Technology posts displayed by category

National Library of Medicine Director Patricia Brennan stands with event organizers.

Libraries Help to Provide New Pathways to Precision Health

Patricia Brennan, PhD, RN, FAAN, FACMI, a pioneer in the development of information systems for patients, was ready to enjoy retirement when she was asked to join the National Library of Medicine (NLM) as its director two years ago, and she has not looked back since.

“I was well on my way to the lounge chair and the knitting club and then I took this job,” Brennan said during her keynote lecture Oct. 11 at the University of Maryland School of Nursing (UMSON) titled, “Precision Health and the National Library of Medicine: From Accelerating Discovery to Improving Health and Well-Being.”

“Now, why would someone who was well on her way to nirvana move to Washington?” she asked. “Well, it’s a fabulous job. It’s an amazing place. But I control the biomedical knowledge of the world. So, by shaping the way we index, curate, distribute research … I am able to broaden the conversation from medicine to health.”

The NLM is the world’s largest biomedical library and the producer of digital information services used by scientists, health professionals, and members of the public worldwide. Brennan became its 19th director in August 2016.

Mary J. Tooey, MLS, AHIP, FMLA, associate vice president for Academic Affairs, executive director of the University of Maryland Health Sciences and Human Services Library (HS/HSL), and director of the National Network of Libraries of Medicine, Southeastern/Atlantic Region, was excited about welcoming Brennan, calling her the HS/HSL’s unofficial “captain.”

“As a health sciences library, and a health sciences librarian, we think of the National Library of Medicine as the ‘mothership,’ and so I guess that means that Dr. Brennan is our leader, Captain Patty T. Kirk,” Tooey quipped. “I can’t underscore the importance and great fortune of having the National Library of Medicine as the leader and partner of the important work of collecting, organizing, and making biomedical information available in whatever the format, print, digital, and certainly, data. The NLM articulates and sets strategic directions for our profession.”

For more than 35 years, the HS/HSL has been designated as the regional headquarters for the National Network of Libraries of Medicine Southeastern/Atlantic region, one of eight regional headquarters in the United States, Tooey said. As a regional headquarters, the HS/HSL serves 1,600 network members throughout the region, working as a field office for the NLM.

“Patti Brennan came to the NLM a little more than two years ago, developed a new strategic plan with a cast of thousands, and has health sciences librarians and libraries casting themselves forward into new and exciting places — to boldly go where many had never considered going before. So, you can see why our library community is excited to have her here,” Tooey said.

Joining Tooey in her excitement about Brennan’s visit to UMSON was Eun-Shin Nahm, PhD, RN, FAAN, professor, Department of Organizational Systems and Adult Health, program director, Nursing Informatics, and co-director of the Center of Excellence in Biology and Behavior Across the Life Span. She introduced Brennan, calling her “a visionary leader in health care informatics and my esteemed mentor.”

Since assuming her directorship, Brennan has positioned the NLM to be the hub of data science at the National Institutes of Health and a national and international leader in the field, Nahm said. “She spearheaded the development of a new strategic plan that envisions NLM as a platform for biomedical discovery and data-powered health.”

The NLM is a strong and robust library, Brennan said, committed to a national network of libraries of medicine made up of 7,000 institutions around the country that provide NLM’s reach “into everywhere and most importantly into the homes of those who need the health information that we have.” It began as a small bookshelf in a hospital in the 1830s, she noted.

“It has grown to touch every corner of the world and has shaped every biomedical discovery that has happened in the last 50 years,” Brennan said. “You can’t innovate, discover or peer [review] without us.”

The lecture centered around the concept of precision medicine, which Brennan described as an approach to patient care that allows doctors to select treatments that are most likely to help patients based on the genetic understanding of their disease.

“I would submit to you that this definition of precision medicine is not complete. It is accurate but not complete,” she said. “To make precision medicine work, we have to know the person in context. Precision medicine is a new era of health care that will enable treatment to be tailored and prevention to be aligned with people’s unique structure, their characteristics, their gene sequence, how they live, where they grew up.”

Nurses play a unique role in broadening the conversation from precision medicine to precision health, said Brennan, a nurse herself.

“What is it that nurses know that others might not know? Nurses know about the human response,” she said. “Nursing is about the diagnosis and treatment of human response to disease, disability, and developmental crisis. We understand pathology. We understand cellular structure. We understand social engagement, but we know about the human response. Nurses also know about the care between the care, what happens between visits. Because people live health every day, and if the NLM is only available at the point of encounter with our health care system, we are failing our patients.

“To transform precision medicine to precision health, we have to have patients as partners. We’re not going make them partners by giving them research papers to read,” she said.

The lecture was co-sponsored by the following entities:

“This is an impressive array of institutions and it symbolizes the power of the many ongoing collaborations not only among entities within the University of Maryland, Baltimore but also with our colleagues across the street at the University of Maryland Medical Center and with our colleagues throughout the entire University of Maryland Medical System,” said UMSON Dean Jane M. Kirschling, PhD, RN, FAAN, who provided welcoming remarks to the estimated 100 attendees.

“It also reflects our authentic commitment to interprofessional research, education, and practice. Given our commitment to the research enterprise, clinical excellence in public health, and to the education of the next generation of health professionals … we are precisely the configuration of institutions that can support the National Library of Medicine in realizing its inspiring mission of advancing human health and discovery.”

— Mary T. Phelan


Mary PhelanClinical Care, Collaboration, Education, Research, Technology, UMB News, University LifeNovember 8, 20180 comments
Read More
eUMB forms screenshot

Coming Nov. 12: eUMB User Authorization Forms Online

UMB’s Center for Information Technology Services (CITS)  is excited to announce that eUMB security forms will be available Nov. 12 to submit online, utilizing electronic signatures by users and approvers in workflow. The current paper/PDF forms will be eliminated. (Users will be required to log in using multi-factor authentication to access the forms.)

The following eUMB security forms will be available:

  • eForms User Authorization Form and System Access (eTravel and ePAF)
  • RAVEN Access Request Form
  • eUMB HRMS User Authorization Form
  • eUMB Financials User Authorization Form

For more information, please visit this eUMB webpage.

Sarah SteinbergTechnologyOctober 30, 20180 comments
Read More
Information Security collage

Cybersecurity Awareness Month: Helping Others Secure Themselves

Many of us feel comfortable with technology, including how to use it safely and securely. However, other friends or family members may not feel so comfortable. In fact, they may be confused, intimidated, or even scared by it. This makes them very vulnerable to today’s cyber attackers. Cybersecurity does not have to be scary; it’s actually quite simple once you understand the basics. They most likely just need a guide like you to help them understand the basics.

Five Simple Steps

Here are five simple steps you can take to help others overcome those fears and securely make the most of today’s technology. For more information on each of these points, refer to the references section at the end of this newsletter.

Help others securely make the most of technology by sharing these five simple steps with them.

