This document outlines challenges and approaches for long-term preservation of research data in an academic library. It discusses risks of data loss, loss of readability, and loss of interpretability over time if data is not properly curated. The role of libraries and infrastructure services is to support researchers by taking over routine data management tasks and applying expertise in organizing information. The vision is a system that ingests data from researchers, plans and conducts long-term preservation according to international standards to ensure the usability and reusability of the data into the future.
Cisa domain 2 part 3 governance and management of itShivamSharma909
The process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives and what countermeasures to take in reducing risk to an acceptable level.
Taxmann's GST Mini Ready Reckoner | July 2020Taxmann
This book provides a basic-working-knowledge of the GST mechanism, right from understanding the GST Process to the procedure & payment of tax & penalties under the law.
It provides a basic understanding of the GST law and guidance on various compliances under GST law. All complex provisions have been explained with lucid & simple language, examples, FAQs, flow charts, and diagrams. This book is the second edition amended up to 1st July 2020. This book contains:
• GST Compliance Chart for April-September 2020
• Basis provisions of GST
• GST Returns along with due dates
• Provisions pertaining to Offences & penalties
Cisa domain 2 part 3 governance and management of itShivamSharma909
The process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives and what countermeasures to take in reducing risk to an acceptable level.
Taxmann's GST Mini Ready Reckoner | July 2020Taxmann
This book provides a basic-working-knowledge of the GST mechanism, right from understanding the GST Process to the procedure & payment of tax & penalties under the law.
It provides a basic understanding of the GST law and guidance on various compliances under GST law. All complex provisions have been explained with lucid & simple language, examples, FAQs, flow charts, and diagrams. This book is the second edition amended up to 1st July 2020. This book contains:
• GST Compliance Chart for April-September 2020
• Basis provisions of GST
• GST Returns along with due dates
• Provisions pertaining to Offences & penalties
Immigration Compliance: How to keep the Government from knocking on the Door?jvelie
Immigration Compliance: How to keep the Government from knocking on the Door?
Some of the slides are missing content-email us information@velielaw.com or call 405-310-4333, for the full powerpoint presentation and information about a free strategy session.
This book provides a complete guide on the filing of the ‘GST Annual Return and Reconciliation Statement in GST Audit’. The book explains the details to be filed in each part of the forms in a simplified manner along with screenshots of the GST Portal. This book helps the professionals in cross-referencing sections-rules-forms, ascertaining all the key changes, which are listed as follows:
· Applicability of changes taken place through Finance Act, 2019
· Notifications issued during F.Y. 2018-19
· Circulars issued till F.Y. 2018-19, along with relevant
annexures
· Caution Points for F.Y. 2018-19
This book serves as a ready reference for all professionals like Chartered Accountants and their Articles, Company Secretaries, Cost Accountants, Advocates in handling Audit and Annual Return Assignments.
The Present Publication is the 7th Edition & it is updated till 20th August 2020, authored by Aditya Singhania, with the following noteworthy features:
· The book is divided into three divisions namely:
o Division 1 – GSTR 9
o Division 2 – GSTR 9A
o Division 3 – GSTR 9C
· The chapters in the book have been divided based on the said
forms i.e. each Part of the forms has been dealt with in
separate Chapters, making it easy for the professional to
quickly refer the relevant part for better insight
· Exhaustive tables with clear cross reference between GSTR
1, GSTR 3B, GSTR 4 vis-à-vis GSTR 9 and GSTR 9A has
been made for easy pick-up of the data for furnishing return
· Clarifications issued from time to time have been incorporated
in the relevant table to track the changes that has taken place
from time to time
· This book includes explanation of the law and commentary in
each Chapter along-with relevant case laws in order to
ascertain the impact in annual returns and audit for FY 2018-
19.
· Since this is the 2nd year for which GSTR 9 and GSTR 9C
needs to be furnished, therefore, there are several transactions
whose impacts run across FY 2017-18, FY 2018-19, and FY
2019-20 for which a separate Chapter has been incorporated.
· Other key features are enumerated here-in-below:
GST Audit Report:
o Clause-wise detailed analysis
o Action to be taken for each clause
o Areas of concern
o How to do reconciliations in GSTR 9C
o Checkpoints while doing GST Audit
o Clause-wise relaxation
o Explanation using practical examples
o Interlinks with Audited Annual Financial Statements
o Explanation using screenshots of GSTR 9C
o Spillover effects
GST Annual Return:
o Table-wise detailed discussion
o Interlinking of GSTR 1, 3B, 4, ITC Forms
o How to report details in GSTR 9 in Table Form
o Practical scenarios in a tabular presentation
o Explanation using screenshots of GSTR 9 and 9A
o Table-wise options
o Spillover effects
This book is a comprehensive guide in understanding the background, concepts, issues involved, and smooth implementation of ‘GST e-Invoicing’, with effect from 1st October 2020. It explains everything about e-invoicing along with relevant illustrations, tables, and diagrams.
The book serves as a ready referencer for all the professionals, technical experts, and project-in-charge involved in handling the execution of the e-invoicing module in the existing accounting software. The explanation is in complete sync with the current features available at the GST e-invoicing portal, GST e-invoice API portal as well as the GST Common portal.
