Through mid-August, our Middlebury and Monterey campuses have trial access to this database from Al-Manhal, the only provider of full-text searchable databases of scholarly and scientific publications from the Arab and Islamic world. Al-Manhal’s over 13,000 e-books and 300 peer-reviewed journals can be searched through the user-friendly platform linked above. The full-text content is also fully indexed in Summon. (Allow a few days after this post for all Al-Manhal content to be find-able in Summon by Middlebury and MIIS users.)
The ILLiad Web pages will be down at 10:00 am today while we upgrade the ILLiad software. The ILL web site should be inaccessible for only a short time, assuming all goes well with the update.
If anyone has problems after 2:00 pm please contact Rachel Manning at x5498 or firstname.lastname@example.org for assistance.
You may know that Middlebury uses what’s called a “purchase on demand” model for its largest collection of electronic books, EBL (Electronic Book Library). Under this model, we place the catalog records in Midcat but don’t pay anything for the ebook unless and until it’s actually used. Then, we pay a fraction of the list price for each of the first four uses, and on the fifth request, the title is automatically purchased. We have set up seamless access so there’s no delay when you want to use a title, but the library is billed for all uses longer than five minutes, downloads, copies, or printing. There’s a lot more to how the program works, but that’s the broad outline.
Unfortunately, the library has reached the end of its funding for this fiscal year, so we have had to suspend access to the resource until July 1. This is definitely a temporary suspension, and EBL will be back on July 1, along with any titles you may have used but can no longer reach. We’re very sorry for the inconvenience and hope it doesn’t put a serious crimp in your work. Please feel free to contact Douglas Black, Head of Collections Management, for more information.
Has an ebook you’ve previously used disappeared from our catalog? Never fear! We’ve had to make some cutbacks at the end of the fiscal year (lots and lots of requests for new material this year), but if you need to regain access to something that no longer appears, we may be able to get you back in. Just email us the title at email@example.com, and if it’s still available to us, we’ll get you back up and running with it.
You may not realize it, but you are a phishing target at school, at work, and at home. Phishing attacks are a type of computer attack that use malicious emails to trick targets into giving up sensitive information. Ultimately, you are the most effective way to detect and stop phishing scams. When viewing email messages, texts, or social media posts, use the following techniques to prevent your passwords, personal data, or private information from being stolen by a phishing attack.
- Verify the source. Check the sender’s email address to make sure it’s legitimate. Remember that the name of the sender is not the important part. The sender’s email address is what you are really looking for. If in doubt, forward your message to firstname.lastname@example.org.
- Read the entire message carefully. Phishing messages may include a formal salutation, overly-friendly tone, grammatical errors, urgent requests, or gimmicks that do not match the normal tone of the sender.
- Avoid clicking on erroneous links. Even if you know the sender, be cautious of links and attachments in messages. Don’t click on links that could direct you to a bad website. Hovering your mouse over a link should disclose the actual web address that the link is directing you too, which may be different from what is displayed in the message. Make sure this masked address is a site you want to visit.
- Verify the intent of all attachments with the sender before opening them. Even when you know a sender, you should never open an attachment unless have checked with the sender to verify the attachment was sent intentionally. Word and Excel documents can contain malicious macros which could harm your computer. Other files, such as zip files and PDF files, could download malware onto your system. Always verify the intent of attachments with the sender before you open them from an email.
- Verifying a message is always better than responding to a phish. If you ever receive a message that provides reason to pause, it is always better to forward the message to email@example.com or to send a separate email to the sender to verify its intent, before clicking a link or opening an attachment that could potentially impact the security of your computer..
- Change your passwords if you have fallen for a phish. If you think you have fallen for a phishing attack, change your password at go/password and then contact the helpdesk at x2200. It is also a good practice to change your personal passwords outside of the College.
Watch for phishing scams. Common phishing scams are published at sites such as http://IC3.gov , http://phishing.org ,https://www.irs.gov/uac/Report-Phishing. These resources will also allow you to report phishing attacks if you should fall victim outside of the College. Again, if you think you have fallen victim to a phishing attack, always start by changing your passwords.
A brown-bag lunch will be held on May 3 at 12:30 pm, in the Crest Room of the McCullough Student Center, to explore the subject of the library’s approval profile. Douglas Black, the library’s Head of Collections Management, will be presenting, with some sweets and coffee to augment your own lunch. He’ll give some history of the approval program in library acquisitions over the years and lead discussion on its role in the academic library collection of the 21st century.
For context, the library selects, acquires, and provides access to materials in many different ways:
- upon request by students, faculty, and staff
- automatic purchase of e-books and streaming media based on usage
- package deals on journal subscriptions and purchased journal archives (“backfiles”)
- one-time purchases of electronic databases, which often require annual maintenance fees
- and through automatic purchase via an “approval profile.”
Under the approval model, the library utilizes a library vendor (in our case, YBP Library Services) to purchase automatically books that meet certain criteria (e.g., subject, hardbound only, no workbooks, scholarly publishers only, within a certain price range, etc.). Middlebury typically purchases about 3,000 volumes/year this way, at an average annual cost of $97,000 in the last few years. We recently conducted a thorough analysis of the program’s effectiveness, finding that print books purchased through the approval profile are used much less than those specifically requested. The library believes some of that money could be spent more effectively and would like to gather input from members of the campus community on reshaping the profile.
A phishing email message was sent to @middlebury.edu mailboxes today with a subject line of “Update Announcements”. DO NOT RESPOND ON THIS MESSAGE!
The phishing email message is an attack designed to trick people into disclosing their username and password. Do NOT follow the instructions in the message, as it could lead to your Middlebury account being compromised.
If you were tricked by the email and responded, reset your network password immediately at go/password and then call the Helpdesk at x2200 for further assistance with your account and any possible concerns with your computer.
Here’s a sample of the phishing email message:
Dear middlebury.edu User.
Urgent Update Announcements.
Your middlebury.edu Account has been Sign in with a strange IP Address: And this indicate your mail account is been used for FRAUDULENT ACT, For these reasons, Our records indicate you are no longer our current/active user. Therefore, your account has been scheduled for deletion on this Month of APRIL, 2016. As part of this process, your account, files, email address messages etc, will be deleted from our Data Base.
To Retail Your Account.
You are required to reply with your valid ONLINE ACCESS for reactivation, to ensure Your account remains active and subscribed, Otherwise this account will be De-activated within the next 72 hours hence from now.
Name In Full: