In Remembrance

November 4, 2013 • Written by

With Remembrance Day fast approaching we’d like to introduce a part of our library collection which addresses the thoughts of many Canadians throughout “Veteran’s Week”:

Equal to the challenge : an anthology of women’s experiences during World War II

Equal to the challenge : an anthology of women's experiences during World War IIPresents stories by 55 Canadian women of their experiences during World War II. Personal wartime accounts are told by women who worked as civilians, as members of social service groups, and as members of the Canadian armed forces. An introduction discusses women’s roles in the armed forces, and how their wartime contributions influenced general attitudes toward women as equal members of society.



Fifteen days : stories of bravery, friendship, life and death from inside the new Canadian ArmyFifteen days : stories of bravery, friendship, life and death from inside the new Canadian Army

Grounded in insights gained over the course of several trips to Afghanistan, and drawing on hundreds of hours of interviews not only with the service-men and -women but with the commanders and family members as well, Christie Blatchford creates a detailed, complex and deeply affecting picture of military life in the twenty-first century.




For King and Kanata : Canadian Indians and the First World WarFor King and Kanata : Canadian Indians and the First World War

Reveals how national and international forces directly influenced the more than 4,000 status Indians who voluntarily served in the Canadian Expeditionary Force between 1914 and 1919 and how subsequent administrative policies profoundly affected their experiences at home, on the battlefield, and as returning veterans.



A place of honour : Manitoba's war dead commemorated in its geographyA place of honour : Manitoba’s war dead commemorated in its geography

Prepared by Manitoba Geographical Names Program this publication tells about all geographical features named after war Manitoban war casualties.  If you are doing some family research or trying to do some remembrance on your own, this book is a great place to start.



Invisible women : WWII Aboriginal servicewomen in CanadaInvisible women : WWII Aboriginal servicewomen in Canada

While there is anecdotal reporting on Aboriginal involvement, in recent years due to more Indigenous history being written, there is some new research on Aboriginal peoples in WWII, but mainly the Aboriginal male experience. There is practically nothing written about the Aboriginal female experience. Where are their voices? What are their stories?


A poppy is to rememberA poppy is to remember

Each Remembrance Day we honour those who gave so much to serve their country, and those who risk their lives even today, in many troubled areas of the world. With simple yet resonant words and illustrations, A Poppy Is to Remember reminds us why we wear the poppy so proudly on Remembrance Day.  (Children’s Book)

Library Art Contest

October 15, 2013 • Written by


October is Canadian Library Month. The Library would like to invite you to show off your artistic talent by illustrating a 3 X 5 library index card.


  • Open to all RRC students
  • Choose up to 3 cards from any Library location.
  • Illustrate the FRONT of the card incorporating the card’s wording and/or concept. Ideally, keeping the words visible.
  • Use any physical media (i.e. crayon, coloured pencils, macaroni, multi-media, etc.) and style of art.
  • Write your name and contact information clearly on the back.

Entries will be judged on:

  • Quality of the artwork.
  • Artistic interpretation.
  • Creativity.
  • Medium.


  • Entries must be submitted to either Library location by 4:30 pm on Friday November 1.
  • Winning cards and honourable mentions will be displayed in the Library. (Cards will not be returned.)


card examples

To view examples go to:

For More Information

Check out our posters throughout the campus.  If you have any further questions you are invited to make inquiries at any of our Library Reference Desks.

October is Canadian Library Month

September 26, 2013 • Written by


People!  Ideas!  Communities!  Information!  Canada’s libraries foster connections between people, ideas, communities, and information.

In October, these types of connections will be celebrated during Canadian Library Month. This year’s theme is “Libraries Connect”, highlighting how libraries enable people to connect with others, foster the development of ideas, and promote the growth of strong communities.

At this very moment, from coast to coast to coast, Canadian libraries are connecting people with information, providing endless opportunity to people in our diverse communities. For generations, libraries and librarians have worked at the grass roots level, providing services to communities. Today, in Canada, over 23,000 librarians and library clerks serve in over 22,000 libraries in incredibly diverse communities, from major metropolitan areas to towns and rural hamlets, from research‐intensive universities to colleges of art and design.

As well, academic libraries, school libraries and special libraries add to the creativity and personal, professional and academic growth of many Canadians. These libraries serve everyone from students and faculty to those working in the corporate, government, legal and non‐profit sectors.

