Changes

Jump to: navigation, search

2015 Code4Lib Midwest Meeting

225 bytes added, 17:50, 3 August 2015
Tentative Friday, July 24th
10:00 - 10:20: Building Linked Data into your MARC records<br />
Presentation: http://www.slideshare.net/reese_terry/practical-approaches-to-entification-in-library-bibliographic-data
Terry Reese (Ohio State University) -- I'll discuss how MarcEdit does this linking, and share the C# source code that the tool is utilizing within the linking plug-in/assembly.
<br />
1:20 - 1:40: Remediating Loss: emerging roles for librarians - <br />Angela Galvan (Ohio State)<br />Presentation: http://slides.com/angelagalvan/deck-3#/Technology complicates grief and loss in unexpected ways which researchers are only beginning to understand. This presentation discusses thanatosensitive information management, and a growing need to frame the dead as a user group. This talk can form around the interests of attendees. (20 minutes, either day.)
1:40 - 3:00: Workshop (this time is fungible -- it might move slightly)<br />
9:30 - 9:50: <br />
Paul Butler, Ball State University <br />
Presentation: https://github.com/prbutler
EZProxy – The Canary in the Coal Mine for Compromised User Credentials <br />
EZProxy is one of the most used, and exposed, applications that library IT supports. Libraries use EZProxy to restrict access to some of our most coveted resources. As such, EZProxy can be used as one of the frontlines in identifying compromised user credentials. In this presentation Paul Butler (Library Technologies Support Analyst at Ball State University) will discuss the techniques, EZProxy customization, and custom code Ball State University Libraries uses to identify compromised user credentials.
83
edits

Navigation menu