Sarah Burns discusses the development and implementation of Pathfinder’s technical knowledge hub; from conception to systematic integration into all projects and programs. Presented as a case study, the session will showcase all of the steps involved in creating the hub, including, but not limited to, taxonomy creation, SharePoint library development, and the ever-so-important change management activities conducted.
Cloud Computing intends a trend in computing model arises many security issues in all levels such as: network, application, data and host.
These models put up different challenges in security
Depending on consumers, models QOS(quality of service) requirements. Privacy, authentication, secre-cy are main concern for both consumers and cloud providers. IaaS serves as base for other models, if the security in this model is uncertain; it will affect the other models too. This paper delivers a examine the countermeasures and exposures. As a research we project security Assessment and improvement in Iaas layer.
Presenters : Libbie Stephenson, Jared Lyle
This session discusses the value of and methods for curating data, especially in light of recent government and academic initiatives. Special attention will be paid to data management plans.
This document provides an overview of various communication theories and concepts covered in the course. It includes sections on symbolic interactionism, social penetration theory, relational dialectics, functional perspectives on groups, cultivation theory, cultural studies, and theories of gendered communication. Each section lists key related concepts and theories. The document serves as a study guide, mapping out the broad terrain of concepts and theories examined in the class.
The document discusses the interactional view of communication developed by the Palo Alto Group. Some key ideas include:
- Relationships are embedded within systems, and behavior affects both individuals and the overall system.
- Communication involves both content and context, with nonverbal elements being particularly important.
- Family systems resist change and trap members in roles that maintain the status quo, such as double binds with contradictory expectations.
- Effective change requires "reframing" by stepping outside the system to see how rules perpetuate self-defeating patterns.
Laxman Chandra Das is seeking a position that allows for self-improvement and career advancement. He has over 10 years of experience in networking, including setting up LANs, routers, switches, and broadband connections. He is proficient in Microsoft Office, Dreamweaver, and other applications. He holds a Bachelor's degree in Electrical and Electronic Engineering and a Diploma in Computer Technology. His objective is to contribute to an organization's development through individual and team-based work.
The processor-memory bandwidth in modern generation
processors is the important bottleneck due to a number of
processor cores dealing it through with the same bus/ processor-
memory interface. Caches take a significant amount
of energy in current microprocessors. To design an energyefficient
microprocessor, it is important to optimize cache
energy economic consumption. Powerful utilization of this
resource is consequently an important view of memory hierarchy
design of multi core processors. This is presently an
important field of research on a large number of research
issues that have suggested a number of techniques to figure
out the problem. The better contribution of this theme is the
assessment of effectiveness of some of the proficiencies that
were enforced in recent chip multiprocessors. Cache optimization
techniques that were named for single core processors
but have not been implemented in multi core processors
are as well tested to forecast their effectiveness.
Adding value : the foundation on which to build communityAPLICwebmaster
Joe Matthews presents a session based on his book about adding value. The premise of the book is really quite simple. First, the concept of adding value is bandied about in the management, marketing, and strategic planning literature but is rarely broken down and discussed so that anyone can really understand the concept and, more importantly, learn how they can add value in the work that they do. Second, change is all around us and affects us as individuals mightily and in our libraries, museum, galleries, and archives in some pretty significant ways. In addition, many observers believe that the rate of change is accelerating which is also a cause for concern. So perhaps it would be prudent to explore what forces in our society, and in the field of information technology specifically, are impacting our lives and our treasured institutions of libraries, museums, galleries and archives and discover how organizations need to change in order to add value for their customers.
Cloud Computing intends a trend in computing model arises many security issues in all levels such as: network, application, data and host.
These models put up different challenges in security
Depending on consumers, models QOS(quality of service) requirements. Privacy, authentication, secre-cy are main concern for both consumers and cloud providers. IaaS serves as base for other models, if the security in this model is uncertain; it will affect the other models too. This paper delivers a examine the countermeasures and exposures. As a research we project security Assessment and improvement in Iaas layer.
Presenters : Libbie Stephenson, Jared Lyle
This session discusses the value of and methods for curating data, especially in light of recent government and academic initiatives. Special attention will be paid to data management plans.
This document provides an overview of various communication theories and concepts covered in the course. It includes sections on symbolic interactionism, social penetration theory, relational dialectics, functional perspectives on groups, cultivation theory, cultural studies, and theories of gendered communication. Each section lists key related concepts and theories. The document serves as a study guide, mapping out the broad terrain of concepts and theories examined in the class.
The document discusses the interactional view of communication developed by the Palo Alto Group. Some key ideas include:
- Relationships are embedded within systems, and behavior affects both individuals and the overall system.
- Communication involves both content and context, with nonverbal elements being particularly important.
- Family systems resist change and trap members in roles that maintain the status quo, such as double binds with contradictory expectations.
- Effective change requires "reframing" by stepping outside the system to see how rules perpetuate self-defeating patterns.
Laxman Chandra Das is seeking a position that allows for self-improvement and career advancement. He has over 10 years of experience in networking, including setting up LANs, routers, switches, and broadband connections. He is proficient in Microsoft Office, Dreamweaver, and other applications. He holds a Bachelor's degree in Electrical and Electronic Engineering and a Diploma in Computer Technology. His objective is to contribute to an organization's development through individual and team-based work.