The present publication is the 2nd Edition, as amended up to 25th August 2020, with the following noteworthy features:
· Tabular presentation has been made for ascertaining the
responsibility of each stakeholder involved
· Situations and their solutions have been given at appropriate
places
· Pictorial representations have been made for better
understanding
· Impact on other verticals of the business have been
incorporated
· Process flow along-with validations done at IRP portal is also
given
· The book incorporates the following:
o Background and concept of electronic invoicing in the form of
capsules
o Need of E-Invoicing
o Mechanism of E-Invoicing
o E-Invoice creation and IT implementation
o Amendment, cancellation & miscellaneous topics of E-
Invoicing
o E-Invoicing schema/API – Change in IT system
o Time & manner of issuance – Invoice vis-à-vis E-Invoice
o Tax Invoice vis-à-vis E-Invoice
o Bill of supply vis-à-vis E-Bill of supply
o Debit-credit note vis-à-vis E-Debit-credit note
o Receipt, refund and payment voucher
o ISD invoice and miscellaneous documents
o Quick response (QR) code
o Annexures
Strategic Cartography: Identifying IL Intersections Across the Curriculumchar booth
Presentation at ACRL 2015 in Portland, OR.
Abstract: Curriculum mapping builds insight into the sequence of requirements and competencies a learner negotiates while on an academic path. When combined with data visualization, visual curriculum mapping (VCM) provides a holistic view of an entire educational community, highlighting pivotal points at which to introduce information literacy instruction, resources, and research support. This paper presents findings of a large-scale consortial VCM project in 2013-14, exploring anticipated and unanticipated outcomes and offering strategies applicable to other institutions.
Our communications history is dominated by fixed networks of bounded linear predictability. These were based on precise engineering design giving assured information security, and measured operation. However, mobile devices, internet, social networks, IP, and Apps changed all that! Internets are inherently non-linear, unbounded, and essentially designoid — that is, mostly shaped by evolution, steered by demand/rapid innovation - highly adaptive and ‘learning’ in real time.
So, those who suppose we can control such networks to fully guard and protect the information of institutions and individuals are sadly mistaken. And further confounded by Industry 4.0 and the Internet of Things (IoT). Here, a mix of the information of individuals and things, is distributed across the planet on a scale far larger than ever conceived in the past, to become essential components in the survival of our species in realising sustainable societies.
Not surprising then, Privacy and Data protection are big issues for regulators, governments and civil liberties organisations. But so far, nothing has worked, and we see the UK Data Protection Act, EU-GDPR, EU-USA Shield, and Copyright Laws often ignored or worked around. These are largely derivatives of a paper based world and a pre-computing world are now largely unfit for purpose.
Immigration Compliance: How to keep the Government from knocking on the Door?jvelie
Immigration Compliance: How to keep the Government from knocking on the Door?
Some of the slides are missing content-email us information@velielaw.com or call 405-310-4333, for the full powerpoint presentation and information about a free strategy session.
This book provides a complete guide on the filing of the ‘GST Annual Return and Reconciliation Statement in GST Audit’. The book explains the details to be filed in each part of the forms in a simplified manner along with screenshots of the GST Portal. This book helps the professionals in cross-referencing sections-rules-forms, ascertaining all the key changes, which are listed as follows:
· Applicability of changes taken place through Finance Act, 2019
· Notifications issued during F.Y. 2018-19
· Circulars issued till F.Y. 2018-19, along with relevant
annexures
· Caution Points for F.Y. 2018-19
This book serves as a ready reference for all professionals like Chartered Accountants and their Articles, Company Secretaries, Cost Accountants, Advocates in handling Audit and Annual Return Assignments.
The Present Publication is the 7th Edition & it is updated till 20th August 2020, authored by Aditya Singhania, with the following noteworthy features:
· The book is divided into three divisions namely:
o Division 1 – GSTR 9
o Division 2 – GSTR 9A
o Division 3 – GSTR 9C
· The chapters in the book have been divided based on the said
forms i.e. each Part of the forms has been dealt with in
separate Chapters, making it easy for the professional to
quickly refer the relevant part for better insight
· Exhaustive tables with clear cross reference between GSTR
1, GSTR 3B, GSTR 4 vis-à-vis GSTR 9 and GSTR 9A has
been made for easy pick-up of the data for furnishing return
· Clarifications issued from time to time have been incorporated
in the relevant table to track the changes that has taken place
from time to time
· This book includes explanation of the law and commentary in
each Chapter along-with relevant case laws in order to
ascertain the impact in annual returns and audit for FY 2018-
19.
· Since this is the 2nd year for which GSTR 9 and GSTR 9C
needs to be furnished, therefore, there are several transactions
whose impacts run across FY 2017-18, FY 2018-19, and FY
2019-20 for which a separate Chapter has been incorporated.
· Other key features are enumerated here-in-below:
GST Audit Report:
o Clause-wise detailed analysis
o Action to be taken for each clause
o Areas of concern
o How to do reconciliations in GSTR 9C
o Checkpoints while doing GST Audit
o Clause-wise relaxation
o Explanation using practical examples
o Interlinks with Audited Annual Financial Statements
o Explanation using screenshots of GSTR 9C
o Spillover effects
GST Annual Return:
o Table-wise detailed discussion
o Interlinking of GSTR 1, 3B, 4, ITC Forms
o How to report details in GSTR 9 in Table Form
o Practical scenarios in a tabular presentation
o Explanation using screenshots of GSTR 9 and 9A
o Table-wise options
o Spillover effects
This book is a comprehensive guide in understanding the background, concepts, issues involved, and smooth implementation of ‘GST e-Invoicing’, with effect from 1st October 2020. It explains everything about e-invoicing along with relevant illustrations, tables, and diagrams.
