In March, I gave a presentation at the NISO forum on Next Generation Discovery Tools: New Tools, Aging Standards. For those that were there, you may remember the bulk of the presentation was in the screencast tours of the functionality of 10 OPAC enhancement tools. Topping out at over 750MB, the presentation file was too big to share, but I promised to put together a combination of the presentation audio and the screencast videos in a much more manageable size. That video, along with a cleaned up version of the audio, is posted below.
Below are the supplemental links for the presentation at the NISO workshop on discovery layers in Chapel Hill, NC, on March 28, 2008.
Update 20080404T1124 : Carolyn McCallum at Wake Forest University posted a great summary of day two of the NISO discovery layer forum, including an overview of my talk. Thanks, Carolyn!
The presentation started as an extension of a DLTJ blog post. I also mentioned Marshal Breeding’s Library Technology Report published in July/August of 2007 and available from .
NISO is conducting a workshop later this month called Next Generation Discovery: New Tools, Aging Standards. The workshop is described this way: “Discovering scholarly information and data is essential for research and use of the content that the information community is producing and making available. The development of knowledge bases, web systems, repositories, and other sources for this information brings the need for effective discovery — search-driven discovery and network (or browse) driven discovery — tools to the forefront. With new tools and systems emerging, however, are standards keeping pace with the next generation of tools? What’s coming up and where might standards fit to assist in this arena? The forum will include both a look at the current state of discovery tools and at new visions of what these tools might look like in the next several years.”
What’s the deal with NCIP? For those that don’t know, NCIP is the NISO protocol that attempts to “define the various transactions needed to support circulation activities among independent library systems.” For example, “patron and item inquiry and update transactions, such as hold or reserve, check-out, renew, and check-in.”
On Monday, I had the honor and pleasure of speaking at the NISO workshop “Getting the Most Out of Your Institutional Repository” on the topic of The Third Wave of Library Information Stewardship. The presentation abstract was:
[Academic] Libraries are gearing up for the third wave of information under our stewardship. In the first wave, libraries purchased, made discoverable, and managed information from commercial sources in physical forms (e.g., paper-bound monographs, traditional serials, and microform archives). In the second wave, libraries licensed, made discoverable, and supported information from commercial sources in digital form (e.g., electronic journals, index/abstract databases, and image collections).
[Aside: I’m not quite sure what the procedure is for posting on LITAblog.org. This report was posted there last night to appear at something like http://www.litablog.org/2007/06/23/standards-ig/ but it seems to be. I’m reposting it here to get it out to the membership.
Update 20070625T0943 : It was posted as http://www.litablog.org/2007/06/24/standards-ig/.]
ISSN Regina Reynolds, Library of Congress (U.S. ISSN Center)
There are 80 ISSN centers worldwide with about 150 people associated with the assigning of ISSNs.
The ISSN International Center is located in Paris. It assigns the prefixes to ISSN centers and holds a master copy of descriptive metadata — the “Key Title” plus other metadata elements in MARC format — for every assigned ISSN. It also provides documentation, a manual (about 80-100 pages in length) and support for new centers coming on board.
Mike Teets of OCLC and I teamed up to write an article on Metasearch Authentication and Access Management for this month’s D-Lib Magazine. The first part of the article is a bit of a primer on access management techniques followed by a survey and analysis of access management schemes in use last year. The key part, I think, is the “Recommendations” (access restrictions by IP address plus authenticated proxy servers is the best one can hope for right now) and “Next Steps” (Shibboleth is superior to other access control mechanisms beyond IP/proxy that one might consider, but there is lots of work to be done).