This document discusses common challenges library staff face in helping patrons with electronic resources and provides strategies for addressing them. It covers understanding the resource access cycle and authentication processes, troubleshooting browser and resource errors, improving basic search strategies, and knowing where to get help from the right contacts when issues arise. The goal is to build staff confidence and competence in supporting patrons' use of digital library resources.
The document provides guidelines for writing web content. It discusses how web writing differs from print writing as people read differently online. It outlines the key elements of web design and how web content fits into site and page structure. Additionally, it examines web readers' characteristics like scanning rather than reading in-depth and provides tips for writing concise, scannable content using techniques like the inverted pyramid.
The document provides an overview of various topics related to web development including HTTP, HTML, CSS, JavaScript, AJAX, and more. It discusses HTTP verbs and status codes, how HTTP sessions work, and what HTTPS is. It also covers HTML forms, using CSS for styling, JavaScript for behaviors, and putting together all the pieces. The document aims to give a broad introduction to the foundations of web development.
Formal, Executable Semantics of Web Languages: JavaScript and PHPFACE
This document summarizes work on developing formal, executable semantics for JavaScript and PHP to enable language-based web security analysis. It discusses building semantics models for the core languages, analyzing and enforcing security properties, and mechanizing the semantics in proof assistants like Coq. Formalizing real-world web languages is challenging but enables trustworthy verification of properties and subsets for secure sandboxing of untrusted code. References are provided for related work on JSSec, JSCert and KPHP semantics and secure subsets.
This document is a resume for Alex Wilman, who is seeking a position in application development, web development, or network administration in the US. Wilman recently graduated from Queensland University of Technology in Australia with a Bachelor's in Information Technology and is currently in the US on an ESTA visa. He has experience in coding languages like PHP, C++, and Python as well as software like Windows, Mac OS, Amazon EC2, and Android Studio. His work experience includes developing Android and web applications as an application developer and providing IT help desk support.
This document discusses chasing web-based malware. It describes how web-based malware works through malicious JavaScript and social engineering techniques. It then summarizes approaches for detecting web malware, including dynamic analysis oracles that run web pages in instrumented environments, static filtering to quickly classify pages as benign or malicious, and the Wepawet tool which has analyzed over 67 million web pages.
Intro the WordPress REST API by tomhermansTom Hermans
This document discusses the WP REST API and related terms. It begins with introductions and defines key terms like API, JSON, and SPA. It then provides a brief history of WP APIs and discusses RESTful principles and how the WP REST API works based on HTTP verbs. Examples of RESTful APIs are provided. Calypso, the frontend for WordPress.com, is discussed as it utilizes the WP REST API to manage sites via JavaScript. In the end, a demo is provided and questions are invited.
This document provides tips and best practices for optimizing the use of digital resources through NC LIVE. It covers:
1. Integrating resources such as direct database and article links, embedding videos, and customizing interfaces through admin portals.
2. Enabling easier remote access for users through locally managed proxies, backup login pages, or a new hosted proxy service.
3. Understanding issues with discovery services and search boxes on the NC LIVE website.
4. Effectively reporting problems to NC LIVE by including clear details, screenshots, and steps already tried to resolve issues.
5. Encouraging participants to ask additional questions and provide feedback on the most frustrating aspects of working
The Results Are In: Increasing the use of Digital ResourcesHeather Greer Klein
The document summarizes a study conducted by NC LIVE on increasing usage of digital resources at community college libraries. The study analyzed usage data from different peer groups and found that libraries with higher usage customized their digital platforms, involved staff in outreach efforts, engaged more with faculty, and prioritized personal interactions with patrons. Based on these results, the document recommends that libraries make NC LIVE resources their own through customization, build staff confidence through training, engage faculty through embedded librarians and attending meetings, and have more "high touch" interactions with patrons to increase digital resource usage.