  1. Social engineering: Social engineering is a common technique used by cyber attackers to trick or fool people into doing something they should not do, such as sharing their password, infecting their computer, or sharing sensitive information. This is nothing new. Scams and con artists have existed for thousands of years. The only difference now is bad guys are applying these concepts to the internet. You can help others by explaining to them the most common clues of a social engineering attack, such as when someone creates a tremendous sense of urgency, when something is too good to be true, or when a cyber attacker pretends to be someone you know but their messages don’t sound like them. Share examples of common social engineering attacks, such as phishing emails or the infamous Microsoft tech support phone calls. If nothing else, make sure family members understand they should never give their password to anyone or allow remote access to their computer.
  2. Passwords: Strong passwords are key to protecting devices and any online accounts. Walk your family members through how to create strong passwords. We recommend passphrases, as they are the easiest to type and remember. Passphrases are nothing more than passwords made up of multiple words. In addition, help them to install and use a password manager. It is important to have a unique password for each of your devices and accounts. If a password manager is overwhelming, perhaps teach them to write down their passwords, then store those passwords in a secure location. Finally, help them enable two-step verification (often called two-factor or multi-factor authentication) for important accounts. Two-step verification is one of the most effective steps you can take to secure any account.
  3. Patching: Keeping systems current and fully up-to-date is a key step anyone can take to secure their devices. This is not only true for your computers and mobile devices, but also anything connected to the internet, such as gaming consoles, thermometers, or even lights or speakers. The simplest way to ensure all devices are current is to enable automatic updating whenever possible.
  4. Anti-virus: People make mistakes. We sometimes click on or install things we probably should not, which could infect our systems. Anti-virus is designed to protect us from those mistakes. While anti-virus cannot stop all malware, it does help detect and stop the more common attacks. As such, make sure any home computers have anti-virus installed and that it is current and active. In addition, many of today’s anti-virus solutions include other security technology, such as firewalls and browser protection.
  5. Backups: When all else fails, backups are often the only way you can recover from mistakes (like deleting the wrong files) or cyber attacks (like ransomware). Make sure family and friends have an automated file backup system in place. Often, the simplest solutions are cloud-based. They back up your devices hourly or whenever you make a change to a file. These solutions make it easy not only to back up data, but also to recover it.

Securing Kids When Visiting Others

If you are comfortable with technology, you most likely not only have secured yourself, but also helped to secure your kids. However, when kids visit a relative who is not comfortable with technology, such as grandparents, these relatives may not be aware of how to best protect kids online or your expectations. Here are steps you can take to help protect kids when they visit others, especially family:

  • Rules: Be sure that if there are any rules or expectations you have for your kids’ security, others know about them. For example, are there any rules on how long kids can be online, whom they can talk to, or what games they can or cannot play? Trust us, don’t plan on kids explaining the rules to other family members. One idea is to create a “rules sheet” and share that with any relatives your kids frequently visit.
  • Control: If a child understands technology better than their guardians, they may take advantage of that. For example, kids may ask for or gain administrative rights to a grandparent’s computer and then do whatever they want, such as installing that game you may not want them playing. Make sure relatives understand they should not give the kids any additional access beyond what has been established.
Fred SmithTechnologyOctober 24, 20180 comments
Read More
The Internet of Things

Cybersecurity Awareness Month: The Internet of Things

In the past, technology was relatively simple: You just connected your computer to the internet and used it for your daily activities. However, technology became more advanced when mobile devices came into our lives, devices such as smartphones and tablets. These devices put the power of desktop computers into our pockets. While far more mobile, these devices also brought their own, unique security challenges.

The next big technical advancement is the Internet of Things. The Internet of Things, often shortened to IoT, is all about connecting everyday devices to the internet, devices from doorbells and light bulbs to toy dolls and thermostats. These connected devices can make our lives much simpler; for example, having your lights automatically activate as your phone recognizes when you get close to home. The IoT market is moving at an amazing pace, with new devices appearing every week. However, like mobile devices, IoT devices also come with their own individual security issues. In this newsletter, we help you understand what those risks are and what you can do to secure your IoT devices, your home, and your family.

Issues with IoT

Know what IoT devices you have connected to your network, isolate them often, keep them updated, and have strong passphrases.

The power of IoT is that most of these devices are simple. For example, you simply plug your coffee machine in and it asks to connect to your home Wi-Fi network. However, all that simplicity comes at a cost. The biggest problem with IoT devices is that many of the companies making them have no experience with security. Instead, their expertise is manufacturing household appliances. Or perhaps it is a startup trying to develop a product the most efficient, fastest way possible, such as on Kickstarter. These organizations are focusing on profits, not cybersecurity. As a result, many IoT devices purchased today have little or no security built into them. For example, some have default passwords that are well known, perhaps even posted on the internet, and cannot be changed.

In addition, many of these devices have no option or ability to configure them; you’re stuck with whatever was shipped. To make matters worse, many of these devices can be difficult to update or may not even have the capability. As a result, many of the IoT devices you are using can quickly become out of date with known vulnerabilities that cannot be fixed, leaving you permanently vulnerable.

Protecting Your IoT Devices

So what can you do? We definitely want you to leverage the power of IoT devices securely and effectively. These devices can provide wonderful features that can make your life simpler, help save money, and increase the physical security of your home. In addition, as the technology grows, you may have no choice but to purchase or use IoT devices. Here are steps you can take to protect your IoT devices and yourself:

  • Connect only what you need: The simplest way to secure an IoT device is to not connect it to the internet. If you don’t need your device to be online, don’t connect it to your Wi-Fi network.
  • Separate Wi-Fi network: If you do need your IoT devices online, consider creating a separate Wi-Fi network just for them. Many Wi-Fi access points have the ability to create additional networks, such as a guest network. Another option is to purchase an additional Wi-Fi access point just for IoT devices. This keeps your IoT devices on an isolated network, where they cannot be used to harm or attack any computer or mobile devices connected to your primary home network (which is still the main interest of cyber criminals).
  • Update when possible: Just like your PC and mobile devices, keep your IoT devices up to date. If your IoT device has the option to automatically update, enable that.
  • Strong passwords: Change any passwords on your IoT device to a unique, strong passphrase only you know. Can’t remember all of your passphrases? Don’t worry, neither can we. Consider using a password manager to securely store all of them.
  • Privacy options: If your IoT device allows you to configure privacy options, limit the amount of information it shares. One option is to simply disable any information sharing capabilities.
  • Consider replacement: At some point, you may want to replace an IoT device when your existing one has too many known vulnerabilities that cannot be fixed or there are newer devices that have far more security built into them.

There is no one size fits all for every device, so it is worth checking for best practices and any publications on how to secure them. Unfortunately, most IoT devices were not developed with cybersecurity in mind, so many manufacturers do not provide much security information. But as awareness for cybersecurity grows, we hope to see more and more IoT vendors build security into their devices and provide more information on how to protect and update them.

Sarah SteinbergTechnologyOctober 16, 20180 comments
Read More
Cyber security logo

Cybersecurity Awareness Month: 10 Steps to Smartphone Security

Smartphones continue to grow in popularity and are as powerful and functional as many computers. It is important to protect your smartphone just like you protect your computer, because mobile cybersecurity threats are growing. These mobile security tips can help you reduce the risk of exposure to mobile security threats:

  1.  Set PINs and passwords. To prevent unauthorized access to your phone, set a password or Personal Identification Number (PIN) on your phone’s home screen as a first line of defense in case your phone is lost or stolen. When possible, use a different password for each of your important log-ins (email, banking, personal sites, etc.). You should configure your phone to automatically lock after five minutes or less when your phone is idle, as well as use the SIM password capability available on most smartphones.
  2. Do not modify your smartphone’s security settings. Do not alter security settings for convenience. Tampering with your phone’s factory settings, jailbreaking, or rooting your phone undermines the built-in security features offered by your wireless service and smartphone, while making it more susceptible to an attack.
  3. Back up and secure your data. You should back up all of the data stored on your phone — such as your contacts, documents, and photos. These files can be stored on your computer, on a removal storage card, or in the cloud. This will allow you to conveniently restore the information to your phone should it be lost, stolen, or otherwise erased.
  4. Only install apps from trusted sources. Before downloading an app, conduct research to ensure the app is legitimate. Checking the legitimacy of an app may include such thing as: checking reviews, confirming the legitimacy of the app store, and comparing the app sponsor’s official website with the app store link to confirm consistency. Many apps from untrusted sources contain malware that once installed can steal information, install viruses, and cause harm to your phone’s contents. There also are apps that warn you if any security risks exist on your phone.
  5. Understand app permissions before accepting them. You should be cautious about granting applications access to personal information on your phone or otherwise letting the application have access to perform functions on your phone. Make sure to also check the privacy settings for each app before installing.
  6. Install security apps that enable remote location and wiping. An important security feature widely available on smartphones, either by default or as an app, is the ability to remotely locate and erase all of the data stored on your phone, even if the phone’s GPS is off. In the case that you misplace your phone, some applications can activate a loud alarm, even if your phone is on silent. These apps also can help you locate and recover your phone when lost. Visit CTIA for a full list of anti-theft protection apps.
  7. Accept updates and patches to your smartphone’s software. You should keep your phone’s operating system software up to date by enabling automatic updates or accepting updates when prompted from your service provider, operating system provider, device manufacturer, or application provider. By keeping your operating system current, you reduce the risk of exposure to cyber threats.
  8. Be smart on open Wi-Fi networks. When you access a Wi-Fi network that is open to the public, your phone can be an easy target of cybercriminals. You should limit your use of public hotspots and instead use protected Wi-Fi from a network operator you trust or mobile wireless connection to reduce your risk of exposure, especially when accessing personal or sensitive information. Always be aware when clicking web links and be particularly cautious if you are asked to enter account or login information.
  9. Wipe data on your old phone before you donate, resell, or recycle it. Your smartphone contains personal data you want to keep private when you dispose of your old phone. To protect your privacy, completely erase data off your phone and reset the phone to its factory settings. Then, donate, resell, recycle, or otherwise properly dispose of your phone.
  10. Report a stolen smartphone. The major wireless service providers, in coordination with the Federal Communications Commission (FCC), have established a stolen phone database. If your phone is stolen, you should report the theft to your local law enforcement authorities and register the stolen phone with your wireless provider. This will provide notice to all the major wireless service providers that the phone has been stolen and will allow for remote “bricking” of the phone so that it cannot be activated on any wireless network without your permission.

For more information and resources on mobile and cybersecurity, visit the FCC’s website and the Department of Homeland Security’s Stop.Think.Connect.

Sarah SteinbergTechnologyOctober 9, 20180 comments
Read More

The President’s Message

Check out the October issue of The President’s Message. It includes Dr. Perman’s column on Promise Heights’ game-changing $30 million grant; a look ahead to Founders Week; President’s Symposium and White Paper Project tackles gun violence; John T. Wolfe Jr. talks disruption and diversity at DAC Speaker Series; UMB leaders discuss policing and emergency management; new CURE Scholars documentary to air on MPT; “I’m new to Twitter — come say hello @JayPerman;” and a roundup of student, faculty, and staff achievements.

Chris ZangABAE, Bulletin Board, Clinical Care, Collaboration, Contests, Education, For B'more, People, Research, Technology, UMB News, University Life, USGAOctober 8, 20180 comments
Read More

Meet the Makers: Dr. Luana Colloca

Luana CollocaJoin the Health Sciences and Human Services Library for Meet the Makers, its speaker series focusing on emerging technologies in the life sciences, on Oct. 17, noon to 1 p.m., in the Gladhill Board Room on the fifth floor of the library.

Luana Colloca, MD, PhD, MS, of the University of Maryland schools of medicine and nursing will deliver the lecture titled, “The neurobiology of pain modulation: From placebo effects to virtual reality”.

“The capacity to activate endogenous opioid and nonopioid systems in concomitance with the administration of an intervention represents a fascinating phenomenon that is capturing the attention of scientists from different disciplines,” Colloca says. “This lecture focuses on the neurobiology of placebo effects and virtual reality with an emphasis on relevant discoveries, new insights and developments.”

A light lunch will be provided.

Please RSVP at this link.

