Remove Libraries Remove Presentation Remove Tips Remove Training
article thumbnail

Terry Kendrick helps libraries achieve their marketing, communications and engagement goals

CILIP

Now more than ever, libraries must find ways to engage with their communities in order to demonstrate the value they create and deliver. It takes each element of the strategic marketing domain and outlines both current marketing best practice and its detailed application in the library and information sector. Information Now Ltd ?

article thumbnail

New to Remote Working? Tapping Into 6+ Years of Tips for Working from Home

AIIM

So, we thought we’d gather our best WFH tips for those newly remote workers. You'll be on video calls, so you should look presentable. Jesse Wilkins, VP, Training and Certification. Here's my two-fer tip to accomplish both at the same time! Don't Work in Your PJs. Don't work in your PJs. Don't Forget About Your Body.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Working Internationally for Libraries: How to write effective grant proposals

CILIP

Working Internationally for Libraries: How to write effective grant proposals. I had heard about the International Federation of Library Associations (IFLA) during my MSc, but I didn?t From her description, it sounded like an exceptional opportunity for learning what libraries all over the world are doing and for networking.

article thumbnail

eRecords 2018: Panel Discussions on Preservation and Protecting the Bits

The Texas Record

Singer talked about how an unexpected data breach presented the opportunity for them to arrange for more centralized executive support and IT upgrades. The group also spoke about the need for support with training, how to create metrics to measure success, and using other divisions resources to build RM throughout an agency.

article thumbnail

What Is API Security? Definition, Fundamentals, & Tips

eSecurity Planet

With the use of tokens like access tokens and refresh tokens for secure resource access, it presents a more adaptable and versatile token-based method. The user is then presented with a Google Photos login page and asked to grant or deny access. adds access delegation. The code is then sent to the client provided.

Security 105
article thumbnail

Application Security: Complete Definition, Types & Solutions

eSecurity Planet

Also read: Database Security: 7 Best Practices & Tips Use better and unique passwords to protect your data from breaches, reduce identity theft, and better protect sensitive and personal information. Threats such as SQL injection and cross-site scripting ( XSS ) attacks can be minimized with techniques such as input sanitization.

article thumbnail

The British Library?s International Library Leaders Programme

CILIP

The British Library?s s International Library Leaders Programme. Ilene McKenna is the Lead Archivist, Archival Information System Renewal at Library and Archives Canada. In November 2019, she had the opportunity to take part in British Library?s s International Library Leaders programme. Background.