OPLIN 4cast #409: Serious GIFs

October 29th, 2014

book animationSometimes new tech ideas that might be of interest to libraries do not happen quickly and make a big splash, but rather slip slowly and quietly into practice. Animated GIFs – short, repetitive animations done in Graphics Interchange Format – came to be known years ago as a defining characteristic of less-than-serious websites and are the technology behind many of those annoying ads that border web pages, so they are not exactly quiet and unobtrusive. But it seems they do have a more serious side that is not as splashy and can possibly be useful to libraries. Is your library using any animated GIFs for online library “how-to” guides or other instructional materials?

  • Animated GIFs: From gimmick to gestalt (University of Alaska Fairbanks eLearning Instructional Design Team blog | Christen Bouffard)  “GIFs are well suited for illustrating sequential processes. Many explanations we may want to share with others do not require all the time involved in shooting a video or creating a screencast. Sometimes these explanations can be most effectively conveyed in just a handful of frames, free of audio narration, excessive bandwidth usage, and extraneous media players.”
  • Using animated GIF images for library instruction (In the Library with the Lead Pipe | Karl Suhr)  “One initial attraction to exploring the use of animated GIFs was as an alternative to video. Given a choice between a video, even a short one, and some other media such as a series of captioned images or simple text, in most cases I will opt for the latter, especially if the subject matter demonstrates or explains how to do something. Some of this is merely personal preference, but I suspected others had the same inclination. In fact, a study by Mestre that compared the effectiveness of video vs. static images used for library tutorials indicated that participants had a disinclination to take the time to view instruction in video form.”
  • How to use GIFs to enhance your visual content marketing strategy (Everypost | Fernando Cuscuela)  “GIFs that function as how-tos, product demos, or instructional guides are a great way to convey a lot of information efficiently, and can be even better than blog articles or long-form social media posts.… What’s more, the GIF version is much more visually appealing, memorable, useful and therefore shareable.”
  • Why aren’t animated gifs used for more practical purposes? (Replicator | Joseph Flaherty)  “So why aren’t these miniature animations used more widely for practical purposes? Do any ecommerce sites use animated gifs to show off the unique features of a product? How about replacing turgid instructional guides with gif-tastic help pages? Animated images are a perfect midpoint between static images and full on video content, but are rarely used for productive purposes, with a few exceptions.”

Articles from Ohio Web Library:

OPLIN 4cast #408: Cheap attacks

October 22nd, 2014

Abrams tankAt its latest meeting, the OPLIN Board discussed making a substantial financial commitment to protecting OPLIN participants from Distributed Denial of Service (DDoS) attacks. DDoS attacks send so much traffic to a victim’s web server – often a company or organization big enough to have made enemies in the hacker community – that the victim’s Internet connection or web server cannot handle it all, and their website becomes inaccessible to legitimate traffic: a “denial of service.” The “distributed” part of the name refers to the fact that a single computer cannot generate enough traffic to overwhelm most systems, so the traffic comes from an automated collection of computers that have been infected with malware – a “botnet” – that is under the control of a bot master. Botnets are also used for ad fraud, spam, and testing stolen credit cards. OPLIN staff were mystified as to who would go to the trouble and expense of launching a DDoS attack at a library, but then we learned how cheap and easy it is to rent a botnet these days.

  • DDoS in 2014: The new Distributed Denial of Service attacks and how to fight them (Continuum MSP blog| Steven J. Vaughan-Nichols)  “Other DDoS attacks go after your Web servers themselves rather than the Internet connection by devouring server resources. With these, if you even had infinite bandwidth, a site could still be taken down. DDoS Botnets used to be made up almost entirely of malware-infected Windows PCs. Now, even poorly secured mobile devices are getting into the act. The process is not particularly complicated or technical. You can rent a botnet suitable for launching a DDoS attack for a few bucks an hour.”
  • Renting a zombie farm: Botnets and the hacker economy (Symantec Security Insights Blog | Tim G.)  “Similar to Amazon Web Services renting cloud capacity to any number of applications, a bot master will often lease their bot out to subsequently commit other cybercrimes. This means individuals with little or no skill in creating a botnet can rent one capable of crippling a major website with a DDoS attack for as little as $100-200 USD per day.”
  • You don’t have to be an evil hacker genius to bring down PlayStation (Businessweek | Dune Lawrence)  “Incapsula’s chief business officer and a co-founder Marc Gaffan calls DDoS ‘the weapon of choice’ for hackers these days, in part because technology is making it increasingly convenient and powerful (sound familiar?). It doesn’t take much money to inflict a costly headache on a business. An attacker can rent a ‘botnet’—a network of infected zombie computers controlled by cyber criminals—to mount a DDoS campaign for less than $10 an hour, according to Verizon’s most recent Data Breach Investigations Report (PDF).”
  • DDoS attacks can take down your online services (TechPro Essentials | Dr. Bill Highleyman)  “Botnets are readily available for rent on the darknet, private networks where connections are made only between trusted peers. Hackers form a community of trusted peers and can gain access to botnet rentals. The cost for botnets is relatively modest given the damage they can inflict. For instance, the following botnet rentals are advertised on the darknet: 10,000 PCs – 10 gbps – $500 per month; 100,000 PCs – 100 gbps – $200 per day.”