The processor-memory bandwidth in modern generation
processors is the important bottleneck due to a number of
processor cores dealing it through with the same bus/ processor-
memory interface. Caches take a significant amount
of energy in current microprocessors. To design an energyefficient
microprocessor, it is important to optimize cache
energy economic consumption. Powerful utilization of this
resource is consequently an important view of memory hierarchy
design of multi core processors. This is presently an
important field of research on a large number of research
issues that have suggested a number of techniques to figure
out the problem. The better contribution of this theme is the
assessment of effectiveness of some of the proficiencies that
were enforced in recent chip multiprocessors. Cache optimization
techniques that were named for single core processors
but have not been implemented in multi core processors
are as well tested to forecast their effectiveness.
Adding value : the foundation on which to build communityAPLICwebmaster
Joe Matthews presents a session based on his book about adding value. The premise of the book is really quite simple. First, the concept of adding value is bandied about in the management, marketing, and strategic planning literature but is rarely broken down and discussed so that anyone can really understand the concept and, more importantly, learn how they can add value in the work that they do. Second, change is all around us and affects us as individuals mightily and in our libraries, museum, galleries, and archives in some pretty significant ways. In addition, many observers believe that the rate of change is accelerating which is also a cause for concern. So perhaps it would be prudent to explore what forces in our society, and in the field of information technology specifically, are impacting our lives and our treasured institutions of libraries, museums, galleries and archives and discover how organizations need to change in order to add value for their customers.
APLIC 2014 - Social Observatories Coordinating NetworkAPLICwebmaster
NSF project looks to define social science research for the 21st century. The major objective of the SOCN is to continue exploration of ideas regarding the potential form and functioning of such a network of social observatories and to actively engage individuals and groups across the SBE research community in this process.
Facebook is vulnerable to hackers who alter profiles and upload viruses through pictures. Hackers also create fake Facebook login pages to steal user passwords. Facebook can be addictive due to frequent checking and time spent on activities with friends. Prospective employers sometimes search applicants' public Facebook profiles, which could reveal unprofessional content and jeopardize job offers if personal information is exposed.
This document discusses several communication and social theories including symbolic interactionism, expectancy violations theory, social penetration theory, uncertainty reduction theory, relational dialectics, organizational culture theory, cultural studies, communication accommodation theory, face negotiation theory, and how they relate to gender differences and group decision making. Theories on social convergence, constructivism, the functional perspective, and information processing are also referenced in the overview of communication concepts.
An overview of the Dataverse Network Project by Sonia Barbosa, Eleni Castro, and Gustavo Durand of Data Science. The Dataverse Network team, from Harvard University’s Institute for Quantitative Social Science (IQSS) is in the final stages of a two year project, funded by The Alfred P. Sloan Foundation, in a partnership with Stanford & Simon Fraser University’s Public Knowledge Project (PKP) to help make data sharing, citation and preservation an intrinsic part of the scholarly publication process.
Distributed firewalls have been developed to maintain the networks with a higher level of protection than conventional firewalling mechanisms like gateway and host-based fire-walls. even though distributed firewalls provide higher secu-rity, they too have boundaries. Toovercome those limitations we presenting the design & implementation of a new distrib-uted firewall model, based on stateful Cluster Security Gateway (CSG) architecture[1]. This distributed security model are implemented in bottom-up approach means each cluster of end-user hosts are secured first using the CSG architecture. These different CSGs are then centrally man-aged by the Network Administrator. A file-based firewall update mechanism is used for dynamic real- time security. IPsec protocol is used to secure the firewall policy update distribution while X.509 certificates cater for sender/receiver authentication. The major advantage of this approach is to distributed security include tamper resistance, anti-spoofing, anti-sniffing, secure up to date firewall updating, low overall network load, high scalability and low firewall junction times.
Sé fuerte para que nadie pueda herirte, noble para que nadie pueda ofenderte, humilde para que todos quieran admirarte y original para que nadie pueda imitarte.
Warming up students at the beginning of class focuses their attention on the lesson and provides language practice to increase student involvement. Reviewing material from the previous lesson is also part of the warm up to engage students and prepare them for new content. The role of the warm up is to get students ready to learn by capturing their attention and reviewing essential information.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
Allison Long and Julia Cleaver of Ipas report on setting up a Sharepoint deployment that people will actually use - within a large, multinational organization with varying levels of bandwidth / accessibility.
The document discusses evaluating a library's capacity to manage research data by assessing its intellectual assets beyond just the knowledge and skills of individual staff members. These include organizational or structural capital like databases and routines that remain with the institution, as well as relational capital like networks with researchers. The document argues that understanding these hidden strengths can help libraries identify unique factors that position them well for research data stewardship and recognize how human assets can be applied in new areas like exploiting collection expertise when curating data sets.
Talent Pipelines for Smart Cities, Hong Kong Productivity Council, 21 sept2017Martha Russell
1. A Perfect Storm for Change and Transformation
• Data is the new gold – for digital cities, digital living, digital working
• Technologies, talent, markets, and resources are local & global
2. The Human Dimension of “Smart Futures” is Crucial
• Partnerships of people and technology
• Smart people needed to make smart decisions
• Smart Futures (IoT) are Identity Systems
• Skilling and reskilling are urgent
• System leadership is crucial
3. Shared Vision and Trust Accelerate Innovation
• Innovation ecosystems are built on relational capital
• Stories matter -‐ we are “HomoNarrative.”
