RFID in Libraries

Library Video Network
Show More

Related videos

Rethinking the Call Number
This training program highlights libraries that have replaced the Dewey Decimal System for customer use. Rethinking the Call Number visits the Maricopa Public Library (AZ) and the Frankfort Public Library (IL) to see how their conversion to a "Dewey-less" library has gone. The results have been pretty dramatic. "Even if…
Serving Teens in Libraries
The training program highlights libraries that provide outstanding services to teens and shows how to replicate their successes. Serving Teens in Libraries showcases the outstanding services offered by the Public Library of Charlotte (NC) and Mecklenburg County, Queens (NY) Library, and the Baltimore County (MD) Public Library. LVN crews spent…
Leading the Change: Breaking New Ground
Leading the Change: Libraries Breaking New Ground is a training program that highlights libraries that are using innovative methods to better serve their communities. The 57-minute program features the "Tower of Books Library" in Spijkenisse, The Netherlands, the DOK Library in Delft, The Netherlands, The San Diego County Library, and…
Tell Me How Career Series: Librarian
Tell Me How Career Series - Career Education & Opportunities for Young People. Recommended for both School, Public Libraries and Guidance Offices. The Tell Me How series is a necessary addition to any library, guidance center of school curriculum. It explores a large number of career opportunities for young people…
Diversity in the Library
Every day we make assumptions about who we are, what we do, and who we interact with. Diversity in the Library will help you examine those assumptions and realize that they can create barriers to outstanding public service. The program uses scenarios taken directly from library worker's experiences. By examining…
Error Types, Systematic Debugging, Exceptions
Episode 11 of How to Program
Confront the nemesis of all computer programmers: bugs. First, look into the history of this peculiar term. Then take a systematic approach to solving mysterious glitches in your own programs. Get acquainted with the debugger in PyCharm, and explore strategies for tracking down bugs and fixing them.
And Access for All: ADA and Your Library
The program covers ADA compliance, including pulling together a focus group and designing an action plan to make the library's facilities and resources accessible. Real stories from libraries are included throughout the program. Customers with disabilities share their concerns about accessibility and provide insight to providing "reasonable accommodation." The resource…
Do Libraries Have a Future?
Do Libraries Have a Future? discusses the present and future roles of libraries. The program is designed to stimulate discussion among library workers and encourage them to take actions to ensure their library remains relevant well into the future..
Holding an Effective Meeting
Learn strategies for having your meetings be effective and efficient. In today's fast-paced world, it's important to use our time efficiently and a well-run meeting can do just that. Among the topics covered are:
  • The role of the moderator
  • Setting a workable agenda
  • Keeping…
Conducting the Reference Interview
Learn the stages of a reference interview and the behaviors necessary to conduct a successful reference interview. Produced with a content committee of reference librarians and trainers. The program also discusses the unique challenges of online reference interviews. "Although an online reference interview is a lot like that done in-person,…
Merchandising Strategies
Learn how to merchandize your library's collection and increase circulation and customer satisfaction. Detailed, step-by-step instructions give you the skills you need to create vibrant displays that grab customers' attention. This comes with a manual of tips and instructions. 3 1/2 Stars ~ "Designed to help achieve a professional, consistent…
Enterprise Security Landscape
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director…