{"id":3136,"date":"2009-08-16T18:37:26","date_gmt":"2009-08-16T22:37:26","guid":{"rendered":"http:\/\/www.libology.com\/blog\/?p=3136"},"modified":"2009-08-16T18:37:26","modified_gmt":"2009-08-16T22:37:26","slug":"perfect-storm","status":"publish","type":"post","link":"https:\/\/www.libology.com\/blog\/2009\/08\/16\/perfect-storm.html","title":{"rendered":"Perfect Storm"},"content":{"rendered":"<p><a href=\"http:\/\/www.clir.org\/pubs\/issues\/issues70.html#perf\"><strong>The Perfect Storm<\/strong><\/a> is a brief essay in the current issue of the <a href=\"http:\/\/www.clir.org\/\">Council on Library and Information Resources (CLIR)<\/a> newsletter.\u00a0 G. Sayeed Choudhury, the author of the essay, states that<em><\/em><\/p>\n<blockquote><p>&#8220;Universities have authentication and authorization systems to identify who you are and what you can use; they also have office software or course management systems to support collaboration.\u00a0\u00a0\u00a0 How many passwords do you use within your university system? How easy is it to collaborate with people outside your university? Yet within and without our universities, many faculty, students, and staff collaborate daily using Google&#8217;s suite of tools.\u00a0 This trend will almost certainly grow once Google Wave is launched later this year.\u00a0 With its impressive integration of services and novel method for identity management, Google Wave may become a tsunami that washes away the office software suite\u2014and perhaps even the course management system.&#8221;<\/p><\/blockquote>\n<p>I am not so sure that <a href=\"http:\/\/wave.google.com\/help\/wave\/about.html\">Google Wave<\/a> will be the tipping point, but it is certainly another step in this direction.\u00a0 How many of us have stepped outside of the boundaries of the traditional tools we use for our work and schooling?\u00a0 It is humbling to recognize how much time and effort can be saved through the proper application of a new software program, or an online service, or even tapping into social networking to gain insight (it is interesting that e-mail lists are considered standard, while Facebook, Twitter and blogging still have the &#8220;Library 2.0&#8221; label stuck on them&#8230; they are all different forms of social networking, with their accompanying strengths and weaknesses).<\/p>\n<p>Choudhury adds:<\/p>\n<blockquote><p>Too often we fail to examine trends beyond our own institutional context; we are reluctant to embrace risk taking when developing services or infrastructure.\u00a0 The choices that universities and libraries make regarding infrastructure in the next few years will have profound implications for the future.<\/p><\/blockquote>\n<p>I would take it a step further, and suggest that we not only don&#8217;t look beyond our own context, we fail to grasp the possibilities that exist with new technology and new applications of existing technology.\u00a0 When the environment surrounding our libraries changes, the environment within our libraries changes as well &#8211; whether we incorporate these changes or remain passive.<\/p>\n<p>In other words:\u00a0 We ignore tools such as Google Wave, Open Source, Open Access, Wikis, Blogs, Social Networking, social library catalog tools, and everything else at our own peril.\u00a0 These tools have changed our libraries, are currently changing our libraries, and will continue to change our libraries as far into the future as we can see.\u00a0 If we want to remain relevant (in other words:\u00a0 if we want to survive), we need to pay attention.\u00a0 Libraries as they have existed in the past will continue to play a role, but that role will be viewed more as an archive than a dynamic library.<\/p>\n<p>We have lost a lot of ground, but we have the ability and the resources to do this, and it starts with each and every one of us.\u00a0 How can we do our job better?\u00a0 Smarter?\u00a0 Faster?\u00a0 What tools can we use?\u00a0 How can others help?\u00a0 The libraries that pay attention to those questions, and strive to answer them effectively, will be the ones to thrive.<\/p>\n<p>I challenge you to, within the next week, find one new tool, idea, or resource that makes you better at your job.\u00a0 Repeat, <a href=\"http:\/\/en.wikipedia.org\/wiki\/Ad_infinitum\">ad infinitum<\/a> &#8211; from here it appears that it is <a href=\"http:\/\/en.wikipedia.org\/wiki\/Turtles_all_the_way_down\">Turtles all the way down<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Perfect Storm is a brief essay in the current issue of the Council on Library and Information Resources (CLIR) newsletter.\u00a0 G. Sayeed Choudhury, the author of the essay, states that &#8220;Universities have authentication and authorization systems to identify who &hellip; <a href=\"https:\/\/www.libology.com\/blog\/2009\/08\/16\/perfect-storm.html\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2920,2934,2936,2943,2944,2952,2954,2982,2966,2979],"tags":[5339,5028,5027,5346,5025,5024,4039,5388,3693,4960,5026],"class_list":["post-3136","post","type-post","status-publish","format-standard","hentry","category-blogs","category-google","category-groups","category-libraries","category-library-20","category-online-services","category-open-access","category-open-source","category-software","category-wiki","tag-blogs","tag-clir","tag-council-on-library-and-information-resources-clir","tag-education","tag-g-sayeed-choudhury","tag-google-wave","tag-library","tag-open-source","tag-social-networking","tag-technologyinternet","tag-wikis"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pSU5g-OA","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.libology.com\/blog\/wp-json\/wp\/v2\/posts\/3136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.libology.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.libology.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.libology.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.libology.com\/blog\/wp-json\/wp\/v2\/comments?post=3136"}],"version-history":[{"count":0,"href":"https:\/\/www.libology.com\/blog\/wp-json\/wp\/v2\/posts\/3136\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.libology.com\/blog\/wp-json\/wp\/v2\/media?parent=3136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.libology.com\/blog\/wp-json\/wp\/v2\/categories?post=3136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.libology.com\/blog\/wp-json\/wp\/v2\/tags?post=3136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}