LITA Forum: Online Registration Ends Oct. 27

Don’t miss your chance to register online for the 2014 LITA Forum “From Node to Network” to be held Nov. 5-8, 2014 at the Hotel Albuquerque in Albuquerque N.M. Online registration closes October 27, 2014. You can register on site, but it’s so much easier to have it all taken care of before you arrive in Albuquerque.

Book your room at the Hotel Albuquerque. The guaranteed LITA room rate date has passed, but when you call at: 505-843-6300 ask for the LITA room rate, there might be a few rooms left in our block.

Three keynote speakers will be featured at this year’s forum:

  • AnnMarie Thomas, Engineering Professor, University of St. Thomas
  • Lorcan Dempsey, Vice President, OCLC Research and Chief Strategist
  • Kortney Ryan Ziegler, Founder Trans*h4ck.

More than 30 concurrent colleague inspired sessions and a dozen poster sessions will provide a wealth of practical information on a wide range of topics.

Two preconference workshops will also be offered;

  • Dean B. Krafft and Jon Corson-Rikert of Cornell University Library will present
    “Linked Data for Libraries: How libraries can make use of Linked Open Data to share information about library resources and to improve discovery, access, and understanding for library users”
  • Francis Kayiwa of Kayiwa Consulting will present
    “Learn Python by Playing with Library Data”

Networking opportunities, a major advantage of a smaller conference, are an important part of the Forum. Take advantage of the Thursday evening reception and sponsor showcase, the Thursday game night, the Friday networking dinners or Kitchen Table Conversations, plus meals and breaks throughout the Forum to get to know LITA leaders, Forum speakers, sponsors, and peers.

2014 LITA Forums sponsors include EBSCO, Springshare, @mire, Innovative and OCLC.

Visit the LITA website for more information.

Library and Information Technology Association (LITA) members are information technology professionals dedicated to educating, serving, and reaching out to the entire library and information community. LITA is a division of the American Library Association.

LITA and the LITA Forum fully support the Statement of Appropriate Conduct at ALA Conferences

Jobs in Information Technology: October 22

New vacancy listings are posted weekly on Wednesday at approximately 12 noon Central Time. They appear under New This Week and under the appropriate regional listing. Postings remain on the LITA Job Site for a minimum of four weeks.

New This Week

Head of Technology, Saline County Library,  Benton,  AR

Science Data Librarian,  Penn State University Libraries, University Park,  PA

Visit the LITA Job Site for more available jobs and for information on submitting a  job posting.

Women Learning to Code

keyboard

I am a user of technology much more than a creator.   After I completed a masters in educational technology I knew to better use the skills I had learned it would benefit me to gain a better understanding of computer coding. My HTML skills were adequate but rusty, and I didn’t have any experience with other languages. To increase these skills I really did not want to have to take another for-credit course, but I also knew that I would have a better learning experience if I had someone of whom I could ask questions. Around this time, I was made aware of Girl Develop It. I have attended a few meetings and truly appreciate the instruction and the opportunity to learn new skills. As a way to introduce the readers of the LITA blog who might be interested in adding to their skill-set I interviewed Michelle Brush and Denisse Osorio de Large, the leaders of my local Girl Develop It group.

What is Girl Develop It?

MB: Girl Develop It is a national nonprofit organization dedicated to bringing more women into technology by offering educational and network-building opportunities.

DL: Girl Develop It is a nonprofit organization that exists to provide affordable and accessible programs to women who want to learn web and software development through mentorship and hands-on instruction.

What sparked your interest in leading a Girl Develop It group?

MB: I attended Strange Loop where Jen Myers spoke and mentioned her involvement in Girl Develop It.   Then several friends reached out to me about wanting to do more for women in tech in Kansas City, so we decided to propose a chapter in Kansas City.

DL: Growing up my mom told me my inheritance was my education, and that my education was something no one would ever be able to take away from me.  My education has allowed me to have a plentiful life, I wanted to pay it forward and this organization allowed to do just that. I’m also the proud mom of two little girls and I want to be a good example for them.

What is your favorite thing about working in the technology industry?

MB: Software can be like magic.  You can build very useful and sometimes beautiful things from a pile of keywords and numbers.  It’s also very challenging, so you get the same joy when your code works that you do when solving a really hard math problem.

DL: I love the idea of helping to create things that don’t exist and solving problems that no one else has solved. The thought of making things better, drives me.

Why do you believe more women should be working in information technology?