The document provides guidelines for writing web content. It discusses how web writing differs from print writing as people read differently online. It outlines the key elements of web design and how web content fits into site and page structure. Additionally, it examines web readers' characteristics like scanning rather than reading in-depth and provides tips for writing concise, scannable content using techniques like the inverted pyramid.
The document provides an overview of various topics related to web development including HTTP, HTML, CSS, JavaScript, AJAX, and more. It discusses HTTP verbs and status codes, how HTTP sessions work, and what HTTPS is. It also covers HTML forms, using CSS for styling, JavaScript for behaviors, and putting together all the pieces. The document aims to give a broad introduction to the foundations of web development.
Formal, Executable Semantics of Web Languages: JavaScript and PHPFACE
This document summarizes work on developing formal, executable semantics for JavaScript and PHP to enable language-based web security analysis. It discusses building semantics models for the core languages, analyzing and enforcing security properties, and mechanizing the semantics in proof assistants like Coq. Formalizing real-world web languages is challenging but enables trustworthy verification of properties and subsets for secure sandboxing of untrusted code. References are provided for related work on JSSec, JSCert and KPHP semantics and secure subsets.
This document is a resume for Alex Wilman, who is seeking a position in application development, web development, or network administration in the US. Wilman recently graduated from Queensland University of Technology in Australia with a Bachelor's in Information Technology and is currently in the US on an ESTA visa. He has experience in coding languages like PHP, C++, and Python as well as software like Windows, Mac OS, Amazon EC2, and Android Studio. His work experience includes developing Android and web applications as an application developer and providing IT help desk support.
This document discusses chasing web-based malware. It describes how web-based malware works through malicious JavaScript and social engineering techniques. It then summarizes approaches for detecting web malware, including dynamic analysis oracles that run web pages in instrumented environments, static filtering to quickly classify pages as benign or malicious, and the Wepawet tool which has analyzed over 67 million web pages.
Intro the WordPress REST API by tomhermansTom Hermans
This document discusses the WP REST API and related terms. It begins with introductions and defines key terms like API, JSON, and SPA. It then provides a brief history of WP APIs and discusses RESTful principles and how the WP REST API works based on HTTP verbs. Examples of RESTful APIs are provided. Calypso, the frontend for WordPress.com, is discussed as it utilizes the WP REST API to manage sites via JavaScript. In the end, a demo is provided and questions are invited.
This document provides tips and best practices for optimizing the use of digital resources through NC LIVE. It covers:
1. Integrating resources such as direct database and article links, embedding videos, and customizing interfaces through admin portals.
2. Enabling easier remote access for users through locally managed proxies, backup login pages, or a new hosted proxy service.
3. Understanding issues with discovery services and search boxes on the NC LIVE website.
4. Effectively reporting problems to NC LIVE by including clear details, screenshots, and steps already tried to resolve issues.
5. Encouraging participants to ask additional questions and provide feedback on the most frustrating aspects of working
The Results Are In: Increasing the use of Digital ResourcesHeather Greer Klein
The document summarizes a study conducted by NC LIVE on increasing usage of digital resources at community college libraries. The study analyzed usage data from different peer groups and found that libraries with higher usage customized their digital platforms, involved staff in outreach efforts, engaged more with faculty, and prioritized personal interactions with patrons. Based on these results, the document recommends that libraries make NC LIVE resources their own through customization, build staff confidence through training, engage faculty through embedded librarians and attending meetings, and have more "high touch" interactions with patrons to increase digital resource usage.
Presentation slides from Charleston Library Conference, November 10, 2017 on the Resource Access in the 21st Century Initiative #RA21 presented by Todd Carpenter, Robert Kelshian, Don Hemparian and Ann Gabrail.
This document discusses the design of an intelligent assistant named Artemis to help security analysts with their workflow. It describes conducting user research to understand pain points of different security roles. The findings showed analysts lack context for alerts and have repetitive tasks. The document outlines requirements for Artemis, including understanding natural language, providing context-driven investigations, educating users, recommending next steps, and expediting collections using workflows. It provides examples of how Artemis could assist analysts and help optimize their time by automating common tasks. In the end, the goal is to design tools that better utilize analyst resources and are easier for a diverse range of users.