Paul Henning Krogh A New Dawn For E Collaboration In ScienceVincenzo Barone
Plone has growing reputation within research for working as an important component in international scientific collaboration infrastructures. In this panel session researchers shall present and answer questions on both their experiences in using Plone in a scientific context and on their research of studying Plone in use by scientists. Attendees will leave with a better conception of what is needed for international scientific collaboration and what Plone can offer as an e-collaboration tool to support research infrastructures. The panel participants will bring in expertise on computer supported collaborative work (CSCW) to stimulate use and development of Plone applications for such use cases. Panel headlines: - Exchange experiences with Plone in research environments (use cases) - Requirements for Plone in research environments: what's available, which extensions or modifications do we need? - Coordinate actions around Plone products for scientific use - Promote the use of Plone in scientific environments - Confront conceptions of collaborative research processes with Plone implementations of such models
Europeana Network Association AGM 2016 - 9 November - Speaker Shawn Averkamp Europeana
This document discusses innovation and change at the New York Public Library (NYPL). It describes some of the challenges of managing digital cultural heritage over time, including ensuring continued access, user understanding, and cultural sensitivity. It then outlines NYPL's efforts to build resilience into its digital systems through approaches like redundancy, participation, feedback, and modularity. Specific projects discussed include the Registry, Discovery, and using linked open data. The goal is to create systems that can adapt to change while preserving core functions and values.
As Head of LETS, my role would be to help the libraries use information technology to enhance public services in several key ways:
1) Acting as a bridge between traditional library services and new models by interpreting user needs and technological possibilities.
2) Cheerleading for new technologies by communicating successes and changing perceptions.
3) Connecting different parts of the libraries and facilitating collaboration between libraries and other campus units.
4) Catalyzing innovation by predicting implications of new technologies, identifying services to retire, and testing usability.
Libraries, collections, technology: presented at Pennylvania State University...lisld
Library collections are changing in a network environment. This presentation considers how collections are being reconfigured, it looks at research support services, and it explores the shift from the purchased/licensed collection to the facilitated collection.
The document discusses open learning environments and their foundations. It outlines several theories that inform open learning like constructivism and humanism. Technological tools can be used to access knowledge, collaborate, and share knowledge. Open learning environments are student-centered and situated in authentic contexts. They emphasize inquiry, discovery, and critical thinking over memorization. Such environments leverage technological tools for communication, resources, and cognitive support. An example of a resource sharing network called E-Bursa APTIKOM is described that connects universities to share courses, research, and other intellectual resources.
This document discusses technology competencies and training for library staff. It begins by defining competencies as the skills needed for employee and organizational success. It then lists several existing competency frameworks for different types of library professionals. While many competency lists exist, libraries have generally lacked specific technology competency training and qualifications. The document advocates for developing a task force to create a technology competencies list tailored for each library. It provides detailed recommendations for the entire process, from gaining staff input to implementing training programs and reassessing competencies over time.
This document discusses the importance of developing technology competencies and training programs for library staff. It begins by defining competencies as the skills needed for employee and organizational success. While many library organizations have competency lists, there is a lack of focus on specific technology skills. The document then outlines the benefits of developing a competency training program, such as improving staff skills and customer service. It provides detailed recommendations for creating a competency task force, developing competency descriptions, gaining approval, implementing incentives and assessments, and continually revising the training program. The goal is to establish a formal technology training structure within libraries.
This document provides guidance and resources for students writing a dissertation, including:
- The objectives and benefits of undertaking a dissertation such as developing personal specialisms and research skills.
- An overview of the key processes involved like planning, literature reviews, and writing.
- Tips for evaluating sources and conducting research, including distinguishing primary and secondary sources.
- Recommendations for useful library resources and databases for discovering relevant literature.
APLIC 2014 - Social Observatories Coordinating NetworkAPLICwebmaster
NSF project looks to define social science research for the 21st century. The major objective of the SOCN is to continue exploration of ideas regarding the potential form and functioning of such a network of social observatories and to actively engage individuals and groups across the SBE research community in this process.
Facebook is vulnerable to hackers who alter profiles and upload viruses through pictures. Hackers also create fake Facebook login pages to steal user passwords. Facebook can be addictive due to frequent checking and time spent on activities with friends. Prospective employers sometimes search applicants' public Facebook profiles, which could reveal unprofessional content and jeopardize job offers if personal information is exposed.
This document discusses several communication and social theories including symbolic interactionism, expectancy violations theory, social penetration theory, uncertainty reduction theory, relational dialectics, organizational culture theory, cultural studies, communication accommodation theory, face negotiation theory, and how they relate to gender differences and group decision making. Theories on social convergence, constructivism, the functional perspective, and information processing are also referenced in the overview of communication concepts.
An overview of the Dataverse Network Project by Sonia Barbosa, Eleni Castro, and Gustavo Durand of Data Science. The Dataverse Network team, from Harvard University’s Institute for Quantitative Social Science (IQSS) is in the final stages of a two year project, funded by The Alfred P. Sloan Foundation, in a partnership with Stanford & Simon Fraser University’s Public Knowledge Project (PKP) to help make data sharing, citation and preservation an intrinsic part of the scholarly publication process.
Distributed firewalls have been developed to maintain the networks with a higher level of protection than conventional firewalling mechanisms like gateway and host-based fire-walls. even though distributed firewalls provide higher secu-rity, they too have boundaries. Toovercome those limitations we presenting the design & implementation of a new distrib-uted firewall model, based on stateful Cluster Security Gateway (CSG) architecture[1]. This distributed security model are implemented in bottom-up approach means each cluster of end-user hosts are secured first using the CSG architecture. These different CSGs are then centrally man-aged by the Network Administrator. A file-based firewall update mechanism is used for dynamic real- time security. IPsec protocol is used to secure the firewall policy update distribution while X.509 certificates cater for sender/receiver authentication. The major advantage of this approach is to distributed security include tamper resistance, anti-spoofing, anti-sniffing, secure up to date firewall updating, low overall network load, high scalability and low firewall junction times.
Sé fuerte para que nadie pueda herirte, noble para que nadie pueda ofenderte, humilde para que todos quieran admirarte y original para que nadie pueda imitarte.
Warming up students at the beginning of class focuses their attention on the lesson and provides language practice to increase student involvement. Reviewing material from the previous lesson is also part of the warm up to engage students and prepare them for new content. The role of the warm up is to get students ready to learn by capturing their attention and reviewing essential information.
In this paper we are study-ing about cloud computing, their types, need to use cloud computing. We also study the architecture of the mobile cloud computing. So we included new techniques for backup and restoring data from mobile to cloud. Here we proposed to apply some compres-sion technique while backup and restore data from Smartphone to cloud and cloud to the Smartphone.
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
Allison Long and Julia Cleaver of Ipas report on setting up a Sharepoint deployment that people will actually use - within a large, multinational organization with varying levels of bandwidth / accessibility.
The document discusses evaluating a library's capacity to manage research data by assessing its intellectual assets beyond just the knowledge and skills of individual staff members. These include organizational or structural capital like databases and routines that remain with the institution, as well as relational capital like networks with researchers. The document argues that understanding these hidden strengths can help libraries identify unique factors that position them well for research data stewardship and recognize how human assets can be applied in new areas like exploiting collection expertise when curating data sets.
Talent Pipelines for Smart Cities, Hong Kong Productivity Council, 21 sept2017Martha Russell
1. A Perfect Storm for Change and Transformation
• Data is the new gold – for digital cities, digital living, digital working
• Technologies, talent, markets, and resources are local & global
2. The Human Dimension of “Smart Futures” is Crucial
• Partnerships of people and technology
• Smart people needed to make smart decisions
• Smart Futures (IoT) are Identity Systems
• Skilling and reskilling are urgent
• System leadership is crucial
3. Shared Vision and Trust Accelerate Innovation
• Innovation ecosystems are built on relational capital
• Stories matter -‐ we are “HomoNarrative.”
Paul Henning Krogh A New Dawn For E Collaboration In ScienceVincenzo Barone
Plone has growing reputation within research for working as an important component in international scientific collaboration infrastructures. In this panel session researchers shall present and answer questions on both their experiences in using Plone in a scientific context and on their research of studying Plone in use by scientists. Attendees will leave with a better conception of what is needed for international scientific collaboration and what Plone can offer as an e-collaboration tool to support research infrastructures. The panel participants will bring in expertise on computer supported collaborative work (CSCW) to stimulate use and development of Plone applications for such use cases. Panel headlines: - Exchange experiences with Plone in research environments (use cases) - Requirements for Plone in research environments: what's available, which extensions or modifications do we need? - Coordinate actions around Plone products for scientific use - Promote the use of Plone in scientific environments - Confront conceptions of collaborative research processes with Plone implementations of such models
Europeana Network Association AGM 2016 - 9 November - Speaker Shawn Averkamp Europeana
This document discusses innovation and change at the New York Public Library (NYPL). It describes some of the challenges of managing digital cultural heritage over time, including ensuring continued access, user understanding, and cultural sensitivity. It then outlines NYPL's efforts to build resilience into its digital systems through approaches like redundancy, participation, feedback, and modularity. Specific projects discussed include the Registry, Discovery, and using linked open data. The goal is to create systems that can adapt to change while preserving core functions and values.
As Head of LETS, my role would be to help the libraries use information technology to enhance public services in several key ways:
1) Acting as a bridge between traditional library services and new models by interpreting user needs and technological possibilities.
2) Cheerleading for new technologies by communicating successes and changing perceptions.
3) Connecting different parts of the libraries and facilitating collaboration between libraries and other campus units.
4) Catalyzing innovation by predicting implications of new technologies, identifying services to retire, and testing usability.
Libraries, collections, technology: presented at Pennylvania State University...lisld
Library collections are changing in a network environment. This presentation considers how collections are being reconfigured, it looks at research support services, and it explores the shift from the purchased/licensed collection to the facilitated collection.
The document discusses open learning environments and their foundations. It outlines several theories that inform open learning like constructivism and humanism. Technological tools can be used to access knowledge, collaborate, and share knowledge. Open learning environments are student-centered and situated in authentic contexts. They emphasize inquiry, discovery, and critical thinking over memorization. Such environments leverage technological tools for communication, resources, and cognitive support. An example of a resource sharing network called E-Bursa APTIKOM is described that connects universities to share courses, research, and other intellectual resources.
