The African University Librarian In The Information Age


Since their inception, libraries have maintained their sovereignty as the main storage of knowledge in society. Today, novel information technologies equipped with the computer, telecommunications and optical media are seriously affecting libraries. ICTS, for short, is used here to include computer hardware, software and telecommunication equipment. It has been an indispensable tool and has great impact globally. Of all the diversified technologies of our time, progress in information and communication technology has no doubt had, and continues to have considerable influence on the global economy. It makes it possible to collect, process and transmit information at breathtaking speed and declining cost. It increases productivity, improves quality and efficiency in all types of services.

The impact is seen in diverse areas such as health-care, finance and banking, transportation, publishing and management. Information technology is already changing our lives in various ways. It facilitates communication irrespective of distance, relieves one of a great deal of hard, dirty and repetitive work and gives control over the natural environment. As Knopp (1984) realistically observed, the library is presently standing on a crossroad and must try to find a useful balance between the traditional library functions and methods, and the new challenges. The African university librarian will pay a tremendously high price in preserving traditional services and embracing the technological advances. This notwithstanding, it must be paid if the African librarian wants to interpose or remain the mediator between the user and information. It is the librarian’s role to ensure that the resulting use of computers and telecommunication and any other appropriate technology contributes in cost effective ways to the needs of scholarship and research since “he librarians have the expertise in acquiring materials in a variety of formats and make them accessible for a variety of purposes” (Simpson, 1984, p.38).


Two programmes of the International Federation of Library Associations and Institutions (IFLA), the Universal Bibliographic Control (UBC) and the Universal Availability of Publications (UAP), have contributed immensely to a wide and easy access to print information. Something similar can be done to provide the same access to electronic information. African university librarians could take the legacy of the aforementioned programmes and tranpose them into a new vision for an electronic future.

At the second meeting of the Ad Hoc Committee on University Libraries held in Accra in 1999, the need to give priority to the improvement and the issues of access to the new information technologies were stressed. It was emphasized that university management structures must acknowledge the centrality of the library as a pedagogic tool (AAU, 199). Continuing education programmes for African libraries to facilitate reskilling, which meets the dynamic information environment, must be supported because there must be a concentration in training for technology regardless of the area of librarianship one specializes in. It is a truism that “librarians need to know how to access and filter what is on the web” (Rosenberg, 2000, p.15).


A school of thought forcefully argues that the advantages of information technology are double-edged. Technology too appears to have increased rather than decreased the woes of African university libraries in the provision of information. Special equipment is needed to access and to retrieve information that comes in electronic format. There are problems of storage and conservation even when the equipment is available. Technology can only be installed and utilized if adequate and sound funding supports it. It is incontrovertible that the most important factor worth investigating seriously is the economic side of the issue. In Sierra Leone, the university administration initially centrally budgeted about six percent for its college and institute libraries. Central funding however has been replaced by collegiate funding which is inadequate (Rosenberg, 1997). Management must acknowledge and support the centrality of its academic nerve centre and ensure the sustainability of the library programmes and services.

The development of systems for the organization of knowledge and information retrieval has reached a plateau, with names of fundamental system characteristics now adequately tried and tested. Nevertheless, news of the core concepts, the use of inverted files to aid in retrieval and the context in which many systems operate need constant revision. Researchers are pursuing a variety of approaches in their search for better systems, categorized into the following:

1. System design, where the general objective is to optimize the efficiency and effectiveness of the system, including storage and its retrieval speed; and

2. The human computer interface (human factor) where the objective is to improve the quality of interaction between the user and the computer so that the former can be more successful in extracting what they require.


National governments should give more prominence to African university libraries in the area of provision of infrastructure and funding. It is a truism that the government of Sierra Leone like other African governments is seeking ways and means to curtail the amount of money spent on tertiary education (Duah, 1999). The New Educational Policy for Sierra Leone (1995) is committed, in principle, “to establish, equip, manage, maintain and develop an efficient library service in the capital, provisional towns and districts” (p.41). Until such a policy is implemented, the library system would go Rip Van Wrinkle. Information is a factor of production. Consequently, the institutions that acquire, organize, store, preserve in a manner that facilitates retrieval and provide it to potential users deserve government support and attention. The Ministry of Education in Ghana for instance launched several initiatives to enhance both computerization and access to the internet for educational institutions. The Educational Management Information System (EMIS) project was launched in October 1997 to provide internet services/access to educational administrators across the country.


In spite of the novel technology, the mission of the library will remain unchanged though the ways in which librarians fulfill this mission changes. African librarians must find a very useful balance between the conventional/traditional library functions and the methods of the new challenges in order to maintain their leadership role in the information age. The university library should consider operating an automated system that will be accessible to students, lecturers and the general public in order to support teaching, learning, research and extension services of the university. This system can be worked through collaborative efforts of all concerned.


AAU Newsletter (1999). The role of the university libraries in Africa, 5(2), pp.1-12.

Duah, V. (1999). The AAU and higher education in the next millennium. AAU Newsletter, 5(2), pp.1-2.

Knopp, W. (1984). The library in a technological world: problems and queries put forward by the client. IFLA Journal, 10(1), pp.57-62.

New Education Policy for Sierra Leone. Freetown: Department of Education.

Rosenberg, D. (1997). University libraries in Africa. London : International African Institute.

___________ (2000). Internet training for libraries. INASP Newsletter, 15, p.15.

Simpson, D. (1984). Advancing technology: the secondary impact on libraries and users. IFLA Journal, 10 (1), pp.43-48.

Platonic Fullerene Chemistry and the Information Singularity

During the 6th Century BC, the Greek philosopher Thales, who studied political ethics at the Egyptian Mystery Schools, was followed by the philosopher Pythagoras. In the 4th Century BC the scientist Anaxagoras developed the concept of the Nous, a whirling force that acted upon primordial particles in space to form worlds. Plato fused ethics into the Nous, which was held to transmit infinite living evolutionary information to human consciousness, through the mind’s eye. During the 3rd Century BC the Platonic tradition of Greek philosophy’s fusing of ethics into the Nous resulted in the Greek Science for Ethical Ends and the Science of Universal Love. In the latter science the harmonic moon’s Music of the Spheres was held to transmit evolutionary wisdom to the atoms of a mother’s soul, to explain her love and compassion for children.

The Nous force became known as gravity and the mind’s eye is about the functioning of liquid crystal optics within cellular membranes, transmitting intuitive pattern recognition of the sacred geometrical dance of life enfolding protein in DNA. Pythagoras’ linking of light to the Music of the Spheres described an electromagnetic phenomenon guiding evolution. During the 18th and 19th Centuries, scientists such as Kant, Orsted, Humboldt and Schelling, involved in the discovery of electromagnetic forces, attempted to discover an ethical Godlike spiritual (holographic) purpose, in order to develop a spiritual technology to make the electric motor a child’s toy by comparison.

Scientist have located the basis of this futuristic technology as being associated with the female cellular electromagnetic field, as it morphs the electromagnetic motor driving the sperm’s tail into the form of the centriole, when it penetrates the ovum. This in turn energises the first bone created in the embryo, the sphenoid bone, which then guides the electromagnetic functioning of conscious thought within the human metabolism. In 1990 the World’s largest technological research institute IEEE SPIE Milestone Series in Washington reprinted the optical mathematics of the Science-Art Research Centre of Australia. The Centre’s discovery was that seashell evolution was guided by new physics laws governing optimum growth and developmental through space-time. This was the world’s first rigorous measurement of the mathematical life-force of the Music of the Spheres and the research methodology now can be applied to humanoid evolution. In 1995 the President of the Institute for Basic Research upgraded the mathematics to embrace physics principles, lying beyond the imagination of current entropic science.

HRH Prince Charles has written a book entitled Harmony and the scientist Dr Richard Merrick, at the University of Texas, has written a book called Interference. The Science-Art research Centre of Australia is about to publish its book The 21st Century Renaissance, in collaboration with the Florentine New Measurement of Humanity Project. All three books refer to the importance of the ancient Greek concept known as The Music of the Spheres.

In the 1959 Rede Lecture delivered at Cambridge University the Molecular Biologist Sir C P Snow, advised that unless modern science was reunited with the ancient Greek Humanities, civilisation would be destroyed. The engineer Buckminster Fuller wrote about this situation in his book Utopia or Oblivion. Prince Charles has reawakened a vital interest in the Music of the Spheres concept, fulfilling Buckminster Fuller’s prediction that a new human survival paradigm would emerge from within the Humanities.

Observer participancy is about mind influencing matter. Albert Einstein, Niels Bohr, Werner Heisenberg and other scientists referred to this phenonemon as the Copenhagen Interpretation of quantum mechanics, obeying the law of ultimate chaos. However, other scientists such as the 1937 Nobel Prize winner in Medicine Albert Szent-Gyorgyi considered this to be an insane interpretation. He realised that universal consciousness was being generated to balance the energies of destruction in order to prevent the universe from reverting to chaos, a concept belonging to the teachings of the Egyptian Deity Maat.

Western civilisation, governed by the second law of thermodynamics, is unable to consider the linking of life-force to negentropic values, thus creating the species Homo Entropicus. This species must become extinct, in accordance to Einstein’s premier law of all science. The acceleration of technological information is rapidly approaching an information crisis, referred to as an information singularity, which within our present culture can only become subject to terminal chaos.

To prevent such a death sentence being enacted upon Homo Entropicus,when it arrivies at the information singularity, it need to harness negentropic technologies in order to free humanity from its dependence on an obsolete fossil fuel based economy. For Homo Entropicus to survive it must change its mindset, allowing itself to embrace the negentropic potential of the functioning of a holographic universal energy system. This reappraisal of the real nature of information through space-time, will allow the human species to effectively utilise the information singularity. In doing so, Homo Entropicus will have made the necessary quantum leap into an infinite future.

The major obstacle is greed, driven by a lack of ethical knowledge and a primitive lust for power. The Science for Ethical Ends was based upon the physics principles upholding the harmonic properties of the Music of the Spheres.

At the beginning of this century Sir Isaac Newton’s unpublished papers, discovered during the 20th Century, proclaimed the existence of a more profound philosophy to complete the mechanical description of the universe (Gregory, R. 1989, Alchemy of Matter and Mind, Nature.Vol 324. 30 November, page 473). Newton based his conviction upon the physics principles upholding the Music of the Spheres. He had also written that the properties of light attached to gravity transmitted evolutionary information acting instantaneously through space-time, the very core quantum non local effect concept needed to survive the information singularity.

The theories of Nikolai Kozyrev, examined by the Science-Art Research Centre, were considered relevant to their famous seashell discoveries of new physics laws governing optimum biological growth and development. By upgrading their Music of the Spheres research methodology, Kozyrev’s warping of space-time propulsion theories, for the harnessing of negentropic technology, was found to be consistent with the recently discovered negentropic properties of carbon. It is foolish to continue to classify Newton’s unpublished Heresy Papers as being the product of an insane mind, used somehow to support a purported Axis of Evil, threatening Western Culture. Western culture will be able to develop the ethic technologies and save humanity from an entropic information singularity extinction, once it breaks free from the entropic law it has imposed upon itself. The rigorous mathematical base for the new technology can be located by nano-photographic techniques observing the functioning of the ‘Molecule of Emotion’, discovered by Dr Candace Pert in 1972.

The difference between the mathematical cultures of the Mystery Schools of Babylon and Egypt has been made quite clear. The Egyptian mathematics was about preventing the universe from reverting to chaos, while Einsteinian mathematics, derived from the Babylonian school, demanded that the universe must revert to chaos. The mathematician Lord Bertrand Russell, devoted to the study of ancient mythological mathematical intuitions, wrote his influential book, The Freeman’s Worship, in which he said humanity had no option but to worship Einstein’s understanding of the Babylonian mathematics.However, Einstein’s understanding of the geometry of the Babylonian mathematics was that it must lead to an eventual universal chaos. This became the basis of global economic rationalism, which is now accelerating that chaos.

© Professor Robert Pope

Apply Information Security Concepts in Your Business Organisation

It is almost 100% certain that the reader of this article has been using technology to enhance his or her business in one way or the other. However, unfortunately, only few people know how to apply technology, especially information security concepts in their everyday work. Over the years, technology has undergone a huge transformation, and information security has become one of the major discussion topics on the Internet due to the way hackers attack different companies and do away with their sensitive information. If you are an ardent computer user, chances are that all your vital information is stored on your computer, or on the Internet. Now if I ask, what have you done in order to prevent losing your data should in case your computer runs into a problem?

For the benefits of those who are looking for a concise information about the use of information security concepts in everyday work, we have come up with a short, but accurate points on how you can apply information security concepts in your business. Hopefully, this short piece will be of great help in securing your work.

As a team of security experts, has created many useful videos, and published a lot of articles that can help you in the field of information security. In fact, our specialized training courses are designed mainly for people who are looking for ways to secure their information and other sensitive resources in their work place. However, without wasting much time, let’s move straight to the point and talk about the subject matter.

We definitely agree that information security is quite important in every business. It does not even matter whether you are working in a large firm or a small company. Obviously, you would want to share data with people in different offices in your workplace, and at the same time communicate using Internet connection. If this is the part of your office setting, then you are already applying technology in your business. However, the big question is how do you secure your information and how do you restrict unauthorized people from stealing your sensitive data? This and other thought provoking questions are the reasons why we’ve come up with this topic.

Since the theme of this article is the uses of information security concepts in everyday work, we won’t want to deviate from the topic at all. So, let’s look at them one after the other.

Information security concepts help prevent data loss.

A lot of people have lost important data due to the lack of strong security measure. Honestly speaking, we are all exposed to different security threats. However, what makes some of us confident about our business is the level of security that are put in place. There are different security concepts that can help you run your business successfully without fearing whether someone will steal your information or not. Learning about all these techniques is of great importance, as it helps you understand how things work and how you can apply them effectively.

It gives you hope that no one is using your device without your permission

Have you ever noticed any irregularities on your computer? Have you ever imagine what other people are doing on your computer when you are not around? These are some of the questions that bother me the most. If you left your office computer unprotected, some people might start toying with it. Sadly, some will even execute some programs that can halt the working condition of the computer. Furthermore, some people might install fishing programs on your computer, which indirectly sends everything that happens on the computer to the person’s email address. If such programs are installed on your computer, chances are that the person will have access to all your confidential information without your notice. However, if your computer is protected with password, and other security measures, you will be confident that no one is using your device without your permission. Because of this, it is important to apply strong security measures in everyday work.

Saves you money and gives you rest of mind

Some people might say, how will information security concepts saves me money? Of course, there are many ways you can lose money if your information is not secure. Fortunately, a lot of people who enroll on our training courses can testify to this. Once you apply a strong security measure in your work place, you will be able to focus on other things without worry whether someone will hack your information or not. It will save you money that you might spend on repairing the damage or to recover the loss that will happen after any unwanted attacks.

Secure identity

A lot of people have fallen victim of identity theft due to lack of strong security measures and knowledge of information security. Honestly, this is one of the things that you should worry about. Identity theft is a serious issue, and could cause problems if scammers use your real identity to perform their act.

In order for you to prevent scammers and hackers from stealing your information, you need to setup a strong security measure and educate yourself on how you can monitor your information and secure it.