Tag Archives: Post for MiddPoints

Take the library with you

Take the library with youYou CAN use library databases from off campus! Just start at the library website:  go.middlebury.edu/lib. When you’re off campus, links on library web pages like Research Guides, Summon and the Journals list will ask you to log in with Midd credentials.

Questions? Ask a librarian: go.middlebury.edu/askus.

ACTT In-Progress Project Presentation for GoogleApps for Edu and OneDrive

Tuesday, May 17th from 3-4pm LIB 105A or Polycom 712833 The new ACT Team process includes in-progress project presentations. These presentations are meant to inform the community about how things are going, what has been done and what still needs to be done, what is going well and what are the challenges.


In this meeting we will look at the GoogleApps for Edu and OneDrive projects. In-progress project presentations are open meetings, anyone may attend. Please feel free to share the invitation with anyone you feel is interested in the topics discussed.

ACTT In-Progress Project Presentation Video Streaming Service

Tuesday, May 10th from 3-4pm LIB 105A or Polycom 712833 The new ACT Team process includes in-progress project presentations. These presentations are meant to inform the community about how things are going, what has been done and what still needs to be done, what is going well and what are the challenges.


In this meeting we will look at the Video Streaming Service project. In-progress project presentations are open meetings, anyone may attend. Please feel free to share the invitation with anyone you feel is interested in the topics discussed.  

Join us at our first Write-In

On Wednesday, May 4th from 8-11 PM, the Writing Center at Middlebury College will join 75 other colleges and universities who sponsor a Write-In between the weeks of April 24-May 5. Supported by CTLR, the Writing Program and the Library, the Write-In fosters a writing community by creating a calm time and space in LIB 201, LIB 145 and the Harman Reading Room for students to write together. A Peer Writing Tutor and a Research Librarian will be on hand in LIB 201 to provide support. During the Write-In, students may work on academic papers, do personal writing, or brainstorm writing for fellowships, internships, and jobs. We’ll provide snacks and prizes. See Swarthmore’s International Write-In page for more information.

Why come to a Write-In?

Writing can be lonely, solitary work. Joining a group of other student writers can be motivating, productive, and calming.

How will this work?

  • Come to Davis Family Library 201 any time between 8-11 PM. Stay from 15 minutes to 3 hours.
  • Sign in to receive prizes
  • If you want, we’ll give you a pen and a pad.
  • Have some tasty snacks (Cheese and Crackers, Chicken Satay, Rice Krispie Treats, Brownies)
  • Meet with a Peer Writing Tutor or Research Librarian.
  • Stay in Lib 201, or go to one of our two reserved quiet spaces: Lib 145 and the Harman Reading Room.

What kind of writing should I do?

  • Academic writing (Start your end of the semester papers this week!) (We’ll provide some research questions.)
  • Personal writing (No idea where to start? We’ll provide some writing prompts.)
  • Brainstorm writing for fellowships, internships, and job applications (We have a handy worksheet to get you started.)

Who is making this great event happen?

@MiddInfoSec: Don’t Get Hooked

You may not realize it, but you are a phishing target at school, at work, and at home. Phishing attacks are a type of computer attack that use malicious emails to trick targets into giving up sensitive information. Ultimately, you are the most effective way to detect and stop phishing scams. When viewing email messages, texts, or social media posts, use the following techniques to prevent your passwords, personal data, or private information from being stolen by a phishing attack.

    • Verify the source. Check the sender’s email address to make sure it’s legitimate. Remember that the name of the sender is not the important part. The sender’s email address is what you are really looking for. If in doubt, forward your message to phishing@middlebury.edu.
    • Read the entire message carefully. Phishing messages may include a formal salutation, overly-friendly tone, grammatical errors, urgent requests, or gimmicks that do not match the normal tone of the sender.
    • Avoid clicking on erroneous links. Even if you know the sender, be cautious of links and attachments in messages. Don’t click on links that could direct you to a bad website. Hovering your mouse over a link should disclose the actual web address that the link is directing you too, which may be different from what is displayed in the message. Make sure this masked address is a site you want to visit.
    • Verify the intent of all attachments with the sender before opening them. Even when you know a sender, you should never open an attachment unless have checked with the sender to verify the attachment was sent intentionally. Word and Excel documents can contain malicious macros which could harm your computer. Other files, such as zip files and PDF files, could download malware onto your system. Always verify the intent of attachments with the sender before you open them from an email.
  • Verifying a message is always better than responding to a phish. If you ever receive a message that provides reason to pause, it is always better to forward the message to phishing@middlebury.edu or to send a separate email to the sender to verify its intent, before clicking a link or opening an attachment that could potentially impact the security of your computer..
  • Change your passwords if you have fallen for a phish. If you think you have fallen for a phishing attack, change your password at go/password and then contact the helpdesk at x2200. It is also a good practice to change your personal passwords outside of the College.


Watch for phishing scams. Common phishing scams are published at sites such as http://IC3.gov , http://phishing.org ,https://www.irs.gov/uac/Report-Phishing. These resources will also allow you to report phishing attacks if you should fall victim outside of the College. Again, if you think you have fallen victim to a phishing attack, always start by changing your passwords.