The book serves as a ready referencer for all the professionals, technical experts, and project-in-charge involved in handling the execution of the e-invoicing module in the existing accounting software. The explanation is in complete sync with the current features available at the GST e-invoicing portal, GST e-invoice API portal as well as the GST Common portal.
The present publication is the 2nd Edition, as amended up to 25th August 2020, with the following noteworthy features:
· Tabular presentation has been made for ascertaining the
responsibility of each stakeholder involved
· Situations and their solutions have been given at appropriate
places
· Pictorial representations have been made for better
understanding
· Impact on other verticals of the business have been
incorporated
· Process flow along-with validations done at IRP portal is also
given
· The book incorporates the following:
o Background and concept of electronic invoicing in the form of
capsules
o Need of E-Invoicing
o Mechanism of E-Invoicing
o E-Invoice creation and IT implementation
o Amendment, cancellation & miscellaneous topics of E-
Invoicing
o E-Invoicing schema/API – Change in IT system
o Time & manner of issuance – Invoice vis-à-vis E-Invoice
o Tax Invoice vis-à-vis E-Invoice
o Bill of supply vis-à-vis E-Bill of supply
o Debit-credit note vis-à-vis E-Debit-credit note
o Receipt, refund and payment voucher
o ISD invoice and miscellaneous documents
o Quick response (QR) code
o Annexures
Strategic Cartography: Identifying IL Intersections Across the Curriculumchar booth
Presentation at ACRL 2015 in Portland, OR.
Abstract: Curriculum mapping builds insight into the sequence of requirements and competencies a learner negotiates while on an academic path. When combined with data visualization, visual curriculum mapping (VCM) provides a holistic view of an entire educational community, highlighting pivotal points at which to introduce information literacy instruction, resources, and research support. This paper presents findings of a large-scale consortial VCM project in 2013-14, exploring anticipated and unanticipated outcomes and offering strategies applicable to other institutions.
Our communications history is dominated by fixed networks of bounded linear predictability. These were based on precise engineering design giving assured information security, and measured operation. However, mobile devices, internet, social networks, IP, and Apps changed all that! Internets are inherently non-linear, unbounded, and essentially designoid — that is, mostly shaped by evolution, steered by demand/rapid innovation - highly adaptive and ‘learning’ in real time.
So, those who suppose we can control such networks to fully guard and protect the information of institutions and individuals are sadly mistaken. And further confounded by Industry 4.0 and the Internet of Things (IoT). Here, a mix of the information of individuals and things, is distributed across the planet on a scale far larger than ever conceived in the past, to become essential components in the survival of our species in realising sustainable societies.
Not surprising then, Privacy and Data protection are big issues for regulators, governments and civil liberties organisations. But so far, nothing has worked, and we see the UK Data Protection Act, EU-GDPR, EU-USA Shield, and Copyright Laws often ignored or worked around. These are largely derivatives of a paper based world and a pre-computing world are now largely unfit for purpose.
Software AG Tech Communitites are hosted with OpenCms for more than five years now. The evolution from OpenCms 6 to OpenCms 8 proved to be en par with the challenges developed ever since: whether it is stability, flexibility, scalability or versatility you're looking for - OpenCms delivers.
However in order to keep pace with recent developments like social networking and dealing with volumes of large video files and other binaries it becomes tricky: Never reinvent the wheel and use your tools for what they were intended for. Thus the deployment of specialized third-party systems like for example Liferay, Alfreso and JForum. Depending on the scenario the optimal approach may look differently: tight vs. loose coupling, integration of external functionality into OpenCms vs. sharing OpenCms content with other applications via push, just to name a few.
We will be discussing the pros and cons of the different strategies using OpenCms 8 as an example. The focus will be on dependencies and pitfalls to look out for when migrating several thousands resources from OpenCms 7 and how to integrate it with other legacy systems. In addition we present an optimized Designer-Developer-Editor workflow using our gradually evolved templating engine.
The slides cover Introduction to Big Data and Data Science, as well as go over our current and future projects @eHarmony.
eHarmony was founded to give people a better chance to find happy, passionate and fulfilling relationships.
During this talk I will describe steps that we go through to create Compatible matches and how we leverage Big Data technologies to accomplish that goal.
I will specifically talk on how we take Billion+ potential matches that we find through MongoDB, store them in Voldemort NoSQL datastore and then run multiple Hadoop jobs to come up with filtered list based on Machine Learned models.
Our hadoop clusters are in-house, high density, low power Seamicro installations and we use Spring Batch and Spring Data Hadoop to orchestrate the hadoop jobs.
Did you know that eHarmony is responsible for 5% of all new US marriages and that more than 600,000 people already got married through us?
This session will demystify (generative) AI by exploring its workings as an advanced statistical modelling tool (suitable for any level of technical knowledge). Not only will this session explain the technological underpinnings of AI, it will also address concerns and (long-term) requirements around ethical and practical usage of AI. This includes data preparation and cleaning, data ownership, and the value of data-generated - but not owned - by libraries. It will also discuss the potentials for (hypothetical) use cases of AI in collections environments and making collections data AI-ready; providing examples of AI capabilities and applications beyond chatbots.
