User Behavior Access Controls at a Library Proxy Server are Okay
Earlier this month, my Twitter timeline lit up with mentions of a half-day webinar called Cybersecurity Landscape - Protecting the Scholarly Infrastructure. ...
Earlier this month, my Twitter timeline lit up with mentions of a half-day webinar called Cybersecurity Landscape - Protecting the Scholarly Infrastructure. ...
I may nod off several times in composing this post the day after election day. Hopefully, in reading it, you won’t. It is a story about one corner of democ...
This is an article draft that was accidentally published. I hope to work on a final version soon. If you really want to see it, I saved a copy on the Interne...
During the inaugural NISO Plus meeting at the end of February, I was surprised and proud to receive the Ann Marie Cunningham Service award. Todd Carpenter, ...
I saw it happen. The cable-chewing device The contractor in the neighbor’s back yard with the Ditch Witch trencher ...