What’s an Approval Profile, and Why Does the Library Want to Change Ours?

A brown-bag lunch will be held on May 3 at 12:30 pm, in the Crest Room of the McCullough Student Center, to explore the subject of the library’s approval profile. Douglas Black, the library’s Head of Collections Management, will be presenting, with some sweets and coffee to augment your own lunch. He’ll give some history of the approval program in library acquisitions over the years and lead discussion on its role in the academic library collection of the 21st century.

For context, the library selects, acquires, and provides access to materials in many different ways:

  • upon request by students, faculty, and staff
  • automatic purchase of e-books and streaming media based on usage
  • subscriptions
  • package deals on journal subscriptions and purchased journal archives (“backfiles”)
  • one-time purchases of electronic databases, which often require annual maintenance fees
  • gifts/donations
  • and through automatic purchase via an “approval profile.”

Under the approval model, the library utilizes a library vendor (in our case, YBP Library Services) to purchase automatically books that meet certain criteria (e.g., subject, hardbound only, no workbooks, scholarly publishers only, within a certain price range, etc.).  Middlebury typically purchases about 3,000 volumes/year this way, at an average annual cost of $97,000 in the last few years. We recently conducted a thorough analysis of the program’s effectiveness, finding that print books purchased through the approval profile are used much less than those specifically requested. The library believes some of that money could be spent more effectively and would like to gather input from members of the campus community on reshaping the profile.

Please feel welcome to contact your liaison or Douglas Black (dblack@middlebury.edu or x3635) with any questions (whether or not you can attend the meeting), or comment here in the blog.

Notes for Kick-Off on April 5, 2016


We will be starting the new ACTT process with a Kick-Off meeting. This is an open, non-mandatory meeting for anyone who is interested in learning about the Academic Cyberinfrastructure Transformation Team to attend. We will introduce the new team members, structure, and thoughts on how the Team activities will be evaluated.

This is an open meeting, please share with anyone who is interested in learning about the ACTT


  • Mission: “Our mission is to evaluate and recommend technology services and innovations for teach, learning and research.”
  • Joe is teaching a course on “Design Thinking” this semester. Design Thinking includes an “Empathy Phase”


    • Q (Melissa/CNS). How will information and requests trickle up?
      • “I have many day-to-day projects where I would love to have a license that exists on the Midd campus, but not the MIIS campus, or I would like to build a server with 1TB of storage to host a web site”
      • “My research center, CNS, is becoming such a large consumer of storage and bandwidth”
      • “On a request from Laurie Patton, I am researching a cloud services that could host our information”.
      • Answer – Joe – Anyone who wants to make a request for technology or technology services for academic use may approach the team. Happy to be an entry point for requests that may go to ITS or other groups.
      • Jim – we have to account for the resource requests during the budget request process.
    • Q (Melissa/CNS). We are a collection of researchers that become PI on large grants, we need to inform others of the implications on the projects that we are running…  So we can write it into
      • We are giving money to non-Middlebury developers to do things that could be done inside Middlebury
      • Jim: not necessarily opposed to using outside resources…
    • Q (Jim): May be Amy McGill can weigh in on the MIIS budget process and how funding decisions are made.
      • Amy McGill
        • MIIS Research Centers are funded with base productivity requirements
        • Campus community infrastructure is for day-to-day use
        • Research Centers seek their own funding for larger projects that need additional resources, they do typically provide for initial as well as on-going maintenance costs.
    • Q. ACTT contribution to the Strategic Planning Process?
      • t.b.d.
  • Q (Melissa/CNS).  Is it too early to start making suggestions for agenda items?
  • Q (Melissa/CNS).  I would love to explore the ability to share licenses across campuses.  We pay out of grant licenses for Tableau, for image processing software…  I drool over some of the licenses that the Geology department has.  This is not a simple request, but I would love to tackle it as a subject.
    • A (Zach/ITS-SR): Let’s talk; more productive if we can get an idea of the specific titles you’re interested in, so we can check what licensing models are available.
  • Q (Melissa/CNS).  I would love to talk about our data storage and access to bandwidth.  Because we use satellite images, large data sets, we are becoming something of a hog on the MIIS systems.   I would like to open a discussion on how we can meet CNS’s research technology needs including storage, bandwidth, and some security issues.
    • Joe: Has anyone done a “needs assessment for the department”?
      • We don’t have a department, we are a research center within a larger campus.
      • I have done a casual needs assessment. 13 TB of storage, external drives, google drives, drop boxes… Need access across three offices.
      • Jim:  ITS can help with a needs assessment and identify appropriate technology solutions, perhaps on campus or in the cloud, ideally consistent with other larger IT initiatives for Middlebury and work with CSN to identify, implement solutions.  We did this for the Middlebury DC office a couple of years ago that included the CSN operation there for example.
  • Q (Bob/MIIS).  Working toward equitable cyber infrastructure across VT and Monterey campuses seems like a an appropriate activity for the Team.


Joe to build form for collecting evaluation requests.