MB: If we can get women involved at the same percentages as we have men, we would solve our skills gap.  It also helps that women bring a different perspective to the work.

DL: The industry as a whole will benefit from the perspective of a more diverse workforce. Also, this industry has the ability to provide a safe and stable environment where females can thrive and make a good living.

Are there other ways communities can be supportive of women entering the information technology industry?

MB: We need more visibility to the women already in the industry as that will make other women recognize they can be successful in the community as well.  Partly it’s on women like me to seek out opportunities to be more visible, but it’s also on the community to remember to look outside of the usual suspects when looking for speakers, mentors, etc.  It’s too easy to keep returning to the names you already know. Conferences like Strange Loop and Midwest.io are making strides in this area.

DL: I believe it starts with young girls and encouraging and nurturing their interest in STEM. It is very important that members of the community provide opportunities for girls to find their passion in the field of their choice.

Are any of you reading the LITA blog involved with Girl Develop It? I’d love to hear your stories!

Midwinter Workshop Highlight: Meet the Programming Presenter!

We asked our LITA Midwinter Workshop Presenters to tell us a little more about themselves and what to expect from their workshops in January. This week, we’re hearing from Elizabeth Wickes, who will be presenting the workshop:

Introduction to Practical Programming
(For registration details, please see the bottom of this blog post)

LITA: We’ve seen your formal bio but can you tell us a little more about you?

ElizabethI once wrote an entire Python program just so I could have a legitimate reason to say “for skittle in skittles.”  Attendees will meet this program during the workshop.  I can also fix pretty much anything with hot glue. 

LITA: Who is your target audience for this workshop?

Elizabeth: This workshop speaks to the librarian or library student who is curious about programming and wants to explore it within a very library-centric context.  So many of the existing books and resources on programming are for people with extensive math backgrounds. This workshop will present the core concepts and basic workflows with a humanities voice. 

LITA: How much experience with programming do attendees need to succeed in the workshop?

ElizabethAny amount is helpful, but nothing is required.  I’ll be presenting the topics from the ground up, presuming that folks have never seen any code before.

LITA: If your workshop was a character from the Marvel or Harry Potter universe, which would it be, and why?

ElizabethI would say Snape, if I had to pick a character.  But hear me out! The topic might seem moody and unapproachable, but on the inside just wants to love!  Also, programming is really like potions class, where you are combining lots of little pieces very precisely to somehow produce something shiny and beautiful.  My final argument: Alan Rickman.

LITA: Name one concrete thing your attendees will be able to take back to their libraries after participating in your workshop.

Elizabeth: Attendees will leave the workshop with a greater understanding of assessment strategies for material selection and a solid structure on which to build as a self-taught programmer.

LITA: What kind of gadgets/software do your attendees need to bring?

ElizabethParticipants should bring a laptop (not a tablet) with an operating system they are comfortable using.  Macs are easiest to set up but any current computer will work.

LITA: Respond to this scenario: You’re stuck on a desert island. A box washes ashore. As you pry off the lid and peer inside, you begin to dance and sing, totally euphoric. What’s in the box?

ElizabethPerhaps I’m singing because the box brought me a singing voice.  But seriously, I’d be super excited to get sunscreen in that situation.

More information about Midwinter Workshops. 

Registration Information:
LITA members get one third off the cost of Mid-Winter workshops. Use the discount promotional code:  LITA2015 during online registration to automatically receive your member discount.  Start the process at the ALA web sites:
Conference web site:
Registration start page:
LITA Workshops registration descriptions:
When you start the registration process and BEFORE you choose the workshop, you will encounter the Personal Information page.  On that page there is a field to enter the discount promotional code:  LITA2015
As in the example below.  If you do so, then when you get to the workshops choosing page the discount prices, of $235, are automatically displayed and entered.  The discounted total will be reflected in the Balance Due line on the payment page.
preconference
Please contact the LITA Office if you have any registration questions.

E-Learning in the Library

Pixabay, 2008
Pixabay, 2008

Online education has extended its presence to public libraries. Online learning and career training, by services such as Ed2Go and Lynda, are usually offered complimentary to college and university students. Similar services such as Gale Courses, Universal Class and Treehouse are geared toward public library use.
Gale Courses is a subscription service of Cengage Learning. It is a hybrid of Ed2Go, offering courses that range from GED preparation to PC Security. Courses are six weeks in length and are instructor led.
Universal Class offers hundreds of courses on a variety of topics, including dog obedience training, to patrons of diverse interests. Courses are self-paced and users can begin a course at anytime.
Treehouse is uniquely geared toward web design, development and programming for personal computers and mobile device applications. Users can select self-paced educational Tracks that are focused on a specific development area.

