should disclose the actual web address that the link is directing you too, which may be different from what is displayed in the message. Make sure this masked address is a site you want to visit.
- Verify the intent of all attachments with the sender before opening them. Even when you know a sender, you should never open an attachment unless have checked with the sender to verify the attachment was sent intentionally. Word and Excel documents can contain malicious macros which could harm your computer. Other files, such as zip files and PDF files, could download malware onto your system. Always verify the intent of attachments with the sender before you open them from an email.
- Verifying a message is always better than responding to a phish. If you ever receive a message that provides reason to pause, it is always better to forward the message to email@example.com or to send a separate email to the sender to verify its intent, before clicking a link or opening an attachment that could potentially impact the security of your computer..
- Change your passwords if you have fallen for a phish. If you think you have fallen for a phishing attack, change your password at go/password and then contact the helpdesk at x2200. It is also a good practice to change your personal passwords outside of the College.
Watch for phishing scams. Common phishing scams are published at sites such as http://IC3.gov , http://phishing.org ,https://www.irs.gov/uac/Report-Phishing. These resources will also allow you to report phishing attacks if you should fall victim outside of the College. Again, if you think you have fallen victim to a phishing attack, always start by changing your passwords.
A brown-bag lunch will be held on May 3 at 12:30 pm, in the Crest Room of the McCullough Student Center, to explore the subject of the library’s approval profile. Douglas Black, the library’s Head of Collections Management, will be presenting, with some sweets and coffee to augment your own lunch. He’ll give some history of the approval program in library acquisitions over the years and lead discussion on its role in the academic library collection of the 21st century.
For context, the library selects, acquires, and provides access to materials in many different ways:
- upon request by students, faculty, and staff
- automatic purchase of e-books and streaming media based on usage
- package deals on journal subscriptions and purchased journal archives (“backfiles”)
- one-time purchases of electronic databases, which often require annual maintenance fees
- and through automatic purchase via an “approval profile.”
Under the approval model, the library utilizes a library vendor (in our case, YBP Library Services) to purchase automatically books that meet certain criteria (e.g., subject, hardbound only, no workbooks, scholarly publishers only, within a certain price range, etc.). Middlebury typically purchases about 3,000 volumes/year this way, at an average annual cost of $97,000 in the last few years. We recently conducted a thorough analysis of the program’s effectiveness, finding that print books purchased through the approval profile are used much less than those specifically requested. The library believes some of that money could be spent more effectively and would like to gather input from members of the campus community on reshaping the profile.
The new ACT Team process includes Extended Team meetings. These closed meetings allow the Team to work with expert staff and focus on evaluating solutions that inform recommendations.
The next two meetings will be discussions with vendors that can help meet the needs for the Video Streaming Service project.
The new ACT Team process includes in-progress project presentations. These presentations are meant to inform the community about how things are going, what has been done and what still needs to be done, what is going well and what are the challenges.
In this meeting we will have two presentations:
- RStudio Server http://act.middcreate.net/site/projects/rstudio-server/
- Academic Cyberinfrastructure Inventory http://act.middcreate.net/site/projects/academic-cyberinfrastructure-inventory/
In-progress project presentations are open meetings, anyone may attend.
Albert Kim and David Guertin
- David creates accounts for faculty and students.
- In the desktop version, each student needs to install multiple packages; with RStudio Server, a faculty or an admin installs all packages in one location and students don’t need to.
- R Markdown: combines text, R code, graphics are embedded in one document. Standardized and easier to grade.
- Some upper-level courses require students to download the desktop version of RStudio, it is important for them to understand this environment. The server version is most useful for entry-level courses and limited use within a course as it reduces the time needed to set up the software.
- VPN may be necessary for MIIS to access RStudio, this should not be the case. David will work with Chris to see why this may be happening.
- To go live, we would need to set up with Active Directory. Do we want people to add RStudio via the Course Hub using a self-service model, or do we them to contact AT? David and Joe will communicate about this.
- Shiny Server Pro: create interactive apps and graphics without needing any tech knowledge. Graphics are interactive, changing the variables changes the graphic display in real time.
- You can host apps on free shinyapps.io or you can install Shiny Server Pro and serve on your own servers. Free for academic institutions with proof of syllabus. The Middlebury-hosted service is much more responsive.
