Category Archives: Post for MiddPoints

Take the library with you

Take the library with youYou CAN use library databases from off campus! Just start at the library website:  go.middlebury.edu/lib. When you’re off campus, links on library web pages like Research Guides, Summon and the Journals list will ask you to log in with Midd credentials.

Questions? Ask a librarian: go.middlebury.edu/askus.

ACTT In-Progress Project Presentation for GoogleApps for Edu and OneDrive

Tuesday, May 17th from 3-4pm LIB 105A or Polycom 712833 The new ACT Team process includes in-progress project presentations. These presentations are meant to inform the community about how things are going, what has been done and what still needs to be done, what is going well and what are the challenges.

Agenda

In this meeting we will look at the GoogleApps for Edu and OneDrive projects. In-progress project presentations are open meetings, anyone may attend. Please feel free to share the invitation with anyone you feel is interested in the topics discussed.

ACTT In-Progress Project Presentation Video Streaming Service

Tuesday, May 10th from 3-4pm LIB 105A or Polycom 712833 The new ACT Team process includes in-progress project presentations. These presentations are meant to inform the community about how things are going, what has been done and what still needs to be done, what is going well and what are the challenges.

Agenda

In this meeting we will look at the Video Streaming Service project. In-progress project presentations are open meetings, anyone may attend. Please feel free to share the invitation with anyone you feel is interested in the topics discussed.  

Join us at our first Write-In

Middlebury Write-In

On Wednesday, May 4th from 8-11 PM, the Writing Center at Middlebury College will join 75 other colleges and universities who sponsor a Write-In between the weeks of April 24-May 5. Supported by CTLR, the Writing Program and the Library, the Write-In fosters a writing community by creating a calm time and space in LIB 201, LIB 145 and the Harman Reading Room for students to write together. A Peer Writing Tutor and a Research Librarian will be on hand in LIB 201 to provide support. During the Write-In, students may work on academic papers, do personal writing, or brainstorm writing for fellowships, internships, and jobs. We’ll provide snacks and prizes. See Swarthmore’s International Write-In page for more information.

Why come to a Write-In?

Writing can be lonely, solitary work. Joining a group of other student writers can be motivating, productive, and calming.

How will this work?

  • Come to Davis Family Library 201 any time between 8-11 PM. Stay from 15 minutes to 3 hours.
  • Sign in to receive prizes
  • If you want, we’ll give you a pen and a pad.
  • Have some tasty snacks (Cheese and Crackers, Chicken Satay, Rice Krispie Treats, Brownies)
  • Meet with a Peer Writing Tutor or Research Librarian.
  • Stay in Lib 201, or go to one of our two reserved quiet spaces: Lib 145 and the Harman Reading Room.

What kind of writing should I do?

  • Academic writing (Start your end of the semester papers this week!) (We’ll provide some research questions.)
  • Personal writing (No idea where to start? We’ll provide some writing prompts.)
  • Brainstorm writing for fellowships, internships, and job applications (We have a handy worksheet to get you started.)

Who is making this great event happen?

@MiddInfoSec: Don’t Get Hooked

You may not realize it, but you are a phishing target at school, at work, and at home. Phishing attacks are a type of computer attack that use malicious emails to trick targets into giving up sensitive information. Ultimately, you are the most effective way to detect and stop phishing scams. When viewing email messages, texts, or social media posts, use the following techniques to prevent your passwords, personal data, or private information from being stolen by a phishing attack.

    • Verify the source. Check the sender’s email address to make sure it’s legitimate. Remember that the name of the sender is not the important part. The sender’s email address is what you are really looking for. If in doubt, forward your message to phishing@middlebury.edu.
    • Read the entire message carefully. Phishing messages may include a formal salutation, overly-friendly tone, grammatical errors, urgent requests, or gimmicks that do not match the normal tone of the sender.
    • Avoid clicking on erroneous links. Even if you know the sender, be cautious of links and attachments in messages. Don’t click on links that could direct you to a bad website. Hovering your mouse over a link should disclose the actual web address that the link is directing you too, which may be different from what is displayed in the message. Make sure this masked address is a site you want to visit.
    • Verify the intent of all attachments with the sender before opening them. Even when you know a sender, you should never open an attachment unless have checked with the sender to verify the attachment was sent intentionally. Word and Excel documents can contain malicious macros which could harm your computer. Other files, such as zip files and PDF files, could download malware onto your system. Always verify the intent of attachments with the sender before you open them from an email.
  • Verifying a message is always better than responding to a phish. If you ever receive a message that provides reason to pause, it is always better to forward the message to phishing@middlebury.edu or to send a separate email to the sender to verify its intent, before clicking a link or opening an attachment that could potentially impact the security of your computer..
  • Change your passwords if you have fallen for a phish. If you think you have fallen for a phishing attack, change your password at go/password and then contact the helpdesk at x2200. It is also a good practice to change your personal passwords outside of the College.