An alternative to MOOCs
A considerable population of the general public cannot afford to pursue a formal education. Extending the services of the library into web-based learning, online courses provide access to continuing education for the general public. The mention of free online education is not complete without a nod to massive open online courses (MOOC). MOOCs can be non-profit or commercial. They offer free or affordable online education, of varying course structure, to students around the world. Though MOOCs and open courseware are comparable alternatives, library-hosted continuing education offers additional incentives from those of most freely available online courses.

Education as a service
One advantage to using a service provided by the public library is that patrons can use the computers available on site. For patrons lacking home computer access, they can incorporate another library service into their education. Continuing education courses are free to library card holders at participating libraries. If your regional library does not offer the service, you can always purchase a library card from a participating library. Considering that each course can range from $50 to the mid $100s, the benefit of access to hundreds of courses outweighs the cost of purchasing a library card. Patrons will receive a certificate of completion for each completed course and in the case of Universal Class they will receive continuing education units that are approved by the International Association for Continuing Education and Training (IACET). Treehouse opts for using a point-based system and Badges, digital awards, which signify a user’s progress. Online education also helps to highlight the public library as an evolving source of public information.
All three continuing education providers, offer free trials and demo courses for anyone interested in their services.

Tech Yourself Before You Wreck Yourself – Vol. 2

Ada Lovelace
Augusta Ada King, Countess of Lovelace (10 December 1815 – 27 November 1852)

Happy Belated Ada Lovelace Day, LITA Blog Readers! In honor of Ada Lovelace, the forward-thinking mother of scientific computing, I’m highlighting opportunities to really get to know your data (and users) in this Tech Yourself Before You Wreck Yourself installment.

Once again, Tech Yourself Before You Wreck Yourself (TYBYWY) is a curated selection of upcoming free webinars, classes, and other opportunities designed to help you learn and master new technologies and stay ahead of tech trends.

Your Monthly MOOC  -

This edition of TYBYWY, I am recommending a Coursera MOOC helmed by faculty from UC San Diego. Human-Computer Interaction Design may sound like a dry topic- but I know that you know that we all need to get better at designing online experiences that please and engage our patrons, constituents or students. The course promises to,  help “you build human-centered design skills, so that you have the principles and methods to create excellent interfaces with any technology.” This five week course sounds like an excellent and immersive opportunity for next gen librarians to get their sea legs in designing for better user experiences.

Worthwhile Webinars –

ProQuest and Library Journal are teaming up for a three-part webcast series on Data-Driven Academic Libraries, developed in partnership with ER&L. Excited yet? What if I mentioned that speakers include librarians from Yale, Harvard, and University of Southern California? Now you’re in.

This series includes the following sessions:

A Little Something Different –

Classes and webinars are helpful learning opportunities, and I encourage you to take them, but you can also learn a lot through involvement and discourse. And there’s no better place for that kind of interaction than on Twitter. To commemorate Ada Lovelace, and to get you immersed in the Technology TwitterCom, here some excellent twitter accounts to help TYBYWY.

The Ada Initative – Named in honor of the Countess herself, The Ada Initiative is a nonprofit organization that seeks to increase women’s participation in the free culture movement, open source technology and open culture.

Digital Public Library of America – The Digital Public Library of America (DPLA) brings together the riches of America’s libraries, archives, and museums, and makes them freely available to all. They post pretty pictures and useful information.

The Open Source Initiative – The OSI, a non-profit corporation with global scope, supports education in & advocacy for the benefits of open source software & communities.

LITA – Shameless self-promotion, I realize, but are you following us yet?

Tech On, TYBYWYers-

TYBYWY will return 11/14. Let me know if you have any specific requests!

 

Jobs in Information Technology: October 15

New vacancy listings are posted weekly on Wednesday at approximately 12 noon Central Time. They appear under New This Week and under the appropriate regional listing.  Postings remain on the LITA Job Site for a minimum of four weeks.

New This Week

Assistant Coordinator, Stacks and Circulation,  Colorado State University,  Fort Collins, CO

Digital Archivist, University of Georgia Libraries,  Athens,  GA

Metadata Systems Specialist, NYU, Division of Libraries, New York City,  NY

Visit the LITA Job Site for more available jobs and for information on submitting a  job posting.

