1. LITA Session Identifies To

advertisement
*****netWork: The Newsletter of the OLC Automation & Technology Division*****
In this issue:
1. LITA Session Identifies Top Tech Trends
2. DIY ~ Remote Access to Subscription Databases
3. VPN Technology for Remote Staff Access
4. IT Department FAQ--Humor
5. Technology Cartoon Sites (more than one cartoonist)
6. Technology Cartoon Sites (single cartoonist)
7. Password Security Part One: Why Do Libraries Need It & How Much Do They Need?
8. A New Look at Groupware in a Library Setting
*LITA Session Identifies Top Tech Trends*
At the Midwinter Conference of the American Library Association in Washington, DC,
on January 14, 2001, LITA held its third annual discussion of trends you need to be
aware of in planning for your library. Here are the 5 most important current trends
identified by Karen Coyle, Clifford Lynch, Eric Lease Morgan, Thomas Peters, Joan Frye
Williams, and Tom Wilson.
Trend #1:
The group is still keeping a close eye on trends in e-books, but the picture has remained
murky as to what formats and reading devices will continue to be viable. Microsoft,
Adobe, and Gemstar have emerged as major players. The group did agree that, in a
variety of ways we can't even foresee yet, e-books are giving birth to the concept of the
book, not as fixed and unchanging, but renderable in a variety of forms.
Trend #2:
In today's electronic, quick-response world, libraries may not be able to rest solely on
their free-access laurels. Although in the days of the digital divide, libraries are even
more important as an open and equitable public-access point for the world of information,
a large part of our clientele are getting used to speed and demanding convenience. They
are becoming used to having convenient options if they're willing to pay for them.
Trend #3:
Users are asking "Why can't the library's catalog search a million items as fast as Google
can search a billion?" and they may soon be asking "Why does the library take the time to
tell me how many centimeters tall a book is, but nothing about whether it's any good or
not?" If we continue to see the world solely through the prism of the library catalog, will
we be looking at that world all by ourselves?
Trend #4:
How can we "automate the shop floor" of the library? The shortage of library
professionals means that the jobs of those we do have need to be "reprofessionalized,"
and the productivity of laborious functions like physical inventory (collection)
management must be increased. Radio Frequency Identification technology used to track
library materials is already being implemented. Could Speedpass automatic payment
technology help? Libraries must look to functions in industry comparable to those we do,
in order to survive and thrive.
Trend #5:
Will attempts to "repatriate" the Web be successful? Yahoo's imbroglio with France over
the sale of Nazi memorabilia on its auction site and Germany's attempts to fight neo-Nazi
hate speech on the Web raise the question "How 'world wide' is the Web?" The group did
not believe that ultimately countries would be successful in enforcing national laws in an
international arena, but already these attempts have resulted in changes in what some
major Web players allow through their sites.
For more information, see the LITA website at www.lita.org. Note: This information is
from “2001: a Technology Trends Odyssey” located at
http://www.lita.org/committe/toptech/mw2001.htm. We invite you to visit this website
for a bibliography of additional sources on these trends.
**************************************************
*DIY ~ Remote Access to Subscription Databases*
Tracy Strobel, Web Applications Supervisor
Cleveland Public Library
Tired of depending on vendors to supply you with a way to authenticate users for remote
access to subscription databases? Or are you avoiding offering remote access all together
because of the potentially tricky technology involved with authenticating your patrons?
There are easy to use tools that can help you expand your online resources to patrons at
home, work and school.
One such tool is EZProxy (http://www.usefulutilities.com/ezproxy). This handy piece of
software, developed specifically for libraries, works by operating as an intermediary
server between your users and your licensed databases. The link to a database from your
Web page is preceded by your Ezproxy URL. When your users connect to your Ezproxy
server, it then connects to your licensed databases. Since the Ezproxy server is on a
server on your network, your database vendor (who is doing IP authentication) sees the
requests as coming from an IP address on your network, so it permits access. A
customizable page requests your patrons' library card number and checks it against a
predefined scheme before granting access to the database.
So what do you need to make it work?
> A Web server
> The EZProxy software (just $495.00)
> A day to install and configure the software
Database vendors are increasingly willing to permit remote access but often don't have
the technical infrastructure to create and support a means to provide it. With tools like
EZProxy, we can take control of remote authentication and open our online resources to
our patrons from anywhere, anytime.