For additional information please refer to the Canadian Library Month Website:

Do you want to get on wireless?

September 24, 2013 • Written by

Wireless at RRCThe Red River College Library receives plenty of inquiries about the wireless networks here on our campuses.  As usual we try to answer all of our Patron’s questions, though it must be said that we do not control or manage the wireless networks here at RRC.  At the Library we are users, just like you!

In fact, it is the Information Technology Department that manages the wireless networks at the Notre Dame Campus and throughout the Exchange District Campus.   However, though we do not control the system,  the Library can still provide some assistance in this matter.

Lesson #1: If you can’t connect, make sure you are in an area where there is coverage

First of all, users should know where the wireless access points are located. Wireless is fully available throughout the Roblin Centre and the Patterson Global Institute at the Exchange District Campus.  In the Notre Dame Campus full wireless coverage is available in Buildings A, C, D, E, F and Z and certain common areas, such as the Library, the cafeterias (Buffalo, Voyageur, Otto’s, Hard Drive ), the Cave Lounge, and the North and South Gyms.  There is only partial wireless coverage in buildings M, J and B.

Lesson #2: Make sure you use your correct username and password

Windows 8 allows you to store your username and password

Windows 8 allows you to store your username and password

Additionally, Staff and students should connect through the Wireless Network named RRCWireless.  You should take note that this network does not operate like an open wireless, such as the wireless at “Starbucks” or “McDonald’s”. A user needs to enter their credentials to obtain a connection. When challenged, use your normal RRC network username and password to login.  If you are having troubles, please review more detailed instructions on our web page, as connections may sometimes be tricky.

As for devices, iPhones and iPads usually connect very easily.  Just enter your RRC username and password and you are usually connected in seconds.  Other operating systems, such as Android, may require additional settings.  Further, devices such as Kobo may have trouble connecting as they normally do not have the correct WPA2 protocol required for a connection.  Please refer to our webpage for more detailed info and instructions.

Lesson #3: Don’t use RRCGUEST!

Staff and students should connect through the Wireless Network named RRCWireless.  Do not connect to RRCGUEST.

A common problem that occurs is users try to connect to the network named “RRCGUEST”.  This network is for guests to the college and is not meant to be used by students and/or staff.

Connections to “RRCGUEST” require a special username and a password that must be obtained  in advance, by making a CASELOG request to Information Technology Solutions.  The Library does not know any of the usernames and/or passwords and we cannot issue you with one.


Please note, those staff and students that have College-issued laptops and devices, should submit a Caselog if they have troubles connecting to the Wireless network.  However, the RRC IT Department cannot support those that have personal devices.  If you have a personal device and you just can’t seem to get it connected to the RRCWIreless then come to our Helpdesk in the Lower Learning Commons of the Roblin Centre, or to the Help Desk in the Library Computer Lab at the Notre Dame Campus.  Our staff is available from 8:00AM to 4:00 PM and they are great at helping students with these types of problems.

Reference: Library Help and Guides – Red River College Wireless

Safe Social Networking

September 4, 2013 • Written by

title-screenSocial networking sites such as Facebook and Twitter are powerful, allowing you to meet, interact and share with people around the world.

However, with all these capabilities come risks; not to just you, but your family, friends and employer.

In this blog entry I will discuss what these dangers are and how to use these sites more safely.


A common concern about social networking sites is privacy.

  • Potential dangers include:
    • Impacting Your Future: Many organizations search social networking sites as part of background checks. Embarrassing or incriminating posts, no matter how old, can prevent you from getting hired or promoted.
    • Attacks against You: Cyber criminals can harvest your personal information and use it for attacks against you. For example, they can use your information to guess the answers to your “secret questions” to reset your online passwords, create targeted email attacks or apply for a credit card using your name. These attacks can also spill into the real world, such as identifying where you work or live.
    • Harming Your Employer: Criminals or competitors can use any sensitive information you post about your organization against your employer. In addition, your posts can potentially cause reputational harm for your organization. Be sure to check with your organization’s policies before posting anything about your employer.
    • Harming others: We have to always remember that the things we post on social networking sites is very public and others may be offended by what we post. Sometimes this may be what we call Bullying; at other times it is more innocuous, however it may still be negatively received.

