Category Archives: library

Celebrating Hispanic American/Latinx Heritage Month

From September 15th thru October 15th, the United States celebrates Hispanic American / Latinx Heritage Month. Read below to find out how some of the people at Midd engage with these identities. Also come by the Davis Family Library September 18th-29th to see the display. Many sincere thanks to Marlena Evans 🙂 for her committed work in developing banner designs.

Names of Respondents; Hometowns; Roles on Campus:

Zarai Zaragoza, a Mexican American Middlebury College senior and studio art major sits in front of colorful art pieces.

Zarai Zaragoza, a Mexican American Middlebury College senior and studio art major sits in front of colorful art pieces.

ZZ: Zarai Zaragoza; Chicago, Illinois; Studio Art Major with Education Studies Minor – Part of Alianza, WOC [Women of Color], DMC [Distinguished Men of Color], Anderson Freeman Center Fellow, and so much more.

MRM: Marcos Rohena-Madrazo; San Juan, Puerto Rico; Assistant Professor of Spanish / Linguistics.

KS: Katrina Spencer; Los Angeles, California; Literatures & Cultures Librarian.

XM: Ximena Mejía; Salisbury, Vermont; Middlebury College Counseling Director.

Time at Midd:

Middlebury College Assistant Professor of Spanish and Linguistics Marcos Rohena-Madrazo, born and raised in Puerto Rico, poses for a photo at the Davis Family Library Research Desk.

Middlebury College Assistant Professor of Spanish and Linguistics Marcos Rohena-Madrazo, born and raised in Puerto Rico, poses for a photo at the Davis Family Library Research Desk.

ZZ: 3 years, going on the 4th.

MRM: 6 years.

KS: 7.5 months.

XM: 9 years.

What do you know about Hispanic American/Latinx Heritage Month?

ZZ: Hispanic Heritage month celebrates the histories, cultures and contributions of American citizens whose ancestors came from Spain, Mexico, the Caribbean and Central and South America. It is a time to show the love one has for their culture, traditions, and the many identities that make up the Hispanic community.

MRM: I don’t know a lot about the month, per se, but I know that it’s important in the United States context and I’ve been learning more about it since I’ve lived “here” [on the mainland and not the island of Puerto Rico]. When I was living in Puerto Rico, there wasn’t a need to actively identify with either of those labels. Only recently have I started to engage with them.

Literatures and Cultures Librarian Katrina Spencer, whose father is Afro-Costa Rican, poses in her office while preparing books for the Hispanic American/Latinx Heritage Month display.

Literatures and Cultures Librarian Katrina Spencer, whose father is Afro-Costa Rican, poses in her office while preparing books for the Hispanic American/Latinx Heritage Month display.

KS: Unlike many other commemorative months, this one starts in the middle of September and ends in the middle of October. These dates were chosen in remembrance of a variety of Latin American countries winning their independence from colonial powers.

XM: It commemorates the diversity of the identities that encompass “Hispanic” and Latinx.

How do you pronounce “Latinx” and what does it mean?

MRM: In English, [lə.ˈthi.ˌnɛks]. In Spanish, I’m not sure because grammatical gender is much more complex. I’m still figuring it out. For me, it means a person of Latin American descent in/from a U.S. context.

KS: La-teen-x. Three syllables. You pronounce the “x” just like the letter “x.” To my understanding, the “x” is meant to draw attention away from gender specificity. In Spanish, grammatically speaking, the default term is “Latino,” an adjective that inherently prioritizes the masculine and invisibilizes the feminine. The “x” is an attempt to acknowledge the ways in which language, depending upon how we use it, can be inclusive or exclusive.

XM: Well said Katrina! Breaking down the gender binary.

Middlebury College Counseling Director Ximena Mejía, of Ecuadoran and European ancestry, poses for a photo.

ZZ: Laa-Tee-Nex. I love the way Katrina describes it. It is meant to be more inclusive since the Spanish language is structured to be more gendered.

How do you identify ethnically?

ZZ: Both of my parents are from Guerrero, Mexico. I was born in the U.S, but am very connected to the traditions of my cultural. I am Mexican-American → Latina.