Articles from Ohio Web Library:

OPLIN 4cast #407: Jamming hotspots

October 15th, 2014

Wi-Fi hotspotA couple of weeks ago, the Federal Communications Commission fined the Marriott hotel chain $600,000, charging that they “…intentionally interfered with and disabled Wi-Fi networks established by consumers in the conference facilities of the Gaylord Opryland Hotel and Convention Center in Nashville, Tennessee, in violation of Section 333 of the Communications Act.” In plainer English, Marriott was sending signals that disabled the cellular mobile hotspots that people at the conference facility were trying to set up for use by their group, thus getting around paying steep fees charged by Marriott for using their in-house Wi-Fi. (If you’re curious about how steep these fees can be, OPLIN just paid the Greater Columbus Convention Center $10,000 for Wi-Fi access for OLC Convention attendees last week.) While most media reported this story as an example of a hotel getting caught being greedy, the FCC’s action raised ticklish questions for some technicians responsible for maintaining Wi-Fi networks.

  • Marriott fined $600,000 by FCC for blocking guests’ Wi-Fi (CNN | Katia Hetter)  “Marriott issued the following statement Friday afternoon defending its actions: ‘Marriott has a strong interest in ensuring that when our guests use our Wi-Fi service, they will be protected from rogue wireless hot spots that can cause degraded service, insidious cyber-attacks and identity theft,’ the statement said. ‘Like many other institutions and companies in a wide variety of industries, including hospitals and universities, the Gaylord Opryland protected its Wi-Fi network by using FCC-authorized equipment provided by well-known, reputable manufacturers.’”
  • Understanding FCC decision regarding Wi-Fi containment at Marriott (Mojo Wireless | Hemant Chaskar)  “In this case, it seems FCC reached the conclusion that rogue containment was used in a manner to disrupt rightful communications of users even though they did not pose security threat to the Marriott network. I think everyone would agree with the FCC position here. Some may bring up the hotel Wi-Fi performance degradation issue due to personal hot spots, but Wi-Fi operates in the public spectrum and does not guarantee performance in the first place.”
  • Prudence in the wake of the FCC’s ruling on Marriott jamming WiFi (IT Connection | Mike Fratto)  “On the other hand, Marriott – and any organization running a WiFi network – has good reason to monitor its airspace in order to provide good service. If you look at the airspace at any public venue, it is a mess of access points overlapping channels and degrading WiFi access for everyone, and there is no way for a venue owner to provide good service in that environment. However, protecting unwitting guests from ‘insidious cyber-attacks and identity theft’ is a specious argument and not one you should make unless you have tangible proof.”
  • FCC-Marriott WiFi blocking fine opens Pandora’s box (Network Computing | Lee Badman)  “Many of us have bought into the fact that WLAN can be as good and secure as Ethernet, and the WLAN industry says we shouldn’t hesitate to include WiFi in our critical infrastructures. But we need the FCC to provide some clarity. Even if it’s not OK to ‘jam’ in whatever form that may take, it ought to be OK to have ‘Thou shalt not use’ policies for our own spaces. The FCC didn’t say that’s acceptable, but it really needs to at this point.”