Google like a Pro with Search Operators

Love it or hate it, the sparse white Google search page has become the primary interface to the web for most users. Google helps you cut through the junk to find the needle you were looking for amidst an almost infinite digital haystack. Considering how important the internet is and how difficult it can be to find what you need, Google’s advanced search features are something everyone can benefit from knowing a little bit more about.

The Google Advanced Search page is awesome, but it is rarely used. Most people don’t even know it exists because they have never seen it; there’s no link to it from the main Google page (at least none that are obvious) which makes it harder to reach than the standard single search field of the main Google page. Furthermore, many browsers are now allowing searches to be performed from the URL bar, and most are set to Google by default. How can we combine the power of Google’s advanced search with the convenience of the single field search? The answer is search operators. In a nutshell, search operators are miniature commands you can stuff into a Google single field search to add advanced features and filters to your query.

As librarians, we should all be familiar with Booleans. Google adds an AND between every search term by default for obvious reasons, but if you would be happy with only one of the terms in your query you can connect them with an OR statement (you can also use the pipe symbol, | to mean the same thing). To filter out certain results, use the NOT operator (implemented as a minus symbol in front of the word you want to remove), as in “peanut butter sandwich -jelly” to get results about various types of peanut butter sandwiches (mmm, banana) without the tried-and-true PB&J. Wildcards are another classic librarian move in Google searches. An asterisk (*) can stand in for any word in a quoted search. “Jimmy * is the best” could return results about fans of Jimmy Page, Jimmy Buffet or even Jimmy Carter. An ellipses between two numbers represents the range operator, and searches for every number in between those two as well as the ones named. “years best science fiction 2011…2013″ would return results for 2012 as well as 2011 and 2013.

And now, for something librarians probably won’t be familiar with, I present the humble prefix operator. Prefix operators are words followed by a colon that activate certain search features on the word or words immediately after it (with no space in between). For instance, a search for “classic pb&j” would return any site that has any of those words in the title or the full text of the site, but “pb&j intitle:classic” only returns those that have “classic” in the title. If you want all of the words to be in the title, use “allintitle:classic pb&j”. You can do the opposite with “intext:” and “allintext:” to find those words specifically in the full text of sites. One of the most useful prefix operators is the “filetype:” operator, which uses your search query to find file names with the file extension you define in “filetype:”. For instance, a search for “metadata pdf” is tricky because it not only returns PDF files about metadata, but sites talking about metadata in PDF files:

Screen Shot 2014-10-06 at 4.11.29 PM

A search for “metadata filetype:pdf” will only bring up results that are actual PDF files:

Screen Shot 2014-10-06 at 4.10.35 PMThere are a lot more search operators, but these are the ones I find myself using the most to cut out extraneous results. The sheer amount of operators may seem intimidating, but you don’t need to learn them all. Pick out a few that seem like they would be useful, and try to incorporate them into your daily searches and see if they help or not.

Do you have favorite tips or strategies for searching? Share them in the comments!

Midwinter Workshop Highlight: Meet the UX Presenters!

We asked our LITA Midwinter Workshop Presenters to tell us a little more about themselves and what to expect from their workshops in January. This week, we’re hearing from Kate Lawrence, Deirdre Costello, and Robert Newell, who will be presenting the workshop:

From Lost to Found: How User Testing Can Improve the User Experience of Your Library Website
(For registration details, please see the bottom of this blog post)

LITA: We’ve seen your formal bios but can you tell us a little more about you?

Kate: If I didn’t work as a user researcher, I would be a professional backgammon player or cake decorator (I am a magician with fondant!). Or both.

Deirdre: I’m horse crazy!

Robert: In a past life I was a professional actor. If you pay really really close attention (like, don’t blink), you might spot me in a few episodes of Friday Night Lights or Prison Break.

LITA: User Testing is a big area. Who is your target audience for this workshop?

Presenters: This is a perfect workshop for people who want to learn user testing in a supportive environment. We will teach people how to test their websites in the real world – we understand that time and other resources are limited. This is for anyone who wants to know what it’s like for patrons to try accessing their library’s resources through their website.

LITA: How much experience with UX do attendees need to succeed in the workshop?

Presenters: Experience isn’t required, but an understanding of the general UX field and goals is useful. Attendees are encouraged to come with a potential usability study topic in mind. From Robert: “You just need to be able to put your social scientist hat on and look at user testing as an informal (and fun!) psychology experiment.”

LITA: If your workshop was a character from the Marvel or Harry Potter universe, which would it be, and why?

Kate: Having just read the Harry Potter series with my two kids, I can say that our workshop will inspire like Dumbledore, give you a chuckle like those naughty Weasley twins, teach you like the astute Minerva McGonagle would, and leave you smiling with satisfaction just like the brilliant Hermione Grainger.

Deirdre: Either Hermione or Jean Grey (pre-Phoenix, obviously). In either case, someone others turn to for advice and guidance, but who truly guide rather than doing it for you.

Robert: I’m gonna say Mystique. Mystique can literally put herself in someone else’s shoes (human or Mutant). When we conduct usability testing, we’re directly observing what it’s like to be in the user’s shoes and we’re seeing things from their perspective.

LITA: Name one concrete thing your attendees will be able to take back to their libraries after participating in your workshop.

Kate: The knowledge about how to conduct a user test on their library site, a coupon for a free test from usertesting.com, and support and encouragement from a team of experienced researchers.

Deirdre: The skills to plan, recruit for and execute small-sample usability tests. The ability to communicate the findings for those tests in a way that will advocate for their users.

Robert: The ability to validate your ideas about your website with direct, reliable user feedback. Whenever you think, “This might work, but would it make sense to our users?” You’ll have the skills and tools to go find out.

LITA: What kind of gadgets/software do your attendees need to bring?

Presenters: Whatever note taking method you prefer; a laptop or mobile device to follow along is recommending but isn’t required. Kate recommends “A laptop. A pen and paper. A positive, can-do attitude!”

LITA: Respond to this scenario: You’re stuck on a desert island. A box washes ashore. As you pry off the lid and peer inside, you begin to dance and sing, totally euphoric. What’s in the box?

Kate: I’m assuming my family is on the island with me, and in that case – I want that box to contain Hershey’s hugs, the white chocolate kisses with milk chocolate swirls. I’m obsessed!

Deirdre: Hostess Orange Cupcakes.

Robert: A gallon of Coppertone Oil Free Faces SPF 50+ Sunscreen. I’m sorry but I’m fair skinned with a ton of freckles and a desert island scenario just screams melanoma to me.

Thank you to Kate, Deirdre, and Robert for giving us this interview! We’re looking forward to their UX Workshop at Midwinter in Chicago. We’ll hear from our other workshop presenters in the coming weeks!

More information about Midwinter Workshops. 

Registration Information:
LITA members get one third off the cost of Mid-Winter workshops. Use the discount promotional code:  LITA2015 during online registration to automatically receive your member discount.  Start the process at the ALA web sites:
Conference web site:
Registration start page:
LITA Workshops registration descriptions:
When you start the registration process and BEFORE you choose the workshop, you will encounter the Personal Information page.  On that page there is a field to enter the discount promotional code:  LITA2015
As in the example below.  If you do so, then when you get to the workshops choosing page the discount prices, of $235, are automatically displayed and entered.  The discounted total will be reflected in the Balance Due line on the payment page.
preconference
Please contact the LITA Office if you have any registration questions.

ADE in the Library eBook Data Lifecycle

Reader: “Hey, I heard there is some sort of problem with those ebooks I checked out from the library?”

Librarian: “There are technical problems, potential legal problems, and philosophical problems – but not with the book itself nor your choice to read it.”

[Update 2014.10.14@12.04pm: more info on security in the library data lifecycle added at the bottom of this post]

As mentioned, there are (at least) three sides to the problem. Nate Hoffelder* discovered the technical problem with the way the current version (4) of Adobe Digital Editions (ADE) manages the ebook experience, which was confirmed by security researcher Benjamin Daniel Mussler, and later reviewed by Eric Hellman. The technical problem, that arguably private data is sent in plain text from a reader’s device to a central data-store, seems pretty obvious once it was discovered. The potential legal problem stems from laws in every state which protect reader privacy which set expectations for data security, plus other laws which may apply. The philosophical problem has several facets, which could be simplified down to the tension between privacy and convenience.

When a widely-used software platform is found to be logging data unexpectedly and transmitting it for some unknown use it causes great unease among users. When that transmission is happening in plain text over easily-intercepted channels, it causes anger among technologists who think a leading software developer should know better. When this is all happening in the context of the library world where privacy is highly valued, there is outrage as expressed by LITA Board member Andromeda Yelton.

Here are the library profession’s basic positions:

  1. Each individual’s reading choices and behavior should be private (i.e. anonymized or, better, not tracked)
  2. Data gathered for user-desired functionality across devices should be private (i.e. anonymized)
  3. Insofar as there is any tracking of reading choices and behavior, there should be an opt-out option readily available to individuals (i.e, not buried in the fine print)

In his October 9th post from The Digital Shift, Matt Enis reports that Adobe is working to correct the problem of data being transmitted in clear text but “maintains that its collection of this data is covered under its user agreement.” The data that corporations transmit should be limited to the data and data elements necessary to provide desired functionality yet also restricted enough for an individual’s activity to remain private.

To join the conversation, begin to educate yourself using our ADE Primer, below, plus the following resources:

A Primer on how Adobe Digital Editions (ADE) works with library ebooks

I’m a reader and I go to use a library ebook
(via Overdrive or other downloading service offered):

  1. what will I need to install on my device(s)?
    (laptop, tablet, phone, & iPod let’s assume)

    • laptop/computer: Adobe Digital Editions (ADE), activated with an Adobe ID
    • tablet, phone, iPod, etc.: Bluefire Reader (or compatible) app, activated with an Adobe ID
  2. how do the various devices know which page to show me next when I switch between them?
    • access and synchronization across devices are managed using the Adobe ID and the information associated with the ebook and by data tracked with ADE
  3. what technologies are behind the scenes?
    • the ADE managed digital rights management (DRM) required by the ebook publisher
    • the ebook reader software/app
    • the internet
  4. what data is needed to be able to do the sync?
    • the minimum required data is arguably the UserID, BookID, and a page-accessed timestamp
    • the current ADE version, ADE4, tracks significantly more data than the minimums above
  5. how is that data shared between devices?
    • Users can access their ADE account from up to 6 different devices. When accessing the ID/account from a new device the user must “activate” the device by logging into the Adobe ID/Account to prove that the user is the legitimate account holder.
    • ADE4 shares all ebook data it tracks in plain-text in an unsecured channel over the internet
  6. what functionality would not work if this were suddenly not provided?
    • if ADE did not provide reader tracking data, each time a reader opened an ebook on a different device the reader would have to remember the page s/he was on and then navigate to that page to continue reading from where they left off
    • A computer can be anonymously activated using ADE, however this will prevent the items from being accessible from more than one computer/device. The ebooks would then be considered to be “owned” by that computer and would not be available to be accessed from other devices.
    • if ADE were completely withdrawn from availability, ebook DRM would prevent use of ADE-managed DRM-protected ebooks

From a technology point of view, the clear-text data transmitted suggests the data may be for synchronization, but it seems, first and foremost, to support various licensing business models. Because Adobe might in the future have customers who want to use Adobe DRM to expire a book after a certain number of hours or pages read, they may feel the need to collect that data. Adobe’s data collection seems to be working as intended here. Clear-text transmission is clearly a bug, but that this data about patron reading habits is being transmitted to Adobe is a feature of the software.

The philosophical discussion which needs to happen around ebooks and DRM should include:

  • what data elements enable user-desired functionality
  • what data elements enable digital rights management
  • what data elements above are/are not within ALA’s stated professional ethics
  • whether tracking ebook user behavior is acceptable *at all*

From libraryland conversations around the issue so far, opinions have ranged from ‘tracking is not the problem, the clear-text transmission is‘ to ‘tracking is very much a problem, it’s unacceptable.’

Issues like this highlight the need to revisit stated positions and evaluate where the balance point is between accomodating user functionality and protecting against collection of personally identifiable data, or metadata.

*Post updated to correctly credit Nate Hoffelder as the original discoverer (my apologies!)

[Update with more on the library data cycle from Gary Price of INFOdocket below]

  • According to OverDrive: “It is our understanding that the reported issue involves Adobe Digital Editions 4, which is not used as part of the OverDrive app.” Meaning this ADE4 problem does not affect their apps for Android, iOS, etc., it is only for the ADE console which is installed on computers and laptops.
  • Pulling more from Gary’s long-time informtional and eductaional posts about library data and privacy, there are data insecurities in the configuration of many library services which involve sharing library user data with third parties such as Adobe, Amazon, library catalog vendors, etc.
  • As Gary correctly points out: “issues with any third parties having access to library user data need to be discussed not only in the library community but also directly with users.”

The Library and Information Technology Association