Middlebury WordPress Sites Now Resize Images After Upload
We have Network Enabled the Resize Images After Upload plugin on the Middlebury WordPress sites (sites.middlebury.edu). This plugin does not affect any images you have previously uploaded to WordPress, however, it will resize new images larger than 1200×1200 pixels so that they have a maximum of those dimensions. Smaller images will not be affected.
We find that people often upload very large original images from devices like their phone, but then only show them at the width of a WordPress post, which is usually less than 800px. This causes them to run out of space on their site quickly for images they’re not showing at full size. This plugin will help keep your site under the default storage quota.
If your site needs to store very large images at their original dimensions, you can change the plugin settings by going to your WordPress site dashboard, clicking on Settings, clicking on Resize Image Upload and changing “Enable re-sizing” to “NO – do not resize images”. You can also change the maximum dimension settings.
Drupal Taxonomy Field Permissions Update
In several places on our sites we have fields that allow you to add tags to content and, if you enter a tag that doesn’t exist yet, your new tag will be added to the list of available tags. We have changed this behavior so that only people in the Communications groups at Middlebury and MIIS can add new tags to the “New MiddTags” taxonomy on the Middlebury Drupal site and the “MIIS Tags” taxonomy on the MIIS site.
If you are not in that group, you can still tag your content with one of the tags they’ve made available, but if you try to add a new one, you will get an error message. This does not affect the “MiddTags” taxonomy, which can still be used to add whatever tags you like. The “New MiddTags” vocabulary appears on the News and Story content types in the Middlebury Drupal site. The “MIIS Tags” taxonomy appears on the Story, Profile, Gallery, File Upload, and Ten Questions content types on the MIIS Drupal site.
Fixed an issue with the “title” attribute of Vimeo embeds in Drupal.
The style of the Site Editor Log On link in the center page region of our Drupal site was updated to ensure that the link is readable when you hover over it and aligned with its bullet point.
If you are viewing content that embeds an image that’s in a Drupal Recycle Bin as an editor, the link to the Recycle Bin is now clickable.
The WordPress admin bar, with the Log In link is now set to appear above most other theme elements, ensuring that the links are clickable on themes with transparent headers.
The “featurednews” element, which showed out-of-date blog posts, was removed from the Current Students page.
Link paths to the submission form on the Non-College Housing site are now fully qualified as relative paths weren’t working on one person’s local network.
When we first set up the Davis UWC Scholars site we created a user account for everyone at Middlebury, but we really only need a few such accounts for the site editors. Accounts that aren’t associated with any content on the site have been removed to ease that site’s migration to Drupal 8.
Table cell padding in our responsive theme for the Middlebury site was decreased by 5px for mobile.
Noticed that an ebook you’ve previously seen no longer appears available? There are several possible reasons, but the most likely one right now is that it was removed from our collection because of its cost. The library has many sources for ebooks, and the largest one is a company called Ebook Library (EBL). We have some 200,000 EBL records in our catalog, of which we own only .6%. The rest are there for access as needed, and we don’t pay for them until they’re actually used. This is a recently developed program called Demand-Driven Acquisitions (DDA). A vastly oversimplified description is that for the first four uses, the library pays a percentage of the full purchase price, and the fifth use triggers an automatic purchase. DDA lets us offer a tremendous range of ebooks at a small fraction of the full purchase price. Over the last four years, we’ve paid less than $500,000 for access to more than $8 million worth of books.
However, in the last two years, many publishers have decided they weren’t making enough money, so they dramatically hiked their fees for those first four uses, which has sent our library’s costs skyrocketing. We’ve shifted some funds from print purchasing to cover the additional ebook costs, but the only way to moderate expenditures for the longer term is to remove the most expensive titles, along with titles from the most expensive publishers.
What to do? If you’re not finding something you’d previously seen, or if you come across a catalog link that doesn’t work (removing the catalog records tends to lag behind the actual ebook access), email us right away, and we might be able to get it back. If we can’t, we’ll work on finding another way to lay hands on the material for you.
We are pleased to announce the recent addition of Tom Cutter to the staff of ITS. Tom will be taking on the responsibilities of an Application Administrator – Project Manager- Business Analyst within Enterprise Applications.
Tom brings over 30 years of diverse IT experience to ITS including 23+ years serving the Middlebury College community. Tom will be transferring from his current position in Facilities Services where he has been working as Information Systems Manager since 2009. Prior to working with Facilities Services Tom filled numerous roles within Information Technology Services and Library and Information Services from 1993-2009.
Tom’s transition to ITS will occur on Monday March 28th. Tom’s office will be located in Painter House with the Enterprise Application team.
Please join me in welcoming Tom to ITS. We are excited to have Tom’s rich experience on our team and we are looking forward to Tom’s contributions to our organization.
Attackers commonly use the macro functionality found in Microsoft Word and Excel to attack their victims. They attach malicious documents to an email. When opened, the files can lead to a virus infection on your computer. If you ever get a message with any of these attachments, particularly if you were not expecting it, do NOT open the attachment.
