article thumbnail

Learning from our Past: Celebrating Black History Month with Lancaster University Library

CILIP

Learning from our Past: Celebrating Black History Month with Lancaster University Library Slavery Banner in Lancaster Universit Library (to Sunita Abraham) Lancaster University Library takes the lead in decolonisation to reach staff and students of the university, with a diverse range of engaging, and enriching activites, initiatives, and projects.

article thumbnail

Public Library Staff: Making a Difference

CILIP

Public Library Staff: Making a Difference. Public library staff are an integral part of library services and arguably its most vital asset. Our new research Making a Difference: Libraries, Lockdown and Looking Ahead has made this, among other things, abundantly clear. Only, services don?t

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Libraries Week 2019 celebrates libraries in a digital world

CILIP

Libraries Week 2019 celebrates libraries in a digital world. Annual Libraries Week celebrations (7-12 October 2019) will showcase how libraries have transformed their digital offer, featuring events and activities in more than 1,000 libraries across the UK. 500 to donate to a library of your choice.

article thumbnail

What are the Best Document Management Capabilities?

AIIM

Check-in and check-out are very similar to how a library works – when a book is checked out, nobody else has access to it until it is checked back in. When the knowledge base grows, it quickly makes finding specific documents a challenge. Security and access controls. Audit Trails. Check-in/Check-out. Search/Categorization.

ECM 232
article thumbnail

6 Ways to elevate the Salesforce experience for your users

IBM Big Data Hub

This means making your product information, knowledge articles and other content easily accessible, searchable and filterable. Deflect cases by giving customers access to the same content your service employees use via the knowledge base or a chatbot. Empower your users to be your advocates.

Cloud 76
article thumbnail

Hackers Are Now Exploiting Windows Event Logs

eSecurity Planet

The system uses DLL (Dynamic Link Library) files to store some resources the application needs and will load automatically. Kaspersky researchers explored the code and discovered it acts as a proxy to intercept all calls to the original library (the legitimate one) and prepare the next stages, which indicates an iterative procedure.

article thumbnail

Top Open Source Security Tools

eSecurity Planet

It matches reported vulnerabilities to the open source libraries in code, reducing the number of alerts. It has more than 70 extensions, and a knowledge base with more than 14 million open source components. It prints out a description of the contents of packets on a network interface, preceded by a time stamp.

Security 133