This document discusses technology competencies and training for library staff. It begins by defining competencies as the skills needed for employee and organizational success. It then lists several existing competency frameworks for different types of library professionals. While many competency lists exist, libraries have generally lacked specific technology competency training and qualifications. The document advocates for developing a task force to create a technology competencies list tailored for each library. It provides detailed recommendations for the entire process, from gaining staff input to implementing training programs and reassessing competencies over time.
This document discusses the importance of developing technology competencies and training programs for library staff. It begins by defining competencies as the skills needed for employee and organizational success. While many library organizations have competency lists, there is a lack of focus on specific technology skills. The document then outlines the benefits of developing a competency training program, such as improving staff skills and customer service. It provides detailed recommendations for creating a competency task force, developing competency descriptions, gaining approval, implementing incentives and assessments, and continually revising the training program. The goal is to establish a formal technology training structure within libraries.
This document provides guidance and resources for students writing a dissertation, including:
- The objectives and benefits of undertaking a dissertation such as developing personal specialisms and research skills.
- An overview of the key processes involved like planning, literature reviews, and writing.
- Tips for evaluating sources and conducting research, including distinguishing primary and secondary sources.
- Recommendations for useful library resources and databases for discovering relevant literature.
This document discusses the future role of libraries in supporting e-science. It makes three key points:
1. E-science aims to enable new forms of distributed, collaborative, multi-disciplinary and data-intensive science through the use of information technology. This will require libraries to manage large amounts of scientific data and improve access to information.
2. The future "hybrid library" will combine physical and virtual collections, providing organized access to intellectual works wherever they are located. Institutional repositories will be important for publishing data and integrating it into the digital research cycle.
3. Libraries will need skills in data management, curation and providing discovery and access tools for e-scientists. Physical library spaces may also
Similar to APLIC 2014 - Building a Technical Knowledge Hub: Applying library science to Pathfinder's organizational experience (12)
NIH Biosketch & Federal Public Access PoliciesAPLICwebmaster
The document discusses open access, public access, and biosketch policies from NIH. It explains the importance of journal articles and the differences between open access and public access models of publishing. The main points are that the NIH Public Access Policy requires authors to submit peer-reviewed publications from NIH-funded research to PubMed Central within 12 months of publication. Compliance is important because NIH can delay funding for non-compliance. The document outlines the steps for complying with the policy, including determining the submission method and proper citation of the PMCID.
Developing New Services in Science LibrariesAPLICwebmaster
This document discusses how science libraries can provide new services to better serve scientists. It suggests that libraries provide free bibliographic and publication services like maintaining staff bibliographies, populating institutional repositories, and helping integrate publications into the broader scientific publishing ecosystem. These services allow libraries to showcase the work of their scientists while also reusing bibliographic information to serve multiple audiences.
1) The document discusses how to make informative and fun videos using simple everyday tools like PowerPoint without needing advanced or expensive video editing software.
2) It provides tips for creating short videos under 4 minutes that keep the content visual using features in PowerPoint like SmartArt and animations.
3) The document outlines a three step process for making the PowerPoint presentation into a video including making it visually appealing, adding movements between slides, and saving it as a movie file. It also lists free programs and websites that can be used for audio, graphics, and file conversion.
Terra Populus: Integrated Data on Population and EnvironmentAPLICwebmaster
Terra Populus is an NSF-funded DataNet project that seeks to lower the barriers for conducting human-environment interactions research. TerraPop provides access to hundreds of census and survey microdata samples, area-level data describing geographic units, and environmental data, commonly stored as raster data, describing land use, land cover, and climate. The data access system adds value to these data by supporting transformations across microdata, area-level data, and raster data. Users may select variables of interest from any of the three formats and obtain output in their desired format. This presentation will provide an overview of the data available in the TerraPop data access system and the system’s transformation functionality, as well as a demonstration of the data access system.
This document discusses Medium, an online publishing platform. It explains that Medium allows users to easily share stories, ideas, and knowledge with broad audiences. The document distinguishes between content published on K4Health's blog, which focuses on announcements and event recaps, and K4Health's Medium publication, which shares knowledge management techniques and personal experiences in a more conversational tone. The intended audience for K4Health's Medium content is global health, family planning, and knowledge management professionals as well as personal networks.
Sharing Promising Practices Internally and Externally: Lessons Learned from PCIAPLICwebmaster
In this session, Janine Schooley, PCI Senior Vice President, Programs, demonstrates how Project Concern International’s ‘Leveraging Knowledge’ and related strategic directions have utilized various approaches such as Chatter, InnovAtion, and regional workshops this past year to share promising practices and lessons learned both internally and externally for optimal efficiency, effectiveness, thought leadership, and performance.
Presentation by Dr. Miriam King.
IDHS is a new NICHD-funded data integration project that lowers the barriers to cross-temporal and cross-country research using the Demographic and Health Surveys, focusing initially on Africa and India. IDHS recodes data consistently across samples without losing detail, displays variable availability at a glance, offers variable-specific documentation (including question universes and wording and discussion of comparability issues), and merges files on the fly to create customized data extracts. This presentation will summarize MPC’s approach to integrating microdata, with examples from IDHS, describe the value-added features of IDHS, and summarize future plans for IDHS. At the time of the presentation, IDHS will include data on women of childbearing age, their households, and children under 5, from 18 countries and 77 samples.