MRM: Puerto Rican. If there is one identity that I can unproblematically claim, it is Puerto Rican. Where were my ancestors “from”? On my mom’s side from Cantabria and Mallorca and on my dad’s side general Caribbean Afro-Euro combo.

KS: My mother is African American and Creole; my father is Afro-Costa Rican. So. . . I’m black. 😉 With some cultural, historical and social connections to both Central America and the Caribbean, broadly defined. Not one of these, however, for me, is an “ethnicity.” (Or are they?)

A map depicting the many departures from the African continent and arrivals to the "New World." The image is taken from David Eltis' Atlas of the Transatlantic Slave Trade, on display now in the Davis Family Library. See the circular information desk.

A map depicting the many departures from the African continent and arrivals to the “New World.” The image is taken from David Eltis’ Atlas of the Transatlantic Slave Trade, on display now in the Davis Family Library. See the circular information desk.

XM: Multiethnic / Mestiza a combination of North Ecuadorean indigenous people and European (German and French from maternal side and Spanish from paternal side).

Why is it important to have a display to commemorate this month?

ZZ: It’s a beautiful thing to take pride in your culture, your family’s culture, and how these traditions, stories, and art impact your interests and your sense of self. It’s very important to give identities that are sometimes overlooked, ignored, or marginalized, some space of confidence, openness, and growth. Speaking from experience, it is not always easy to take pride in one’s apparent (sometimes not apparent) identity, and it can often be thrown in your face that you’re different. I am hoping that this display will show differences but will shine it in a positive, wholesome light.

The cover of Pulitzer Prize winning author Junot Díaz's 2012 book This Is How You Lose Her is depicted here. His work regularly engages what it means to be both Dominican and American.

The cover of Pulitzer Prize winning author Junot Díaz’s 2012 book This Is How You Lose Her is depicted here. His work regularly engages what it means to be both Dominican and American.

MRM: It’s important in order to counter hegemonic discourses of who the people living in the United States are.

KS: I want more students of diverse and non-dominant/non-hegemonic backgrounds to know what materials we have in our collections that mirror their experiences, lives, and struggles. If we don’t highlight them, they may never know that they’re there. The library is theirs, too.

XM: Make visible to our larger community that there are students, faculty and staff who identify with this heritage.

What are some of the challenges in preparing a display such as this?

ZZ: Often times there can be an misrepresentation of a group of people. What I hope this display will do is bring together a true, multifaceted array of stories, backgrounds, and talents that make up the Hispanic community at Midd.

MRM: Choosing who and what to represent. It’s by no means a unified and easily portrayable group.

KS: “Who is Hispanic?” “Who is Latinx?” “Who is not?” For example, do we include Brazil and Brazilians? And how? How do we include works that represent all of them? Are all my choices generational and based on what I liked growing up? Will students even recognize these items I’ve chosen?

The cover art for 2013 Venezuelan feature-length film Pelo Malo (Bad Hair) is pictured here.

The cover art for 2013 Venezuelan feature-length film Pelo Malo (Bad Hair) is pictured here.

What readings/music CDs/DVDs might you recommend that your peers check out to commemorate this month?

ZZ: Recently… Latinoamerica by Calle 13 has been my jam, my motivator, my sense of pride. Give it a listen, look at the music video if you can. Internacionales by Bomba Estereo is also a great tune!

MRM: Junot Díaz. Rita Indiana ‘cause she’s got diaspora all over the place. Daddy Yankee. That’s very Caribbean, but that’s my experience. Ooh, ooh, also Brujos — queer-of-color geekstravaganza!

KS: All things Junot Díaz. Contemporarily, he’s likely the most famous writer who represents the Hispanophone world transnationally. Also Achy Obejas, writes on themes touching the queer Latina world. I’ve been wanting to see Pelo Malo (Bad Hair) for quite some time. We have it in the library on Bluray. I believe it studies hair straightening, a practice that often favors western European features, a discourse that continues to be relevant in the Afro-Latinx world today.

