Creating effective training for public library staff requires a process that's both data-informed and adaptable. Cooperative Computer Service's (CCS) quarterly evaluation model uses feedback and data from select sources to identify and prioritize training topics for our public library consortium. This session will explore our streamlined approach to gathering and analyzing input, turning staff needs into actionable training plans. We'll discuss our methods for balancing quantitative survey data with qualitative insights, and how we leverage these findings to develop relevant, timely training initiatives.
Attendees will gain practical strategies for building responsive training programs. Join us to discover ways to create a training model that stays in tune with staff and organizational goals.
Andrew McDonald is the lead software developer at SILS. He will explain why SILS chose custom software solutions for its member library websites and consortial mobile apps. This choice comes with clear benefits, but also tradeoffs and risks which will be outline throughout the presentation.
Library staff are expected to manage large collections with little insight into actual use. How do you quickly decide what to remove, what to replace and how to budget? Rochester Hills uses libraryIQ to enhance their adult and teen collection through a variety of Discover tools that are created to ease the burden of decision making while highlighting gaps in the collection. Aurora Public Library uses libraryIQ to quickly and efficiently run weeding lists, transforming hours of work into a few clicks. Learn about the tool and the strategies that led to their success. Note: Co-presenters Jaylyn McCoy from Aurora Public Library and Sara Roberts from LibraryIQ
Nestled within the structure of the Polaris database there is an unassuming folder that may confound and confuse someone new to Polaris SQL. The Polaris views can be a strange place, with some oddities built right into the code. But this folder is of fantastic tools that can help make your life easier whenever you find yourself writing a query. We'll dive deep into these views and discover what they do, how they can help you, and how (and why) you can make your own.
This presentation is aimed at beginning and intermediate Polaris SQL users, but everyone is welcome!
An open discussion of the many reporting tools that are a part of Sierra. Do you have questions (or expertise to share) on Create Lists, Web Management Reports, SQL, Decision Center, Statistics, interesting Excel hacks, or anything else related to reporting? Then this is the session for you.
As a new Sierra Integrated Library System (ILS) administrator, stepping into this role can be both exciting and overwhelming. There's a vast amount of information to absorb, a complex system to navigate, and the pressure to become proficient quickly. In this presentation, I'll share my experiences and practical strategies to help other new administrators not only manage but thrive in this role. The focus will be on how to approach learning Sierra, how to leverage personal strengths, and the importance of embracing mistakes as part of the learning journey.
1. Digesting and Applying the Vast Amount of Information on Sierra ILS: Sierra ILS is a powerful system with extensive functionalities, which can be daunting for new administrators. The sheer volume of material to learn, ranging from circulation and cataloging to reporting and system configuration, can easily feel overwhelming. In this section, I will outline strategies for breaking down and prioritizing the learning process. I'll share methods for identifying key areas to focus on first and how to use Sierra's documentation, community forums, and training resources efficiently. Attendees will walk away with practical tips for managing the learning curve without feeling overloaded.
2. Leveraging Your Strengths (Even if They're Not Specific to ILS Administration): One of the best ways to succeed as a new administrator is to harness the strengths you already possess. Whether you have a background in librarianship, project management, customer service, IT, or even something seemingly unrelated, these skills can be extremely valuable when applied to ILS administration. This section will discuss how to integrate your unique talents into your role as a Sierra administrator. For example, strong organizational skills can help manage system updates and documentation, while technical troubleshooting experience can accelerate problem-solving. I will offer examples of how different skill sets can be applied creatively to make managing Sierra more approachable and efficient.
3. Embracing Mistakes as a Learning Tool: Mistakes are inevitable when managing a complex system like Sierra, especially as a new administrator. In this part of the presentation, I'll talk about how making mistakes is not only expected but can be an invaluable learning tool. I'll share examples of mistakes I made early on and how they ultimately led to deeper understanding and improved system management. We'll explore how to create a mindset that views errors as opportunities for growth rather than setbacks, and I'll provide tips for bouncing back quickly after missteps. This section will also cover how to document lessons learned from mistakes to avoid repeating them and to help others on your team.
By the end of the presentation, participants will gain confidence in their ability to navigate the steep learning curve of Sierra ILS administration. They'll walk away with actionable strategies for managing the breadth of information, ways to leverage their strengths, and the mindset needed to turn mistakes into valuable learning experiences. Whether you're new to the role, training a new ILS administrator, or looking for ways to optimize your approach, this session will offer practical advice to help you succeed.