Brian ZelipResearch, TechnologyOctober 5, 20180 comments
Read More
Cyber security logo

Cybersecurity Awareness Month: Make Your Home a Haven for Online Safety

Every day, parents and caregivers teach kids basic safety practices — like looking both ways before crossing the street and holding an adult’s hand in a crowded place. Easy-to-learn life lessons for online safety and privacy begin with parents leading the way. Learning good cybersecurity practices can also help set a strong foundation for a career in the industry.

With family members using the internet to engage in social media, adjust the home thermostat, or shop for the latest connected toy, it is vital to make certain that the entire household — including children — learns to use the internet safely and responsibly and that networks and mobile devices are secure. Week 1 will underscore basic cybersecurity essentials the entire family can deploy to protect their homes against cyber threats.

Three Things You Can Do Today to Protect Your Home and Family

Most of us probably remember our parents advising us to look both ways before crossing the street or to never touch a hot stove. But how many of us can recall parental guidance — or have talked to our own children — about how to secure our social media accounts or how to protect our laptops from hackers?

Cybersecurity isn’t just for the workplace. Technology permeates our daily lives, helping us to connect, create, and cool off. We take our tech home, using smartphones to play music or stream movies when we aren’t answering emails. As the number of devices per household continues to grow, more children are being exposed to more technology in less time.

It’s our responsibility as consumers and family members to be aware of our own security and understand how each of us is empowered to protect it.

1. Engage with your family about the way they use technology.

Communication is important in relationships, whether with a partner or a family. Take the time to talk about technology — and we don’t mean just to share the Wi-Fi password.

For the parents among us, get involved with the technology your children use. What apps and social media sites are helping them connect with friends? What information are they sharing through texts and social media, and with whom? Are they aware of fake profiles, Fortnite scams, and other tricks used by cybercriminals?

Understanding how your children engage with devices and online services will help you protect them from dangers they may not be aware of. Help them understand that they’re in control of their accounts’ privacy settings and what they share, and that a little caution can save a lot of embarrassment and regret down the road. As an added bonus, your tech talks might give you some gift ideas for the approaching holiday season!

2: Change that Wi-Fi password!

Most home routers come out of the box with a default SSID (network name) and password. Usually, this information is printed on a label, and many people never change it. Problem is, most of these passwords also are posted online and are easy for hackers (and neighbors) to find. Some routers might not even require a password by default!

If someone can log in to your router, they can view your connected devices, change your network settings, and even lock you out of your own network. This year, the FBI warned consumers to reset their router passwords in response to an outbreak of Russian malware that allowed hackers to do exactly those things. Even if the hackers don’t poke around, they can use your home like a free hotspot as long as they’re in range (in which case you’d better hope they’re not up to anything illegal!).

Your home has a front door, and so does your network. Make sure you keep both locked tight.

3: Make sure your family’s devices are all password (or fingerprint) protected.

Computers and smartphones include password protection features that you can enable in system settings. Most newer phones and laptops also include biometric protection features such as fingerprint scanners or facial recognition. Some devices may ask you to create passwords or biometric profiles when you first configure them or when you update their operating system. There’s a good reason for that.

If your device doesn’t have a password, anyone who picks it up can view your pictures, messages, and other data. Your thief may place a few Amazon orders in your name or meddle with other open apps.

Setting a strong password or using biometric authentication prevents thieves from stealing your data, even if they manage to get their hands on your computer or phone. It also helps prevent your significant other or your kids from snooping on or pranking you.

Sarah SteinbergTechnologyOctober 4, 20180 comments
Read More
If you could have 3 library wishes, what would they be?

Submit Your Wishes to the HS/HSL Library Genie

How can the Health Sciences and Human Services Library better meet your needs? Would you like to see the library’s space designed differently? Are there any new technologies you would like to see? Are there additional resources and services you would like provided? Now is the chance to make your wishes known.

The Library Genie is accepting wishes through Oct. 31. Submit three Library Wishes to the Library Genie today!

All wishes are anonymous, but if you’re willing to talk about them, please include your name and email address.

Thanks for your input, and happy wishing!

Everly BrownEducation, People, Technology, University LifeOctober 1, 20180 comments
Read More
Join us for Wikipedia Training on Oct. 10

Wikipedia Edit-A-Thon Training at HS/HSL

Are you interested in helping improve a resource students, faculty, staff, and the community use daily?

Come to the Health Sciences and Human Services Library (HS/HSL) on Oct. 10 to learn how to become a Wikipedian and participate in the National Network of Libraries of Medicine’s  second Edit-A-Thon. The event will take place from 11 a.m. to 12:30 p.m. on the lower level of the HS/HSL, Room LL05.

During this training, librarians will help you make a Wikipedia account, make edits in Wikipedia, and use trusted National Library of Medicine (NLM) resources to improve the world’s largest encyclopedia. This workshop will help prepare you for the #citeNLM2018 Fall Edit-A-Thon, which will take place at HS/HSL on Nov. 7 and focus on women’s health. Your participation will help contribute to WikiProject Medicine.

Learn more about WikiProject Medicine or the NNLM Edit-A-Thon.

Register for Wikipedia Edit-a-thon Training.

Lauren WheelerCollaboration, Education, People, Research, TechnologyOctober 1, 20180 comments
Read More
Connective Issues: Volume 12, Issue 4

Check Out the Latest ‘Connective Issues’ Newsletter

The September 2018 issue of the Connective Issues newsletter from the Health Sciences and Human Services Library is now available.

Included in this issue:

  • Welcome — Expertise, Resources, Place!
  • Doing Research?
  • Meet the Makers — The Neurobiology of Pain Modulation: From Placebo Effects to Virtual Reality
  • Wikipedia Edit-a-thon at HS/HSL
  • The Library Genie Returns Oct. 1
  • Outbreak: Epidemics in a Connected World
  • Scholarly Publishing Workshop Series
  • Showcasing and Preserving UMB CURE Scholars’ Works
  • Meet Your Librarian
  • Top 10 Reasons to Love the HS/HSL
  • The “Spanish” Influenza Pandemic in Baltimore, 1918-1919
Everly BrownClinical Care, Collaboration, Education, Research, Technology, USGASeptember 27, 20180 comments
Read More
Scholarly Publishing Workshop Series.

Scholarly Publishing Workshop Series at HS/HSL

During this year’s Open Access Week, the Health Sciences and Human Services Library (HS/HSL) will be hosting a Scholarly Publishing Workshop Series. Please join us for a series of 30-minute workshops introducing topics related to scholarly publishing and research impact.

Choosing the Right Journal for Your Research

Tuesday, Oct. 23, noon-12:30 p.m.
Do you struggle with finding a journal that’s the perfect fit for your research? We can help! In this 30-minute workshop, we will discuss tools and strategies you can use to identify the journal that best matches your work. Feel free to come with a current manuscript or just to learn approaches for the future.

Open Access and Predatory Publishing 

Tuesday, Oct. 23, 12:30 p.m.-1 p.m.
Are you confused about different models of Open Access publishing? Are you wondering if Open Access journals are trustworthy? Are you trying to locate a legitimate Open Access journal to submit your manuscript? In this workshop, we will talk about what Open Access is, why you should consider publishing in an Open Access journal, how to evaluate a reputable publisher, and how to differentiate predatory journals and publishers.

Author IDs

Wednesday, Oct. 24, noon-12:30 p.m.
This 30-minute workshop will cover three author IDs — ORCID, Google Scholar, and Scopus. We will discuss the differences among them and why they can help boost your research impact. The workshop will be followed by a 30-minute open session to give you time to try the tools introduced in the Author IDs workshop and allow you to ask individual questions about your author IDs.

Enhancing Your Research Impact

Thursday, Oct. 25, noon-12:30 p.m.
This 30-minute workshop will walk you through methods for enhancing the impact of your research. Topics will include establishing your scholarly identity, making strategic publishing decisions, and enhancing the discoverability of your work. The workshop will be followed by a 30-minute open session to test these strategies and ask questions about your individual research impact.

To register, please use the links above or fill out the form here. Registration is encouraged but not required.

Emily GormanBulletin Board, Education, Research, TechnologySeptember 25, 20180 comments
Read More
Office 365

Office 365: The Modern Workplace

We have been utilizing Office 365 at the University of Maryland, Baltimore for the past few years. Office 365 offers many tools and services that are all geared to make our work lives easier, more accessible, and more flexible. It started small — we first focused on OneDrive, Office Online, and how to access these tools through the Office 365 Portal. Then we introduced SharePoint, which allows for team collaboration. Shortly thereafter came Teams, which is another team collaboration tool.

We’ve been gradually adding more features and programs to the UMB Office 365 workspace; however, each of these tools was a standalone. You could use one, or two, or maybe all of them — but each one was used as its own distinct tool.

This is changing! Because of Microsoft’s continuing efforts, the Office 365 platform is now mobile-friendly, robust, and beneficial, due to the new modern workplace.

What Is the Modern Workplace?

Using Office 365, the modern workplace provides an environment where people can store, sync, and securely share their work files across multiple devices and access them anywhere, anytime. It utilizes numerous real-time collaboration tools to improve how working groups and teams access content and collaborate, thus improving communication and productivity. These tools enable individual users to access and share files, emails, discussions, calendars, videos, and many other programs with their teams and other teams across the campus.

What Exactly Is Changing?

If you’ve been using any of the Office 365 tools, you may wonder what exactly does this mean, how will things be different?

When we first introduced Office 365 at UMB, each tool was promoted as serving a specific function. With the updates by Microsoft, all the tools we’ve had access to are now intertwined and serve many functions.

  • OneDrive is still used for your personal work files, but OneDrive also is an access point for ALL of your files — regardless of where they are stored or who they are shared with.
  • For team collaboration, instead of having to choose between SharePoint and Teams, your department/group/project team now gets both. If you are a part of a number of different groups, Office 365 provides easy access to all of them.
  • Teams offers a chat-based approach to communication to quickly and easily communicate with your team.
  • Additional tools, such as Office Online, OneNote, and Planner, can be used in conjunction with all of the above.

Using the Office 365 modern workplace provides a more seamless approach to information you need to complete your job from any location AND ways for you to discuss it with others in your team — whether that’s a department, cross-campus group working on a project/committee/initiative, student organization, multiple departments collaborating on a common project, or an ad-hoc group that needs to discuss a topic.

Please keep an eye out for new and updated Office 365 classes and sessions to help you learn more about Office 365 as the modern workplace. We’ll be announcing them soon!

Sarah SteinbergCollaboration, People, TechnologySeptember 24, 20180 comments
Read More
Flow Cytometry Graphic

UMGCCC Flow Cytometry Shared Services Lecture Set for Oct. 8

The University of Maryland Marlene and Stewart Greenebaum Comprehensive Cancer Center (UMGCCC) Flow Cytometry Shared Services monthly flow lecture will be held Monday, Oct. 8, 10:30 a.m. to noon, at the Bressler Research Building, Room 7-035.

The lecture will be led by Xiaoxuan Fan, PhD, the School of Medicine, and you will learn:

  • How flow cytometry works
  • Multi-color design and compensation
  • Instruments and services
  • New technology and tools
  • Online booking system

The lecture is free, but you need to reserve your spot at this link.

All are welcome, and this lecture is required for those who want to be “trained users” at the UMGCCC FCSS facility.

Karen UnderwoodBulletin Board, Collaboration, Community Service, Education, Research, TechnologySeptember 19, 20180 comments
Read More