This workshop explained how metadata, both technical and descriptive, is and can be embedded in these files and how its addition makes them more accessible and usable. If you have a large collection of digital files and are looking for a way to add information about them without a database, using embedded metadata may be for you.
In a hands-on session, we worked with several existing embedded metadata reading and editing tools and introduce the Visual Resources Association's custom XMP File Info panel for Adobe Photoshop and Bridge applications.
more info:
http://serc.carleton.edu/viz/metadata11/embedded_metada.html
Search engines are programs that search documents for keywords and return a list of documents containing those keywords. Examples include Google and Yahoo. They work by using web crawlers to locate documents and indexers to create indexes of words in each document. Google provides many useful search features beyond basic keyword searches, including calculators, unit converters, clocks for different time zones, weather and flight status checks, and more specialized searches like site: searches. The document provides examples of how to use advanced search features on Google to refine searches by file format, domain, keyword locations, and excluding certain words.
Team Lightning presents on improving information retrieval for the LAPL Photo Collection by addressing issues like session timeouts, improving search result ranking, and enhancing the user interface. The presentation provides background on the photo collection and system, identifies three main problems, and proposes solutions to better organize and surface relevant search results for users.
This document summarizes research into discovering lost web pages using techniques from digital preservation and information retrieval. Key points include:
- Web pages are frequently lost due to broken links or content being moved/removed, but copies may still exist in search engine caches or archives.
- Techniques like lexical signatures (representing a page's content in a few keywords) and analyzing page titles, tags and link neighborhoods can help characterize lost pages and find similar replacement content.
- Experiments showed that lexical signatures degrade over time but page titles are more stable, and combining techniques improves performance in locating replacement content. The goal is to develop a browser extension to help users find lost web pages.
What is RSS and Why Should I Care? A Presentation for Educators and School Ad...lcstephenson
This document discusses RSS (Really Simple Syndication or Rich Site Summary) and provides examples of how educators can use RSS feeds. It explains that RSS is a format for delivering regularly changing web content and allows users to access updates from their favorite websites in a standardized, computer-readable format. The document then provides several specific examples of how RSS can be used, including for tracking student blogs, package deliveries, calendar updates, news searches, and sports scores.
An explanation of the Visual Resources Association Embedded Metadata working group project to develop a custom info panel for cultural heritage metadata.
Background to social media at National Library of Scotland, the Flickr evolution and being part of the the Flickr Commons initaitive, presentation by J. Toon, NLS, given at CIGS Web2.0 metadata and issues seminar, Fri 30 Jan, 2009.
http://www.flickr.com/photos/nlscotland/
This document provides instructions for creating an MP3 player using HTML and Flash. It discusses embedding MP3 files using Flash embedding code and parameters. It also discusses using Greasemonkey and the Del.icio.us Playtagger userscript to automatically generate inline Flash players for linked MP3 files on webpages and to save MP3 links to a Del.icio.us account for creating playlists.
Search engines are programs that search documents for keywords and return a list of documents containing those keywords. Examples include Google and Yahoo. They work by using web crawlers to locate documents and indexers to create indexes of words in each document. Google provides many useful search features beyond basic keyword searches, including calculators, unit converters, clocks for different time zones, weather and flight status checks, and more specialized searches like site: searches. The document provides examples of how to use advanced search features on Google to refine searches by file format, domain, keyword locations, and excluding certain words.
Team Lightning presents on improving information retrieval for the LAPL Photo Collection by addressing issues like session timeouts, improving search result ranking, and enhancing the user interface. The presentation provides background on the photo collection and system, identifies three main problems, and proposes solutions to better organize and surface relevant search results for users.
This document summarizes research into discovering lost web pages using techniques from digital preservation and information retrieval. Key points include:
- Web pages are frequently lost due to broken links or content being moved/removed, but copies may still exist in search engine caches or archives.
- Techniques like lexical signatures (representing a page's content in a few keywords) and analyzing page titles, tags and link neighborhoods can help characterize lost pages and find similar replacement content.
- Experiments showed that lexical signatures degrade over time but page titles are more stable, and combining techniques improves performance in locating replacement content. The goal is to develop a browser extension to help users find lost web pages.
What is RSS and Why Should I Care? A Presentation for Educators and School Ad...lcstephenson
This document discusses RSS (Really Simple Syndication or Rich Site Summary) and provides examples of how educators can use RSS feeds. It explains that RSS is a format for delivering regularly changing web content and allows users to access updates from their favorite websites in a standardized, computer-readable format. The document then provides several specific examples of how RSS can be used, including for tracking student blogs, package deliveries, calendar updates, news searches, and sports scores.
An explanation of the Visual Resources Association Embedded Metadata working group project to develop a custom info panel for cultural heritage metadata.
Background to social media at National Library of Scotland, the Flickr evolution and being part of the the Flickr Commons initaitive, presentation by J. Toon, NLS, given at CIGS Web2.0 metadata and issues seminar, Fri 30 Jan, 2009.
http://www.flickr.com/photos/nlscotland/
This document provides instructions for creating an MP3 player using HTML and Flash. It discusses embedding MP3 files using Flash embedding code and parameters. It also discusses using Greasemonkey and the Del.icio.us Playtagger userscript to automatically generate inline Flash players for linked MP3 files on webpages and to save MP3 links to a Del.icio.us account for creating playlists.
Extending your own and others' sites with HTML5Mark Reeder
- The document discusses extending third-party sites like Turntable.fm using HTML5 capabilities in a Chrome extension. It started as a bookmarklet but grew to include features like desktop notifications, local storage, and message passing between the content script and page scripts. Maintaining compatibility with the third-party site code poses challenges as the site can change unexpectedly.
The document discusses the evolution from Web 1.0 to Web 2.0, including defining characteristics of Web 2.0 sites like user participation, reusable data, and improving functionality as more users engage with the site. It also provides an overview of important Web 2.0 technologies like AJAX, microformats, mashups and recommendations for skills needed by web developers, such as JavaScript libraries, debugging tools, and techniques to improve page load speeds.
Preservation Metadata, CARLI Metadata Matters series, December 2010Claire Stewart
This document discusses preservation metadata and provides examples of how it can be implemented. Preservation metadata supports ensuring the long-term usability of digital resources by documenting their creation, format, and any events that impact them over time. The document outlines the PREMIS data model and provides sample PREMIS XML documents following that model. It also presents case studies of how preservation metadata has been implemented for Northwestern University's digitized book collection and by organizations like Portico and HathiTrust.
The document discusses metadata schemas and workflows for cataloging digital assets. It provides examples of metadata schemas including Dublin Core and Photoshop XMP schemas. It also describes different organizations' processes for collecting metadata from faculty and students and integrating it into databases using tools like Photoshop and custom metadata panels. Custom metadata schemas are suggested to better fit specific needs rather than repackaging existing schemas.
EJME: Enhanced Journals Made Easy (2011-11-14, KX Bonn)Driek Heesakkers
The document discusses the Enhanced Journals Made Easy (EJME) plugin for Open Journal Systems (OJS). The plugin allows authors to submit supplementary data files with journal articles. The data is integrated into the editorial workflow and publishing process. When published, the article is accompanied by a resource map and identifiers linking the article to any supplementary data files. The goal of the project is to make it easy for small academic presses to publish enhanced scholarly articles.
Overview of three Yahoo! Technologies. Build your Own Search Service (BOSS), Yahoo! Query Language (YQL) and the Yahoo! Application Platform (YAP) for the University of South Carolina
Andreas Creten is the lead developer of My Name is E, a social networking service. E uses open web standards like PHP, MySQL, jQuery, and open protocols like HTTP, SMS and Bluetooth. E's architecture includes web servers, static storage, and a sync service for sharing social network information across devices. Creten emphasizes using open standards to promote competition and data portability.
The document provides an introduction to the Semantic Web, including:
- The Semantic Web extends the current web by giving information well-defined meaning so computers and people can better work together.
- It aims to make data easier for machines to publish, share, find and understand through smarter data rather than just smarter machines.
- Examples of Semantic Web applications include Bio2RDF, which provides structured data about genes, and the BBC publishing semantic metadata about musical artists.
Georgi Kobilarov presented on the status and future of DBpedia. DBpedia extracts structured data from Wikipedia and makes it available as linked open data. Current challenges include improving data quality, handling live Wikipedia updates, adding other data sources, and developing a new approach for infobox extraction using a domain-specific ontology. The vision is for DBpedia to become the Wikipedia of structured data and enable users and applications to access and query this data without having to understand its technical implementation.
"RDFa - what, why and how?" by Mike Hewett and Shamod LacoulShamod Lacoul
The document discusses RDFa (Resource Description Framework in Attributes), which allows adding semantic metadata to web pages. It provides an overview of RDFa and examples of using RDFa to annotate events, people, and other entities on web pages in order to make the information machine-readable. The examples demonstrate how RDFa can be used to embed semantics in HTML and reuse attributes, allowing the HTML and RDF data to coexist in the same document.
841- Advanced Computer Forensics
Unix Forensics Lab
Due Date: Please submit your answers to the Linux Lab dropbox by midnight of July 2nd 2013.
******************************************************************************
To challenge yourself, you may work on the advanced Unix forensics lab analyzing the Lewis USB image and writing a report about this case. See the file UNIXForensicslab-usb for details.
******************************************************************************
Objective
This lab will use Autopsy, PTK, Sleuthkit and foremost to analyze a given image. Read the entire document before starting to be sure you have all the necessary tools and files required to complete the lab. You should further explore the tools used in this lab to ensure your familiarity with alternative investigation options.
Deliverable
Answer all the exercise questions and include screenshots as supporting data if necessary.
OPTIONS:
You can work on this lab by
1. using a bootable live CD, for example, backtrack 5
2. using the RLES vCloud.
3. using SANS Investigate Forensic Toolkit (SIFT) Workstation, http://computer-forensics.sans.org/community/downloads.
4. installing the software on your own system (check the appendix for more installation details).
If you choose to use the RLES vCloud, please continue.
Lab Setup for using RLES vCloud
This lab is designed to function on the RLES vCloud via https://rlesvcloud.rit.edu/cloud/org/NAT. Please FIRST read the RLES VCLOUD user guide in myCourses > Content > Hands-on Labs.
Special Browser Setting Requirement (See RLES VCLOUD user guide)
In order to view the console of virtual machines, the VMRC plugin must be installed within the browser. The first time the console is accessed, the plugin can be downloaded. In Internet Explorer, https://rlesvlcoud.rit.edu must be added to the Local intranet zone.
(Go to Tools -> Internet Options -> Security tab -> Local intranet, click the Sites button, click Advanced and add the URL.)
The interface is available by navigating to https://rlesvcloud.rit.edu/cloud/org/NAT. (Yes, we know the certificate wasn’t issued by a commonly trusted certificate authority. Also check the user guide for your browser compatibility).
Use your RIT Computer Account credentials to gain access to the rlesvcloud interface.
To start, you will first create your vApp by following the instructions of Add a vApp Template to My Cloud in the RLES VCLOUND user guide. Make sure to follow the vApp name convention defined in the RLES VCLOUND user guide and select the vApp template, 841_Linux_Forensics, from the Public Catalogs. No network/IP address is needed for this lab.
Double click on the virtual machine to power it on, now you should have a Linux forensics machine with all the forensics’ tools to provide you with a highly interesting experience in forensics investigation. Login to the virtual machine with
Username: root
Password: netsys
Exercise 1:Using Autopsy and Sleuthkit
Require.
An examination of the current data portability design patterns used in Social Media sites. Looking at a possible new Open Stack concept to create true plug and play interfaces for user to exchange data.
rNews: Embedding Metadata in On-line News
From the talk at SemTech
Wednesday, June 8, 2011
09:45 AM - 10:35 AM
Level: Business / Non-Technical
Case Study
Location: Yosemite A
The IPTC, a consortium of the world's major news agencies, news publishers and news industry vendors, recently released rNews, a semantic standard for on-line news. rNews uses RDFa to annotate HTML documents with news-specific metadata, to help with search, ad placement, aggregation and the sharing of on-line news. Jayson Lorenzen, a software engineer with Business Wire and one of the IPTC Member organization delegates working on rNews, will give an overview of the IPTC, the rNews standard, why rNews is needed and how the standard was eventually created. The talk will include use cases and live demonstrations of rNews and will end with a call to action for you to participate; rNews is currently at version 0.5 and the IPTC is looking for feedback on how to improve the standard.
This document provides an overview of sitepackages in TYPO3, including:
- What a sitepackage is and the benefits it provides over putting configurations directly in the fileadmin
- The basic structure of a sitepackage including folders for classes, configuration, documentation, and resources
- Examples of configuration files like PageTS, TCA, and TypoScript that can be included
- Setting up a minimal example package as a demonstration of the core components of a sitepackage
Do you struggle to keep track of all your favority Web sites and other online resources? Would you like to share the links to your favority online resources with your colleagues or students? Social bookmarking is a technique of storing, classsifying, sharing, and searching links through the practice of folksonomic tagging. This hands-on session will introduce the popular social bookmarking tools del.icio.us and CiteULike and explore several practical applications for implementing social bookmarking in the classroom.
The document discusses how adding semantic markup like microformats to web content can make it more meaningful to machines and improve search engine optimization. It provides examples of how standards like hCalendar and hCard can be used to semantically tag events and contact information. Implementing microformats transforms a website into a readable API that allows other applications to retrieve and reuse the structured data.
Creative Commons @ Seybold San Francisco 2004 - DRM RoundtableMike Linksvayer
This document summarizes a discussion on digital rights management (DRM) and rights description. It provides an example of using metadata to describe the license and permitted uses of a creative work according to a Creative Commons license. It also distinguishes between rights description, which promotes certain uses, and rights management, which focuses on restricting uses and protecting content.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Extending your own and others' sites with HTML5Mark Reeder
- The document discusses extending third-party sites like Turntable.fm using HTML5 capabilities in a Chrome extension. It started as a bookmarklet but grew to include features like desktop notifications, local storage, and message passing between the content script and page scripts. Maintaining compatibility with the third-party site code poses challenges as the site can change unexpectedly.
The document discusses the evolution from Web 1.0 to Web 2.0, including defining characteristics of Web 2.0 sites like user participation, reusable data, and improving functionality as more users engage with the site. It also provides an overview of important Web 2.0 technologies like AJAX, microformats, mashups and recommendations for skills needed by web developers, such as JavaScript libraries, debugging tools, and techniques to improve page load speeds.
Preservation Metadata, CARLI Metadata Matters series, December 2010Claire Stewart
This document discusses preservation metadata and provides examples of how it can be implemented. Preservation metadata supports ensuring the long-term usability of digital resources by documenting their creation, format, and any events that impact them over time. The document outlines the PREMIS data model and provides sample PREMIS XML documents following that model. It also presents case studies of how preservation metadata has been implemented for Northwestern University's digitized book collection and by organizations like Portico and HathiTrust.
The document discusses metadata schemas and workflows for cataloging digital assets. It provides examples of metadata schemas including Dublin Core and Photoshop XMP schemas. It also describes different organizations' processes for collecting metadata from faculty and students and integrating it into databases using tools like Photoshop and custom metadata panels. Custom metadata schemas are suggested to better fit specific needs rather than repackaging existing schemas.
EJME: Enhanced Journals Made Easy (2011-11-14, KX Bonn)Driek Heesakkers
The document discusses the Enhanced Journals Made Easy (EJME) plugin for Open Journal Systems (OJS). The plugin allows authors to submit supplementary data files with journal articles. The data is integrated into the editorial workflow and publishing process. When published, the article is accompanied by a resource map and identifiers linking the article to any supplementary data files. The goal of the project is to make it easy for small academic presses to publish enhanced scholarly articles.
Overview of three Yahoo! Technologies. Build your Own Search Service (BOSS), Yahoo! Query Language (YQL) and the Yahoo! Application Platform (YAP) for the University of South Carolina
Andreas Creten is the lead developer of My Name is E, a social networking service. E uses open web standards like PHP, MySQL, jQuery, and open protocols like HTTP, SMS and Bluetooth. E's architecture includes web servers, static storage, and a sync service for sharing social network information across devices. Creten emphasizes using open standards to promote competition and data portability.
The document provides an introduction to the Semantic Web, including:
- The Semantic Web extends the current web by giving information well-defined meaning so computers and people can better work together.
- It aims to make data easier for machines to publish, share, find and understand through smarter data rather than just smarter machines.
- Examples of Semantic Web applications include Bio2RDF, which provides structured data about genes, and the BBC publishing semantic metadata about musical artists.
Georgi Kobilarov presented on the status and future of DBpedia. DBpedia extracts structured data from Wikipedia and makes it available as linked open data. Current challenges include improving data quality, handling live Wikipedia updates, adding other data sources, and developing a new approach for infobox extraction using a domain-specific ontology. The vision is for DBpedia to become the Wikipedia of structured data and enable users and applications to access and query this data without having to understand its technical implementation.
"RDFa - what, why and how?" by Mike Hewett and Shamod LacoulShamod Lacoul
The document discusses RDFa (Resource Description Framework in Attributes), which allows adding semantic metadata to web pages. It provides an overview of RDFa and examples of using RDFa to annotate events, people, and other entities on web pages in order to make the information machine-readable. The examples demonstrate how RDFa can be used to embed semantics in HTML and reuse attributes, allowing the HTML and RDF data to coexist in the same document.
841- Advanced Computer Forensics
Unix Forensics Lab
Due Date: Please submit your answers to the Linux Lab dropbox by midnight of July 2nd 2013.
******************************************************************************
To challenge yourself, you may work on the advanced Unix forensics lab analyzing the Lewis USB image and writing a report about this case. See the file UNIXForensicslab-usb for details.
******************************************************************************
Objective
This lab will use Autopsy, PTK, Sleuthkit and foremost to analyze a given image. Read the entire document before starting to be sure you have all the necessary tools and files required to complete the lab. You should further explore the tools used in this lab to ensure your familiarity with alternative investigation options.
Deliverable
Answer all the exercise questions and include screenshots as supporting data if necessary.
OPTIONS:
You can work on this lab by
1. using a bootable live CD, for example, backtrack 5
2. using the RLES vCloud.
3. using SANS Investigate Forensic Toolkit (SIFT) Workstation, http://computer-forensics.sans.org/community/downloads.
4. installing the software on your own system (check the appendix for more installation details).
If you choose to use the RLES vCloud, please continue.
Lab Setup for using RLES vCloud
This lab is designed to function on the RLES vCloud via https://rlesvcloud.rit.edu/cloud/org/NAT. Please FIRST read the RLES VCLOUD user guide in myCourses > Content > Hands-on Labs.
Special Browser Setting Requirement (See RLES VCLOUD user guide)
In order to view the console of virtual machines, the VMRC plugin must be installed within the browser. The first time the console is accessed, the plugin can be downloaded. In Internet Explorer, https://rlesvlcoud.rit.edu must be added to the Local intranet zone.
(Go to Tools -> Internet Options -> Security tab -> Local intranet, click the Sites button, click Advanced and add the URL.)
The interface is available by navigating to https://rlesvcloud.rit.edu/cloud/org/NAT. (Yes, we know the certificate wasn’t issued by a commonly trusted certificate authority. Also check the user guide for your browser compatibility).
Use your RIT Computer Account credentials to gain access to the rlesvcloud interface.
To start, you will first create your vApp by following the instructions of Add a vApp Template to My Cloud in the RLES VCLOUND user guide. Make sure to follow the vApp name convention defined in the RLES VCLOUND user guide and select the vApp template, 841_Linux_Forensics, from the Public Catalogs. No network/IP address is needed for this lab.
Double click on the virtual machine to power it on, now you should have a Linux forensics machine with all the forensics’ tools to provide you with a highly interesting experience in forensics investigation. Login to the virtual machine with
Username: root
Password: netsys
Exercise 1:Using Autopsy and Sleuthkit
Require.
An examination of the current data portability design patterns used in Social Media sites. Looking at a possible new Open Stack concept to create true plug and play interfaces for user to exchange data.
rNews: Embedding Metadata in On-line News
From the talk at SemTech
Wednesday, June 8, 2011
09:45 AM - 10:35 AM
Level: Business / Non-Technical
Case Study
Location: Yosemite A
The IPTC, a consortium of the world's major news agencies, news publishers and news industry vendors, recently released rNews, a semantic standard for on-line news. rNews uses RDFa to annotate HTML documents with news-specific metadata, to help with search, ad placement, aggregation and the sharing of on-line news. Jayson Lorenzen, a software engineer with Business Wire and one of the IPTC Member organization delegates working on rNews, will give an overview of the IPTC, the rNews standard, why rNews is needed and how the standard was eventually created. The talk will include use cases and live demonstrations of rNews and will end with a call to action for you to participate; rNews is currently at version 0.5 and the IPTC is looking for feedback on how to improve the standard.
This document provides an overview of sitepackages in TYPO3, including:
- What a sitepackage is and the benefits it provides over putting configurations directly in the fileadmin
- The basic structure of a sitepackage including folders for classes, configuration, documentation, and resources
- Examples of configuration files like PageTS, TCA, and TypoScript that can be included
- Setting up a minimal example package as a demonstration of the core components of a sitepackage
Do you struggle to keep track of all your favority Web sites and other online resources? Would you like to share the links to your favority online resources with your colleagues or students? Social bookmarking is a technique of storing, classsifying, sharing, and searching links through the practice of folksonomic tagging. This hands-on session will introduce the popular social bookmarking tools del.icio.us and CiteULike and explore several practical applications for implementing social bookmarking in the classroom.
The document discusses how adding semantic markup like microformats to web content can make it more meaningful to machines and improve search engine optimization. It provides examples of how standards like hCalendar and hCard can be used to semantically tag events and contact information. Implementing microformats transforms a website into a readable API that allows other applications to retrieve and reuse the structured data.
Creative Commons @ Seybold San Francisco 2004 - DRM RoundtableMike Linksvayer
This document summarizes a discussion on digital rights management (DRM) and rights description. It provides an example of using metadata to describe the license and permitted uses of a creative work according to a Creative Commons license. It also distinguishes between rights description, which promotes certain uses, and rights management, which focuses on restricting uses and protecting content.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
78. Bridge Exercise Bridge Metadata panel preferences Do one of the following: click Metadata panel menu -> Preferences click Edit -> Preferences step 4 of 5
79. Bridge Exercise Bridge Metadata panel preferences Select the metadata fields that you want to display -> OK step 5 of 5
80. Exercise Open file “order6545.pdf” in Acrobat Reader right click - Properties File - Properties + d File - Properties step 1 of 1
81.
82. PDF Some free PDF tools allow basic metadata editing
109. Exercise step 3 of 4 Source : Minneapolis College of Art and Design Copyright Status : Public Domain Rights Usage Terms : This image may be freely copied and used for any desired application. Copyright Notice : This image is in the public domain.
Back in the 20 th century, I would have given you a cassette of my favorite songs, which trust me, you would love, but you would have a hard time identifying and finding the songs. And no, I wouldn't ’t take the time to label each cassette with all the songs.
Contrast this to the experience of iTunes, one of the most prevalent examples of embedded metadata. Wouldn't ’t it be great if you could do the same thing with digital image files as they are transferred from one device or application to another? Finding, organizing, making playlists, moving that functionality from desktop to laptop to phone, to iPod, to iPad. You can share files with friends and they can do the same thing. Digital music files have taken the guesswork out of music. Image files and pdf files can and should work the same way. MP3s are able to do this because they have metadata - information about the file and its contents, embedded in the file. the metadata is part of the file, just like the image or text. it travels with the file.
This works well for music files and we are all used to it, and even expect it now. Interestingly, the jpeg album cover image does not have any data. It could have just as much data as the MP3s. It could be just as understandable and discoverable as the MP3s, but it ’s not. Clearly this is unfair to jpegs.
More often than not, all you know about a digital image is its file name and when it was created.
By embedding metadata in the files, images can have the same usability as MP3s, like displaying the Title and tags.
This works in Mac OS too (you are not able to customize the display as much)
First, download all the test files used in this presentation. http://metadatadeluxe.pbworks.com/w/file/46749169/Workshop_files.zip
After installing the test files you will now try searching for a specific image based on it’s embedded metadata. 1. Enter the phrase “find me” in the Windows or Mac file browser search box.
In Windows 7 enter the search at the top right. You should see this result.
In Mac OSX enter the search at the top right. You should see this result.
Windows 7 can display a lot of embedded metadata, but to see it you have to do some work. 1. Expand the metadata pane at the bottom by dragging the border up.
To customize Windows Explorer, start by enabling the main menu. Go to: 1. Organize 2. Folder and search options
Check: “ Always show menus”
Go to: 1. View 2. Choose details…
In Choose details Check the fields you want to see Note: Fields are visible according to file type
To see your chosen fields… Select: Change your vview 2. More options
Select: 2. Details
Now you can see, and sort the embedded metadata.
Windows 7 Choose Right click - Properties
Windows 7 Choose Right click - Properties
Windows 7 To see the large image preview: 1. Click show/hide
Mac Show metadata inspector: command + i NOTE: Spotlight Comments is not recommended - it only works within Mac OS and is not read by other applications
Mac 1. Preview: double click file or Open with – Preview 2. Preview inspector: command + i 3. Quick view: command + i
When you use an image database online, you get the image and the metadata.
However, when the images are removed from the web environment, they loose their identity. Typically, when you download images there is no metadata included – you have to download it separately or, more typically, you go back to the website and copy and paste the data into a Word doc.
Fortunately, the MDID2 database shown earlier embeds some basic metadata on export. To see how this benefits the user, try searching test images folder for the word “pyramids”. Click on each file and use the metadata/inspector panels to view the Title and Tags in each file.
Then search for “civil war”. You should get a different set of images. This demonstrates how allows you to find and identify images when they have been downloaded with embedded metadata.
If the images have rich embedded metadata, you can search for very specific names such as “Fort Richardson”.
Windows 7 allows you to create and edit embedded metadata. Exercise: In metadata pane: click metadata fields. If a white text box appears, you can edit the text. Some fields are not editable. Windows Explorer can edit Title, Tags, Author, Subject writes to Title (why???) is supposed to read from XMP dc:description but doesn't (why???)
Mac OSX can't edit IPTC data . Preview is supposed to edit keywords, but it doesn’t always work, I’m not sure why. 1. click magnifyig glass (Keyword inspector)
For full creation and editing you are better off in one of several dedicated photo applications. This exercise will use Photoshop. 1. open file: EMwg-chicago_picasso
2. go to File - File info... (the file info dialog will open in the foreground) 3. Select the “Description” tab 4. In the “Keywords” field add: "plazas; civic centers"
5. In the “Copyright notice” field add: "Creative Commons Attribution"
6. Click “OK” to save your changes and close the info panel. 7. In Photoshop, save the file. Now go back to the Windows File Explorer or Mac Finder and view the results.
There are several excellent free tools for creating reliable embedded metadata.
How does this work? Digital image formats, such as TIFF, use a set of metadata tags in the file header to tell your system how to interpret and display the image. Some of these tags contain data recorded by cameras and scanners such as date, time, and device settings.
Exchangeable image file format (Exif) is a standard that specifies the formats for images , sound , and ancillary tags used by digital cameras (including smartphones ), scanners and other systems handling image and sound files recorded by digital cameras. Exif was developed by Japan Electronics and Information Technology Industries Association (JEITA) and Camera & Imaging Products Association (CIPA)
There are also fields for descriptive metadata which allow you to identify what is shown in the image
Embedded metadata was first embraced by news organizations who needed to send photos around the world along with text that positively identified what was in the in a photo. The original method for doing this was very simple - information such as date, caption, location and credit was directly written on or attached to the print and then it was sent over telephone lines on teletype machines (similar to a fax). When the recipient received the photo, the information was right there, they didn ’t have to match a list of captions to several photos that came in that day. When TIFF files replace this format, images could be transferred faster, with higher quality and with some basic embedded text. The metadata was limited, but it got the job done.
IPTC partnered with Adobe to add the IPTC “Information Interchange Model” (IPTC IIM) standard to Photoshop in 1995. After this IPTC IIM became widespread in the press industry, and has increasingly been adopted by professional and amateur photographers alike.
XMP was released by Adobe in 2001. It is more powerful than the previous standard because it uses RDF/XML and standardizes the definition, creation, and processing of extensible metadata . Adobe said “With an XMP-enabled application, information about a project can be captured during the content-creation process and embedded within the file and into a content-management system.”
Like the TIFF standard, XMP is meant to be completely interoperable.
XMP is an open standard - Adobe makes it and several tools that use it available for free.
File formats supported by XMP
The process of embedding the data is handled by your photo editing or organization tool. It converts your text into code and adds it to the file.
XMP metadata is written in RDF/XML and written into the image file.
This exercise demonstrates how XMP metadata is shared among several info panels. The same data values will be seen in the various info panels. Photoshop: 1. open file "EMwg-Schiller-2.jpg" 2. open File info... 3. select the Description tab 4. select IPTC tab 5. select VRA_beta 0985 tab
Partial views of the Description, IPTC and VRA info panels. Notice the same text appears in different fields in each panel. The text is actually only stored in one XMP record and displayed by each panel.
Where XMP lives: There are separate groups of data stored within image files. Within those tags there are other groups of data for specific uses.
Because it ’s a form of RDF, an XMP record can be a mix of various schemas - as long as you follow the specifications of each. This is a very common approach as illustrated by the Metadata Working Group’s recommended mapping which uses properties from four different namespaces.
Mix and match: Dublin Core, photoshop, xmp, and Iptc The Metadata Working Group includes software and hardware makers who work together to use the same XMP properties for metadata to ensure interoperability.
If you want more specialized metadata, you can choose from several XMP schemas built into many applications (and not just Adobe).
Since your embedded metadata will likely be viewed by a variety of applications it is important to understand how existing schemas are used.
For instance, IPTC “Creator” refers to the creator of the photo and is the same as “Artist”, “Author”, and “Photographer”. IPTC “Copyright” refers to the rights of the photo, not an artwork it shows.
To help establish industry-wide standards for embedded image metadata, the Metadata Working Group has published a map that many manufacturers and developers use.
In addition, these groups (and more) adhere to agreed upon use of XMP schemas.
The VRA Embedded Metadata Working Group (EMwg) was formed in 2008 to research data standards and explore the potential implications of embedding metadata using the cultural heritage-focused VRA Core schema, the broadest schema available for addressing the description of both the digital image, or surrogate, and the work it depicts.
Exercise: 1. go to flickr.com/photos/53000293@N03/ (Google search: flickr metadata deluxe) 2. look for the two photos titled “Friedrich Schiller” 3. Open each and notice the difference in Tags (Keywords), Caption 4. view exif data - all VRA data is there but it's hard to find and is not searchable What’s going on: In one photo, only the VRA schema was used. In the other, the VRA fields were concatenated to create a Caption and a set of Keywords that Flickr could see and display.
Flickr Uploadr alows you to enter data before you upload your files to Flickr. However, it does not embed the data, it sends it separately to Flickr. You are better off embedding your data in another application and then uploading them to Flickr. Embed data once and use it many times.
If you have entered a lot of data in Flickr, you can use various tools such as Bulkr to retrieve it as embedded metadata.
The pro version of Bulkr downloads your images embedded with any data you entered in Flickr. This could be used to collect data from users, e.g., class projects, collaborative cataloging.
In Photoshop 1. Open Royal Architectural Museum folder 2. Open file info...
This is a tour of the pop-up info panel dialog: Click on each of the panel tabs along the top Click on the Preferences button Click the downward arrow beside the Import/Export button
In Bridge 1. Open Weitz Center Images folder 2. Open file info...
You can add or edit metadata directly into the Bridge Metadata panel. Open Bridge and navigate to the image(s) file(s) that you wish to work with using the “Folders” tab located on the either side of the “Content” tab in the workspace. Once the images can be viewed in the “Content” tab, select the files that you want to write data to by clicking on them. To select multiple images sequentially, hold down the Shift key and click on the image at the beginning of the sequence using the mouse and then click on the last image in the sequence. To select multiple images randomly use the “Control/Command” key and mouse to click on the desired files. Add or Edit metadata Click the Pencil icon to the far right of the metadata field you want to edit. Type in the box to edit or add metadata. Press Tab to move through metadata fields. When you have finished editing the metadata, click the Apply button at the bottom of the Metadata panel. To cancel any changes you’ve made, click the Cancel button at the bottom of the panel.
1. Click on the VRA Work Site Location field 2. Enter the text “United States” 3. Click on the check mark or click anywhere in the workspace and Save.
Open the PDF file “order6545” View the file properties
Process: 1. Basic accession data recorded on a department wiki. 2. If labeled slides are provided, scans/photos showing the labels and images are made. This is saved as a PDF. 3. Full accession record created in the PDF header using a custom XMP panel in either Acrobat Pro, Photoshop, or Bridge. 4. Completion of production steps are recorded in using the same custom XMP panel in either Acrobat Pro, Photoshop, or Bridge.
Completed accession record info panel.
Hidden data doesn't help the casual user but can be enormously useful to the professional.
XMP for PDF documents has been introduced with Acrobat 5 and PDF 1.4 in 2001. Advantages: PDF files are more compact and require only a fraction of the memory space of respective TIFF files, often with a better quality
Advantages: PDF stores structured objects (e.g. text, vector graphics, raster images), allowing for an efficient full-text search in an entire archive
Advantages: Metadata like title, author, creation date, modification date, subject, keywords, etc. can be embedded in a PDF file PDF files can be automatically classified based on embedded XMP metadata, without requiring human intervention.
All ISO standards for PDF include the use of XMP metadata (even mandatory in most cases except ISO 32000). PDF/A is an ISO Standard for using PDF format for the long-term archiving of electronic documents. In order to create electronic archives, emphasis must be given to the creation of metadata.. PDF/A requires the use of XMP for identifying PDF documents as conforming to PDF/A-1a or 1b.
For more information go to pdfa.org
Hidden data doesn't help the casual user but can be enormously useful to the professional.
The Semantic Web envisions a world of structured data online where computers can understand concepts and use logic to achieve similar results to human brainstorming. This world is one of distributed expertise where authoritative data from many different communities can be combined by computers to be more than the sum of its parts.
To see how a website can extract and display embedded metadata: 1. go to embedmydata.com 2. upload one of the Weitz Center example images
The key to the Semantic Web is RDF, a method that enables machines to combine data files posted by people online and easily understand them and learn new things that no single document contained.
Nikon View NX2 can embed GPS coordinates in images using a Google map search
It can also use those GPS coordinates to query Wikipedia for additional keywords. This allows users to bring in related information they might not have known, such as City, State, Country, affiliated institutions, creators etc.
To make it easy for users to input parsed data, an XMP panel could query a semantic web resource, such as VIAF, and retrieve authoritative database-ready data.
Encode values as linked data URIs that query a central database for the most accurate information possible. You could also embed any level of data that you think will provide a basic description of the content and then take the user to a central source for complete information.
In this exercise you will copy all of the embedded metadata from one image to another. In Adobe Bridge 1. Open the file “EMwg-manuscript1.jpg” 2. Open File - file info…
In this exercise you will copy all of the embedded metadata from one image to another. In Adobe Bridge 1. Open the file “EMwg-manuscript1.jpg” 2. Open File - file info…
1. Create a template of the current data by clicking on the arrow beside the Import/Export button. 2. Choose Export. 3. Name the template 4. Save 5. Close “EMwg-manuscript1.jpg”
Now you will apply the template to another image.
1. Open the file “EMwg-manuscript2.jpg” 2. Open File - file info…
1. Click the arrow beside the Import/Export button 2. Click Import 3. Choose either: Clear existing properties and replace with template properties Keep original metadata, but replace matching properties from template Keep original data, but append matching properties from template
1. Choose a template file 2. Double click or click Open The metadata from the template should now appear in the info panel. You have just copied the data from EMwg-manuscript1.jpg to EMwg-manuscript2.jpg
The data from EMwg-Manuscript-1.jpg should now appear in the info panel for the current image, EMwg-Manuscript-2.jpg.
This exercise demonstrates how you can enter metadata into groups of images using Bridge. In Adobe Bridge: 1. Open the Acropolis folder
2. Select all images (Ctrl+click each thumbnail)
3. In the IPTC Core section, enter this information. 4. click the check mark or click on the workspace and select “Save”
This is what you should see. You have just embedded this information in all four images.
Now you will create a template for the image creator’s contact information. In Adobe Bridge: 1. Select just one image thumbnail. 2. Open File - file info…
3. Click on the IPTC tab 4. Enter this information
Your info panel should look like this.
1. Create a template of the current data by clicking on the arrow beside the Import/Export button. 2. Choose Export. 3. Name the template 4. Save 5. Close the File info dialog.
Now you will apply the creator information to the other three images. 1. Select the three image thumbnails that don’t have the creator information. 2. Open File - file info…
1. Click Import (if you don’t see “Import”, click the arrow beside the Import/Export button 2. Choose: “Clear existing properties and replace with template properties” 3. Select the template you created earlier and double click or click “Open”
You should now see the Creator information. Click “OK” to save and close the Info panel.
EMET is a free tool designed to extract metadata embedded in JPEG and TIFF files. EMET is compatible with Mac OS 10.4+, as well as Windows XP, Windows Vista, and Windows 7. http://www.artstor.org/global/g-html/download-emet-public.html
IPTC and PLUS have a free plug-in Metadata Panel for Bridge CS3/CS4 for the IPTC Core, IPTC Extension and the PLUS metadata - with a comprehensive User Guide for all fields. This tool also includes an Import/Export tool in the “Extras” section. The Import/Export work with tab-delimited files of all of the IPTC Core, IPTC Extension and the PLUS fields.
Currently in development, the VRA Export-Import plugin for Bridge creates tab-delimited files of all the fields used in the VRA beta 0.9.8.5.2 custom info panel. It allows you to batch export and import XMP metadata.
For more information on XMP, including how to create custom info panels, go to adobe.com/devnet/xmp.html