Articles from Ohio Web Library:

OPLIN 4cast #406: Felonious libraries

October 8th, 2014

handcuffsTwo weeks ago, the American Civil Liberties Union filed a lawsuit in Arizona against that state’s “revenge porn” law on behalf of several bookstores and other organizations. Revenge porn – which some people argue is a misleading term – was a big news item recently when some nude “selfies” of celebrities were leaked on the Internet, a clear violation of privacy. So far, thirteen states have passed revenge porn laws, but even advocates for such state laws, like Professor Danielle Citron, admit that many are poorly written and make even the display of nude images a crime. The ACLU suit lists an example of how this could put libraries on the wrong side of the law: “A library in Arizona provides computers with Internet access to its patrons and, because no filters could effectively prevent this result, the library patrons are able to access nude or sexual images.”

  • Bookstores, publishers sue to stop law against “revenge porn” (Ars Technica | Joe Mullin)  “The plaintiffs-in-suit are several bookstores, as well as the American Association of Publishers and the National Press Photographers Association. [Michael] Bamberger, a First Amendment specialist who’s working together with the American Civil Liberties Union in this case, added that librarians are concerned they could be held liable simply for providing Internet access.”
  • Is Arizona’s revenge porn law overbroad? (Forbes | Sarah Jeong)  “Note the particular bizarreness of the library example. The library gets netted by the law because how many different kinds of activities that the Arizona law criminalizes: ‘It is unlawful to intentionally disclose, display, distribute, publish, advertise or offer a photograph, videotape, film or digital recording of another person in a state of nudity or engaged in specific sexual activities if the person knows or should have known that the depicted person has not consented to the disclosure.’”
  • Revenge porn is malicious and reprehensible. But should it be a crime? (The Nation | Michelle Goldberg)  “At first glance, it can be hard to imagine any decent person objecting to these laws. State-level efforts, which target people who share nude images without the pictured person’s consent, vary considerably. Most make the crime a misdemeanor, with prison sentences of up to a year, though in Arizona it’s a felony. Georgia’s law includes the ‘depiction of covered male genitals in a discernibly turgid state,’ while a bill that passed Michigan’s State Senate applies to sexually explicit drawings as well as photographs. The ACLU objects to most of this legislation, arguing that it is dangerous to criminalize the display of material that’s not obscene and was legally obtained.’”
  • Are revenge porn laws going too far? (Newsweek | Lauren Walker)  “In 2013, California decided that taking an intimate and confidential picture or video and distributing it with the intention of causing serious emotional distress to the victim is ‘disorderly conduct.’ In reaction, Lee Rowland of the ACLU’s Speech, Privacy and Technology Project told NPR ‘the reality is that revenge porn laws tend to criminalize the sharing of nude images that people lawfully own.… That treads on very thin ice constitutionally.’”

Articles from Ohio Web Library:

OPLIN 4cast #405: Goodbye, Yahoo Directory

October 1st, 2014

Yahoo logoLast Friday, in a progress report on “Product Focus,” Yahoo included three sentences announcing that “our business has evolved and at the end of 2014 (December 31), we will retire the Yahoo Directory.” While this is not surprising news — some of you youngsters may not even know what the Yahoo Directory is — it caught our attention because the original OPLIN website from mid-1996 to early 1999 was basically a collection of “link directories” (or “web directories”) similar to the Yahoo Directory. Before the founding of Google in 1998, link directories were the way people found things on the Internet. Librarians spent a lot of time building link directories and posting them on the Internet because that’s what librarians do; they help people find information. So in a way, the end of the Yahoo link directory is the end of one chapter in the history of the Internet that included a significant role for librarians.

  • Yahoo! is scuttling the only thing we knew them from (UPROXX | Bea Kaye)  “If you’re like me, then you had no idea that Yahoo! was actually an acronym. In 1994, Stanford students Jerry Yang and David Filo created a comprehensive web directory. At first they named it ‘Jerry and David’s Guide to the World Wide Web’, but shortly changed it to ‘Yet Another Hierarchical Officious Oracle.’ (If you are under the age of 20: Search engines sucked in the ’90s. Web directories like Yahoo were where it was at.)”
  • The Yahoo Directory — once the Internet’s most important search engine — is to close (Search Engine Land | Danny Sullivan)  “A ‘directory’ relies on humans to review websites, summarize them with short descriptions and organize them into a categories. When Yahoo started, this system was effective, because there weren’t that many pages on the web (relatively speaking) and automated search technology to organize websites wasn’t very good.”
  • End of an era: Yahoo Directory to shut down Dec. 31 (Best Techie | Shawn Farner)  “For a long time, the Directory was a big part of Yahoo’s business. That all changed when automated crawlers began indexing websites, and Yahoo partnered with several companies (including Google) to provide search results that weren’t compiled by humans. The Directory still existed, but it just wasn’t as important as it was in Yahoo’s heyday — the early-to-late ’90s.”
  • Yahoo will ring in the new year by killing its website directory (PCWorld | Zach Miners)  “Yahoo is also not the company it used to be. Since Marissa Mayer took over as CEO in 2012, she’s engineered a number of acquisitions and launched new products and apps, like digital video and online magazines, aimed at making Yahoo more relevant. But still, some things must go.”

