Thanks, all, for your helpful responses. It looks like Greenstone may be
the most workable solution for the moment, although I am intrigued by your
article, Julia.
Regards,
Kyle
On Mon, Nov 11, 2019 at 4:36 PM Julia Bauder <[log in to unmask]> wrote:
> Hi, Kyle,
>
> I did almost this exact thing several years ago (created an offline library
> catalog for a prison education program) and wrote it up for the Code4Lib
> Journal: https://journal.code4lib.org/articles/6225 . The code, based on
> an old version of VuFind, is incredibly outdated by now, but the principles
> should still hold, and it would work for #2 if you indexed article metadata
> rather than book metadata. I've indexed JSTOR metadata into VuFind (not for
> the prison catalog, for a different thing), so I know that works. Somewhere
> (I think) I still have the mapping I used to do that, and I'm happy to
> share it, if you want it. You would just need to sign a rider with JSTOR
> to get them to give you the files of metadata for JSTOR articles.
>
> Julia
>
>
> ........................................................................................
>
> Julia Bauder
>
> Social Studies and Data Services Librarian
>
> Consulting librarian for anthropology, economics,
>
> education, political science, sociology,
>
> global development studies, and policy studies
>
>
>
> On Mon, Nov 11, 2019 at 1:07 PM Kyle Banerjee <[log in to unmask]>
> wrote:
>
> > On Mon, Nov 11, 2019 at 10:06 AM Kyle Breneman <[log in to unmask]>
> > wrote:
> >
> > > My university has a program that offers classes at a nearby prison, and
> > > this program is about to get a bunch of new laptops. As many of you
> > know,
> > > prisons are pretty restrictive and inflexible regarding technology...
> > >
> >
> > My gut reaction would be to schedule a meeting with people who decide
> > what's acceptable.
> >
> > Many things presented as security measures are really compliance issues.
> > This means engaging people can help you avoid problems outright,
> negotiate
> > paths through gray areas in ways that pass muster, and make people who'd
> > otherwise shoot you down part of the solution.
> >
> > Many environments subscribe to "checkbox" security model. Failure to meet
> > required checkboxes or triggering undesirable ones gets you rejected.
> This
> > means your goal -- and the goal you present -- is to get all the right
> > boxes checked. Don't get too hung up on common sense or actual technical
> > merit.
> >
> > You might want to have a couple approaches in your back pocket to propose
> > if the meeting goes really well. I suspect a more realistic expectation
> > would be to sent back to the drawing board. I'd avoid anything people
> might
> > have trouble processing like the plague. People always say no when they
> > don't know what's going on, and that can color future interactions with
> > you. Good luck on your project
> >
> > kyle
> >
>
|