Remove Definition Remove Examples Remove Libraries Remove Training
article thumbnail

How do librarians oppose knowledge destruction?

CILIP

As the senior executive of the Bodleian Libraries, Richard heads one of the oldest libraries in Europe. general carnage of institutional libraries in the middle decades of the 16th century? and he had presented a volume of his own works to the library with a poem in honour of the Bodleian. But, despite the ?very

article thumbnail

Brexit means new risks for the sector

CILIP

That means greater risk aversion, more obstacles and more costs for library and information professionals. The most immediate problem for the library and information sector is orphan works. s most significant institutions, the British Library, has decided to take down its orphan works.? Brexit means new risks for the sector.

Risk 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

AI Governance: Why our tested framework is essential in an AI world

Collibra

Our framework is informed by our definition of AI governance: AI governance is the application of rules, processes and responsibilities to drive maximum value from your automated data products by ensuring applicable, streamlined and ethical AI practices that mitigate risk, adhere to legal requirements and protect privacy.

article thumbnail

Supporting the Future of Scholarly Communication

CILIP

Having worked in academic libraries for nearly twenty years I?ve ve lived through Pinterest, library services offered via Second Life, social tagging in cataloguing and more 23 Things programmes than I want to think about. s hard to deny that it is becoming increasingly more common in academic libraries. However, in this time I?ve

article thumbnail

What Is API Security? Definition, Fundamentals, & Tips

eSecurity Planet

For example, a client (mobile app) registering with the Google Photos Authorization Server receives a client_id and a client_secret. The frictionless use of services like Spotify, where access is accelerated by a single login via Facebook or Gmail, serves as an example of this. This measure minimizes exposure to potential attackers.

article thumbnail

Get time on your side

CILIP

RE always talking about what the library of the future might look like, but could a library be a place that contains the future? Consultant Matt Finch explains how the fourth dimension can make libraries even more attractive to their communities and funders. He gives Ikea as an example of VCS in action. ?They

article thumbnail

What Is a Host-Based Firewall? Definition & When to Use

eSecurity Planet

Lastly, monitor and update your rules, conduct audits, and train users regularly. To do this, state the policy’s purpose, scope, definitions, and exceptions and change guidelines. Host-based firewalls can use binary libraries to detect and prevent future exploitation attempts. Lastly, plan the policy’s dissemination.