Before the Ohio Web Library:

Below is a link directory of “Electronic Resources” from the original OPLIN website.
link directory

OPLIN 4cast #404: Better pictures

September 24th, 2014

picture frameChances are, your website has a lot of eye-catching images. In fact, if your site is typical of most websites, images probably account for about two-thirds of all the bytes that get delivered from your web server to the browser of someone looking at your site. And that’s OK, because a picture is worth a thousand words, right? But if the viewers of your website happen to be using smartphones, those pretty pictures may be worth a thousand angry words! Since that’s a problem for just about every website, HTML developers have come up with a new element tag: <picture>.

  • How a new HTML element will make the Web faster (Ars Technica | Scott Gilbertson)  “If you’ve got a nice fast fiber connection, that image payload isn’t such a big deal. But if you’re on a mobile network, that huge image payload is not just slowing you down, it’s using up your limited bandwidth. Depending on your mobile data plan, it may well be costing you money. What makes that image payload doubly annoying when you’re using a mobile device is that you’re getting images intended for giant monitors loaded on a screen slightly bigger than your palm. It’s a waste of bandwidth delivering pixels most simply don’t need.”
  • The new picture HTML code could make your website load faster (Small Business Trends | Joshua Sophy)  “Image-heavy Web pages can take a long time to download. Visitors get frustrated and leave your site. You may have implemented a responsive Web design, thinking that solves all your mobile problems. And it’s true that a responsive Web design solves some problems. It automatically arranges and displays your site elements to be viewed on smaller, narrower mobile screens. But responsive Web design isn’t the answer to everything. It doesn’t necessarily solve the image download issue.”
  • Native responsive images (Dev.Opera | Yoav Weiss)  “But, even though RWD [responsive Web design] sites looked different on each device, underneath, most of them continued to download the same resources for all devices. And since images comprised the major part of the bytes that websites were downloading, the developer community started to look into possible solutions to avoid this waste. […] The picture element specification that was written in collaboration between the community and browser vendors was merged into the HTML spec, and both Blink & Gecko’s implementations are destined to ship early this fall!”
  • Built-in browser support for responsive images (HTML5 Rocks | Pearl Chen)  “The <picture> element offers a declarative approach towards image resource loading. Web developers will no longer need CSS or JavaScript hacks to handle images in responsive designs. And users benefit from natively-optimized image resource loading—especially important for users on slower mobile internet connections. Alongside the newer srcset and sizes attributes recently added to <img>, the <picture> element gives web developers more flexibility in specifying image resources.”

Articles from Ohio Web Library:

OPLIN 4cast #403: Tor privacy

September 17th, 2014

Tor onion logoOver the weekend, Boing Boing published a piece about libraries in Massachusetts that are using the Tor browser on their public PCs to protect patron privacy. If you’re not familiar with Tor, it is free software that allows users to browse the Internet anonymously. It’s sometimes called “the onion router” because it sends browser requests through a roundabout network, hiding the original computer within layers of other computers, somewhat like the layers on an onion. Tor has also been in other news recently because of a claim that some employees of government spy agencies – like the National Security Agency (NSA) – have been helping Tor by passing them information about security breaches spies have used. If true, that would be an interesting development. But is it true?