Improving awareness pescador san diego air & space museumAPLICwebmaster
Presentation by Katrina Pescador
The San Diego Air & Space Museum houses one of the largest and most comprehensive collections of aerospace related materials in the world. The collection includes books, documents, films, photos, periodicals, manuals, drawings, and other archival materials. Over the past several years, the Museum has reviewed and revised its processes for cataloging, organizing, and digitizing these collections, as well as improving connectivity. The Museum adopted national cataloging standards and practice, insured consistency for the various types of materials, developed digitizing standards and procedures, and made other changes to improve both productivity and efficiency. The digitization project allows for greater public access to the collection and assures the materials will be preserved for future use. By making these resources more accessible to researchers through a variety of online services, digitization has dramatically enhanced worldwide awareness of the Museum’s collection.
The document discusses HINARI, a WHO portal that provides access to full-text biomedical and health literature for institutions in developing countries. It launched in 2002 to support the UN Millennium Development Goals. HINARI is available to eligible institutions in over 100 low and middle-income countries based on factors like GNI and HDI. The portal contains over 13,000 journals, 29,000 eBooks and other resources. While registration provides the most access, some links and databases can be used without membership. Training resources are available to help partners in developing countries make better use of HINARI.
APLIC 2014 - Douglas MacFadden on Harvard CatalystAPLICwebmaster
Harvard Catalyst works with Harvard schools and affiliated hospitals to build an environment where discoveries are rapidly and efficiently translated to improve human health
APLIC 2014 - HINARI experience in BangladeshAPLICwebmaster
Dr. M. Nazim Uddin, International Centre for Diarrhoeal Research, Bangladesh, examines the impact of the HINARI project for developing country researchers
This report explores the significance of border towns and spaces for strengthening responses to young people on the move. In particular it explores the linkages of young people to local service centres with the aim of further developing service, protection, and support strategies for migrant children in border areas across the region. The report is based on a small-scale fieldwork study in the border towns of Chipata and Katete in Zambia conducted in July 2023. Border towns and spaces provide a rich source of information about issues related to the informal or irregular movement of young people across borders, including smuggling and trafficking. They can help build a picture of the nature and scope of the type of movement young migrants undertake and also the forms of protection available to them. Border towns and spaces also provide a lens through which we can better understand the vulnerabilities of young people on the move and, critically, the strategies they use to navigate challenges and access support.
The findings in this report highlight some of the key factors shaping the experiences and vulnerabilities of young people on the move – particularly their proximity to border spaces and how this affects the risks that they face. The report describes strategies that young people on the move employ to remain below the radar of visibility to state and non-state actors due to fear of arrest, detention, and deportation while also trying to keep themselves safe and access support in border towns. These strategies of (in)visibility provide a way to protect themselves yet at the same time also heighten some of the risks young people face as their vulnerabilities are not always recognised by those who could offer support.
In this report we show that the realities and challenges of life and migration in this region and in Zambia need to be better understood for support to be strengthened and tuned to meet the specific needs of young people on the move. This includes understanding the role of state and non-state stakeholders, the impact of laws and policies and, critically, the experiences of the young people themselves. We provide recommendations for immediate action, recommendations for programming to support young people on the move in the two towns that would reduce risk for young people in this area, and recommendations for longer term policy advocacy.
RFP for Reno's Community Assistance CenterThis Is Reno
Property appraisals completed in May for downtown Reno’s Community Assistance and Triage Centers (CAC) reveal that repairing the buildings to bring them back into service would cost an estimated $10.1 million—nearly four times the amount previously reported by city staff.
UN WOD 2024 will take us on a journey of discovery through the ocean's vastness, tapping into the wisdom and expertise of global policy-makers, scientists, managers, thought leaders, and artists to awaken new depths of understanding, compassion, collaboration and commitment for the ocean and all it sustains. The program will expand our perspectives and appreciation for our blue planet, build new foundations for our relationship to the ocean, and ignite a wave of action toward necessary change.
Combined Illegal, Unregulated and Unreported (IUU) Vessel List.Christina Parmionova
The best available, up-to-date information on all fishing and related vessels that appear on the illegal, unregulated, and unreported (IUU) fishing vessel lists published by Regional Fisheries Management Organisations (RFMOs) and related organisations. The aim of the site is to improve the effectiveness of the original IUU lists as a tool for a wide variety of stakeholders to better understand and combat illegal fishing and broader fisheries crime.
To date, the following regional organisations maintain or share lists of vessels that have been found to carry out or support IUU fishing within their own or adjacent convention areas and/or species of competence:
Commission for the Conservation of Antarctic Marine Living Resources (CCAMLR)
Commission for the Conservation of Southern Bluefin Tuna (CCSBT)
General Fisheries Commission for the Mediterranean (GFCM)
Inter-American Tropical Tuna Commission (IATTC)
International Commission for the Conservation of Atlantic Tunas (ICCAT)
Indian Ocean Tuna Commission (IOTC)
Northwest Atlantic Fisheries Organisation (NAFO)
North East Atlantic Fisheries Commission (NEAFC)
North Pacific Fisheries Commission (NPFC)
South East Atlantic Fisheries Organisation (SEAFO)
South Pacific Regional Fisheries Management Organisation (SPRFMO)
Southern Indian Ocean Fisheries Agreement (SIOFA)
Western and Central Pacific Fisheries Commission (WCPFC)
The Combined IUU Fishing Vessel List merges all these sources into one list that provides a single reference point to identify whether a vessel is currently IUU listed. Vessels that have been IUU listed in the past and subsequently delisted (for example because of a change in ownership, or because the vessel is no longer in service) are also retained on the site, so that the site contains a full historic record of IUU listed fishing vessels.
