Skip to main content

RFS 2.0 – A Year On

RFS 2.0 – A Year On

Today’s guest post is from Kate Murray (Digital Projects Coordinator, Digital Collections Management & Services Division), Marcus Nappier (Digital Collections Specialist, Digital Content Management Section), and Ted Westervelt (Chief, US/Anglo Division) at the Library of Congress. Introduction As the Library of Congress expands its digital collecting activities, the Recommended Formats Statement (RFS) has revised its […]

Computing Cultural Heritage in1

The following is a post by Alice Goldfarb, an LC Labs team Innovation Specialist working on the Computing Cultural Heritage in the Cloud (CCHC) initiative at the Library. As we recently announced, we are working with three digital humanities researchers as part of the Computing Cultural Heritage in the Cloud (CCHC) initiative, where we are […]

AssetFinder: A Handy Subdomain1

The process of discovering “what service is hosted where” can prevent most common causes of security-related incidents. Things like outdated installs, abandoned installations and in-development software running on publicly accessible domains are a major source of such attacks. Domain and specially subdomain discovery is a critical skill for hackers, security researchers and pentesters. Therefore, using […]

Serial Swatter Who Caused Deat1

A 18-year-old Tennessee man who helped set in motion a fraudulent distress call to police that lead to the death of a 60-year-old grandfather in 2020 was sentenced to 60 months in prison today. 60-year-old Mark Herring died of a heart attack after police surrounded his home in response to a swatting attack. Shane Sonderman, […]

More proof that information wa1

More proof that information wants to be free?

Originally noted by ResearchBuzz, from PsyPost: The “Sci-Hub effect” can almost double the citations of research articles, study suggests. The researchers found that articles downloaded from Sci-Hub were cited more frequently compared to articles not downloaded from Sci-Hub. After controlling for variables such as the number of figures included in a paper, title length, the […]

Computing Cultural Heritage in1

The following is a post by Olivia Dorsey, an LC Labs team Innovation Specialist working on the Computing Cultural Heritage in the Cloud (CCHC) initiative at the Library. Hello! Things have really started to get underway with the Computing Cultural Heritage in the Cloud (CCHC) initiative, like rounding out our team and the arrival of […]

Spam Kingpin Peter Levashov Ge1

Peter Levashov, appearing via Zoom at his sentencing hearing today. A federal judge in Connecticut today handed down a sentence of time served to spam kingpin Peter “Severa” Levashov, a prolific purveyor of malicious and junk email, and the creator of malware strains that infected millions of Microsoft computers globally. Levashov has been in federal custody […]

Making Room in the Crowd: Libr1

In today’s post, By the People community managers Carlyn Osborn, Lauren Algee, and Abby Shelton reflect back on changes in their program since March 2020. Launched in 2018, By the People is a volunteer engagement and collection enhancement program at the Library of Congress that invites the public to explore and transcribe documents on the […]

Intrusion Detection Systems: T1

Much of this focus has come about to address the sheer volume and sophistication of cyber threats in today’s landscape. The rise of malicious actors seeking to compromise data, steal information, disrupt services and cause damage has led to the implementation of numerous defense strategies, practices and technologies. Encrypting data, using firewalls to prevent unauthorized […]

Don’t Wanna Pay Ransom Gangs?

Browse the comments on virtually any story about a ransomware attack and you will almost surely encounter the view that the victim organization could have avoided paying their extortionists if only they’d had proper data backups. But the ugly truth is there are many non-obvious reasons why victims end up paying even when they have […]

Computing Cultural Heritage in1

Alice Goldfarb, Innovation Specialist at the Library of Congress. Alice is working on Computing Cultural Heritage in the Cloud (CCHC). Photo credit: Becky Lettenberger We’re thrilled to share that Alice Goldfarb has joined the LC Labs team as an Innovation Specialist! Alice will be working on the Computing Cultural Heritage in the Cloud (CCHC) initiative at […]

IP Discovery: How to Create a 1

It provides a modern perspective for securing one’s virtual organization, in the same way that an organization’s physical office and assets are secured. And with the increasing frequency and sophistication of internet attacks, the need to secure one’s organization becomes more important every day. With the rise of IPv6 and the shortage of IPv4, newly […]

Microsoft Patch Tuesday, July 1

Microsoft today released updates to patch at least 116 security holes in its Windows operating systems and related software. At least four of the vulnerabilities addressed today are under active attack, according to Microsoft. Thirteen of the security bugs quashed in this month’s release earned Microsoft’s most-dire “critical” rating, meaning they can be exploited by […]

Spike in “Chain Gang” Destruct

Last summer, financial institutions throughout Texas started reporting a sudden increase in attacks involving well-orchestrated teams that would show up at night, use stolen trucks and heavy chains to rip Automated Teller Machines (ATMs) out of their foundations, and make off with the cash boxes inside. Now it appears the crime — known variously as […]

Recruit, Retain, and Engage

On February 19, United for Libraries (UFL) hosted “Friends and Trustees under 40: Recruit Them, Retain Them, Engage Them,” a webinar featuring tips for attracting millennials and younger adults to Friends groups, trustee boards, and foundations. The session was moderated by Jillian Wentworth, UFL’s manager of marketing and membership, and presented by members of UFL’s […]

Intellectual Freedom: A Manual1

First published in 1974, the American Library Association’s (ALA) Intellectual Freedom Manual has become an essential reference for library workers who need dependable answers to thorny questions about book challenges, patron privacy, and policy development for their institutions. The 10th edition, coedited by Martin Garnar, director of Amherst (Mass.) College Library and former president of […]

A Deeper Look: Censorship beyo1

Programming such as drag queen story hours has been subject to challenges. Photo: Jennifer Ricard Just as books are sometimes challenged and banned in libraries, schools, universities, and public institutions, other library materials, resources, and services have been challenged, canceled, or dismantled. People’s perception of offensive content is not limited to the written word. Censorship […]

2021 International Innovators

Students compete in the Virtual Library InfoLit Race Challenge at Nazarbayev University Library in Nur-Sultan, Kazakhstan Five libraries earned this year’s American Library Association (ALA) Presidential Citation for Innovative International Library Projects. The winning projects include programs that offered online academic aid and games to college students during the pandemic; examined the significance of historic […]

Catalog Locally, Share Globall1

If you have paid any attention to cataloging matters over the past three years, you might have heard rumblings about something called the 3R Project, which is having a large impact on RDA cataloging. RDA, or Resource Description and Access, is the successor to AACR2 (Anglo-American Cataloging Rules, second edition), the cataloging system developed nearly […]