CATH DISHMAN, CENYU SHEN,
KATHERINE STEPHAN
Although scholarly communications has become more open, problems with predatory and problematic publishers remain. There are commercial providers of lists, start-up/renegade Internet lists of good/bad and the researchers, publishers and assessors that try to understand and process what being on/off a list means to themselves, their careers and their institutions. Still, these problems persist and leaves many asking: where is the list?
Christina Dinh Nguyen, University of Toronto Mississauga Library
In the world of digital literacies, liaison and instructional librarians are increasingly coming to terms with a new term: algorithmic literacy. No matter the liaison or instruction subjects – computer science, sociology, language and literature, chemistry, physics, economics, or other – students are grappling with assignments that demand a critical understanding, or even use, of algorithms. Over the course of this session, we’ll discuss the term ‘algorithmic literacies,’ explore how it fits into other digital literacies, and see why it as a curriculum might belong at your library. We’ll also look at some examples of practical pedagogical methods you can implement right away, depending on what types of AL lessons you want to teach, and who your patrons are. Lastly, we’ll discuss how librarians should view themselves as co-learners when working with AL skills. This session seeks to bring together participants from across the different libraries, with diverse missions/vision/mandates, to explore ways we can all benefit from teaching AL. If time permits, we may discuss how text and data librarians (functional specialists) can support the development of this curriculum.
David Pride, The Open University
In this paper, we present CORE-GPT, a novel question- answering platform that combines GPT-based language models and more than 32 million full-text open access scientific articles from CORE. We first demonstrate that GPT3.5 and GPT4 cannot be relied upon to provide references or citations for generated text. We then introduce CORE-GPT which delivers evidence-based answers to questions, along with citations and links to the cited papers, greatly increasing the trustworthiness of the answers and reducing the risk of hallucinations.
Cath Dishman, Cenyu Shen, Katherine Stephan
Although scholarly communications has become more open, problems with predatory and problematic publishers remain. There are commercial providers of lists, start-up/renegade Internet lists of good/bad and the researchers, publishers and assessors that try to understand and process what being on/off a list means to themselves, their careers and their institutions. Still, these problems persist and leaves many asking: where is the list?
This plenary panel will discuss the problems of “predatory” publishing and what, if anything, publishers, our community and researchers can do to try and help minimise their abundancy/impact.
eth Montague-Hellen, Francis Crick Institute, Katie Fraser, University of Nottingham
Open Access is a foundational topic in Scholarly Communications. However, when information professionals and publishers talk about its future, it is nearly always Gold open access we discuss. Green was seen as the big solution for providing access to those who couldn’t afford it. However, publishers have protested that Green destroys their business models. How true is this, and are we even all talking the same language when we talk about Green?
Chris Banks, Imperial College London, Caren Milloy, Jisc,
Transitional agreements were developed in response to funder policy and institutional demand to constrain costs and facilitate funder compliance. They have since become the dominant model by which UK research outputs are made open access. In January 2023, Jisc instigated a critical review of TAs and the OA landscape to provide an evidence base to inform a conversation on the desired future state of research dissemination. This session will discuss the key findings of the review and its impact on a sector-wide consultation and concrete actions in the UK and beyond.
Michael Levine-Clark, University of Denver, Jason Price, SCELC Library Consortium
As transformative agreements emerge as a new standard, it is critical for libraries, consortia, publishers, and vendors to have consistent and comprehensive data – yet data around publication profiles, authorship, and readership has been shown to be highly variable in availability and accuracy. Building on prior research around frameworks for assessing the combined value of open publishing and comprehensive read access that these deals provide, we will address multi-dimensional perspectives to the challenges that the industry faces with the dissemination, collection, and analysis of data about authorship, readership, and value.
Hylke Koers, STM Solutions
Get Full Text Research (GetFTR) launched in 2020 with the objective of streamlining discovery and access of scholarly content in the many tools that researchers use today, such as Dimensions, Semantic Scholar, Mendeley, and many others. It works equally well for open access content as it does for subscription-based content, providing researchers with recognizable buttons and indicators to get them to the most up-to-date version of content with minimal effort. Currently, around 30,000 OA articles are accessed every day via GetFTR links.
Gareth Cole, Loughborough University, Adrian Clark, Figshare
Researchers face more pressure to share their research data than ever before. Owing to a rise in funder policies and momentum towards more openness across the research landscape. Although policies for data sharing are in place, engagement work is undertaken by librarians in order to ensure repository uptake and compliance.
We will discuss a particular strategy implemented at Loughborough University that involved the application of conceptual messaging frameworks to engagement activities in order to promote and encourage use of our Figshare-powered repository. We will showcase the rationale behind the adoption of messaging frameworks for library outreach and some practical examples.
Mark Lester, Cardiff Metropolitan University
This talk will outline how a completely accidental occurrence led to brand new avenues for open research advocacy and reasons for being. This advocacy has occurred within student communities such as trainee teachers, student psychologists and (especially) those soon losing access to subscription-based library content. Alongside these new forms of advocacy, these ethical example of AI use cases has begun to form a cornerstone of directly connecting the work of the library to new technology.
Simon Bell, Bristol University Press
The UN SDG Publishers Compact, launched in 2020, was set up to inspire action among publishers to accelerate progress to achieve the Sustainable Development Goals by 2030, asking signatories to develop sustainable practices, act as champions and publish books and journals that will “inform, develop and inspire action in that direction”.
This Lightning Talk will discuss how our new Bristol University Press Digital has been developed as part of our mission to contribute a meaningful and impactful response to this call to action as well as the global social challenges we face.