**************************************************
*VPN Technology for Remote Staff Access*
George Lenzer
Network Systems Supervisor, Cleveland Public Library
How many times have you found yourself in need of accessing internal resource on your
network while at a remote location? You have your laptop with you and an Internet
connection, but you just can't get past the Internet security of your network. Perhaps it's
time that you consider Virtual Private Networking (VPN) for you and your remote staff
users.
The basic idea behind VPN is to use the Internet as a conduit, or tunnel, to your internal
network. The remote staff user connects to their ISP (dial-up, DSL, or even another
Internet connected LAN) as usual, and then establishes a connection to their home
network using a VPN client. The client requests the set up of an encrypted, secure tunnel
with the VPN device on the home network. Next the VPN device on the home network
checks against some type of authentication mechanism (NT Authentication, Cisco or
UNIX based authentication) to make certain that the remote user is a legitimate user. If
the authentication procedure is successful, the VPN device sets up the tunnel and the
client is connected.
VPN connections are identical to being connected to an Ethernet jack within the physical
plant of the home network. Your remote user will have an IP assigned from within their
home network for the VPN connection. They will be able to use some resources on your
network, such as printers, shared files or thin client servers. Your remote user will have
access to all the resources behind your firewall. The tunnel itself is encrypted to ensure
that the VPN traffic is safe for traversing the Internet. The only limitation to this type of
connection is bandwidth. You wouldn't want to use a 56K VPN connection to install
software, but you can use it to open a small MS Office document.
VPN can be a very useful solution to allow trusted remote users full access to your
internal network resources without the need for a dedicated point-to-point connection. In
today's Internet connected libraries, VPN is a great fit for the road warrior.
For more information, try these Web sites:
Microsoft: Virtual Private Networking: An Overview
http://www.microsoft.com/windows2000/techinfo/howitworks/communications/remoteac
cess/vpnoverview.asp
VPN Insider.com
http://www.vpninsider.com/
Cisco Hardware and VPN Clients Supporting IPSec/PPTP/L2TP
http://www.cisco.com/warp/public/707/cmatrix.shtml
**************************************************
*IT Department FAQ*
(courtesy of the IT Department at Cleveland Heights-University Heights Public Library)
Q: What is a “geek,” really? I don’t see you guys with pocket protectors!
A: Well, this is a highly subjective question. There are many categories of geeks and
even sub-categories of geeks. Virtually none come outfitted with pocket protectors.
However, we have attempted to compile a short guide to the definitive, broad
characteristics of an official geek.
1. Quake, caffeine and lack of light rate the bottom rung on Maslow’s pyramid.
2. You know that Archie and Veronica are NOT comic characters and you don’t look for
a gopher in your yard
3. Linus Torvalds, Larry Wall, Mark Minasi and/or Richard Stallman are minor deities in
your universe
4. Your favorite shopping site is ThinkGeek.com
5. Your tax refund is ALWAYS spent on computer hardware. Who needs vacations?
6. There are more computers in your house than chairs
7. Your pet is named “Packets”
8. Your kids all have stuffed Tux penguins
9. Actually, you don’t have kids. You have PDA’s and workstations with human names.
Your favorite is Hal.
10. You have a bumper sticker that says “My website was /.”
We hope this is somewhat enlightening. If not, you may require a geek-to-human
interpreter.
**************************************************
*Technology Cartoon Sites (more than one cartoonist):*
CartoonBank.com: www.cartoonbank.com: This is the New Yorker’s collection and is
one of the best collections I found. It is strictly one panel cartoons and not a strip unlike
many of the other sites listed here. The index includes cartoons on computers, the
Internet and technology.
Very Funny Pics.com: www.veryfunnypics.com
This site also has some nice cartoons (including a section on Microsoft), but there is a lot
of advertising that pops up as well. At least three ads opened when I hopped onto a link
for the archives and it seemed to be the norm when I was moving elsewhere in the site.
Bamdad’s Math Comics Page: www.csun.edu/~hcmth014/comics.html
Yup, this site is full of cartoons that are math-related. But don’t worry they can be
enjoyed by anyone, not just the mathematically inclined.
Microsoft Editorial Cartoons: http://cagle.slate.msn.com/microsoft/
This site is, as the name implies, editorial cartoons on Microsoft.