The webinar discusses quick wins for improving the user experience when accessing online library resources. It covers challenges users face with logins, the benefits of single sign-on via federated access management, and initiatives like RA21 that aim to create a seamless user experience across resources. Six quick wins are suggested: improving terminology, organisation discovery, deep linking, working with designers, user testing, and support team training on federated sign-on.
OpenAthens Conference 2018 - Adam Snook - Quick wins for an easier user journ...OpenAthens
The document discusses improving the user experience for accessing online resources through federated authentication. It notes that login can be a barrier and libraries try to improve discovery. The OpenAthens redirector provides a single sign-on link structure to check location and authenticate users. Personalization across platforms is now possible through federated access without compromising privacy. The RA21 initiative aims to facilitate seamless access across devices and locations through alternatives to IP authentication using existing federated technologies. Improving the organization discovery experience, providing personalization linked to login, and account linking features can enhance the user experience.
Basics of contributing to an open source project - from the first Linux Learners Day at LinuxCon 2011
http://events.linuxfoundation.org/events/linuxcon/student-program
The document provides information about library instruction for online and hybrid courses. It discusses what library instruction entails, including teaching students how to locate information effectively. It also provides examples of library assignments and defines information literacy. The document then discusses how library instruction can work for online and hybrid courses, including scheduling online sessions and the process for students to attend. It outlines what students need to access the online classes and how to participate.
This document provides an overview of coding for librarians. It discusses why coding is relevant for libraries, including better understanding information systems, improving communication with IT, and participating in development projects. Common coding terms like XML, PHP, and JavaScript are defined. The document also gives examples of how coding skills could be used, such as adding columns to data or automatically adding a library proxy. Tips are provided, such as setting small goals and commenting code. Resources for learning coding include Codecademy, code4lib, and online tutorials.
This document discusses using machine learning and deep learning techniques to detect malicious URLs and TLS certificates. It describes building recurrent neural network models to classify URLs and certificates based on their content. The models were able to achieve over 98% accuracy on URL classification and can be used to detect phishing URLs and malicious TLS certificates that aim to mimic legitimate ones. A demo of these techniques is also mentioned. The goal is to develop more robust detection of malicious AI that is trying to simulate legitimate behavior.
Geek out: Adding Coding Skills to Your Professional RepertoireBohyun Kim
Presented at the 2012 Charleston Conference Charleston Conference XXXII. November 9, 2012. An article version of this presentation at the Conference Proceedings is downloadable at: http://docs.lib.purdue.edu/charleston/2012/Tech/8/
Program description: http://2012charlestonconference.sched.org/event/b7cd8aed0d21408e6c23fd95b6162837#.UJLWcoWQkbQ
Technology Competencies for Online Learning at UBJennifer Austin
This document outlines the key technology skills needed for online learning at UB. It identifies the most critical skills as using a web browser, email, word processing, and learning management system navigation. The document provides guidance on developing proficiency with these skills, such as updating software, using email attachments, basic word functions, and familiarizing with UBlearns. It encourages students to assess their skills and seek help from available resources to be well prepared for online coursework.
E Learning Management System By Tuhin Roy Using PHPTuhin Ray
Bachelor of Information Technology Final Year Project on E-Learning Management System i.e: Creating a site for virtual classroom, sharing materials, students-teacher database and many more. 2019
Key considerations when mapping your end user experienceEduserv
This document discusses how OpenAthens is working to improve access to online resources for organizations through a single redirector link structure. It notes that individual users need to authenticate themselves as subscribers to access publisher websites. OpenAthens' redirector checks a user's IP address and either directly sends them to the resource URL if on the organization's network, or constructs an OpenAthens authentication URL to log the user in if off the network. This provides a consistent linking method for libraries to use in their portals to seamlessly direct both on and off-site users to subscribed resources through a single URL format.