Administering an ILS at a library of any size can be a challenge, especially in situations which require communication across multiple departments and branches which do not often cross paths. This session will explore how Allen County Public Library (ACPL) ILS administrators have built a more cohesive work environment through the utilization of collaborative software tools including Office 365, FreshService, and others. Using these tools, the ACPL has improved communications and workflows related to:
--Moderated and collaborative communication platforms
--Project management
--Incident management
--And more!
Representing the ACPL ILS administrative team, Nathaniel Burnard and Matthew Etzel collectively have over 40 years of library experience across a variety of positions in libraries large and small. They currently share in leading a team which administers the ACPL collection of over 3 million item records and 200,000 patron records across 14 branches, which circulates over 5 million items annually.
Write Better SQL The second of a 2-presentation series delivered over two successive days. The goal is to be largely product-agnostic and to focus more on common concepts without deep dives into the database structure of either product. This session will resume wherever the first session ended. As time permits, additional topics will include: Creating and using temp tables; understanding and using window functions; writing performant SQL. Audience members are encouraged to chime in at any time to round out the presentation with input from multiple perspectives. Likewise, questions will be encouraged throughout, including on tangential database topics. I will be working with one or more Polaris SQL experts to develop examples for the Polaris attendees.
Cybersecurity isn't just a technology concern; it's a collective responsibility. Regardless of the size of your library, your role, or technical prowess, if you're connected, you're affected. While technical solutions are critical, they're only as strong as the people who use them. Staff training and awareness are crucial components in safeguarding library data and preventing breaches.
In this session, we will focus on the pivotal role library staff play in cybersecurity. You'll learn about the most common risks to users and how to recognize and mitigate them. Whether you're front-line staff or in a leadership position, this presentation will offer practical strategies to help you foster a security-conscious culture across your entire organization.
Whether you have a dedicated IT department or not, you'll leave with actionable insights on how to make cybersecurity an everyday part of library operations, ensuring both your library and its patrons remain safe from cyber threats.
SILS uses Kibana to present Polaris data in a way that's easy to understand, encourages staff engagement, and helps our libraries make informed decisions. This presentation will give an overview of the Kibana tools that bring library data to life with visualizations and dashboards. It will cover why dashboarding has become an integral component of our reporting toolset, why we chose Kibana over alternative products, how we use Elastic with Polaris and other data sources, and the challenges we've encountered along the way.
Denver Public Library had been watching Leap functionality evolve from the sidelines for several years. In 2023, we decided the time was right to jump in and teach hundreds of front line staff at our 26 branch system to swim these new waters. Why not? We were only in the midst of a major reorg and several large-scale building renovations.
Come learn our approach to leveraging circumstances and timing to help Denver Public Library Leap forward.
Messy metadata. We've all got it. (In fact, if you don't, please come to this session and tell us how you reached that pinnacle of perfection!) In this panel, cataloging and metadata enthusiasts will discuss how we clean-up and maintain our Polaris database through monthly tasks, SQL searches, and even soliciting help outside of tech services. We'll discuss how to plan, prepare and tackle bigger projects like changing the classification of an entire collection or subject heading changes. And, of course, how to do it all while the librarians keep ordering and the materials keep arriving. Panelists will include members from hosted and unhosted sites, as well as consortia and stand-alone libraries.
Whether you're a systems administrator leading a team or a lone librarian in multiple roles, the steps to create effective cybersecurity are available to you. Using ISO27001 as the underlying framework and emphasizing a proactive, 20/80 approach (20% effort for 80% results), this session will cover the fundamental knowledge for ensuring a more secure IT environment.
We will begin with a discussion of recent library ransomware attacks starting with the biggest: the London Public Library. What happened? How did the attacker get in? Exactly what systems were compromised and what could have been done to prevent it?
This will pivot to a more general topic: what does it mean to be hacked? What is access? This will lead to the first action point: the principle of least access. Least access means that all users only get the access they need to do specific tasks, i.e. administrator access should only be provided in a limited way. Had this been followed by the IT staff at the London Public Library, the attack would not have occurred.
From here the discussion will move to the ways in which Identity and access can be stolen and how that can be prevented. What does it mean to have your identity stolen? How does this happen and how do malicious actors obtain stolen identities? I'll talk briefly about the dark web only to make participants aware that large packages of stolen identities can be bought and sold. Knowing this make it easier to recognize common patterns of attacks (such as FIRSTNAME+LASTNAME+NUMBER@GMAIL.com as the sender in email).
