Mobile Libraries: Culture on the Go

Unwritten Record

National Bookmobile Day is April 22, part of National Library Week (April 19-25). . A library is a place that stores information, a place where people from all walks of life have the opportunity to obtain textual and audiovisual material for education, entertainment, and enlightenment.

Arup Library: 60 years


Arup Library: 60 years. Arup Library: 60 years. Key projects include the Sydney Opera House, the Pompidou Centre and the British Library. The first library in the firm?s What follows is a brief overview of 60 years of the Arup Library in London. Early Arup Library.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Libraries: don't mess with trust


Libraries: don't mess with trust. Libraries: don't mess with trust. Jeni Tennison, CEO of the ODI discusses how libraries could fit into it without damaging themselves. Operational uses such as using data to support the day-to-day running of a library.

Should library services be cutting their most dynamic spaces?


Should library services be cutting their most dynamic spaces? Photo credit: Should library services be cutting their most dynamic spaces? A recent report, Libraries on the Move , by Dr Alyson Tyler, studied the impact of mobile libraries in Scotland. Libraries don?t

Librarian Sues Equifax Over 2017 Data Breach, Wins $600

Krebs on Security

” West said she’s surprised more people aren’t following her example. It’s not clear if the Web site tool is still functioning, but West said it was media coverage of this very same lawsuit bot that prompted her to file.

A useful guide to copyright tools and resources


A useful guide to copyright tools and resources. In the years following numerous tools and resources have emerged to help people stay copyright compliant. One tool to help with this is the Public Domain calculator. the Libraries and Archives Copyright Alliance ?

Understanding web archive access and use with Google Analytics: Lessons and questions from the Federal Depository Library Program


Stump and Bower introduce how Archive-It partners at the Federal Depository Library Program (FDLP) Web Archive have implemented and use Google Analytics to understand the use of their existing collections and plan for the future.

Google released PathAuditor to detect unsafe path access patterns

Security Affairs

Google has released the source code of a tool, dubbed PathAuditor, designed to help developers identify vulnerabilities related to file access. Google decided to release the source code of a tool dubbed PathAuditor designed to help developers identify vulnerabilities related to file access.

?Could do better? ? School Librarians deliver their report card to Education Minister Nick Gibb


School Librarians in England, Wales and Northern Ireland have called on Education Minister, Nick Gibb, to address the findings of new research into School Library provision, which highlights inequality of access to school libraries and insecure employment for school librarians.

Google found zero-click vulnerabilities in Apple’s multimedia processing components

Security Affairs

The discovery urges Apple into implementing additional security measures to protect these components, following the approach already adopted by Google to protect multimedia processing libraries. and eight issues in OpenEXR, which is an open-source library for parsing EXR image files.

Nodersok malware delivery campaign relies on advanced techniques

Security Affairs

Nodersok abuse of legitimate tools also called living-off-the-land binaries ( LOLBins ). Researchers observed threat actors dropping two legitimate tools onto the infected machines, namely Node.exe, the Windows implementation of the popular Node.

A straightforward and pragmatic guide to leadership, management and teamwork


Contemporary managers and leaders in library and information services are working in a challenging context; dealing with multiple demands on their time, expertise and resources. This book provides a practical guide to leadership, management and teamwork in library and information services.

Feedify cloud service architecture compromised by MageCart crime gang

Security Affairs

Cloud service firm Feedify has over 4,000 customers, it is a cloud platform to engage customers’ clients with powerful tools that target them based on their behavior. The script loads various resources from Feedify’s infrastructure, including a library named “feedbackembad -min-1.0.js

Cloud 100

A few binary plating 0-days for Windows

Security Affairs

Anyway, sometime later I continued the research and start developing a tool in order to help detect similar vulnerabilities and exploit them. This library tries to load the missing DLL “diagtrack_wininternal.dll” several times per day.

Benefits of Enterprise Modeling and Data Intelligence Solutions


In particular, the tool helped them to design their qualification review, which is necessary in a pharmaceutical business. That capability is something I have not seen in other suppliers’ tools.”.

The North Korean Kimsuky APT threatens South Korea evolving its TTPs

Security Affairs

The “ AutoUpdate.dll” library then gains persistence by setting the following registry key “ HKCUSoftwareMicrosoftWindowsCurrentVersionRunOnceWindowsDefender ”. An example of the decryption routine is reported in the following figure on top right: Figure 10: Decryption flow graph.

IT 112

InvisiMole group targets military sector and diplomatic missions in Eastern Europe

Security Affairs

Experts noticed that in the recent campaign, threat actors dropped InvisiMole’s tools only on systems that have been previously compromised by Gamaredon.

Advocating for our profession


As the Chartered body for library, information and knowledge workers, CILIP has an important responsibility to advocate for the value and impact of our profession locally, nationally across all four nations of the UK and internationally. invest in libraries? library? TITLE.

Get time on your side


RE always talking about what the library of the future might look like, but could a library be a place that contains the future? Consultant Matt Finch explains how the fourth dimension can make libraries even more attractive to their communities and funders.

Do I Need a Data Catalog?

Michael Adjei

For example, before users can effectively and meaningfully engage with robust business intelligence (BI) platforms, they must have a way to ensure that the most relevant, important and valuable data set are included in analysis.

Documentation Theory for Information Governance

ARMA International

Lund, for example, question whether Facebook is a digital document. and at the same time it is something completely new challenging hitherto used analytical conceptual tools.” [xix]. Library Trends 52, no.3, (2004b): 387-407. Libraries and the Academy 13, no.

Opportunity in times of crisis ? LibrariesDeliver campaign


Working with US library advocacy group the EveryLibrary Institute , CILIP has launched LIbrariesDeliver ? a project that brings together campaigners, library staff and the general public in a connected, data-enabled campaign. The database is a tool, not the campaign.