Privacy Advice

  • Limit the information you post. Don’t post anything personal. Yes, privacy options can provide some protection; however, keep in mind that privacy options are often confusing and can change frequently without you knowing. Facebook is notorious for doing this.
  • In Facebook, on the right side of your posts, is a security settings dropdown.  Check it and make sure it is set to at least "Friends".  Avoid "Public"

    In Facebook, on the right side of your posts, is a security settings dropdown. Check it and make sure it is set to at least “Friends”. Avoid “Public”

    In Facebook, the default is to give you minimum security.  In fact, currently, when a new Facebook account is created the user’s posts will be public.  This is not a good idea.  In fact it is recommended that users change their default settings so that ONLY FRIENDS see their postings.

  • The privacy of your information is only as secure as the people you share it with. Limit your friends.  In fact if someone is a stranger to you, then do not become friends with them.
  • Be aware of what information friends are posting about you. It can be just as damaging if they post private information or embarrassing photos of you. Make sure your friends understand what they can or cannot post about you.
  • You may change your settings so that posts and photos where you have been tagged are only seen by you and are hidden from your friends. If one of your friends posts something you are not comfortable with, ask them to take it down. At the same time, be respectful of what you post about others.


In addition to privacy concerns, social networking sites can be used by cyber criminals to attack you, your workstation or your device (Smart Phone). Here are some steps to protect yourself:

  • Login: Protect your social networking account with a strong password and do not share this password with anyone or re-use it for other sites. In addition, some social networking sites support stronger authentication, such as two-step verification. Enable stronger authentication methods whenever possible.
  • Variety of Passwords: Try not to use the same password for all your sites. Try to vary the password in some way. When one site gets hacked, then the hackers may try to use the same password to break into your other accounts. Don’t use the same password for banking as you do for facebook!
  • Encryption: Many social networking sites allow you to use encryption called HTTPS to secure your connection to the site. Some sites like Twitter and Google+ have this enabled by default, while other sites require you to manually enabled HTTPS via account settings. Whenever possible use HTTPS.
  • Email: Be suspicious of emails that claim to come from a social networking site; these can easily be spoofed attacks sent by cyber criminals. The safest way to reply to such messages is to never click the link in an email, but to go to the website directly, perhaps from a saved bookmark, and check any messages or notifications using the website.


Look out for certain types of scams:

  • Twitter Scams:
    • Users sending you a direct message such as “Did you see this picture someone posted of you”. This is a scam. Don’t click the link! The user may even be a colleague or friend. The reason they are sending you these messages is because they have been scammed.
    • If you click something and then you are asked to login to Twitter, be careful. Check the address bar of your browser and make sure you are actually providing your username and password to the real web site.For example if you see something like the picture below you will know that you are not giving your information to the REAL (look carefully at the address!)
Note that the address is not exactly  This is a Phishing attempt.  Don't login!

Note that the address is not exactly This is an attempt to steal your password (Phishing). Don’t login!

  • Facebook Scams:
    • Malicious Links/Scams: Be cautious of suspicious links or potential scams posted on Facebook. Cyber criminals can post malicious links and if you click on them, they take you to websites that attempt to infect your computer. In addition, just because a message is posted by a friend does not mean it is from them, as their account may have been compromised. If a family member or friend has posted an odd message you cannot verify (such as they have been robbed and need you to send money), call them to confirm the message.
    • Apps: Facebook give you the ability to add or install third-party applications, such as games. Keep in mind there is little or no quality control or review of these applications; they may have full access to your account and private information. Only install apps that you need, that are from well-known, trusted sites and remove them when you no longer need them.
    • This is not a real warning. It is an Advertisment for virus-like software.

      This is not a real warning. It is an Advertisment for virus-like software. Ignore it!!!

      Confusing Ads that are scams: You may see an ad that tells you that your computer is at risk, however clicking on the ad will prompt you to download and install malware. Don’t click it. Ignore it!

    • Like and Share Scams: Did you know that these viral Facebook photos and posts that implore you to Like or Share them are often posted on Facebook for one single purpose? …to make scammers money? Just ignore them.


Social networking sites are a powerful and fun way to communicate with the world. If you follow the tips outlined here, you should be able to enjoy a much safer online experience. For more information on how to use social networking sites safely or report unauthorized activity, be sure to review the security pages of the sites you are using.



