Author Archives: markwilliams

Equal Footing

Having done a number of FE events this month, I’ve got the impression that when all the to shib or not to shib deployment issues are unpacked, a reoccurring problem is the ability of LRC staff to make their case at the SMT level. It’s not that they can’t articulate it, they certainly can but … Read more

Navigation at UKSG

Marthyn Borguis session was on how users navigate publisher platforms. Tied in nicely with the JISC study focused on SP interfaces which will be starting up soon and reporting in July. Martyn used path analysis to track activity on the basis of logged actions, distinguished between guests and customers, with attention paid to entry pages … Read more

what about the ethics?

Lauries and James’s session at the JISC Conference worked well, primarily because we got a head start on the lunch queue but also because it did make me feel fairly angry about how my identity has been stolen, not by a fraud cartel but by JISC! For a number of reasons covered previously by this … Read more

Come meet us at UKSG

Calling all publishers! Many of you may have already been contacted by me to arrange quick meetings at UKSG in Torquay. If I havn’t contacted you and you would like to get together and talk through Access Management issues, please give me an email and we can arrange a time otherwise just catch up with … Read more

Identity back up

Outside of work, I blog with an entirely secret identity, usually in geeky domains where I may want to say something slanderous about Cylons. Well journalspace where I existed suffered a blogpocalypse over the holiday period. The drives failed, but hey that happened before so they installed rigorous backups. The backups failed. Well last time … Read more

I wrote this…but who are you?

At Online Information last week had a nice chat with the man from google about Knol. It would be unfair to say that it is Wikipedia with authors names, so I won’t (but others will!). Its USP over Wikipedia is attributal authorship and clearly represents a possible use of role based authentication. However as yet … Read more