NISO Workshop Exploring the Discovery Layer; March 27-28, 2008; Chapel Hill, NC

NISO is conducting a workshop later this month called Next Generation Discovery: New Tools, Aging Standards. The workshop is described this way: “Discovering scholarly information and data is essential for research and use of the content that the information community is producing and making available. The development of knowledge bases, web systems, repositories, and other sources for this information brings the need for effective discovery — search-driven discovery and network (or browse) driven discovery — tools to the forefront. With new tools and systems emerging, however, are standards keeping pace with the next generation of tools? What’s coming up and where might standards fit to assist in this arena? The forum will include both a look at the current state of discovery tools and at new visions of what these tools might look like in the next several years.”

What’s the Deal with NCIP?

What’s the deal with NCIP? For those that don’t know, NCIP is the NISO protocol that attempts to “define the various transactions needed to support circulation activities among independent library systems.” For example, “patron and item inquiry and update transactions, such as hold or reserve, check-out, renew, and check-in.”

NISO IR Presentation: “The Third Wave of Library Information Stewardship”

On Monday, I had the honor and pleasure of speaking at the NISO workshop “Getting the Most Out of Your Institutional Repository” on the topic of The Third Wave of Library Information Stewardship. The presentation abstract was:

[Academic] Libraries are gearing up for the third wave of information under our stewardship. In the first wave, libraries purchased, made discoverable, and managed information from commercial sources in physical forms (e.g., paper-bound monographs, traditional serials, and microform archives). In the second wave, libraries licensed, made discoverable, and supported information from commercial sources in digital form (e.g., electronic journals, index/abstract databases, and image collections).

Notes from the LITA Standards IG meeting

[Aside: I'm not quite sure what the procedure is for posting on LITAblog.org. This report was posted there last night to appear at something like http://www.litablog.org/2007/06/23/standards-ig/ but it seems to be stuck in a moderation queue of some sort. I'm reposting it here to get it out to the membership.

Update 20070625T0943 : It was posted as http://www.litablog.org/2007/06/24/standards-ig/.]

Authentication and Access in a Metasearch Environment

Mike Teets of OCLC and I teamed up to write an article on Metasearch Authentication and Access Management for this month’s D-Lib Magazine. The first part of the article is a bit of a primer on access management techniques followed by a survey and analysis of access management schemes in use last year. The key part, I think, is the “Recommendations” (access restrictions by IP address plus authenticated proxy servers is the best one can hope for right now) and “Next Steps” (Shibboleth is superior to other access control mechanisms beyond IP/proxy that one might consider, but there is lots of work to be done).