‘Puter Toons Postcard Rack: http://microimg.com/postcards/cardrack8-4x.html
If you enjoy these cartoons, you can send them on to lighten someone else’s day.
**************************************************
*Technology Cartoon Sites (single cartoonist):*
Business and Computer Cartoons: www.glasbergen.com
All by Randy Glasbergen, the name of the site says it all.
Cran and Lerma Cartoons: http://toons.net/xstrip.asp
Topical ‘Net-related comic strip by Nik Scott.
The Official Dilbert Website: www.dilbert.com
If you need a Dilbert fix, this is the official site of the strip by Scott Adams.
The Fifth Wave: www.the5thwave.com
These comics by Rich Tennant can also found in some of the computer oriented books
part of the IDG …For Dummies series.
Geek-O-Rama: www.geek-o-rama.net
Terry McElligott pens this cartoon aimed at, you guessed it, geeks. It also has links to
other sites of interest to “geeks”.
Geeks: www.happychaos.com/geeks/
Julie Sigwart puts this comic out that seems to be from the frustrated techs point of view
(as in…”how many times do I have to explain how to use the scroll bar?”, etc.)
Helen, the Sweetheart of the Internet: www.comicspage.com/helen/
Peter Zale, an Ohio native, puts out this strip from the point of view of a female
computer tech.
Joy of Tech: www.joyoftech.com
Dilbert-like in feel but more techie-oriented.
Kevin and Kell: www.kevinandkell.com
Online syndicated comic strip by Bill Holbrook about a techno-savvy rabbit and the shewolf he married after meeting in a chat room.
Net-Wits: www.bminteract.com/netwits
Web frustration humor by Bill Morrison.
Off the Mark: www.offthemark.com/computers.htm
A comic by Mark Parisi that includes a section on the joys and frustrations of owning a
computer.
User Friendly: www.userfriendly.org
Daily comic strip about a small, hard-working ISP by Illiad.
**************************************************
*Password Security Part One: Why Do Libraries Need It & How Much Do They Need?*
Matt Hoffman, Network Administrator
Cleveland Heights-University Heights Public Library
At some point, the security of any network comes down to whether someone knows a
user name and password combination or not. Depending on the rights and permissions
assigned to that user account, someone can do massive damage or very little damage. If
you are running a tightly controlled high-security network, say, for a legal firm or
hospital, it’s easy for employees to see why secure passwords should be necessary. But
in a library environment, it’s pretty typical to see that your staff doesn’t think that they
have anything worth securing, and that’s where things fall apart.
Most of us in the library technology world do have some sort of network security plan in
place. It’s necessary these days to have some sort of protection for your own, and others,
networks. Many libraries will have firewalls between your network and ISP, public
machines locked down tight with group policies, antivirus software installed, and locks
on the door to your server room. These things are basically transparent to our staff, so we
set them up and proceed on our merry way. But when it comes to passwords, we often go
soft; our staff personnel don’t even understand why we have passwords to begin with, let
alone having to make them complex or changing them periodically. So, we give them
some default password and hope that nobody else figures it out.
This is where it is very important that you begin thinking about making your security
plan include passwords that are of higher complexity. NT can be set to require a
password to be a certain minimum length. This is a good start. The longer the password,
the more difficult it is to figure out. Staff should be instructed to create passwords that
contain more than just words, names, dates, etc. A complex password should have a
combination of letters, numbers, and non-alphanumeric characters (e.g. punctuation
marks) to make it hard to crack. There is a method of enforcing password complexity in
NT; however the kind of password complexity it will want to see is probably beyond
what you want to put your users through.
Unfortunately, passwords are a weak link in any security plan. At some point, one of
your users is going to leave their password lying around on a scrap of paper where
someone who shouldn’t be seeing it can easily find it. It’s inevitable, so your staff should
be instructed to be as careful as possible with their passwords. A hacker would love to
luck into just such a situation; however, they often employ other means to get your
passwords. There are a number of readily available applications out there that can be
used to crack your passwords (Lophtcrack is a good example). It’s really not a matter of
if your system gets hacked, but when. So, it’s important to make things as difficult on an
intruder as possible.
