Learning Outcomes An introduction to key policies and legislation affecting the recording and storing of information An overview of copyright law and how it affects people working in libraries Key policies The main policies everyone needs to be aware of are: GDPR Information Security Freedom of Information Use of Electronic Communications in the workplace Social media guidelines Copies of these policies will be given to you by your supervisor and hard copies will be available at your location. Should any changes be made you will be made aware Information Security & Data Protection Library staff use lots of different ...
What is Berkeley DB? Berkeley DB is an Open Source embedded database library that provides scalable, high- performance, transaction-protected data management services to applications. Berkeley DB provides a simple function-call API for data access and management. 2 Berkeley DB vs RDBMS Function-call interface vs SQL Statement • Because the library runs in the same address space, no inter-process communication is required for database operations. • Berkeley DB uses a simple function-call interface for all operations, there is no query language to parse, and no execution plan to produce. 3 2MB library vs GB application Inventory Management System Inventory Management System ...
Table of Contents Introduction Background Executive Summary Assessment Findings & Recommendations Plan Viability Project Management Practice FY17 Q4 Assessment Summary Appendices A: Independent Assessment Process B: Detailed Assessment C: List of Interviewed Stakeholders Info-Tech Research Group 2 Background The Arizona Department of Child Safety (ADCS) has completed the Planning and Initiation phases for the Program of projects to assess, procure, design, and implement a replacement of the current Federal Administration for Children and Families (ACF), Statewide Automated Child Welfare Information System (SACWIS) compliant system known as the Children’s Information Library and Data Source or CHILDS. The resulting CHILDS ...
Early steps taken Background Strategic Plan Need Assessment Analysis Staffing Current Processes Inventory Access – Network Access – Hardware Access – Software Training Support Early steps taken Gathered data Library Management System Vendor CSU Expenditure on Technology Presented to the Library Management Team Presented to the Provost & Vice Provost Early Adoption of Innovation At Kennedy Library Automated Circulation Automated Processing Online Catalog Desktop Workstations for Staff Public/Patron Workstation Updating Infrastructures Electronic Resources Unmediated Services to Users ITS Dedicated Terminal Lab Technology Spending at Kennedy Library 1 ...