  • Radical Librarianship: how ninja librarians are ensuring patrons’ electronic privacy (Boing Boing | Alison Macrina and April Glaser)  “Others have installed Firefox with privacy-protecting browser plugins like Disconnect.me, Ad-Block Plus, and The Electronic Frontier Foundation’s HTTPS Everywhere and Privacy Badger tools. Still more are setting up Tor middle relays on their libraries’ networks. One librarian said that the workshop made her feel ‘thoroughly empowered…[to] help stop illegal surveillance against my patrons.’ Amazing.”
  • NSA and GCHQ agents ‘leak Tor bugs’, alleges developer (BBC News | Leo Kelion)  “The allegations were made in an interview given to the BBC by Andrew Lewman, who is responsible for all the Tor Project’s operations. He said leaks had come from both the UK Government Communications Headquarters (GCHQ) and the US National Security Agency (NSA). By fixing these flaws, the project can protect users’ anonymity, he said. ‘There are plenty of people in both organisations who can anonymously leak data to us to say – maybe you should look here, maybe you should look at this to fix this,’ he said. ‘And they have.’”
  • How Tor’s dark web is getting darker thanks to spies (Tech Cheat Sheet | Natalie Shoemaker)  “Covert operations, like GCHQ, ‘heavily relies on Tor working to be able to do a lot of their operations,’ according to Lewman. But there’s also a seedy underbelly of child porn and illegal drug sales. You have to take the good with the bad if you want to protect your privacy these days. There are over 150 million people who have downloaded the browser in the past year, of which 2.5 million use it each day. It’s important to consider the people who are in dire situations, people who may be fighting against oppression that rely on networks like these–the ‘dark web’–in order to stay hidden and protected.”
  • Are government spies tipping off Tor? (Top Tech News | Jennifer LeClaire)  “He [Tyler Reguly, director of security research for Tripwire] told us this isn’t the first time that this topic has been discussed and no one should be naive enough to think that it will be the last. ‘Just a few weeks ago questions were raised about the safety of Tor. Stating that these organizations are assisting in increasing Tor’s safety is the perfect marketing ploy,’ Reguly said. ‘The statements can’t be verified and they help reduce concerns regarding privacy breaches while using Tor.’”

Articles from Ohio Web Library:

OPLIN 4cast #402: Internet by name, not by number

September 10th, 2014

headstoneIt’s not everyday you look at the news and see that a group of the largest universities and Internet companies have decided it’s time to completely change the architecture of the Internet. But that’s what happened last week, as the formation of the Named Data Networking Consortium was announced. TCP/IP — short for Transmission Control Protocol and Internet Protocol — was developed about 45 years ago to handle network communication between two computing devices identified by their IP addresses, and since then it has defined the way the Internet works. But a lot of Internet traffic these days looks more like broadcasting of content than one-to-one communication, and a growing number of network innovators feel that TCP/IP is about to reach its limits.

  • Forget IP, Cisco thinks the answer to the data tsunami may be Named Data Networking (TelecomTV | Guy Daniels)  “TCP/IP was created for a point-to-point, voice-centric world – a communications network. The fact that it has lasted so long and still supports the data-centric distribution networks of today is testimony to its creators’ skills. But with the IoT [Internet of Things] threatening to increase data traffic and apps by several orders of magnitude, ecommerce and digital media growing, the Internet has become a ‘distribution network’. Therefore, a rethink is required.”
  • NDN project overview  “To carry the Internet into the future, a conceptually simple yet transformational architectural shift is required, from today’s focus on where – addresses and hosts — to what – the content that users and applications care about. The Named Data Networking (NDN) project aims to develop a new Internet architecture that can capitalize on strengths — and address weaknesses — of the Internet’s current host-based, point-to-point communication architecture in order to naturally accommodate emerging patterns of communication.”
  • UCLA, Cisco & more join forces to replace TCP/IP (Network World | Bob Brown)  “Since that time [2010], participating organizations have somewhat quietly been working on new protocols and specifications, including a new packet format, that have been put through their paces in a testbed that spans from the United States to Asia. Their aim is to put forth an Internet architecture that’s more secure, able to support more bandwidth and friendlier to app developers. Cryptographic authentication, flow balance and adaptive routing/forwarding are among the key underlying principles.”
  • DEATH TO TCP/IP cry Cisco, Intel, US gov and boffins galore (The Register | Simon Sharwood)  “Intel, Huawei, Alcatel-Lucent, Qualcomm, Comcast and Orange are also contributing to the effort to create the new protocols. Work on the Named Data Networking (NDN) has been going on for some time: the National Science Foundation has been pumping in cash since 2010. The significance of this launch is that industry is now involved, and the consortium is committed to producing open-source software to take researchers’ work beyond the hypothetical.”