Using thematic tagging to create uniquely curated themed eBook collections around the Global Social Challenges, Bristol University Press Digital responds directly to the need to provide the scholarly community access to a comprehensive range SDG focussed content while minimising time and resource at the institution end in collating content and maintaining collection relevance to rapidly evolving themes
Jenni Adams, University of Sheffield, Ric Campbell, University of Sheffield
Academic researchers are becoming increasingly aware of the need to make data and software FAIR in order to support the sharing and reuse of non-publication outputs. Currently there is still a lack of concise and practical guidance on how to achieve this in the context of specific data types and disciplines.
This presentation details recent and ongoing work at the University of Sheffield to bridge this gap. It will explore the development of a FAIR resource with specialist guidance for a range of data types and will examine the planned development of this project during the period 2023-25
TASHA MELLINS-COHEN
COUNTER & Mellins-Cohen Consulting, JOANNA BALL
DOAJ, YVONNE CAMPFENS
OA Switchboard,
ADAM DER, Max Planck Digital Library
Community-led organizations like DOAJ (Directory of Open Access Journals), COUNTER (the standard for usage metrics) and OA Switchboard (information exchange for OA publications) are committed to providing reliable, not-for-profit services and standards essential for a well-functioning global research ecosystem. These organizations operate behind the scenes, with low budgets and limited staffing – no salespeople, marketing teams, travel budgets, or in-house technology support. They collaborate with one another and with bigger infrastructure bodies like Crossref and ORCID, creating the foundations on which much scholarly infrastructure relies.
These organizations deliver value through open infrastructure, data and standards, and naturally services and tools have been built by commercial and not-for-profit groups that capitalize on their open, interoperable data and services – many of which you are likely to recognize and may use on a regular basis.
Hear from the Directors of COUNTER, DOAJ and OA Switchboard, as well as a library leader, on the role of these organizations, the challenges they face and why support from the community is essential to their sustainability.
CAMILLE LEMIEUX
Springer Nature
What is the current state of diversity, equity, and inclusion in the scholarly publishing community? It's time to take a thorough look at the 2023 global Workplace Equity (WE) Survey results. The C4DISC coalition conducted the WE Survey to capture perceptions, experiences, and demographics of colleagues working at publishers, associations, libraries, and many more types of organizations in the global community. Four key themes emerged from the 2023 results, which will be compared to the findings from the first WE Survey conducted in 2018. Recommendations for actions organisations can consider within their contexts will be proposed and discussed.
Rob Johnson, Research Consulting
Angela Cochran, American Society of Clinical Oncology
Gaynor Redvers-Mutton, Biochemical Society
Since 2015, the number of self-published learned societies in the UK has decreased by over a third, with the remaining societies experiencing real-term revenue declines. All around the world, society publishers are struggling with increased competition from commercial publishers and the rise of open access business models that reward quantity over quality. We will delve into the distinctive position of societies in research, examine the challenges confronting UK and US learned society publishers, and explore actionable steps for libraries and policymakers to support the continued relevance of learned society publishers in the evolving scholarly landscape.
Simon Bell, Clare Hooper, Katharine Horton, Ian Morgan
Over the last few years we have witnessed a seismic shift in the scholarly ecosystem. Three years since outset of the COVID pandemic and the establishment UN Publishers Compact, this is discussion-led presentation will look at how four UK Universities Presses have adopted a consultative and collaborative approach on projects to support their institutional missions, engage with the wider scholarly community while building on a commitment to make a meaningful difference to society.
This panel discussion will combine the perspectives of four UK based university presses, all with distinct identities and varied publishing programs drawn from humanities, arts and social sciences, yet with a shared recognition and value of the importance to collaborate and co-operate on a shared vision to support accessibility and inclusivity within the wider scholarly community and maintain a rich bibliodiversity.
While research support teams are generally small and specialist in nature, an increased demand of its service has been observed across the sector. This is particularly true for teaching-intensive institutions. As a pilot to expand research support across ARU library, the library graduate trainee was seconded to the research services team for a month. This dialogue between the former trainee and manager will discuss what the experience and outcomes of the secondment were from different perspectives. The conversation will also explore the exposure Library and Information Studies students have to research services throughout their degree.
TIM FELLOWS & EMILY WILD, Jisc
Octopus.ac is a UKRI funded research publishing model, designed to promote best practice. Intended to sit alongside journals, Octopus provides a space for researcher collaboration, recording work in detail, and receiving feedback from others, allowing journals to focus on narrative.
The platform removes existing barriers to publishing. It’s an entirely free, open space for researchers, without editorial and pre-publication peer review processes. The only requirement for authors is a valid ORCiD ID. Without barriers, Octopus must provide feedback mechanisms to ensure the community can self-moderate. During this session, we’ll explore Octopus’ aims to foster a collaborative environment and incentivise quality.
David Parker, Publisher and Founder, Lived Places Publishing
Dr. Kadian Pow, Lecturer in Sociology and Black Studies & LPP Author, Birmingham City University
Natasha Edmonds, Director, Publisher and Industry Strategy, Clarivate
Library patrons want to search for and locate authors by particular identity markers, such as gender identification, country of origin, sexual orientation, nature of disability, and the many intersectional points that allow an author to express a point-of-view. Artificial Intelligence, skilled web researchers, and data scientists in general struggle to achieve accuracy on single identity markers, such as gender. And what right does anybody have to affix identity metadata to an author other than the author theirselves? And what of the risks in disseminating author identity metadata in electronic distribution platforms and in library catalog systems? Can a "fully informed" author even imagine all the possible misuses of their identity metadata?
