Library Improves Login Process with the 3M Cloud-ID

Library Improves Login Process with the 3M Cloud-ID

Visitors to the library want to have a smooth login process and the 3M Cloud-ID has been designed to do so.

Launched by 3M Cloud Library, the 3M Cloud-ID leverages a patron’s existing library barcode and PIN to authenticate the patron and allows checkout of eBooks from the 3M Cloud Library.

This is completely different from services offered by existing eLending providers that use a separate third party ID/PIN for authentication of library patrons. These traditional process, notes 3M is the cause of about 43 percent failure rate experienced by patrons who are checking out an electronic title for the first time.

3M claims this problem is effectively addressed by 3M Cloud-ID that leverages the credentials a patron already has from the library and allows them to easily navigate the system.

On most occasions users can navigate the system with minimal to no assistance from library staff.

“3M continues to blaze the trail in improving the library patron’s experience,” said Tom Mercer, digital business development leader, 3M Library Systems. “By leaving secondary authentication behind, 3M Cloud-ID allows patrons to quickly and easily download lendable materials.”

The 3M Cloud Library boasts a growing catalog of material and has inked several publishing deals with established names such as ABC-CLIO, Baker Publishing Group and John Wiley & Sons.

This Library offers more than 100,000 titles and has also added four new beta sites in recent months. The Cloud Library eBook lending service includes 3M Discovery Terminals, which let patrons at the library browse the content catalog on electronic kiosks.

Moreover, the Library uses 3M eReaders tablets that can be checked out from the library like any other lendable materials.

3M’s system, which includes both digital content and in-library hardware will be showcased at the upcoming Library Journal and School Library Journal eBook Summit on Oct. 12.

3M is excited to participate in this summit to share more about these latest updates with the library community,” said Matt Tempelis, global business manager, 3M Library Systems. “With simple functionality, an ever-expanding catalog and a growing list of beta sites, the 3M Cloud Library has more than ever to offer both libraries and patrons.”

By Anuradha Shukla

Sorry, comments are closed for this post.

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…