XM: Music: Bomba Estereo, Los Cojolites, Gina Chavez, Perota Chingo, Calle 13, Manu Chao, Cultura Profetica, Onda Vaga.

Books: Umami by Laia Jufresa; Juliet Takes a Breath by Gabby Rivera; Multiple Choice by Alejandro Zambra; Bruja by Wendy C. Ortiz; Transmigration of Bodies by Yuri Herrera; Among Strange Victims by Daniel Saldaña Paris, and more.

Anything else?

MRM: The more we talk about what “Latinx” is and what it isn’t, the more we understand ourselves and each other.

A screenshot taken from a Pero Like video of producer Julissa Calderón who often discusses her Dominican heritage in her work.

A screenshot taken from a Pero Like video of producer Julissa Calderón who often discusses her Dominican heritage in her work.

KS: There’s an Afro-Dominican actress and filmmaker, Julissa Calderón, regularly featured on Pero Like and a comedian and filmmaker who’s black and Honduran who produces content on “Callme Choko.” Aside from being hilarious dramatists, they both give greater representation to minority populations that too often go unseen.

ZZ: Thank you for providing the space… <3

If there’s a work you’re interested in seeing and feel the library should own, visit go.middlebury.edu/requests to let us know!

Welcome to the Libraries, Class of 2021

Hello, Class of 2021Hello, Class of 2021!

We know you have questions — who doesn’t? Introduce yourself to a librarian at the Research Desk. You’ll find that we’re always happy to help. Tell us what you’re working on and together, we’ll figure out what to do next.

Fall Research Desk Hours
(September 10-December 15)
Mon – Wed: 11 am – 5 pm
and 7 pm – 10 pm
Thursday:    11 am – 5 pm
Friday:          11 am – 4 pm
Sunday:        1 pm – 5 pm

And online anytime!
go/askus/ or
http://go.middlebury.edu/askus

No one available at the Research Desk?
Visit us in our offices! Librarians are conveniently located right behind the Research Desk.

New Public Library_Printers

ITS has replaced the printers with paper decks in Davis Library 142, 242 and 303 along with the two in Armstrong library. The new devices are Konica Minolta multi-function copier/printers. They look very similar to the Library_Color printers in LIB 142 and Armstrong lower level, but they only print in black and white. We have removed all print-release stations since users can now log into Papercut using the touch screen on the device.  Signage has been posted on the wall above each machine providing the new instructions.

 

 

 

@MiddInfoSec: Keeping Your Password Secure

Did you know that most passwords are easily broken? A few “secrets” can help you make a stronger more memorable password.

Dos

  • Longer is better – use at least 8 characters with upper and lower case, numbers and symbols.
  • Create an easy-to-remember passphrase  with four or more words substituting special characters for some of the letters.
  • Use a unique password for each service or account.
  • Change your password or passphrase regularly:
  • Be sure you’re on the correct website before entering your password or passphrase
  • Set a password for access to your mobile device

Don’ts

  • Don’t include personal information such as usernames, account numbers, address or phone numbers in your password or passphrase.
  • Don’t reuse the same password for multiple services
  • Don’t use a single word, in any language
  • Don’t use consecutive repeating characters or a number sequence
  • Don’t share your password or passphrase – even with managers, co-workers or the Help Desk
  • Don’t send your passwords through email

Tools

@MiddInfoSec: Don’t Get Hooked

You may not realize it, but you are a phishing target at school, at work, and at home. Phishing attacks are a type of computer attack that use malicious emails to trick targets into giving up sensitive information. Ultimately, you are the most effective way to detect and stop phishing scams. When viewing email messages, texts, or social media posts, use the following techniques to prevent your passwords, personal data, or private information from being stolen by a phishing attack.