More from UKSG: connecting the knowledge community (20)
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Connector Corner: Automate dynamic content and events by pushing a button
1330 mon etive toewe
1. “ F o r e v e r is c o m p o s e d o f
Nows ” :
L o n g -t e r m p r e s e r v a t io n o f
re s e a rc h d a ta
U K S G 2 0 12
in a n a c a d e m ic lib r a r y
G l a s g o w , 2 6 t h /2 7 t h M a r c h 2 0 12
D r . M a t t h ia s T ö w e
E T H Z u r ic h , E T H -B ib lio t h e k
1
2. O U T L IN E
1. B a c k g r o u n d : i s s u e s a n d
o b je c t iv e s
2. C u r r e n t p r o j e c t
3. R o l e s
4. V i s i o n
5. L i m i t a t i o n s
6. « N o w s » a n d c a v e a t s
2 6 /2 7
2 Ma rc h M . Tö w e
2 0 12
3. B A C K G R O U N D ( I)
C h a lle n g e s
• R e s e a r c h process as a whole
r e lie s o n d ig it a l d a t a
• Data can only be used in a
d e f in e d t e c h n ic a l e n v ir o n m e n t ,
which usually remains
stable for only a few years
• G o o d s c i e n t i f i c p r a c t i c e requires
retention of data in usable
form
2 6 /2 7
3 • F u n d i n g o r g a nM s Ta wtei o n s require
Ma rc h
2 0 12
i. ö
4. B A C K G R O U N D ( II)
C h a lle n g e s
• R e - u s e o f d a t a becomes
increasingly important and
should be facilitated
• Data which cannot easily be
reproduced and has p e r m a n e n t
r e l e v a n c e must remain
available
• P u b lis h e d o r r e f e r e n c e d
supplementary material
must be citable and remain
2 6 /2 7
4 Ma rc h M . Tö w e
2 0 12
5. M A J O R R IS K S
• D a t a lo s s
Data cannot be found
• L o s s o f r e a d a b ilit y
Data cannot be rendered due to
technical reasons (most often
obsolescence of one required
component such as application,
operating system, hardware)
• L o s s o f in t e r p r e t a b ilit y
5 Data cannot M be e interpreted and
2 6 /2 7
Ma rc h . Tö w
2 0 12
6. D A TA L O S S
D a ta L o s s
Data cannot be found because…
• Their location of storage is not
known
• File or folder structures were
changed without documentation
• Intransparent redundancies and
versions exist
• Persons originally responsible
cannot be conctacted
• Offline-media are stored in
unknown locations
6
• Offline-mediaM .were damaged by
2 6 /2 7
Ma rc h Tö w e
2 0 12
7. L O S S O F R E A D A B IL IT Y
L o s s o f r e a d a b ilit y
Data cannot be rendered
because…
• F i l e f o r m a t s are not recognized by
current software or are not
rendered correctly
• S o f t w a r e required for rendering
or even editing data is no
longer available
• Available older software
cannot be run on current
o p e r a t i n g s y s t e m s a n d /o r h a r d w a r e
2 6 /2 7
7 Ma rc h M . Tö w e
Re c o v e r y « e x po s t » mig ht
2 0 12 ev e n b e
8. LOS S OF
IN T E R P R E TA B IL IT Y
L o s s o f in t e r p r e t a b ilit y
Data cannot be interpreted and
used in a scientifically correct
way because s e m a n t i c i n f o r m a t i o n i s
m i s s i n g , e.g. about…
• S a m p le taking and preparation
• M e t h o d s o f m e a s u r e m e n t or data
collection
• Known e r r o r s a n d c o r r e c t i o n s
• L e v e l o f d a t a p r o c e s s in g
• M e t h o d s o f a n a l y s i s and algorithms
used
2 6 /2 7
8 Ma rc h M . Tö w e
2 0 12
9. WH AT WE M E A N B Y
C U R A T IO N
Wha t? Wh y? Who ?
E ns ure
D a ta D a ta
in t e lle c t u a l
C u r a t io n P rod uc e rs
r e -u s a b ilit y
C o nte nt E ns ure
E TH -
P r e s e r v a t io t e c h n ic a l
B ib lio t h e k
n r e -u s a b ilit y
B it s t r e a m E ns ure
I T -S e r v i c e s
P r e s e r v a t io t e c h n ic a l
E T H Z u r ic h
n s t a b ilit y
ed after Jens Ludwig, Wissgrid
2 6 /2 7
9 Ma rc h M . Tö w e
2 0 12
10. D IF F E R E N C E S B E T W E E N
D A TA T YP E S ?
Wha t? R e s e a r c h d a t ai b r a r y o b j e c t s
L
C o m p r e h e n s iv
e
F u ll c o n t r o l o f
D a ta d o c u m e n t a t io
me ta d a ta a nd
C u r a t io n n by
c o nte xt
produc e rs
M o r e qaun r e ld s s
re id e M a in ly
C o nte nt c ommon s ta nd a rd
P r e s e r v a t io f o rSm a t s p r e s e r vfa tri mn t s
o o a
a me
n
p r o c e d u r e s a p p ly
B it s t r e a m
P r e s e r v a t io „ A n y o b je c t is ju s t b it s “
n
2 6 /2 7
10 Ma rc h M . Tö w e
2 0 12
11. O T H E R V IE W S
(M a n y ) people including
p o t e n t i a l p a r t n e r s (IT, research)
• Tend to mix up long-term s t o r a g e
(bitstream preservation) and
l o n g - t e r m p r e s e r v a t i o n (keeping data
usable)
• Ta k e p r e s e r v a t i o n f o r g r a n t e d , once
data is reliably stored
• S e e t h e n e e d t o c h a n g e a n d im p r o v e
c u r2r6e n t p r a c t i c e i n d a t a m a n a g e m e n t
/2 7
11
withc hthe option e of long-term
Mar
2 0 12
M . Tö w
12. «OUR» ROLE AND
« T H E IR S »
• C a n w e a c t u a lly « r a is e a w a r e n e s s »
with researchers?
• Is it r e a lly u s e f u l t o b o t h e r
r e s e a r c h e r s with technical
background – unless asked
for?
• There are r e s e a r c h e r s w i t h a
h ig h le v e l o f a w a r e n e s s a n d
c onc e rn
2 6 /2 7
•
12 B e s t s t a r t w i t h Mt. hö o es e w h o a c t u a l l y
Ma rc h
2 0 12
T w
13. C OULDN’ T RES EARC HERS
D O IT T H E M S E L V E S ?
• D a t a m a n a g e m e n t a n d d ig it a l
c u r a t io n h a n d le d b y r e s e a r c h e r s
t h e m s e lv e s :
• P o s s ib le in principle and
sometimes done very well
• Tim e c o n s u m in g
• Supportive of research
productivity
• N o t p r o d u c t iv e r e s e a r c h in it s e lf
2 6 /2 7
13 Ma rc h M . Tö w e
2 0 12
14. WH Y D O E S E TH -
B IB L IO T H E K B O T H E R ?
• In f r a s t r u c t u r e s e r v ic e s s u c h a s
E T H -B ib lio t h e k a n d IT s e r v ic e s
• S u p p o r t the research process
• Can offer services to e a s e
w o r k l o a d o f r o u t i n e t a s k s for
researchers
• Rely on scientists to define
their requirements
• R e ly o n r e s e a r c h e r s t o d o c u m e n t t h e ir
d a t a according to community
needs
14
• E 2 6 pc lho i t s y n e r g i e T ö win order to
x /2 7
Mar M.
s e
2 0 12
15. W H Y T H E L IB R A R IE S ?
• Reputation of scientific
libraries as l o n g - l i v e d /p e r m a n e n t
in s t it u t io n s
• O r g a n is in g a n d m a n a g in g in f o r m a t io n
is seen as a task, where
librarians can contribute
their experience
• Building on former
(obviously p o s i t i v e ) t r a c k r e c o r d ,
t h e r e/2 7s h o u l d b e M aT ö bea s i s o f t r u s t
26
15 Ma rc h . w
2 0 12
16. N E W TA S K S F O R
L IB R A R IE S
• W e c a n b e s e r v i c e p r o v i d e r s – if we
have a service to offer
• W e t a k e o n a n e w r o le :
• I n a d d i t i o n t o d e l i v e r i n g i n f o r m a t i o n to
researchers…
• …we now offer s e r v i c e s a r o u n d t h e i r
o w n d a ta …
• …w h i c h w e o f t e n c a n n o t e v e n m a k e p u b l i c l y
a c c e s s ib le .
• New tasks call for a n e w
p r o f2e /2 7s i o n a l p r o f i l e («data
6 s
16 Ma rc h M . Tö w e
2 0 12
17. V IS IO N - U S E R ’ S V IE W
2 6 /2 7
17 Ma rc h M . Tö w e
2 0 12
18. V IS IO N – S YS T E M S V IE W
Additional Ingest Additional search /retrieve
Content sources
components Archival core modules & delivery components Access components
Primary data Preservation Planning Catalog
Administration Admin-
Secondary Interface
data Data
Producer Management Create User
(E-Depot) Archiv-DB
Deliveries /
Preprocessing
Retrieve
Ingest
Requests Reposi-
Ingest Access tories
GEVER
Archival
Additional Storage
sources
Storage-Layer
Security-Layer
(Authentication , Authorisation )
Abschlussbericht zur zweiten Phase „Pilot Langzeitarchivierung“,
S. 23f; Aliesch, P. et al., 2007: Projekt „Pilot
Langzeitarchivierung“. Intern.
2 6 /2 7
18 Ma rc h M . Tö w e
2 0 12
19. R O S E TTA
P re -
M a n u a lly
D a ta in g e s t ,
p r o d u c t io e .g .
n a nd s t r u c t u r in
h a n d lin g g,
fo r re -
L o n g -t e r m
c urre nt a r r a n g in g
p r e s e r v a t io n
a n a ly s is ( S e m i-) ,
a c c o r d in g t o O A IS
a u t o m a t i c sael lly c t i n g
e
2 6 /2 7
19 Ma rc h M . Tö w e
2 0 12
20. V IS IO N
Additional Ingest Additional search /retrieve
Content sources
components Archival core modules & delivery components Access components
Primary data Preservation Planning Catalog
M a n u a lly
P re - Administration Admin-
D a Secondary
ta in g e s t , Interface
p r o d u c data
t io e .g . Data
Producer Management Create User
(E-Depot) Archiv-DB
n a nd s t r u c t u r in Deliveries /
Preprocessing
h a n d lin g g, Retrieve
Ingest
Requests Reposi-
fo r re - Ingest Access tories
GEVER L o n g -t e r m
c urre nt a r r a n g in g
p r e s e r v a t io n
a n a ly s is ,
a c c o r dArchivalt o O A I S
in g
( S e m i -) a u tsoeme c t i n g
l
Additional i c a l l y Storage
at
sources
Storage-Layer
Security-Layer
(Authentication , Authorisation )
Abschlussbericht zur zweiten Phase „Pilot Langzeitarchivierung“,
S. 23f; Aliesch, P. et al., 2007: Projekt „Pilot
Langzeitarchivierung“. Intern.