CC BY license implementation deep dive (OPEN Kick-off)Jane Park
Session description from http://open4us.org/events/kick-off-conference-agenda/:
This session will dive into detail about the CC BY licensing requirement and what it takes to implement the license when hosting content on individual and external platforms. CC staff will go over the license metadata, examples of good implementation, and OER platforms where you can host resources under the CC BY license. We will also demonstrate tools and sites to find existing CC BY or otherwise licensed OER for your project. (SBCTC will share their stories, ie. around Open Course Library.)
The document discusses developing a web analytics strategy for libraries. It covers core concepts like visits, unique visitors, page views, bounce rate, and engagement metrics. It also discusses more advanced concepts such as segmenting versus filtering data, benchmarking, and using event tracking. Developing goals and key performance indicators (KPIs) based on the site's objectives is important. Understanding the site, its users, content, and organizational goals is key to creating an effective web analytics strategy.
The document discusses remote access technology for libraries. It defines remote access as allowing library users to access subscribed resources from anywhere without disruption. It describes various tools for remote access, including RemoteXS, EZProxy, VPN, Shibboleth, and OpenAthens. The Vikram Sarabhai Library uses RemoteXS to provide remote access to over 1755 users, authenticating users and giving access to online databases. Issues discussed include publisher site changes breaking the service and inability to access offline databases remotely.
Database Web Application Usability TestingTim Broadwater
TechSmithMoraewas used on a laptop computer to conduct usability testing of the newly designed WVU Libraries Database web application. This round of usability testing was internal and focused on WVU Libraries primary target audience.
This document discusses open source software and its relevance for libraries. It begins by addressing common concerns about open source like security and lack of commercial support. It then explains how open source software development works through peer review and transparency. Examples are given of large organizations and businesses that use open source. The document emphasizes the natural alignment between open source principles of open access and collaboration and libraries' mission. It provides resources for libraries considering open source options.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
More Related Content
Similar to Troubleshooting Digital Resources with Confidence
Presentation slides from Charleston Library Conference, November 10, 2017 on the Resource Access in the 21st Century Initiative #RA21 presented by Todd Carpenter, Robert Kelshian, Don Hemparian and Ann Gabrail.
This document discusses the design of an intelligent assistant named Artemis to help security analysts with their workflow. It describes conducting user research to understand pain points of different security roles. The findings showed analysts lack context for alerts and have repetitive tasks. The document outlines requirements for Artemis, including understanding natural language, providing context-driven investigations, educating users, recommending next steps, and expediting collections using workflows. It provides examples of how Artemis could assist analysts and help optimize their time by automating common tasks. In the end, the goal is to design tools that better utilize analyst resources and are easier for a diverse range of users.
The webinar discusses quick wins for improving the user experience when accessing online library resources. It covers challenges users face with logins, the benefits of single sign-on via federated access management, and initiatives like RA21 that aim to create a seamless user experience across resources. Six quick wins are suggested: improving terminology, organisation discovery, deep linking, working with designers, user testing, and support team training on federated sign-on.
OpenAthens Conference 2018 - Adam Snook - Quick wins for an easier user journ...OpenAthens
The document discusses improving the user experience for accessing online resources through federated authentication. It notes that login can be a barrier and libraries try to improve discovery. The OpenAthens redirector provides a single sign-on link structure to check location and authenticate users. Personalization across platforms is now possible through federated access without compromising privacy. The RA21 initiative aims to facilitate seamless access across devices and locations through alternatives to IP authentication using existing federated technologies. Improving the organization discovery experience, providing personalization linked to login, and account linking features can enhance the user experience.