By introducing this concept to participants, what I'm trying to point out is that most hacks occur through staff. Most of those are phishing attacks. What is phishing? I'll then point out a few basic phishing attacks--the generic one ('phishing') and the targeted ('whaling'). So, how can you prevent phishing? I'll introduce a few methods and provide supporting documentation: regular staff awareness training and emails, and anti-phishing plugins for email clients.
After this, I will briefly discuss password security. I'll bring up the recent revision to NIST 800-63-3B which attempts to wrangle many of the myths about password security by providing best practices. I'll also mention other practices such as using unique passwords for each service and secure, free ways to store passwords. I'll also introduce a few password generators such as Last Pass.
The remaining portion of the session will discuss more higher-level activities beginning with Data Security. What is data security? What is a good backup? How often does one take backups? And of what? I'll bring up the usefulness of Amazon S3 for this purpose, since it is effective and cheap but will provide other cloud solutions they may already have access to.
To begin a Data Security program, participants will need to conduct an Audit. Because there is so much data, it's important to sit down with various stakeholders in your institution and find out what data is truly essential to their activities. I'll show a simple worksheet to help manage this discussion with stakeholders and help rank which data and services are essential. I will also give participants a very simple email template they can send to their vendors to ask them what steps are being taken to secure their data. These responses from vendors can be used to fill in the worksheet.
The last topic is the Disaster Response planning meeting: a simple sitdown meeting with various stakeholders to discuss possible responses. I will use the worksheet from the previous section to show how participants can guide this discussion and get a useful outcome.
Have you been given cataloging duties? Not sure where to start? Does reading the rules feel like a Choose Your Own Adventure? This practical session (with a touch of theory) will cover the basic building blocks of cataloging and should leave you feeling more confident and ready to catalog!
This presentation aims to share training strategies to make SQL Searching in the Find Tool more accessible for more library staff. In-house training on this powerful Polaris tool can be engaging and helpful. However, several pitfalls often seem to plague 101 Trainings: not directed at front line staff, don't reduce the intimidation associated with 'coding,' or struggle to convey how it can be useful. Our library held a session on Find Tool SQL for our annual Staff Education Day, which is transitioning to regularly available training due to staff interest. These trainings, along with redesigning our circ training modules, have provided insight into more effectively introducing complex information to a wide staff audience.
Come join us as we discuss all things Polaris Consortia related! Let's discuss strategies on managing multiple libraries using Polaris, overcoming technical challenges, managing staff workflows/permissions, fostering collaboration among member institutions, governance; or whatever you want to bring up! The forum is focused specifically on Consortia using Polaris so discussion may veer into challenges unique to Polaris, but all are welcome!
Marmot implemented PINs last year as a response to many network/data breaches reported worldwide in the last few years. This presentation will look at the implementation of PINs in the current security climate and the steps we took to ensure that PINs would be as secure as possible.
We are a consortium of 30 libraries on two Sierra servers. This makes managing Scheduler very difficult, particularly because of the limits of the Scheduler UI. This presentation will cover the processes I have developed to keep track of what is happening in Scheduler. I keep a full history of Scheduler activity in a spreadsheet, and I have calendars of what is happening when. This allows me to avoid problems in the future and do a better job of learning what happened if something goes wrong.
This presentation will explore strategies to help staff navigate continuous change. It will also showcase innovative approaches to adapting workflows when faced with limited staffing. There will be time at the end to share ideas about what has worked or not worked for your library and staff.
Dive into SQL with Our Beginner’s Guide! Discover the essentials of SQL, explore the Polaris database structure, access key documentation, and learn a basic query.
You know Sierra and have your API key: now what? Join Ray and Jeremy as they showcase real-world projects you can implement right away at your library. Learn how to harvest and export large data sets, perform batch updates that Global Update can't handle, and streamline your workflows. This session is beginner-friendly and will walk you step by step through tapping into Sierra's REST APIs with Python.
Follow up to optional pre-conference session on web design trends and how Vega products support your library's web design and marketing efforts to keep pace.
Are you seeking answers? Looking for advice? Are you a new Polaris ILS administrator or someone who's seen Polaris SA so many times you no longer get lost flipping through menus? Either way, you're always welcome at the Polaris System Administration Forum! We'll dive into all the complexity and simplicity of managing, operating, and dealing with the Polaris system. From WebAdmin to SQL, we'll help you any way we can!
The Sierra Systems Administration Forum at IUG 2025 provides a collaborative space for Sierra Systems administrators to connect, share best practices, and discuss key challenges and solutions. This forum is an opportunity to network with peers, exchange insights, and ideas to deepen your understanding of managing Sierra.