  • Verify the source. Check the sender’s email address to make sure it’s legitimate. Remember that the name of the sender is not the important part. The sender’s email address is what you are really looking for. If in doubt, forward your message to phishing@middlebury.edu.
  • Read the entire message carefully. Phishing messages may include a formal salutation, overly-friendly tone, grammatical errors, urgent requests, or gimmicks that do not match the normal tone of the sender.
  • Avoid clicking on erroneous links. Even if you know the sender, be cautious of links and attachments in messages. Don’t click on links that could direct you to a bad website. Hovering your mouse over a link should disclose the actual web address that the link is directing you too, which may be different from what is displayed in the message. Make sure this masked address is a site you want to visit.
  • Verify the intent of all attachments with the sender before opening them. Even when you know a sender, you should never open an attachment unless have checked with the sender to verify the attachment was sent intentionally. Word and Excel documents can contain malicious macros which could harm your computer. Other files, such as zip files and PDF files, could download malware onto your system. Always verify the intent of attachments with the sender before you open them from an email.
  • Verifying a message is always better than responding to a phish. If you ever receive a message that provides reason to pause, it is always better to forward the message to phishing@middlebury.edu or to send a separate email to the sender to verify its intent, before clicking a link or opening an attachment that could potentially impact the security of your computer..
  • Change your passwords if you have fallen for a phish. If you think you have fallen for a phishing attack, change your password at go/password and then contact the helpdesk at x2200. It is also a good practice to change your personal passwords outside of the College.

 

Watch for phishing scams. Common phishing scams are published at sites such as http://IC3.gov , http://phishing.org ,https://www.irs.gov/uac/Report-Phishing. These resources will also allow you to report phishing attacks if you should fall victim outside of the College. Again, if you think you have fallen victim to a phishing attack, always start by changing your passwords.

@MiddInfoSec: Phishing Alert – – “Update Announcements”

A phishing email message was sent to @middlebury.edu mailboxes today with a subject line of “Update Announcements”.  DO NOT RESPOND ON THIS MESSAGE!

The phishing email message is an attack designed to trick people into disclosing their username and password.  Do NOT follow the instructions in the message, as it could lead to your Middlebury account being compromised.

If you were tricked by the email and responded,  reset your network password immediately at go/password and then call the Helpdesk at x2200 for further assistance with your account and any possible concerns with your computer.

Here’s a sample of the phishing email message:


Dear middlebury.edu User.

Urgent Update Announcements.

Your middlebury.edu Account has been Sign in with a strange IP Address: And this indicate your mail account is been used for FRAUDULENT ACT, For these reasons, Our records indicate you are no longer our current/active user. Therefore, your account has been scheduled for deletion on this Month of APRIL, 2016. As part of this process, your account, files, email address messages etc, will be deleted from our Data Base.

To Retail Your Account.

You are required to reply with your valid ONLINE ACCESS for reactivation, to ensure Your account remains active and subscribed, Otherwise this account will be De-activated within the next 72 hours hence from now.

Name In Full:

User Name:

Pass Word:

@middlebury.edu

Thank You.



 

Beware of Fake Order/Fake Invoice Emails with Malicious Attachments

Attackers commonly use the macro functionality found in Microsoft Word and Excel to attack their victims. They attach malicious documents to an email. When opened, the files can lead to a virus infection on your computer.  If you ever get a message with any of these attachments, particularly if you were not expecting it, do NOT open the attachment.

We have received reports for faked order confirmation and fake invoice emails this week that have been well crafted. The faked emails included malicious Microsoft Word documents bearing malware. A couple of examples are included below.

ALWAYS verify unexpected emails with the sender, particularly if they include attachments.

NEVER open attachments that you are not expecting without first verifying they are legitimate with the sender.

If you do open an attachment or file that you suspect is malicious unplug your network cable and contact the helpdesk at x2200 immediately.

fake-invoice-email fake-order-summary-email

@MiddInfoSec: Securing Mobile Devices

Information Security has a new Twitter feed and other new content on their website. Follow us at @MiddInfosec on Twitter or visit our website at http://go.middlebury.edu/infosec

Mobile devices have become one of the primary ways that we communicate and interact with each other. Powerful computers now fit in our pockets and on our wrists, allowing us to bank, shop, view our medical history, work remotely, and communicate from virtually anywhere. With all this convenience comes added risk, so here are some tips to help secure your devices and protect your personal information.