Unlike the IUU lists published on individual RFMO websites, which may update vessel details infrequently or not at all, the Combined IUU Fishing Vessel List is kept up to date with the best available information regarding changes to vessel identity, flag state, ownership, location, and operations.
Food safety, prepare for the unexpected - So what can be done in order to be ready to address food safety, food Consumers, food producers and manufacturers, food transporters, food businesses, food retailers can ...
United Nations World Oceans Day 2024; June 8th " Awaken new dephts".Christina Parmionova
The program will expand our perspectives and appreciation for our blue planet, build new foundations for our relationship to the ocean, and ignite a wave of action toward necessary change.
Contributi dei parlamentari del PD - Contributi L. 3/2019Partito democratico
DI SEGUITO SONO PUBBLICATI, AI SENSI DELL'ART. 11 DELLA LEGGE N. 3/2019, GLI IMPORTI RICEVUTI DALL'ENTRATA IN VIGORE DELLA SUDDETTA NORMA (31/01/2019) E FINO AL MESE SOLARE ANTECEDENTE QUELLO DELLA PUBBLICAZIONE SUL PRESENTE SITO
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
This session will cover the development and implementation of Pathfinder’s technical knowledge hub; from conception to systematic integration into all projects and programs. Presented as a case study, the session will showcase all of the steps involved in creating the hub, including, but not limited to, taxonomy creation, SharePoint library development, and the ever-so-important change management activities conducted.
Always a work in progress.
Pathfinder works in: Abortion, Advocacy, Adolescents & Youth, Contraception, Gender, HIV & AIDS, Maternal & Newborn Health, growing in PHE and CCP.
Knowledge Management: has always had a library, had a KM Coordinator for four years before I arrived, the coordinator was limited by technology.
I started little over three years ago and have been given the mandate of maintaining the library and doing what I think is needed for KM – which is great but daunting!
Can really impact development outcomes if people have access to the right information.
Started three years ago with a little physical library collection, a non-updated ‘extranet’, and a 3 month old SharePoint deployment with no adoption or content.
Context:
High turnover led to information walking out of the door and knowledge of how things were done.
Few staff retiring with years and years of experience
Documents residing on R drives that were only accessible by those physically within the headquarters office.
Documents residing on personal computers and non-accessible drives all over the world.
A lot of recreating the wheel, or those who didn’t were the only ones who knew where things were.
Ability to implement these KM changes came because:
New technology created intranet and an opportunity for a place for information for all Pathfinders.
New KM person, new director of unit, new vision and direction for KM.
Organization was growing from a small NGO to a medium sized one, the need for systems and less information residing only people’s heads was becoming more and more apparent.
50 Years of experience scattered around the world. External information only reaches small audience. Knowledge stuck in Technical Advisor’s heads.
High turnover led to information walking out of the door and knowledge of how things were done.
Few staff retiring with years and years of experience
Documents residing on R drives that were only accessible by those physically within the headquarters office.
Documents residing on personal computers and non-accessible drives all over the world.
A lot of recreating the wheel, or those who didn’t were the only ones who knew where things were.
Everyone hated the intranet. I spent first year and half just working solely on improving the intranet; navigation, search, content, just general acceptability of it.
Don’t have formal executive buy-in, don’t have a strategy, had to figure this out in an ongoing basis; do we have a KM strategy for just Technical Stuff or do we have a KM strategy for everything.
Had champions and less of a formal structure.
Solution became apparent quickly – need one place for all materials – and that is iShare plus we identified the types of information people needed; broke it into this ‘information architecture’.
First needed to improve iShare and build trust in the system; created a new navigation and worked with people to get content on there and built a super-users team, all could have been better, but still on the right track.
Second developed a taxonomy so that all materials in iShare could be tagged in the same way.
Third collected materials from Technical Advisors for their Technical Assistance Libraries.
Fourth weeded and catalogued physical library, plus got ejournal subscriptions so all Pathfinders could have access to materials, not just HQ.
Fifth got the archive started, collected electronic materials from country offices, catalogued the paper materials in the basement, worked with new projects to get materials collected in an on-going basis so that materials are added on-going instead of just at the end.
While this was going on, created a Yellow Pages so people could find each other and started the VCATs so that technical experts talked to each other.
Continuous change management – constant reminders, communications, always chat with field staff when in HQ, made a DVD walking through Hub, etc.
Constant change management – constant contact and communication and showcasing the benefit.
Always taking the extra time to show someone instead of just sending it to them.
Three times a year we have a library session, yearly reports on TALs, Library, VCATs.
Training sessions with every visiting field staff
Sessions for technical advisors to bring to the field and train country offices
DVD training session of walking through the available sessions
Need to do more to make people aware – has only email and sessions, need to get some organic growth going, which is happening.
First needed to improve iShare and build trust in the system; created a new navigation and worked with people to get content on there and built a super-users team, all could have been better, but still on the right track.
Had to improve just the general SharePoint first.