2 6 /2 7
20 Ma rc h M . Tö w e
2 0 12
21. L IM ITA T IO N S
There are g e n e r a l l i m i t s to
what we can do
• We need to m a k e d e c i s i o n s no w…
• …which i n f l u e n c e i f a n d h o w d a t a c a n
b e u s e d in future.
• We d o n o t k n o w …
• W h o will use data
• W h e n d a t a will be used
• F o r w h i c h p u r p o s e data will be used
• « S o m e o n e » n e e d s t o c o m m it n o w t o
21
p a y i6n cgh f o r « e t e r n i. tT yw e
2 /2 7
Mar M ö
»
2 0 12
22. O N L Y R E S E A R C H D A TA ?
• These limitations are n o t
s p e c if ic o f r e s e a r c h d a t a …
• …but they are m o r e
p r o n o u n c e d in research:
• H i g h m o b i l i t y of staff
f l u c t u a t i o n in responsibilities
• D y n a m i c d e v e l o p m e n t of methods
• D a t a m a n a g e m e n t n o t a lw a y s
c o n s id e r e d a s a p r io r it y
2 6 /2 7
•
22 M u l tr ci t u d e o f f o r M . Ta w e
Ma h m ö ts
2 0 12
23. T H E T R O U B L E W IT H
« N O WS »
L o n g - t e r m p r e s e r v a t i o n i s n o o n e -o f f
a c t iv it y
• E a c h g e n e r a t io n h a s t o a c t
according to its best
knowledge
• Usually, the aim is to h a n d o v e r
u s a b l e d a t a t o t h e n e x t g e n e r a t i o n of
curators
• T h e o v e r a ll q u a lit y o f t h e p r e s e r v a t io n
c h a/2 n i s g o v e r n e d b y t h e p r e s e r v a t i o n
26
i7
23
s t M 0 pc h w i t h t h e l oMwT ö wse t q u a l i t y
2ea 12
r .
e
24. WH AT C A N B E D O N E
« N O W»
E x a m p le s f o r t h e « n o w s » in
re s e a rc h d a ta
• Only now we can c o m m u n i c a t e
w it h d a t a p r o d u c e r s
• F in d o u t w h a t t h e ir n e e d s a r e
• D e f in e t h e r e q u ir e d s e r v ic e s
• M a k e p r o d u c e r s d o c u m e n t t h e ir d a t a
• D i s c u s s a l t e r n a t i v e f o r m a t s where
necessary
2 6 /2 7
24 Ma rc h M . Tö w e
2 0 12
25. C AVE ATS
• Digital curation cannot
«improve» data retroactively:
« g a r b a g e in – g a r b a g e o u t »
• Therefore r e s e a r c h e r s n e e d t o
a c t i v e l y c o n t r i b u t e (e.g.
documentation)
• W h o d e c i d e s about data when the
producer is no longer
available?
• D a t a c a n b e m a d e p u b l i c l y a v a i l a b l e , but
thisr c must not T ö w e a prerequisite
M . be
2 6 /2 7
25 Ma h
2 0 12
26. M O R E C AVE ATS
• W r i t t e n a g r e e m e n t between data
producer and data archive on
formats, procedures and
access rights
• Management of a c t i v e d a t a n o t
t r e a t e d in c u r r e n t p r o je c t …
• …but w e n e e d t o p r o v i d e c o m f o r t a b l e
r o u t e s t o b r in g r e s e a r c h d a t a in t o t h e
a r c h iv e
• T h e r e i s n o a b s o l u t e s a f e t y against
willful attacks
2 6 /2 7
26 Ma rc h M . Tö w e
2 0 12
27. E VE N M O R E C AVE ATS
• «T h e a r t o f c o m m u n i c a t i n g w i t h t h e
f u t u r e »:
• We no w t r y t o m i n i m i z e r i s k s with
reasonable effort in order
to avoid their occurrence in
future
• Together with producers w e
c a n o n l y m a k e e d u c a t e d g u e s s e s at
who might want to use data
for what kind of purpose
•
2 6 /2 7
27 N o M arr ohc k e t s c i e nMc Te w e, b u t a n o n g o i n g
« c . ö »
2 0 12
28. T H A N K YO U V E R Y M U C H !
Q u e s t io n s ?
Dr. Matthias
Töwe
Head Digital
Curation
ETH-Bibliothek
Rämistrasse 101
8092 Zürich
Switzerland
+41 (0)44 632 60
32
m a t t h ia s . t o e w e @ ib r a r y. e t h z . c h
l
2 6 /2 7
2 8 t p : //w wr w . l i b r a r y . e t h z .M . h ö w e
ht Ma c h c T
2 0 12