Articles from Ohio Web Library:

OPLIN 4cast #401: Looking to the horizon

September 3rd, 2014

NMC logoThe New Media Consortium recently released the NMC Horizon Report: 2014 Library Edition [pdf], produced in collaboration with the University of Applied Sciences in Chur, the Technische Informationsbibliothek in Hannover, and the ETH-Bibliothek in Zurich. The NMC Horizon Project started in 2002, and each year it investigates emerging technologies and trends likely to affect education around the globe. That means the Library Edition is focused on academic and research libraries rather than public libraries, but some of the topics discussed in the report will look very familiar to any type of library.

  • Prioritization of mobile content and delivery (page 8)  “‘The Right to e-Read’ campaign by the European Bureau of Library Information and Documentation Associations (EBLIDA) is a Europe-wide initiative to raise awareness for stakeholders and policy makers about the challenges libraries face in providing e-books and digital content because of copyright concerns. Libraries in the United States are closely following the legal policies regarding the purchasing and resale of digital content.”
  • Rethinking the roles and skills of librarians (page 22)  “A number of universities have experimented with fellowship programs and other non-permanent hiring situations that bring in people with the desired skills to work on discipline-specific projects. This strategy provides libraries the opportunity to test new types of professionals and see if their roles merit the creation of a new position.”
  • Competition from alternative avenues of discovery (page 26)  “A recent Slate article explored libraries’ potential transition from print materials to technology and training. Academic and research libraries are incorporating more authentic experiences for information discovery — immersive opportunities that Google Scholar and Wikipedia cannot yet foster. Seattle University’s Lemieux Library, for example, is home to the Media Production Center where students and faculty receive the training and support needed to turn their creative ideas into tangible products.”
  • Semantic web and linked data (page 44)  “Library catalogs will be a more valuable information resource if their metadata is an interoperable part of the semantic web and not siloed in separate inaccessible databases. It is no longer enough for libraries to have their own websites with collection data; there is growing emphasis to integrate these collection catalogs into sites and services more frequently accessed by users.”

Articles from Ohio Web Library:

OPLIN 4cast #400: E-government in Ohio

August 27th, 2014

Ohio flagAnybody who works near the public computers in a library knows that e-government – the government doing its business with the people online rather than in person or through the mail – brings a lot of people into the library to use those computers. It started with tax form downloads and then got a big boost last year as people registered for “Obamacare.” Legislators typically justify providing new services only online by pointing to the public libraries as the safety net for those who do not have Internet access elsewhere, though libraries seldom see any of the money e-government saves. Connect Ohio has now released some interesting data that shows there are already a lot of people using e-government in Ohio, and that number is almost certainly going to grow.

  • 3.6 million Ohioans use e-government services (Connected Nation | Lyndsey Kleven)  “Younger Internet users in Ohio (50% of 18-34 year olds) are more likely than their older peers (46% of ages 35 or older) to go online to search for information, apply for services, or fill out forms. Across the state, more than 1.2 million households still do not subscribe to home broadband service, one in eight cite lack of digital skills as leading barrier to home broadband subscription.”
  • Making government accessible: e-Government usage in Ohio (Connect Ohio) [pdf]  “Two groups in Ohio experience a unique need to remain in contact with government offices. Ohio veterans often work with government agencies for issues ranging from healthcare to job training. In addition, state and federal agencies work with Ohio adults who have disabilities to improve their care and ensure that they have access to the services they need. For many of these Ohioans, the Internet is how they stay in touch with those government agencies.”
  • State Library of Ohio: Leading practices for e-government services (WebJunction | Vanessa Mason and Liz Morris)  “While the state library staff members that attended the monthly meetings of this group [Ohio Network for Health Coverage and Enrollment] initially encountered suspicion due to questions about the role of a state library agency’s place in enrollment strategies, over time meeting attendees not only embraced the role of libraries in supporting marketplace enrollment, but came to expect it as a natural and necessary fit. These monthly meetings helped state library staff learn from practitioners in other institutions and provided resources that librarians could take back and adapt to share with their public libraries.”
  • eGads! eGov! Helping libraries navigate online government resources (OLC Immersion Workshop)  “As more and more government services and programs move to online access, more patrons are turning to their libraries for help navigating this eGovernment environment. Workshop participants will learn about frontline, best practices for helping patrons with eGovernment websites along with legal issues to consider. Presenters from the Ohio Department of Veterans Services, Social Security Administration, and Ohio Department of Job and Family Services will discuss government programs and services and the best practices for accessing these programs and services.”

Articles from Ohio Web Library: