article thumbnail

Learning, work and flexibility: a case study

CILIP

Learning, work and flexibility: a case study As part of our look at CILIP accredited courses we talk to Oona Ylinen, a part-time LIS student at UCL and Academic Support Librarian at University of Essex. During one such study session in 2018, I saw a poster advertising a part-time role in the library.

article thumbnail

How Libraries Can Support Those with Dementia

CILIP

How Libraries Can Support Those with Dementia Libraries are often considered the heart of the community, but not everyone understands just how much they have to offer. When it comes to dementia services, libraries have enormous potential to support people with dementia and their carers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

e-Records Conference 2018: Registration Open!

The Texas Record

e-Records 2018 – Friday, November 16, 2018. Registration is open to state agency and local government staff for the 2018 e-Records Conference. About e-Records 2018. Visit the conference website to REGISTER and to read more about the exciting lineup and exhibitors. Be sure to register as soon as possible.

article thumbnail

e-Records Conference 2018: Call for Presentations

The Texas Record

The annual e-Records Conference will be held Friday, November 16, 2018. This event is organized by the Texas State Library and Archives Commission (TSLAC) and co-sponsored by the Texas Department of Information Resources (DIR). The deadline for submitting presentation proposals is FRIDAY, JULY 20, 2018. Conference contacts.

article thumbnail

UNCOVERING VULNERABILITIES IN OPEN SOURCE LIBRARIES

ForAllSecure

In this post, we will follow up on a prior article on using Mayhem to analyze stb and MATIO by reviewing three additional vulnerabilities found in another open source library. Understanding the downstream users of a library can help prioritize fuzzing efforts. What Makes a Good Target? Who is Using This Target? What to Target?

article thumbnail

Uncovering Vulnerabilities In Open Source Libraries (CVE-2019-13499)

ForAllSecure

In this post, we will follow up on a prior article on using Mayhem to analyze stb and MATIO by reviewing three additional vulnerabilities found in another open source library. Understanding the downstream users of a library can help prioritize fuzzing efforts. What Makes a Good Target? Who is Using This Target? What to Target?

article thumbnail

Uncovering Vulnerabilities In Open Source Libraries (CVE-2019-13499)

ForAllSecure

In this post, we will follow up on a prior article on using Mayhem to analyze stb and MATIO by reviewing three additional vulnerabilities found in another open source library. Understanding the downstream users of a library can help prioritize fuzzing efforts. What Makes a Good Target? Who is Using This Target? What to Target?