• Behind the Exhibit Hall Table with Steve Roses from Hein

    CRIV asked Steve Roses from W.S. Hein & Co. to share some insight into the conference experience from a vendor’s point of view. GETTING TO KNOW YOU Starting off easy, what is your title, and how many years have you been with Hein? I’m director of sales at William S. Hein and Company. I joined… Continue reading

    Categories:


    Tags:



  • New: Jus AI Single-User License Option for Academic Libraries

    Author: Jean Davis, Associate Librarian for International Law, Brooklyn Law School Library Jus Mundi is a searchable collection of 120,000+ international arbitral awards, court decisions, and treaties. Jus Mundi also developed AI assistant Jus AI to support arbitration research and drafting. Jus Mundi now offers academic libraries the option to license individual Jus AI accounts.… Continue reading

    Categories:


    Tags:



  • NASIG: Inaugural Report

    Author: Rebecca Bearden, Senior Continuing Resources Librarian, Fineman and Pappas Law Libraries, Boston University Reposted with author’s permission: Rebecca Bearden, NASIG: Inaugural Report, Technical Services Law Librarian, Mar. 2026, at 1, 3. I am pleased to write the inaugural NASIG column for the newly established liaison position between NASIG and Library Systems & Resource Discovery/Technical Services… Continue reading

    Categories:


    Tags:



  • 8 Vendor Relations-Related Reasons to Attend the 2026 AALL Annual Meeting

    I have been considering the ways that I will make the most of the chance to learn more about information vendors and their offerings and to strengthen my approach to fostering open, constructive relationships with these providers. Here is a list. Continue reading


  • Authentication 101

    Author: Syd L. Stephenson, Technical Services & Systems Librarian, Thurgood Marshall State Law Library For law librarians who work outside the realm of systems administration and electronic resource management (ERM), resource authentication can sound like an overly complicated topic best left to the techy library folks and the IT department. However, authentication plays a central… Continue reading

    Categories:


    Tags: