The ILLiad Web pages will be down at 10:00 am today while we upgrade the ILLiad software. The ILL web site should be inaccessible for only a short time, assuming all goes well with the update.
If anyone has problems after 2:00 pm please contact Rachel Manning at x5498 or firstname.lastname@example.org for assistance.
Photos uploaded to the Directory will now be added to the Facility Commander ID card database after they’ve been approved, allowing for an easy, automated process for allowing students and others to submit photos for their ID card. Additionally, staff who approve the photos can send a custom approve or decline message to the individual. The strict 200×200 pixel dimension requirement on new photos has been removed, but they will be still be displayed in a 200×200 square on the directory.
Fixes and Tweaks
- We resolved a technical issue on the back-end of the Course Catalog that prevented the nightly sync from Banner running as scheduled due to a database version mismatch.
- Items in the Recycle Bin will no longer be displayed in the rotating homepage view of stories on the David Fellows for Peace website.
Please welcome John French to ITS. John will be working part time for the next year (11 hrs per week), usually in the evenings to provide emergency tech support for academic events happening after hours (e.g. screenings.) John also has experience in video production so he will assist with that and other misc tasks, as needed.
One feature that has been requested with increasing frequency of late is the ability to log in to Windows laptops over a wireless connection, i.e. without plugging into a network cable the first time. We have been piloting a way to do this with our Circulation loaners and a wireless lab in MBH for several months now with good results.
We will be bringing this feature to standard College-owned Windows 7 laptops starting this Monday, June 6th. After the change takes effect, you may notice the words “Windows will try to connect to MiddleburyCollege” underneath the normal login fields. What this means is that Windows will first use the credentials supplied to connect to the wireless network, and if successful, will then authenticate over the network, allowing you to login with your current username and password, whether or not you have used that device previously.
If the wireless connection should fail for some reason, for example because you are too far away from an access point for a good signal, Windows will check for cached credentials from a previous login as normal.
Please e-mail email@example.com with any questions about this change.
Information Technology Services
You may know that Middlebury uses what’s called a “purchase on demand” model for its largest collection of electronic books, EBL (Electronic Book Library). Under this model, we place the catalog records in Midcat but don’t pay anything for the ebook unless and until it’s actually used. Then, we pay a fraction of the list price for each of the first four uses, and on the fifth request, the title is automatically purchased. We have set up seamless access so there’s no delay when you want to use a title, but the library is billed for all uses longer than five minutes, downloads, copies, or printing. There’s a lot more to how the program works, but that’s the broad outline.
Unfortunately, the library has reached the end of its funding for this fiscal year, so we have had to suspend access to the resource until July 1. This is definitely a temporary suspension, and EBL will be back on July 1, along with any titles you may have used but can no longer reach. We’re very sorry for the inconvenience and hope it doesn’t put a serious crimp in your work. Please feel free to contact Douglas Black, Head of Collections Management, for more information.
To help raise awareness about community efforts to prevent significant security issues, Middlebury Information Security has launched a ‘Security Scout of the Month’ award.
Highlighting the valuable contributions of community security scouts in an @MiddInfoSec blog post and on Middlebury’s Information Security web site is a great way to show how a cautious and thoughtful approach to computing can protect the College community from cyber risks.
As an example, this past month, an attack against Middlebury’s Banner system was avoided thanks to the contributions of an astute member of our community, Justin Allen, who spotted a targeted phishing attack and raised the awareness around this malicious event.
As Justin Allen describes it:
“I received an email that started out dear account owner which usually gets my attention and as I read down thru the email I noticed that it said I had signed up for a paperless W-2 which I did not and it wanted me to logon to view it. After that I noticed a couple of another things that did not make sense for my Middlebury account one was the sender of the email which wasn’t from the college at all and we all have been told time and time again if the address doesn’t end with middlebury.edu it’s not from the college. Below is a copy of what was sent to me.”
This astute awareness is why Justin is this month’s ‘Security Scout of the Month’.
We are excited to celebrate the hard work and security conscious efforts of our community. Please watch for the next ‘Security Scout of the Month’ and help us recognize these efforts.
If you would like to recognize an individual for their information security contributions or would like to raise an information security concern, please contact firstname.lastname@example.org.