Are we losing it? Thoughts on “Digital Records Dilemma”

June 17, 2013 • Written by

In the June 15th Winnipeg Free Press, it was discussed ( that some government emails are irreversibly deleted. Keeping digital records is important because they provide evidence of how government conducts its business.

Good recordkeeping requires a lot more effort than just ensuring crucial records are not deleted, whether intentionally or not. Essentially, digital records need to be maintained so that they can be accessible and usable over time. Physical artifacts may exist for thousands of years, and paper records could stay for decades, but digital records do not have such robustness. Digital carriers have short longevity, both media and file format obsolete in fast fashion (see Chamber of Horrors), digital data is vulnerable to damage (see Atlas of Digital Damages), can be altered with great ease, all of which could render digital files unreadable in a few years. Stated simply, digital records won’t survive benign neglect.

One might think about printing out and keeping paper records instead. This is definitely not an ideal solution—the benefit of digital format such as links, searchability, and certain functionalities will be lost. Digital records need to be refreshed and migrated on an on-going base. Till today, migration is the most commonly used digital preservation method followed by emulation. Neither of them is straightforward and can be costly. For example, when files are transferred to a different format, errors could be introduced. When it comes to proprietary software, when the vendor is out of the market, support is likely to be discontinued.

Digital preservation is at its infancy. Strategies and methodologies are yet to be developed! One thing is certain–we need to consciously and actively maintain our digital records to avoid leaving a black hole in our society’s collective memory.

Luck, Opportunity, and the New Graduate: Videos to Help the Job Search

June 11, 2013 • Written by

No more classes.  No more assignments.  As caps and gowns swish across the stage during convocation, a new phase begins for Red River graduates:

 Finding a job

The 2011/2012 Graduate Satisfaction and Employment report states 68% of Red River graduates found employment in their field.  How do they do it?  Most programs have classes in career writing. From students needing extra pointers to staff needing more resources to teach job hunting skills, Cambridge Educational offers a series of videos entitled The Complete Job Search System. While Media Services does have hard copies on DVD of the titles, last year the library website featured links to the web streaming editions of these same titles.  It connected with RRC job seekers as they were accessed over 40 times compared to other links on the website.  All it takes is a little time perhaps with a username and password.

Below are the titles in The Complete Job Search System series, each linked to their record in the library catalogue:

Career Evaluation VideoEvaluating different careers
HF 5382.7 .E93 2007
Location: A/V stacks and On Demand

Finding a job
HF 5382.7 .F56 2007
Location:  A/V stacks and On Demand

Interviewing for a Job
HF 5382.7 .I58 2007
Location:  A/V stacks and On Demand

Right Job for your personality
HF 5382.7 .R54 2007
Location:  A/V stacks and On Demand

Succeeding on the job
HF 5386 .S828 2007
Location:  A/V stacks and On Demand

While videos and instructors teach the skills to seek and land a job, each graduate comes equipped with traits like patience, persistence, and perseverance.    In the wise words of Oprah Winfrey,” ‘if you hadn’t been prepared when the opportunity came along, you wouldn’t have been ‘lucky’.”

It’s now or Naxos!

June 5, 2013 • Written by

notesWith the Winnipeg Jazz Festival right around the corner (and down the street) from June 13 -23rd why not get in some early jazz listening.

Check out the Naxos Music Library – Jazz available on the Library’s website.

Thousands of tracks of jazz from over 2,300 albums.  Search by artist, genre and composer. Simply log in to the Naxos Jazz website and search for your favourite jazz artist or jazz track. Create your own playlists.

How to get there:

  1. Go to the Library’s website.
  2. Go to Article and Databases – Alphabetical – Naxos Music Library – Jazz.
  3. Log in with your College username and password.

More music can be found in the Naxos Music Library – the world´s largest online classical music library with over 85,000 discs and 1.2 million tracks.

In the meantime, check out Jazz Festival Headliner, George Benson’s “Breezin’” track:


What’s Happening at the CLA?

May 31, 2013 • Written by

The Canadian Libraries Association annual conference is being held in Winnipeg this week. Red River College is well represented as several staff members are attending, taking advantage of the proximity of this years conference.

The annual CLA conference draws participants from public, college and university, special and school libraries, as well as commercial participants. It is an important and well attended conference.

So, what was discussed?

