Temple University Libraries' software development team is growing! With
exciting projects currently in development and on the horizon for Temple
University Libraries, this is an opportunity to work as part of a dynamic
and passionate team on highly-active Open Source projects like Hydra,
Fedora
The Islandora Foundation is thrilled to invite you to the first-ever
Islandora Conference, taking place August 3 - 7, 2015 in the birthplace of
Islandora: Charlottetown, PEI.
This full week event will consist of sessions from the Islandora
Foundation, Interest groups, community presentations, two
Hello!
I'm looking for a MARC validation tool (either binary or XML MARC) to identify
formatting and structural errors in MARC records, which can be run in a Unix
environment. Does anyone know of such a tool, or has anyone built something
like this which they'd be willing to share?
Thanks so
Hi, Nate!
Here's the Internet Use Policy that we display for all our public computers
when they log on:
These are Pierce County Library System's rules for use of the Internet.
Failure to use this service appropriately and responsibly may result in
suspension of Internet use privileges,
I believe MARC::LINT
(http://search.cpan.org/~eijabb/MARC-Lint_1.48/lib/MARC/Lint.pm ) provides
some of that functionality (I think).
--tr
-Original Message-
From: Code for Libraries [mailto:CODE4LIB@LISTSERV.ND.EDU] On Behalf Of Dana
Jemison
Sent: Friday, January 23, 2015 3:19 PM
To:
Hi all,
I'd like to have our EZProxy server authenticate users using SIP2,
which is totally supported and documented here:
http://www.oclc.org/support/services/ezproxy/documentation/usr/sip.en.html.
However, I am not enthusiastic about sending unencrypted patron login
information over Telnet or
One of our librarians came across K-State's Assignment Planner
http://www.lib.k-state.edu/apps/ap/
which is based on Minnesota/Minitex's
http://sourceforge.net/projects/research-calc/
We're curious to hear:
1. some anecdotes as to how much use this kind of service gets and
2. if there are
I haven't managed a network for years, but our approach was to provide a
broad statement of what the network was for and to make it clear the
network couldn't be used for malicious or illegal purposes.
The CYA policy is a start but you'll still have to deal with problems such
as people using the
Hi Jason,
I can answer the first question. Since we launched it in Nov/2013 we had
278 assignments scheduled through the system.
Feel free to contact me if you need any other information.
-Dhanushka.
On Fri, Jan 23, 2015 at 1:40 PM, Jason Stirnaman jstirna...@kumc.edu
wrote:
One of our
Howdy all,
I've been toying with the idea of embedding DOI's in all our digital assets
and possibly inserting/updating other metadata as well. However, doing this
would alter checksums created using normal methods.
Is there a practical/easy way to checksum only the objects themselves
without the
We do most of our development work with the Java library MARC4j (you can
output MARCXML, and validate that):
http://marc4j.tigris.org/
And we've used the MARC tools in YAZ on the command line quite often, too:
http://www.indexdata.com/yaz
The LOC has a comprehensive list of tools:
Another question: Are you talking full on AUP or a short statement (like I
provided)?
Sent from my Windows Phone
--
Riley Childs
Senior
Charlotte United Christian Academy
Library Services Administrator
IT Services Administrator
(704) 537-0331x101
(704) 497-2086
rileychilds.net
@rowdychildren
I
Can I just say how much I love this Tech Diversity Bingo Card that was
posted on Geek Feminism recently:
http://www.maleallies.com/
The website is Male Allies but the bingo card is designed to be
applicable to allies of any historically marginalized group in tech. I also
like that -- unlike many
Digitization Services Manager
New York Public Library
Long Island City
_**Overview:**_
The Digital Imaging Unit of NYPL Labs is seeking a visionary, inventive
manager to help The New York Public Library to share its vast collections with
the world through digitization. The Manager will
My first thought was something like programatically doing a pairwise diff
of the files, 5500 times. I was surprised I couldn't find a utility that
just does this.
But i did find something called diffuse [1], that allows you to graphically
compare any number of text files in a diff-like fashion.
Just thought I'd pop my head in:
TurnItIn does compare to other previous submissions (both at your own
institution and others) unless the submitter chooses not to include them in the
repository for future checks.
Cheers,
Adam Traub
Electronic Resources Librarian
The Wallace Center
Rochester
On Jan 23, 2015, at 9:44 AM, Mark A. Matienzo wrote:
I believe Turnitin and SafeAssign both compare the text of submissions to
against external sources (e.g., SafeAssign uses ABI/INFORM, among others).
I am not certain if they compare submissions against each other.
My understanding of
I believe Turnitin and SafeAssign both compare the text of submissions to
against external sources (e.g., SafeAssign uses ABI/INFORM, among others).
I am not certain if they compare submissions against each other.
However, if you're looking for something along the lines of what Dre
suggests, you
Can anyone recommend a plagiarism checking software besides Turnitin and
SafeAssign? I need to compare about 100 student assignments against each other
to make sure they don't copy each other's assignments.
Thanks.
Judy K. Meirose
Systems Librarian
Florida Coastal School of Law
8787 Baypine
19 matches
Mail list logo