Soutron Global Blog of Search, Knowledge Services, Archive and Library Management

Welcome to the Soutron Global Blog. Here we delve into the use of metadata, technology, archives, library management and the whole ensemble of tools needed to master the art of what we do.

Looking for ideas, critiques and observations on the fast moving world of search, archives, knowledge services and library management? Want to keep up to date with new developments?

Stay informed!

Note: We always respect your privacy. You may unsubscribe at any time.

Follow Us

Welcome to Soutron Global

Rochester Electronics Transforms Their Content Management with Soutron Archive

Rochester Electronics has successfully transformed its content management operations by updating their Soutron Archive implementation...
The Importance of Great Customer Service
So business is picking up and the service sector is leading the economy. You would expect to find service levels at an all time high yet in general it’s rare to receive great service unless you are paying lots of money or you happen to be royalty.
The Library as a Shrine
From the age of five, Saturday morning was special. I was able to attend the library at the top of the hill, beyond the cinema (we called it the Pictures). The Library was a grand building with a set of stone steps leading up to impressive wooden doors that signified it was a place of importance. There were treasures to keep secure inside, valuable and easily available for me to explore. No book was too small or too large
Top 8 Archiving Tips for Librarians
So you find yourself in the inevitable position of either starting, maintaining or updating your archive or collection. By no means a small task, but one that you have to complete all the same. So where do you begin? What do you need to consider and remember when working with the archive?
Top 10 LMS Security Issues
Library Management Systems need to be secure, but just how secure? Do you realise the complexities of security involved or have to be thought through? We have compiled this list, though not exhaustive, we feel that these security issues and points do need to be considered in most cases.