Then had to go back to my initial attempts to get stuff up and fix the architecture.
Created separate document libraries instead of just one, and had to add the terms. Had to adjust the navigation and figure out how people search for it.
Did focus groups with card sorting exercises to determine best information that had to be on iShare as well as how it should be organized.
Second developed a taxonomy so that all materials in iShare could be tagged in the same way.
Took terms from interviews with Technical Advisors, worked with POPLINE thesaurus, worked with IPPFs library terms, and UNAIDS vocab, and put together our own list. Had TAs edit it and then added the terms to the iShare Term Store; had a quick session to teach our TAs about metadata and why it was important; got the buy-in and they took time to edit it, now have definitions and acronyms.
Used the same vocab for the website and integrated the SharePoint system and our website so that materials uploaded to our intranet get uploaded to our website.
All materials in the archive, the TALs, and the library are tagged the same way, allows for easily searchable content.
Released the taxonomy to all staff.
Third collected materials from Technical Advisors for their Technical Assistance Libraries.
* Technical guidance from our technical advisors on how best to use the resources.
Fourth weeded and catalogued physical library, plus got ejournal subscriptions so all Pathfinders could have access to materials, not just HQ.
External information into our system for people to learn from.
Send monthly technical area updates to keep people in the loop.
Technical Assistance Libraries – work in progress with the advisors to collect resources; some just do, some it is a struggle, some add their own, some don’t.
Library – all done and still get ejournal subscriptions
Fifth got the archive started, collected electronic materials from country offices, catalogued the paper materials in the basement, worked with new projects to get materials collected in an on-going basis so that materials are added on-going instead of just at the end.
Embedded in projects in a non-systematic way, but it is in the start up and closing checklists. Working with identified staffer to collect materials in an ongoing basis; mostly through email, which is not ideal, but it allows people to collect what they need to and send to me for uploading. Also collect hard copy stuff at the end so our archive collect is growing.
Every time a project finishes a technical document, they upload it to the archive.
Goal is to feed this archive into our website collection so that people can see our entire history of content.
Already being used for re-use of materials.
VCATs – communities of practice led by technical advisors on our multiple technical areas.
Work sometimes and sometimes don’t work well, but there is a community building in most of our technical areas; did get executive buy-in.
Used as a vehicle to get information out about other aspects of the KM programs.
Created guide for VCATs; had a session on facilitating virtual communities.
Less about the library science and more KM, but it is an integral part of embedding the KM systems.
Staff can re-use and adapt materials for new projects.
Staff can see what was done before and adapt ideas for new projects.
iShare is now liked and there is far more content and it is building really well and people do use it and feel more comfortable using it. – Still improving, but still ok and a huge increase in the positive response on feedback surveys and actual site usage.
Taxonomy is being used, there is a common understanding of ‘metadata’ and there is a buy-in from everyone on the need for a common taxonomy for all systems.
TALs are a work in progress, but even though it was my first project, they are the least used part of the whole hub – good lesson on demand/supply.
Library is used, went from 90 requests to 300 last year, plus added survey results of having monthly technical updates and new ejournals
Archive is not used that much yet because we are still working on getting it released to the wider audience, but have 1900 items in it and those who are familiar with it like it. May have grown too much for it to be useful; project to identify the best things to re-use to add to the TALs to reduce the amount of searching and filtering that staff have to do.
Yellowpages are waiting for SharePoint improvements, but we do have a general list of staff with their general areas now and it is constantly being used and asked about by staff.
Then had to go back to my initial attempts to get stuff up and fix the architecture.
Created separate document libraries instead of just one, and had to add the terms. Had to adjust the navigation and figure out how people search for it.
* iShare will be undergoing a huge re-do in a few years with an upgrade, so hopefully any major problems with the initial architecture can be re-done with the upgrade.
Taxonomy is always being improved.
TALs are constantly being added to; need to improve system for adding materials
Library; further refine the collection of ejournals
Archive – need to embed further into projects, make easier for people, feed it into more website projects for actual collection, and move away from collecting it all at the end of a project. Potentially feed to other ways of adding materials; less abbot manually adding and more about archiving iShare sites to records collections or something- take the manual entering out of it.
Yellowpages – further integrations with SharePoint so that the profiles are easier to edit, the phone numbers are right, and so that we can use the information in more than just the profiles.
VCATs – actual funding for in-person meetings, more country rep and exec buy-in, more just general buy in from some Tech advisors that see them as too much work. These are an organically growing thing, could be helpful to have a part time coordinator to help with that part.
Lessons Learned:
There is a fine balance between getting stuff in iShare done and learning about SharePoint – know that what you’re doing is going to hit a snag and be OK with it.
Don’t expect change to happen overnight; don’t give yourself one year to implement KM. Start small and work towards it, each time someone asks you for something and you can show them it is in the system and they can get it themselves, it is a step in the right direction because they will use it and then if someone asks them, they’ll show that person and it’ll grow.
Capturing tacit knowledge is super time consuming and there is no real way to capture it. The TALs, while a good idea, are not supposed to replace the need for talking to each other.
Don’t separate out the sources of information to people. I started with each of these separate things and then amalgamated it to the Hub when I realized that the only difference between this information matters to me, it is the Google effect. Need to be able to limit to a specific thing, but also need to be able to see whatever we have in a different search.