We have received reports for faked order confirmation and fake invoice emails this week that have been well crafted. The faked emails included malicious Microsoft Word documents bearing malware. A couple of examples are included below.
ALWAYS verify unexpected emails with the sender, particularly if they include attachments.
NEVER open attachments that you are not expecting without first verifying they are legitimate with the sender.
If you do open an attachment or file that you suspect is malicious unplug your network cable and contact the helpdesk at x2200 immediately.
The login page for CAS, our single-sign on service, now uses a responsive theme. This should make it easier for you log in to our services on your mobile device, particularly useful for responsive-enabled services like WordPress.
We have added the CommentPress plugin to WordPress, which allows line-by-line commenting on a document.
Similarly, we added the Scripto plugin for Omeka, which enabled crowd-sourced document transcription.
iFrames from SensusAccess can now be embedded in Drupal using the iframe shortcode.
When our front-end caching service, Varnish, is unable to fetch a new page from the Drupal servers and has no cached copy of the page it used to show a gray error page that said “503 Guru Meditation”. We’ve improved this so that it looks like a regular Middlebury page, has a human-readable error message, and a link to Web Helpdesk.
The MIIS Drupal site now uses the Institute’s shield for its favicon and the Middlebury and MIIS WordPress sites will now use their shield favicons by default. Individual sites can override this using the WordPress Customizer in the dashboard under Appearance.
We’ve improved the performance of the query that the Drupal Monster Menus module uses to apply permissions to multiple pages so that it’s optimized for our database software. This operation should run somewhat faster.
The homepages of our Drupal sites had titles ending with ” |” when the “site slogan” wasn’t set. These extra characters are now removed so that the title of the Middlebury site is now “Middlebury”, not “Middlebury |”.
We have resolved an error that was preventing some custom splash images from being used on MiddMedia embeds in WordPress.
The WRMC site was fetching and stores new cover art URLs on every page load, whether it already had them in its local database or not. It now only fetches cover art it doesn’t know about yet, reducing somewhat the 9,000,000,000 records stored previously.
The Pinterest sharing button on the MIIS Drupal site stories now uses the custom icon that matches the other share buttons.
Added 10px of padding between the main content region and the content sidebar on the MIIS site to ensure that the text doesn’t run directly against the sidebar, which now has a different background color.
Resolved a display issue with the Log In / Log Off links in the Course Hubs.
We have removed a number of Drupal modules from our sites that were not actively used. These include accessibility, addressfield, bundle_copy, cf, config_perms, content_taxonomy, data, elements, expire, feeds, feeds_oai_pmh, feeds_tamper, geocoder, geofield, geophp, git_deploy, jquery_countdown, kml, middlebury_mobile_detection, middlebury_subjectsplus, migrate, node_accessibility, node_accessibility_statistics, oauth, openlayers, phplot_api, proj4js, quail_api, rules, twitter, twitter_pull, and views_rss. Additionally, the zen theme was removed.
MIIS Language and Professional Programs are now searchable again in the Course Catalog.
Mobile devices have become one of the primary ways that we communicate and interact with each other. Powerful computers now fit in our pockets and on our wrists, allowing us to bank, shop, view our medical history, work remotely, and communicate from virtually anywhere. With all this convenience comes added risk, so here are some tips to help secure your devices and protect your personal information.
Password-protect your devices. Protect the data on your mobile device and enable encryption by enabling passwords, PINs, fingerprint scans, or other forms of authentication. On most current mobile operating systems you have the option to encrypt your data when you have a password turned on. Turn it on!
Secure those devices and backup data. Make sure that you can remotely lock and/or wipe each mobile device. That also means you should back up your data on each device in case you need to use the remote wipe function. Services such as iCloud, OneDrive, and Google offer device location, wipe and backup services.
Verify app permissions. Don’t forget to review which privacy-related permissions each application is requesting, before installing it. Be cautious of fake applications masquerading as legitimate programs by verifying that the application is from a reputable source, such as the Apple Apps Store, Microsoft’s Store, or Google’s Play Store. Occasionally, applications in the official stores can include malware. Read reviews and descriptions carefully. Only install applications that you need. Remove applications that you are no longer using.
Update operating systems. Security fixes or patches for mobile devices’ operating systems are often included in these updates. Just like patching a computer, iOS, Android, and Windows Mobile all need to be patched and kept current.
Be cautious of public Wi-Fi hotspots. When using your mobile device, watch for connections to public hotspots. Many mobile devices will automatically connect to hotspots and prioritize data transmission over Wi-Fi by default. Verify that your settings require manually selecting hotspots if possible. Working with sensitive data while connected to a public hotspot could lead to unintended data exposure. Always ensure that you are using a secure connection.
A new phishing attack is hitting the campus with a subject line of, “Your email id”. Delete this message if you see it. Do NOT click any links in this message. If you believe you have fallen for this fishing attack:
This malicious email would have looked similar to the message below.
Subject: Your email id
Your?mail Id has used 91% of its allowable storage space.?Once your account exceeds the allowable storage space you will be unable to receive any email.?Click?Resolve?to login to your account and resolve this issue.