- We would like to share these services with other faculty. Albert and Bill will communicate and set up a demonstration, possibly through CTLR programming.
Academic Cyberinfrastructure Inventory
- The Project Team is learning a lot about our environment through working on this project.
- Q: Why does the inventory include services like Facebook, Twitter, Scrivener, etc.?
- We know these services are being used for academic work.
- For comparison with similar services.
- To track the continuum of moving from service to service over time.
- A viewable/usable version of the inventory should include a filter for Middlebury-supported services.
- Once the Project Team has completed the categorization phase, the project will be shepherded by the ACTT working with ITS to deploy the information in a web-accessible format. It will include search functions for faculty, staff and students, with some protected information behind authentication for staff that need to track dependencies, for instance.
We will be starting the new ACTT process with a Kick-Off meeting. This is an open, non-mandatory meeting for anyone who is interested in learning about the Academic Cyberinfrastructure Transformation Team to attend. We will introduce the new team members, structure, and thoughts on how the Team activities will be evaluated.
This is an open meeting, please share with anyone who is interested in learning about the ACTT
- Mission: “Our mission is to evaluate and recommend technology services and innovations for teach, learning and research.”
- Read “Horizon Report from NMC”, http://www.nmc.org/nmc-horizon/
- Joe is teaching a course on “Design Thinking” this semester. Design Thinking includes an “Empathy Phase”
- Q (Melissa/CNS). How will information and requests trickle up?
- “I have many day-to-day projects where I would love to have a license that exists on the Midd campus, but not the MIIS campus, or I would like to build a server with 1TB of storage to host a web site”
- “My research center, CNS, is becoming such a large consumer of storage and bandwidth”
- “On a request from Laurie Patton, I am researching a cloud services that could host our information”.
- Answer – Joe – Anyone who wants to make a request for technology or technology services for academic use may approach the team. Happy to be an entry point for requests that may go to ITS or other groups.
- Jim – we have to account for the resource requests during the budget request process.
- Q (Melissa/CNS). We are a collection of researchers that become PI on large grants, we need to inform others of the implications on the projects that we are running… So we can write it into
- We are giving money to non-Middlebury developers to do things that could be done inside Middlebury
- Jim: not necessarily opposed to using outside resources…
- Q (Jim): May be Amy McGill can weigh in on the MIIS budget process and how funding decisions are made.
- Amy McGill
- MIIS Research Centers are funded with base productivity requirements
- Campus community infrastructure is for day-to-day use
- Research Centers seek their own funding for larger projects that need additional resources, they do typically provide for initial as well as on-going maintenance costs.
- Amy McGill
- Q. ACTT contribution to the Strategic Planning Process?
- Q (Melissa/CNS). Is it too early to start making suggestions for agenda items?
- Q (Melissa/CNS). I would love to explore the ability to share licenses across campuses. We pay out of grant licenses for Tableau, for image processing software… I drool over some of the licenses that the Geology department has. This is not a simple request, but I would love to tackle it as a subject.
- A (Zach/ITS-SR): Let’s talk; more productive if we can get an idea of the specific titles you’re interested in, so we can check what licensing models are available.
- Q (Melissa/CNS). I would love to talk about our data storage and access to bandwidth. Because we use satellite images, large data sets, we are becoming something of a hog on the MIIS systems. I would like to open a discussion on how we can meet CNS’s research technology needs including storage, bandwidth, and some security issues.
- Joe: Has anyone done a “needs assessment for the department”?
- We don’t have a department, we are a research center within a larger campus.
- I have done a casual needs assessment. 13 TB of storage, external drives, google drives, drop boxes… Need access across three offices.
- Jim: ITS can help with a needs assessment and identify appropriate technology solutions, perhaps on campus or in the cloud, ideally consistent with other larger IT initiatives for Middlebury and work with CSN to identify, implement solutions. We did this for the Middlebury DC office a couple of years ago that included the CSN operation there for example.
- Joe: Has anyone done a “needs assessment for the department”?
- Q (Bob/MIIS). Working toward equitable cyber infrastructure across VT and Monterey campuses seems like a an appropriate activity for the Team.
Joe to build form for collecting evaluation requests.