Basics of contributing to an open source project - from the first Linux Learners Day at LinuxCon 2011
http://events.linuxfoundation.org/events/linuxcon/student-program
The document provides information about library instruction for online and hybrid courses. It discusses what library instruction entails, including teaching students how to locate information effectively. It also provides examples of library assignments and defines information literacy. The document then discusses how library instruction can work for online and hybrid courses, including scheduling online sessions and the process for students to attend. It outlines what students need to access the online classes and how to participate.
This document provides an overview of coding for librarians. It discusses why coding is relevant for libraries, including better understanding information systems, improving communication with IT, and participating in development projects. Common coding terms like XML, PHP, and JavaScript are defined. The document also gives examples of how coding skills could be used, such as adding columns to data or automatically adding a library proxy. Tips are provided, such as setting small goals and commenting code. Resources for learning coding include Codecademy, code4lib, and online tutorials.
This document discusses using machine learning and deep learning techniques to detect malicious URLs and TLS certificates. It describes building recurrent neural network models to classify URLs and certificates based on their content. The models were able to achieve over 98% accuracy on URL classification and can be used to detect phishing URLs and malicious TLS certificates that aim to mimic legitimate ones. A demo of these techniques is also mentioned. The goal is to develop more robust detection of malicious AI that is trying to simulate legitimate behavior.
Geek out: Adding Coding Skills to Your Professional RepertoireBohyun Kim
Presented at the 2012 Charleston Conference Charleston Conference XXXII. November 9, 2012. An article version of this presentation at the Conference Proceedings is downloadable at: http://docs.lib.purdue.edu/charleston/2012/Tech/8/
Program description: http://2012charlestonconference.sched.org/event/b7cd8aed0d21408e6c23fd95b6162837#.UJLWcoWQkbQ
Technology Competencies for Online Learning at UBJennifer Austin
This document outlines the key technology skills needed for online learning at UB. It identifies the most critical skills as using a web browser, email, word processing, and learning management system navigation. The document provides guidance on developing proficiency with these skills, such as updating software, using email attachments, basic word functions, and familiarizing with UBlearns. It encourages students to assess their skills and seek help from available resources to be well prepared for online coursework.
E Learning Management System By Tuhin Roy Using PHPTuhin Ray
Bachelor of Information Technology Final Year Project on E-Learning Management System i.e: Creating a site for virtual classroom, sharing materials, students-teacher database and many more. 2019
Key considerations when mapping your end user experienceEduserv
This document discusses how OpenAthens is working to improve access to online resources for organizations through a single redirector link structure. It notes that individual users need to authenticate themselves as subscribers to access publisher websites. OpenAthens' redirector checks a user's IP address and either directly sends them to the resource URL if on the organization's network, or constructs an OpenAthens authentication URL to log the user in if off the network. This provides a consistent linking method for libraries to use in their portals to seamlessly direct both on and off-site users to subscribed resources through a single URL format.
CC BY license implementation deep dive (OPEN Kick-off)Jane Park
Session description from http://open4us.org/events/kick-off-conference-agenda/:
This session will dive into detail about the CC BY licensing requirement and what it takes to implement the license when hosting content on individual and external platforms. CC staff will go over the license metadata, examples of good implementation, and OER platforms where you can host resources under the CC BY license. We will also demonstrate tools and sites to find existing CC BY or otherwise licensed OER for your project. (SBCTC will share their stories, ie. around Open Course Library.)
The document discusses developing a web analytics strategy for libraries. It covers core concepts like visits, unique visitors, page views, bounce rate, and engagement metrics. It also discusses more advanced concepts such as segmenting versus filtering data, benchmarking, and using event tracking. Developing goals and key performance indicators (KPIs) based on the site's objectives is important. Understanding the site, its users, content, and organizational goals is key to creating an effective web analytics strategy.
The document discusses remote access technology for libraries. It defines remote access as allowing library users to access subscribed resources from anywhere without disruption. It describes various tools for remote access, including RemoteXS, EZProxy, VPN, Shibboleth, and OpenAthens. The Vikram Sarabhai Library uses RemoteXS to provide remote access to over 1755 users, authenticating users and giving access to online databases. Issues discussed include publisher site changes breaking the service and inability to access offline databases remotely.