  • Password-protect your devices. Protect the data on your mobile device and enable encryption by enabling passwords, PINs, fingerprint scans, or other forms of authentication. On most current mobile operating systems you have the option to encrypt your data when you have a password turned on. Turn it on!
  • Secure those devices and backup data. Make sure that you can remotely lock and/or wipe each mobile device. That also means you should back up your data on each device in case you need to use the remote wipe function. Services such as iCloud, OneDrive, and Google offer device location, wipe and backup services.
  • Verify app permissions. Don’t forget to review which privacy-related permissions each application is requesting, before installing it. Be cautious of fake applications masquerading as legitimate programs by verifying that the application is from a reputable source, such as the Apple Apps Store, Microsoft’s Store, or Google’s Play Store. Occasionally,  applications in the official stores can include malware. Read reviews and descriptions carefully. Only install applications that you need. Remove applications that you are no longer using.
  • Update operating systems. Security fixes or patches for mobile devices’ operating systems are often included in these updates. Just like patching a computer, iOS, Android, and Windows Mobile all need to be patched and kept current.
  • Be cautious of public Wi-Fi hotspots. When using your mobile device, watch for connections to public hotspots. Many mobile devices will automatically connect to hotspots and prioritize data transmission over Wi-Fi by default. Verify that your settings require manually selecting hotspots if possible. Working with sensitive data while connected to a public hotspot could lead to unintended data exposure. Always ensure that you are using a secure connection.
  • Always apply safe computing practices. Whether traveling with a mobile device, a laptop, or sitting in a hotel business center, you always want to use safe computing practices to protect your data. See this link for more tips: http://www.middlebury.edu/offices/technology/infosec/education/training/SafeComputing.

 

@MiddInfoSec – New Phishing Threat

Information Security has become aware of a new phishing threat with a subject line of “ITS Help-desk”. Please see below for the full content of this attack. Note this email is a hoax and should be deleted from your email. Do not reply to this message and do not click any links in this message. If you have any questions please feel free to contact the help desk at x2200 or forward the message to phishing@middlebury.edu.

phish

Important reminders to spot a phish include:

  1. Read the entire email from start to finish to ensure that the content and language fits with the sender.
  2. Hover your mouse over links to ensure the link directs you to the destination indicated by the email.
  3. Look for miss placed language, such as copyrights or signatures, that do not match the sender.

For additional information on phishing please visit http://go.middlebury.edu/phish

Digital Media Bootcamp Update

We’ve added another session to the Digital Media Bootcamp.

Wilson Media Lab

Wilson Media Lab

Quicktime, SnapZ Pro, MPEG Streamclip, Scanners, Plotters and more @ 2:15pm

Date: January 18, 2016

Mack Roark – This workshop will teach you the basic functionality of Apple’s Quicktime, how to use SnapZ Pro to do a screen capture of video, and how to use features of MPEG StreamClip to view and convert video clips. Also included is an overview and demonstration of the scanners, plotter, and capture station located in the Wilson Multimedia Development Lab. You will learn the basics of how to operate these devices and the software associated with them. This is a 2 hour workshop.

Current List of Workshops

Title Date
Quicktime, SnapZ Pro, MPEG Streamclip, Scanners, Plotters and more @ 2:15pm January 18, 2016
Liberal Arts Data Bootcamp – Working with Data @1pm until 4pm January 19, 2016
Liberal Arts Data Bootcamp – Visualizing Data @1pm until 4pm January 20, 2016
Liberal Arts Data Bootcamp – Mapping Data @1pm until 4pm January 21, 2016
Liberal Arts Data Bootcamp – Analyzing Textual Data @1pm until 4pm January 22, 2016
Introduction to Information Literacy @ 2:45pm January 25, 2016
Safe Computing Practices at Middlebury @ 1pm January 25, 2016
Online Identity: Your Story to the World @ 2:45pm January 26, 2016
Online Recording Lab: SANSSpace @ 1pm January 27, 2016
Intro to Audio Literacy @ 3:30pm January 27, 2016
Intro to Visual Literacy and Presentations @ 3:30pm February 3, 2016