 

Watch for phishing scams. Common phishing scams are published at sites such as http://IC3.gov , http://phishing.org ,https://www.irs.gov/uac/Report-Phishing. These resources will also allow you to report phishing attacks if you should fall victim outside of the College. Again, if you think you have fallen victim to a phishing attack, always start by changing your passwords.

What’s an Approval Profile, and Why Does the Library Want to Change Ours?

A brown-bag lunch will be held on May 3 at 12:30 pm, in the Crest Room of the McCullough Student Center, to explore the subject of the library’s approval profile. Douglas Black, the library’s Head of Collections Management, will be presenting, with some sweets and coffee to augment your own lunch. He’ll give some history of the approval program in library acquisitions over the years and lead discussion on its role in the academic library collection of the 21st century.

For context, the library selects, acquires, and provides access to materials in many different ways:

  • upon request by students, faculty, and staff
  • automatic purchase of e-books and streaming media based on usage
  • subscriptions
  • package deals on journal subscriptions and purchased journal archives (“backfiles”)
  • one-time purchases of electronic databases, which often require annual maintenance fees
  • gifts/donations
  • and through automatic purchase via an “approval profile.”

Under the approval model, the library utilizes a library vendor (in our case, YBP Library Services) to purchase automatically books that meet certain criteria (e.g., subject, hardbound only, no workbooks, scholarly publishers only, within a certain price range, etc.).  Middlebury typically purchases about 3,000 volumes/year this way, at an average annual cost of $97,000 in the last few years. We recently conducted a thorough analysis of the program’s effectiveness, finding that print books purchased through the approval profile are used much less than those specifically requested. The library believes some of that money could be spent more effectively and would like to gather input from members of the campus community on reshaping the profile.

Please feel welcome to contact your liaison or Douglas Black (dblack@middlebury.edu or x3635) with any questions (whether or not you can attend the meeting), or comment here in the blog.

ACTT Extended Team Meeting Agendas for April 19th and 26th, 2016

The new ACT Team process includes Extended Team meetings. These closed meetings allow the Team to work with expert staff and focus on evaluating solutions that inform recommendations.

Agenda

The next two meetings will be discussions with vendors that can help meet the needs for the Video Streaming Service project.

  • Tuesday, April 19th, 2016 – Panopto
  • Tuesday, April 26th, 2016 – Ensemble

Notes for In-Progress Projects April 12, 2016

The new ACT Team process includes in-progress project presentations. These presentations are meant to inform the community about how things are going, what has been done and what still needs to be done, what is going well and what are the challenges.

Agenda

In this meeting we will have two presentations:

In-progress project presentations are open meetings, anyone may attend.

RStudio

Albert Kim and David Guertin

  • http://rstudio.middlebury.edu
  • David creates accounts for faculty and students.
  • In the desktop version, each student needs to install multiple packages; with RStudio Server, a faculty or an admin installs all packages in one location and students don’t need to.
  • R Markdown: combines text, R code, graphics are embedded in one document. Standardized and easier to grade.
  • Some upper-level courses require students to download the desktop version of RStudio, it is important for them to understand this environment. The server version is most useful for entry-level courses and limited use within a course as it reduces the time needed to set up the software.
  • VPN may be necessary for MIIS to access RStudio, this should not be the case. David will work with Chris to see why this may be happening.
  • To go live, we would need to set up with Active Directory. Do we want people to add RStudio via the Course Hub using a self-service model, or do we them to contact AT? David and Joe will communicate about this.
  • Shiny Server Pro: create interactive apps and graphics without needing any tech knowledge. Graphics are interactive, changing the variables changes the graphic display in real time.
  • You can host apps on free shinyapps.io or you can install Shiny Server Pro and serve on your own servers. Free for academic institutions with proof of syllabus. The Middlebury-hosted service is much more responsive.
  • We would like to share these services with other faculty. Albert and Bill will communicate and set up a demonstration, possibly through CTLR programming.

 

Academic Cyberinfrastructure Inventory

 

  • The Project Team is learning a lot about our environment through working on this project.
  • Q: Why does the inventory include services like Facebook, Twitter, Scrivener, etc.?
    • We know these services are being used for academic work.
    • For comparison with similar services.
    • To track the continuum of moving from service to service over time.
  • A viewable/usable version of the inventory should include a filter for Middlebury-supported services.
  • Once the Project Team has completed the categorization phase, the project will be shepherded by the ACTT working with ITS to deploy the information in a web-accessible format. It will include search functions for faculty, staff and students, with some protected information behind authentication for staff that need to track dependencies, for instance.