A DRM “Brave New World”

Cory Doctorow - Opening keynote speaker CLA 2013 Winnipeg

Cory Doctorow – Opening keynote speaker CLA 2013 Winnipeg

On Thursday 30 May 13, the keynote speaker was the well-known science fiction novelist, blogger and technology activist Cory Doctorow.

As well as being the the co-editor of the popular weblog Boing Boing ( he is also a regular contributor to The Guardian, the New York Times, Publishers Weekly and Wired. He is an activist in favour of liberalizing copyright laws and a proponent of the Creative Commons organization. In fact, he publishes much of his work under a creative-commons licence.

In his keynote address Doctorow spoke about DRM and how it is affecting our privacy and freedoms. For example, he described how DRM software can be used to take over our computers with hidden files and even introduce spyware.

One of his messages to the Librarians in the room was to avoid purchasing materials with DRM, and essentially join him in his advocacy against DRM.

At one point he made reference to the monetizing of smart phone tracking data, something government agencies usually regard as a harmless act, downplaying the tracking data as benign information. Doctorow’s opinion, in contrast, “there is a very fine and philosophical line between data and metadata.”

Doctorow spoke of the fact that our society should be moving towards greater transparency and digital freedom. However, as Doctorow pointed out, we actually seem to be moving closer to a darker age where governments and corporations can reduce our privacy at will, even going as far as turning on our digital cameras for the purpose of spying on us.

It was an wonderful presentation. Doctorow proved to be engaging and his topics were thought-provoking and extremely timely, as he astutely pointed out, our copyright legislations are currently under large scale review.

McLuhan, Books & Libraries: An Old Figure in a New Ground

Dr. Robert K. Logan from the University of Toronto presented several recollections of conversations with McLuhan. As a past colleague of McLuhan his knowledge of the man seemed peerless.

As well, doing his best to channel McLuhan, Dr. Logan described how he is endeavouring to answer several burning questions about the future of libraries in an effort to write a new book about the subject.

FrankenLibraries: The Latest Tech Trends

Presented by Stephen Abram, a veteran library watcher, strategic technologist and library futurist, the topic centred on services libraries should be adopting for present and future relevance.

One of the first slides in Abrams presentation was “It’s simple really, shift happens, gedoverit (sic)”. This terse statement summed up the topic very well.

One of the important points of the presentation was how libraries need to measure impact rather than just circulation statistics. In fact, the number of people passing through the library doors should be a powerful indicator of success, while dwindling circulation statistics should be considered to be less indicative.

As well, libraries need to focus on professional services and strategic alignment. Librarians need to be service professionals and not servants, and educators not supplements. He pointed out that Librarians are powerful agents for successful learning and they should be seen as such.

Lastly, Abrams stressed the power of video resources. He pointed out that humans are visual learners and they will learn better through video rather than print.

Stephen Abram’s Blog:

Winnipeg Hosts CLA 2013 National Conference and Trade Show

May 29, 2013 • Written by

A National Library Event

Library staff from Red River College Library are geared up for the CLA 2013 National Conference and Trade Show taking place May 29 – June 1, 2013. Thousands of library professionals from Canada and the U.S. will gather at the Winnipeg Convention Centre to network and to learn about the latest trends and developments in the world of libraries.

Introducing the CLA 2013 Conference Keynote Speakers…

photo by Jonathan Worth (, Creative Commons Attribution 3.0

photo by Jonathan Worth (, Creative Commons Attribution 3.0

Cory Doctorow 
( is a science fiction author, activist, journalist and blogger — the co-editor of Boing Boing ( and the author of the bestselling Tor Teen/HarperCollins UK novel LITTLE BROTHER. His latest young adult novel is HOMELAND, his latest novel for adults is RAPTURE OF THE NERDS.


photo by Joi [CC-BY-2.0 (], via Wikimedia Commons

photo by Joi [CC-BY-2.0 (], via Wikimedia Commons

Rebecca MacKinnon
is a leading voice on issues of privacy, free expression and governance in the digital networks, platforms and services. She is Senior Research Fellow at the (New America Foundation), is involved with Ranking Digital Rights, and co-founder of Global Voices Online, a global citizen media network. Her book, Consent of the Networked: The Worldwide Struggle for Internet Freedom was published in 2012 and received the 2013 Goldsmith Book Prize.