Database Web Application Usability TestingTim Broadwater
TechSmithMoraewas used on a laptop computer to conduct usability testing of the newly designed WVU Libraries Database web application. This round of usability testing was internal and focused on WVU Libraries primary target audience.
This document discusses open source software and its relevance for libraries. It begins by addressing common concerns about open source like security and lack of commercial support. It then explains how open source software development works through peer review and transparency. Examples are given of large organizations and businesses that use open source. The document emphasizes the natural alignment between open source principles of open access and collaboration and libraries' mission. It provides resources for libraries considering open source options.
Similar to Troubleshooting Digital Resources with Confidence (20)
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
3. Objectives
Review common issues faced by front line
staff helping users with electronic resources
Discuss strategies to address these issues
and build confidence and competence
Share what you are doing in your library to
address these issues
Share how NC LIVE can help
4. Common Library Staff Challenges:
Understanding the resource access
cycle: identify the source of the issue
Authentication: what is it, and how
does my library do it?
Electronic resource troubleshooting
basics: Error messages & browser
basics
Search strategy: how do I help users
get started with a search?
How do I get help?
5. • Browser:
– a program with a graphical user interface for displaying HTML files,
used to navigate the World Wide Web.
• IP Address:
– a unique string of numbers separated by periods that identifies each
computer using the Internet Protocol to communicate over a
network.
• Electronic resource:
– Databases, tools, etc. licensed by the library for authorized users to
access
• Proxy or Proxy server:
– Server that functions as an intermediary between a web browser and
the Internet.
• Authentication:
– the process of determining whether someone or something is, in fact,
who or what it is declared to be.
Glossary
7. Challenge: Authentication
The process by which your patrons access
resources that are not on the free web:
How do they get to the stuff you paid for?
Vendor server has to recognize user IP
Two ways: recognize campus IP, or
recognize proxy server-assigned IP
8. Authentication In the library/on campus:
“User at IP 152.123.456.23 requests access”
“IP 152.123.456.23 is authorized library 143,
access granted ”
User Vendor
Server
9. Accessing NC LIVE Resources
Inside the Library/On Campus:
No login ever needed
10. Off-Campus Authentication Methods
Local Proxy: All resources have the same
login; campus manages proxy server
NC LIVE Proxy: Use NC LIVE password for
NC LIVE resources; NC LIVE manages proxy;
new password every year
11. How does a user go through the proxy
server?
Proxied links: will work ON and OFF CAMPUS
http://www.nclive.org/cgi-bin/nclsm?rsrc=331
http://library.surry.edu/go.php?c=211213
http://www.nclive.org/cgi-bin/nclsm?URL=http://site.ebrary.com/lib/mhu/
Unproxied links: On campus ONLY
http://site.ebrary.com/lib/mhu/
12. Authentication Off campus:
Username/password=
“I am an authorized
user requesting access”
Password= true “allow access”
Proxy
“For this session this user
is from proxy IP
152.123.456.23”
“IP 152.123.456.23 is
authorized library
143, access granted ”
Server
13. Off-Campus Authentication
Once a user is through the proxy, it is as if they are in
the library--no login pages
Check—is the proxy information in the link?
http://search.proquest.com/
http://search.proquest.com.proxy103.nclive.org/pqcentral
If yes, a login page could mean a vendor is missing an IP
14. Understand Authentication Basics
Understand the basics of how access
works on your campus
Know the what to expect for on-campus
and off-campus access
Know how students/faculty access their
username password
Know contacts for campus IT or NC LIVE
16. Troubleshooting Browsers
Know the names of common browsers and the
basics of using them
Learn how to clear cache and cookies
Recognize browser error messages
18. Troubleshooting Resource Errors
Recognize database and proxy errors
Know how to document errors
Know how to take a
screenshot
Always include the URL in the
screenshot
19. Troubleshooting Resource Errors
Snipping tool (PC)
Skitch—detailed screenshots with
annotation
Jing—video is worth a million words!!
http://screencast.com/t/OBSGxIgrho
20. Challenge: Poor Search Strategies
“It says there are no results!”