Additionally, your network does have vital information on it that you wouldn’t want
someone tampering with, even if the data actually is a matter of public record. Human
Resources and Payroll information are just two areas that you would not want
unauthorized personnel to have access to. The damage that could be done there alone is
worth the security. Doubtless you should have set up your system so that only certain
accounts have access to specific resources, but why take the risk? Making life difficult
on hackers is always a good thing.
Remember, network security should be viewed as being similar to preventative medicine;
an ounce of prevention is worth a pound of cure. You don’t want your data hacked, other
networks attacked, or your time wasted. Password security is a basic and necessary part
of your overall security plan, and is relatively simple to implement if you can get the
support of your staff.
Next issue: What to do and how to do it
**************************************************
*A New Look at Groupware in a Library Setting*
Shawn Walsh, Network Administrator
Hubbard Public Library
“Chat” is a word that usually invokes some sort of emotional reaction in the public
library sector. Whether you love or hate it, it is a medium is joined at the hip to Internet
access. Many librarians link chat to teenagers who tie up computers (just to instant
message the person sitting two computers away), or to cyber stalkers preying on innocent
children.
However, chat has some concrete benefits for libraries. As chat has evolved, it has
become heavily used in the corporate world for use in business communication. This
attention has brought new features to the simple chat program; these features include
whiteboards, video and audio communication, peer-to-peer file sharing and desktop
control, just to name a few. These changes have changed chat into what is more
commonly referred to as “groupware,” although the question remains: what good is
groupware in a library setting?
The main advantage is that groupware provides inexpensive communication between
library buildings and/or systems. Since most libraries have a T1 line, we can take
advantage of all the features of a freeware chat client. This is where groupware can
really shine for a public library.
Take the example of a rural branch library with limited staff and a difficult reference
question to answer. In this case, the reference librarian has exhausted his/her reference
collection and that of their colleagues. They could call around to neighboring libraries,
tying up a library phone line, and depriving other patrons of services. Alternatively, they
could send out emails to those same neighboring libraries and wait a day or more for a
response, but we know most patrons want their information as soon as possible.
Therefore, our groupware-savvy librarian starts up the groupware client. Instead of
contacting neighboring libraries, our librarian has access to librarians anywhere in the
state, or even the world. Soon enough our librarian has the answer and another patron
has received prompt accurate service that libraries always provide.
Groupware can also provide other money and timesaving services. Groupware can
allow a library staff member to be in two places at once. This is done by allowing staff
members to attending meetings or workshops without leaving the confines of the library.
The obvious savings in travel time and expense are appealing, particularly when the
weather is unpleasant or budgets are tight.
Internet-based groupware is still somewhat in its infancy, but it would truly behoove
libraries to get in on the ground floor, instead of trying to play catch-up. Good examples
of chat/groupware clients include:
* ICQ (http://web.icq.com/)
* AOL Instant Messenger (http://www.aolinstantmessenger.com)
* Microsoft Network Messenger (http://messenger.msn.com/)
* Yahoo Messenger (http://chat.yahoo.com/)
*Trillian -a messaging client that allows a user to be on *all* the aforeMentioned networks simultaneously (http://www.trillian.cc/)
It is also worth mentioning Microsoft Net Meeting
(http://www.microsoft.com/windows/netmeeting/default.asp), which represents an
excellent Internet-based groupware product. Several other products that Lotus, Novell,
and Microsoft produce that are excellent, but are rather costly and would likely be
overkill for a typical library application.
It is important to mention some of the failings of groupware, so it is understood that
this is still an emerging technology. Firstly, video over the Internet is choppy at best, and
is not conducive to good face-to-face communication. However, it does offer a timelapsed idea of what emotions you co-viewer is expressing. Secondly, sound (except the
costly voice-over-IP solution) is akin to talking on a two-way radio, with its
asynchronous communication. Yet it is still is far cheaper than a phone call to Canada or
even to a neighboring state. Perhaps the greatest pitfall is the learning curve, which can
be daunting. In my experience, most library personnel are more than able to learn if they
have hands-on training. Finally, most of the chat/groupware programs available today
have a proprietary format which make them completely incompatible with each other; but
this can be remedied with a program like Trillian which allows a user to use multiple chat
clients at once.
Chat and groupware need to be revisited by libraries. The potential benefits for
patron service and communication are extensive and, as the Internet evolves, groupware
will likely become the dominant form of online cooperation. Despite the current
drawbacks to chat/groupware, the benefits far outweigh the problems.
Download