Top picks
Privacy and security
The discussion began by addressing what’s on the horizon for information security. Carver noted that, for public libraries, there had been a few positive developments recently. The “slow but welcome disappearance of Flash and Java” on the web has helped make public computers more secure, he noted as an example. But new threats are arising, such as ransomware—malware that enables hackers to remotely encrypt the files on a computer, and then demand money for unlocking the files. “There’s big money in that, and of course, the bad guys…are building really really good tools to do this,” he said. Reiterating the concepts that she discussed as a top trend, Coulter argued that “libraries need to, again, balance that fear and overreaction in some ways to security concerns. You can get yourself tied up in knots about this stuff. You have to balance it against what’s practical in your own library. If you do the practical things—if you have good backups, you don’t have to pay ransomware. If you are running your patches properly [and are performing other] good solid, everyday IT practices,” libraries will be able to mitigate most threats. Also, patrons are becoming more aware of online threats, Carver said. “These things are becoming more front-and-center issues, partially because things are getting so bad.” If someone is a victim of ransomware, for example, their friends and family members will hear about it and many will take steps to learn more about security, he noted. And libraries are well positioned to be a resource that can help interested patrons with this increasingly important topic. By the same token, Coulter said that libraries need to ensure that their own staff follow good security habits internally, and eliminate bad practices such as common logins. “There’s a lot of people out there that don’t understand these things, and it’s our responsibility [as IT staff or technology experts] to educate our administration as well as our patrons,” she said. An institution’s “security is only as strong as that one employee that doesn’t know not to click” a malicious link or file, Comito added. Coleman agreed, noting that “common sense isn’t so common. Someone is going to click that [malicious] link. As frontline staff and system administrators, we all are responsible for training our users, whoever they are.” On a related note, panelists later discussed the challenges and the necessity of providing continued support for older devices, operating systems, and applications used by patrons. “There’s got to be a cutoff somewhere,” Carver said. “I’m not in a position to make this decision for a library anymore, but I would cut it off really fast, especially with [security problem–prone applications such as] Internet Explorer, Flash, and Java.” Continuing support for older equipment can also slow projects like website development, Coulter noted. “How long do you have to limp along with old screen resolution?” she said. “There has to be a tipping point where you say we’ve moved on to what’s popularly accepted as modern technology. And you can get that from looking at your [website] analytics.” Comito countered that many patrons may not have the money to upgrade their personal computers or phones, and that if a library discontinues support for older devices, those patrons may no longer be able to access a library’s services offsite.Makerspace trends
The Maker space trend has continued to grow, and Grove noted that smaller libraries—possibly encouraged by successful projects they’ve seen at larger institutions—have begun developing projects of their own. “It’s not as scary for that one-person library that serves a town of 400” to develop a hands-on workspace for its community. However, Grove emphasized, the Maker movement is not defined by trendy equipment. “Just because you have a 3-D printer doesn’t mean you have a Maker space, and you can have a Maker space without having a 3-D printer…. It’s about making Makers, not spaces...[and] focusing on having a dedicated space is not as important.” Costello said that Maker spaces and other types of hands-on workspaces have been evolving in academia as well. “Spaces that support different types of learning, whether they are Maker spaces or different, more active learning spaces in libraries have been a huge trend—anything from a learning commons to something like a learning theater space…. I think we also, in academic libraries, see different groups of users using Maker spaces…differently.” 3-D printers, for example, are used for different purposes by students and researchers in the health sciences, architecture, or business departments. Unfortunately, many library systems provide uneven access to these hands-on tools and programs, Comito noted. “I think we need to start thinking about where we are putting them,” she said. “Are you putting them in the shiny central library, or are you going out into neighborhoods and making sure everyone has access to a Maker space, even if they each need to be a bit smaller to accommodate that?”Not so hot
The panel rounded out the session by discussing what they considered to be overstated trends. “Yik Yak. Never go on it,” Costello said, drawing laughs from the large audience. “Don’t read what [students] are saying about your library on it. It’s just going to make you cry.” The anonymous, location-based commenting site is often used by students as a “slam book” for harsh criticism. On a more serious note, Grove said that he believes the Internet of Things is still a few years away from living up to the potential that manufacturers and vendors are already hyping. “Long term, I think it has a lot of applications, and it could be a really big thing. But short term, let’s say three years, [for the] mainstream? I don’t see Internet of Things being as big as it has been proclaimed to be over the last few years.” Coleman agreed, and added that a lot of these new Internet connected smart devices that manufacturers have been creating have security flaws, and can leak personal data both to manufacturers and potentially to malicious third parties. And Carver encouraged the audience to take a look at shodan.io “if you want to see what a horrible nightmare the Internet of Things [is for privacy].... It’s a horrible security afterthought at this point. I’m hoping that Nick [Grove] is right and it will be a few years before these things really take off” and some of the security issues will be addressed during that interval. Referencing an alarming WIRED article from last summer, Coulter pointed out “I bet a great many of us in this room are driving cars that are hackable.”We are currently offering this content for free. Sign up now to activate your personal profile, where you can save articles for future viewing
Add Comment :-
Comment Policy:
Comment should not be empty !!!