For Staff: Classroom support for Start of Semester.

With autumn fast approaching we want to share the following information around learning and teaching spaces ahead of the start of semester.  Learning and teaching spaces Staff can view quick start guidance information and material on the learning spaces Canvas page  Learning and teaching spaces refresher training Faculty Learning Spaces refresher sessions are being planned with Learning […]

Read More

Two policy databases on trial

The Library currently has two policy databases on trial: Policy Commons Policy Commons database includes nearly four million documents, reports and policy content from intergovernmental organisations and non-governmental organisations, think tanks, research centres, cities and other organisations working on the world’s most pressing and complex problems. Policy Commons is a single, easy-to-use source of “real […]

Read More

Leighton Library building exterior

Historic Leighton Library now open again

The 17th century Leighton Library in Dunblane has now reopened after extensive restoration work to the building. The Leighton Library is founded on the personal library of Archbishop Robert Leighton (1611-1684), who bequeathed some 1500 books and pamphlets to the Cathedral of Dunblane. A library building was erected between 1684 and 1688 in order to […]

Read More

LibKey Nomad: one-click access to full-text

LibKey Nomad is a browser extension that delivers one-click access to the full-text of library-subscribed articles, as well as any open access versions. Earlier in the year Information Services added LibKey Nomad to all the university managed computers on campus; on both student and staff computers. So, you may have noticed the friendly looking Nomad […]

Read More

Mobile device security

Welcome to the next installment of our 12-month Cyber Security Awareness campaign.  In previous months we’ve covered social engineering, phishing and password guidance, and this month we’re focusing on mobile devices.   Mobile devices contain a wealth of personal and sensitive information, including emails, contacts, financial details, and login credentials. They also often have access to […]

Read More