SlideShare a Scribd company logo
1 of 5
Good fences  make good  neighbors… http://www.flickr.com/photos/57038667@N00/491863983/
… but take away the fence and you have a  bigger lawn. http://www.flickr.com/photos/82862196@N00/8632562/
Get a few more  neighbors involved… http://www.flickr.com/photos/97042846@N00/391613936/
… and soon you’ve got a park.
Slideshow created by Michael Sauers www.travelinlibrarian.info

More Related Content

More from Michael Sauers

More from Michael Sauers (20)

What's On Your Do List?
What's On Your Do List?What's On Your Do List?
What's On Your Do List?
 
Highlights from CES 2018
Highlights from CES 2018Highlights from CES 2018
Highlights from CES 2018
 
CES 2016: One Librarian's Experience
CES 2016: One Librarian's ExperienceCES 2016: One Librarian's Experience
CES 2016: One Librarian's Experience
 
Secure Online Shopping
Secure Online ShoppingSecure Online Shopping
Secure Online Shopping
 
Makerspaces resources
Makerspaces resourcesMakerspaces resources
Makerspaces resources
 
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
 
Getting more $$ from your Book Sale -or- Is this Old Book valuable?
Getting more $$ from your Book Sale -or- Is this Old Book valuable?Getting more $$ from your Book Sale -or- Is this Old Book valuable?
Getting more $$ from your Book Sale -or- Is this Old Book valuable?
 
Emerging Technologies in Libraries
Emerging Technologies in LibrariesEmerging Technologies in Libraries
Emerging Technologies in Libraries
 
Library Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyLibrary Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The Ugly
 
What We've Learned: Tips & Tricks for Webinars That Deliver The Goods
What We've Learned: Tips & Tricks for Webinars That Deliver The GoodsWhat We've Learned: Tips & Tricks for Webinars That Deliver The Goods
What We've Learned: Tips & Tricks for Webinars That Deliver The Goods
 
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
 
Library UX (NEFLIN 13 November 2014)
Library UX (NEFLIN 13 November 2014)Library UX (NEFLIN 13 November 2014)
Library UX (NEFLIN 13 November 2014)
 
Tinkers, Printers & Makers (NLA2014)
Tinkers, Printers & Makers (NLA2014)Tinkers, Printers & Makers (NLA2014)
Tinkers, Printers & Makers (NLA2014)
 
Is it Copyrighted? Can I Use it? (NLA2014)
Is it Copyrighted? Can I Use it? (NLA2014)Is it Copyrighted? Can I Use it? (NLA2014)
Is it Copyrighted? Can I Use it? (NLA2014)
 
Secure Yourself with LastPass (NLA2014)
Secure Yourself with LastPass (NLA2014)Secure Yourself with LastPass (NLA2014)
Secure Yourself with LastPass (NLA2014)
 
40+ tech tips, tricks, & tools
40+ tech tips, tricks, & tools40+ tech tips, tricks, & tools
40+ tech tips, tricks, & tools
 
Is it copyrighted? Can i use it?
Is it copyrighted? Can i use it?Is it copyrighted? Can i use it?
Is it copyrighted? Can i use it?
 
40 Tips, Tricks & Tools in 20 Minutes
40 Tips, Tricks & Tools in 20 Minutes40 Tips, Tricks & Tools in 20 Minutes
40 Tips, Tricks & Tools in 20 Minutes
 
eBooks & eReaders: Past, Present, & Future
eBooks & eReaders: Past, Present, & FutureeBooks & eReaders: Past, Present, & Future
eBooks & eReaders: Past, Present, & Future
 
Using Audio & Video in the Library
Using Audio & Video in the LibraryUsing Audio & Video in the Library
Using Audio & Video in the Library
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
Overkill Security
 

Recently uploaded (20)

Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 

Fences

  • 1. Good fences make good neighbors… http://www.flickr.com/photos/57038667@N00/491863983/
  • 2. … but take away the fence and you have a bigger lawn. http://www.flickr.com/photos/82862196@N00/8632562/
  • 3. Get a few more neighbors involved… http://www.flickr.com/photos/97042846@N00/391613936/
  • 4. … and soon you’ve got a park.
  • 5. Slideshow created by Michael Sauers www.travelinlibrarian.info