User error can be just as
frustrating as a database error
21. Learn Basic Search Strategies
Database keyword not the same as
web search
Basic Boolean: AND OR NOT () *
Search construction
Using a basic vs. advanced search
box
22. Resources for Learning More:
1.The State Library Train Station: One stop
for NC LIVE vendor-provided webinars,
State library training days, and other staff
development opportunities
2.Support pages within databases
3.NC LIVE For Library Staff page for links to
helpful information
23. Challenge: Discovery, AKA Search Boxes!
“I clicked on full text and it says
there are no results!”
• Metadata errors are common
• Discovery is not as good at
“known item search”
24. Discovery Issue Strategies:
• Use Title Search to try to get to the
item
• Try going directly into the database
that is listed as the source and try
the search again
• Report the issue to your vendor or
to NC LIVE
27. Have a Procedure for Getting Help
Know who administers your proxy
Know who manages you electronic resources
OR, know vendor contacts for your resources
28. Resource List
Clearing cache in Chrome
Troubleshooting in Firefox
Cache and cookies in Internet Explorer
Best practices for webinar participants
Web Junction’s Competency Index for the Library Field (2014)
NC LIVE Library Staff Email List
State Library Continuing Education Information Email List
Questions?
Heather Greer Klein
Member Services Librarian
heather@nclive.org help@nclive.org
Editor's Notes
Let me tell you a little about my experience. As the Member Services librarian at NC LIVE I have responsibility for managing our services to library staff, including our help desk. I and my NC LIVE colleagues help library staff and occasionally library users with problems and questions related to NC LIVE resources. I’ve been able to identify some common problems that library staff encounter particularly if they are new to libraries or are not confident helping with electronic resources.
My objective today is to use my experience helping library staff all over the state to help you identify some common issues that staff encounter, and recommend the best strategies to approach these issues. My hope is that this information will be useful to you either as a staff member or as someone who is responsible for training staff members or student workers. I’m also very interested to hear what you might already be doing in your own library to help staff feel confident resolving common issues around electronic resources.
So what kinds of issues do library staff most often face?
First I find it helps to understand the resource access cycle. Once you know all the steps between the user and the resource, it is easier to figure out where things might be going wrong.
I find that the majority of issues that we hear about from library staff are issues related to authentication, basic troubleshooting, search strategy, and getting help from the right person. These are certainly not the only problems staff encounter and they are not always issues staff can resolve on their own, but I can recommend some ways to resolve these kinds of issues more quickly and confidently in the majority of cases.
Authentication is the number one source of problems for library staff helping remote users like distance learners. It is important that all staff know what kind of authentication processes are used on campus and why they exist.
What can go wrong here? Vendor does not have IP, does not recognize user
Resources are paid for, must be limited to authorized users (you and your patrons)
Inside the library: no login screens
If you see one, what do you do? Help desk!
Authentication is the number one source of problems for library staff helping remote users like distance learners. It is important that all staff know what kind of authentication processes are used on campus and why they exist.
Authentication is the number one source of problems for library staff helping remote users like distance learners. It is important that all staff know what kind of authentication processes are used on campus and why they exist.
A lot more ways things can go wrong here.
Authentication is the number one source of problems for library staff helping remote users like distance learners. It is important that all staff know what kind of authentication processes are used on campus and why they exist.
How do my users get access to NC LIVE
How do my users get access to NC LIVE
How do my users get access to NC LIVE
How do my users get access to NC LIVE
How do my users get access to NC LIVE
How do my users get access to NC LIVE
Sometimes bad search strategies can look like an error to a user, and can be as frustrating as a database error