Skip to main content

A Deeper Look: Censorship beyo1

Programming such as drag queen story hours has been subject to challenges. Photo: Jennifer Ricard Just as books are sometimes challenged and banned in libraries, schools, universities, and public institutions, other library materials, resources, and services have been challenged, canceled, or dismantled. People’s perception of offensive content is not limited to the written word. Censorship […]

2021 International Innovators

Students compete in the Virtual Library InfoLit Race Challenge at Nazarbayev University Library in Nur-Sultan, Kazakhstan Five libraries earned this year’s American Library Association (ALA) Presidential Citation for Innovative International Library Projects. The winning projects include programs that offered online academic aid and games to college students during the pandemic; examined the significance of historic […]

Catalog Locally, Share Globall1

If you have paid any attention to cataloging matters over the past three years, you might have heard rumblings about something called the 3R Project, which is having a large impact on RDA cataloging. RDA, or Resource Description and Access, is the successor to AACR2 (Anglo-American Cataloging Rules, second edition), the cataloging system developed nearly […]

Bookend: Beyond Words

Tenzin Kalsang, children’s librarian at Brooklyn (N.Y.) Public Library’s Williamsburg branch, performs Tibetan storytimes for users around the world. Photo: Todd Boebel When Tenzin Kalsang, children’s librarian at Brooklyn (N.Y.) Public Library’s (BPL) Williamsburg branch, started an online series of bilingual storytimes in April 2020, the native Tibetan speaker couldn’t have predicted she’d become an […]

A Little Light to See By

A confession: I had intended to write about the strategic planning work that we have been engaged in across the Association for the past year. It’s work that centers on the financial stability and membership growth required to achieve ALA’s goals of universal broadband (and the educational, employment, and public health access that depend on […]

Libraries Connect Us

Connection—across our diverse backgrounds, experiences, and futures—is a theme of my presidential year, and it is a necessary conversation. Demographers predict that by 2050, African Americans, Asian Pacific Islanders, Latinx, and Indigenous people will constitute the majority of Americans. So how does the American Library Association (ALA) fit into our rapidly evolving democracy? How can […]

2021 Annual Conference Wrap-Up

Though the ongoing pandemic prompted the American Library Association (ALA) to hold its 2021 Annual Conference and Exhibition virtually June 23–29, there was no shortage of enthusiasm or curiosity among the more than 9,100 attendees who gathered online to hear from speakers and authors and share their experiences. Nikole Hannah-Jones Headlining speakers talked about books, […]

Kaseya Left Customer Portal Vu1

Last week cybercriminals deployed ransomware to 1,500 organizations, including many that provide IT security and technical support to other companies. The attackers exploited a vulnerability in software from Kaseya, a Miami-based company whose products help system administrators manage large networks remotely. Now it appears Kaseya’s customer service portal was left vulnerable until last week to […]

Passive Marketing: Going Digit1

Passive programs in the physical locations are nothing new to libraries; however, with the changing behaviour of visitors, passive programs should be considered on a digital platform as well. Stephen Abram shares his advice on how libraries can start developing their own programs to suit their communities. Read more below! Promoting the Full Digital Library: […]

JA3 Fingerprinting: Functional1

Consequently, if there’s one resounding principle actionable intelligence via internet scanning has taught us, it is that adopting a proactive attitude towards accurate threat identification and correlation is the necessary first step if we are serious (or even care) about evidence-based knowledge and contextualization dictating the flow of any successful investigation. This is particularly true […]

Microsoft Issues Emergency Pat1

Microsoft on Tuesday issued an emergency software update to quash a security bug that’s been dubbed “PrintNightmare,” a critical vulnerability in all supported versions of Windows that is actively being exploited. The fix comes a week ahead of Microsoft’s normal monthly Patch Tuesday release, and follows the publishing of exploit code showing would-be attackers how […]

Another 0-Day Looms for Many W1

Some of Western Digital’s MyCloud-based data storage devices. Image: WD. Countless Western Digital customers saw their MyBook Live network storage drives remotely wiped in the past month thanks to a bug in a product line the company stopped supporting in 2015, as well as a previously unknown zero-day flaw. But there is a similarly serious […]

Intuit to Share Payroll Data f1

Financial services giant Intuit this week informed 1.4 million small businesses using its QuickBooks Online Payroll and Intuit Online Payroll products that their payroll information will be shared with big-three consumer credit bureau Equifax starting later this year unless customers opt out by the end of this month. Intuit says the change is tied to […]

LC Labs Welcomes Computing Cul1

LC Labs Welcomes Computing Cultural Heritage in the Cloud (CCHC) Researchers!

June 2021 LC LABS LETTERA Monthly Roundup of News and Thoughts from the Library of Congress Labs Team Welcome, CCHC researchers! Funded with a 2019 $1 million grant from the Andrew W. Mellon Foundation, the Computing Cultural Heritage in the Cloud (CCHC) initiative aims to better serve research and creative uses of Library of Congress […]

What is the NIST Cybersecurity1

Consequently, cyber attacks have become more widespread and sophisticated, impacting the critical infrastructures of many organizations and gaining access to their most valuable assets. Besides investing in technology, organizations should turn to relevant policies and industry standard frameworks to better inform their practices. It’s a critical step toward keeping data and systems secure and managing […]

Incident Response in Cybersecu1

We often say that in cybersecurity, it’s important to think about “when” an attack will occur, not “if” it will occur. And while being proactive is touted as the key to an organization’s most effective security posture, one should never dismiss the value of reactive security practices, either. Building up your defences against attacks and […]

MyBook Users Urged to Unplug D1

Hard drive giant Western Digital is urging users of its MyBook Live brand of network storage drives to disconnect them from the Internet, warning that malicious hackers are remotely wiping the drives using a critical flaw that can be triggered by anyone who knows the Internet address of an affected device. One of many similar […]

New to me: Google Scholar “Pub

New to me: Google Scholar “Public Access” feature

I was alerted to a new(ish?) feature within Google Scholar earlier this week by this blog post: What does this new Google Scholar “Public Access” feature mean for me or my work? More information on the Google Scholar site itself: https://scholar.google.com/intl/en/scholar/citations.html?1#publicaccess. From that original post: The new Google Scholar feature is a reminder that it […]

The Law of Attraction: Tech an1

On this week’s Princh Library Blog post guest writer Michelle De Aizpurua shares a few pieces of advice on how to attract teens to the library. Technological initiatives that can be used to attract students to the library Attracting young people to the library can often be a challenge, there’s many competing demands on a […]