Q&A: The drivers behind the stark rise — and security implications — of ‘memory attacks’

The Last Watchdog

Garden-variety threat actors are now leveraging memory hacking tools and techniques to gain footholds, move laterally and achieve persistence deep inside well-defended networks. They’re going directly for the application itself, using trusted tools that are left open to them. Leichter: A lot of very advanced hacking tools came out of research labs at the NSA, and other places, and they are now in the hands of nation states, and even independent criminal hackers.

Learn more about web archiving with Archive-It Advanced Training


Here are some examples of what you will find: Managing collections. Partners from the Queens Public Library, Austin Presbyterian Theological Seminary, and UC San Diego explain how they arrived at their answers with a discussion and demonstration of their collection development policies.

History of the State Records Center

The Texas Record

The history of the Texas State Library and Archives Commission began in the 1830s when Texas was still a Republic. In 1909, the Texas Library and Historical Commission was created to direct the State Library, aid and encourage public libraries, and collect materials related to Texas history.

Critical Windows Vulnerability Discovered by NSA

Schneier on Security

Yesterday's Microsoft Windows patches included a fix for a critical vulnerability in the system's crypto library. Examples where validation of trust may be impacted include: HTTPS connections Signed files and emails Signed executable code launched as user-mode processes.

Reflections on international collaboration: enthusiasm, commitment, resilience. It is all about dive


Moving from Higher Education to the NHS in 1992, she created , with her new team, an innovative network of Health Libraries working collaboratively between the NHS and the Higher Education sector in London. Budget cuts are very real especially in public libraries ?

Happy Preservation Week!

Archives Blogs

From April 26th-May 2nd, the Association for Library Collections and Technical Services is celebrating Preservation Week. Our first rehousing example is individual binders for our Papyrus Fragments (MSS 2015-008).

UK National Cyber Security Centre urge to drop Python 2

Security Affairs

“If you maintain a library that other developers depend on, you may be preventing them from updating to 3. ” The NCSC provided a list of the latest features implemented with Python 3, also suggested some tools that could be used by developers to migrate their code.

Common Questions about NARA’s Federal Electronic Records Modernization Initiative (FERMI)

National Archives Records Express

In the spring of 2019, records management contractors under Schedule 36 will be added to the GSA’s Discovery market research tool. Once ERM contractors have been added to this tool, agencies will be able to review the ERM capabilities of contractors awarded under SIN 51 600. These demos will be linked in the Discovery tool. Do you have examples of Requests for Information (RFI) or Requests for Quotation (RFQ) from agencies?

Archive-It Partner News, April 2019


Archivists and researchers met for a “datathon” at George Washington University, to open web archive collections with new discovery and visualization tools. The Challenge of Preserving the Historical Record of #MeToo : The New Yorker reports on the Schlesinger Library’s growing web archive.

SAA Session Overviews- Post #1! Session 702 (“Documenting Current Events and Controversial Topics”)

The Schedule

Jennifer Weintraub began the session by introducing the panelists and highlighting some of its major themes and points: “Controversial material” : Weintraub defined “controversial material” broadly–”it depends”– and noted that the Schlesinger Library, along with many other institutions, already collect this kind of content. At the Schlesinger Library, an ethics statement guides archivists’ endeavors as they collect content related to the #metoo movement. .

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

The report includes topics such as why email matters, technical definitions, lifecycle models, tool workflows, as well as an agenda for email archiving moving forward. Katherine O’Neil from the Manuscript Division of Library of Congress described the process of identifying email within their collections. They use bagger tools and analyze the email using FTK to identify personal identifiable information. The goal is make EPadd a more reliable tool and increase functionality.

Microsoft addresses CVE-2020-0601 flaw, the first issue ever reported by NSA

Security Affairs

“This month we addressed the vulnerability CVE-2020-0601 in the usermode cryptographic library, CRYPT32.DLL, that affects Windows 10 systems.

Analyzing the APT34’s Jason project

Security Affairs

Security expert Marco Ramilli has analyzed the recently leaked APT34 hacking tool tracked as Jason – Exchange Mail BF. Today I want to share a quick analysis on a new leaked APT34 Tool in order to track similarities between APT34 public available toolsets.

e-Records Conference 2018: Call for Presentations

The Texas Record

This event is organized by the Texas State Library and Archives Commission (TSLAC) and co-sponsored by the Texas Department of Information Resources (DIR). Co-presenters, for example, may be state or local government staff and vendors who collaborated on relevant projects.

The whole sector needs to work together


THE choice was either to teach a procurement expert about libraries or to teach a librarian about procurement. so making that framework more appropriate to the library sector. One aim is to find flexibility and grow common ground between suppliers and university libraries.

How to improve your risk assessment process

IT Governance

For example: They are prone to user error; They are hard to maintain; It’s difficult to find relevant data in multiple tabs; and. Its asset library assigns organisational roles to each asset group, applying relevant potential threats and risks by default.

Risk 63

The analysis of the code reuse revealed many links between North Korea malware

Security Affairs

Each node represents a malware family or a hacking tool (“ Brambul ,” “ Fallchill ,” etc.) In defining similarities, we take into account only unique code connections, and disregard common code or libraries. Further shared code across these families is an AES library from CodeProject.

Modern DevOps and the IBM i

Rocket Software

Most importantly, they want to allow new engineers to work with a tool with which they are familiar. The tools they want used are typically Jira for issue tracking, Jenkins for continuous integration and builds and Puppet or Chef for configuration management and deployments. The problem is that none of those tools have the IBM i domain knowledge that is built into most existing IBM i change management tools.