Presentation from Michael Healy, Copyright Clearance Center, at the BISG June 11, 2014 Rights Summit, looking at issues affecting the publishing industry in the management and transmission of rights and rights data.
"Show Me the Value: Enhancing the Perceived Value of Analytics Inside Your Or...Eric Myers
Learn how to drive value from your data stream by driving economic, revenue and cultural value from your data to help drive product, customer, and organizational decisions for your stakeholders.
As institutions start to delve into the staff / student / consumer data they have been storing for years, new questions are emerging about the repercussions of using this data. How will it be analyzed? Who is doing the analysis? And what steps should be taken to protect user’s privacy?
Nonprofit organizations that do focus on technology see a major advantage in productivity, efficiency, and flexibility in their industry.
Here, we have a quick summary of five technology trends that you should be considering in 2018 as a nonprofit organization.
Original post: http://www.proserveit.com/5-nonprofit-technology-trends-2018/
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance BigID Inc
This presentation was shown at the 2019 Collibra Data Citizen Event in New York City.
Presented by Nimrod Vax, Chief Product Officer & Co-Founder & Joaquin Sufuentes, Lead Architect, Metadata Managment and Personal Infomation Protection, enterprise Data Managment, Intel IT
Customer Case: AIG & IBM Blockchain solutionIBM Sverige
AIG - Standard Chartered - IBM Blockchain Solution for Multinational Insurence program. Presentation by Berman, Vice President - Major Accounts Manager at AIG. Held at Watson Sweden Summit 2017
"Show Me the Value: Enhancing the Perceived Value of Analytics Inside Your Or...Eric Myers
Learn how to drive value from your data stream by driving economic, revenue and cultural value from your data to help drive product, customer, and organizational decisions for your stakeholders.
As institutions start to delve into the staff / student / consumer data they have been storing for years, new questions are emerging about the repercussions of using this data. How will it be analyzed? Who is doing the analysis? And what steps should be taken to protect user’s privacy?
Nonprofit organizations that do focus on technology see a major advantage in productivity, efficiency, and flexibility in their industry.
Here, we have a quick summary of five technology trends that you should be considering in 2018 as a nonprofit organization.
Original post: http://www.proserveit.com/5-nonprofit-technology-trends-2018/
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance BigID Inc
This presentation was shown at the 2019 Collibra Data Citizen Event in New York City.
Presented by Nimrod Vax, Chief Product Officer & Co-Founder & Joaquin Sufuentes, Lead Architect, Metadata Managment and Personal Infomation Protection, enterprise Data Managment, Intel IT
Customer Case: AIG & IBM Blockchain solutionIBM Sverige
AIG - Standard Chartered - IBM Blockchain Solution for Multinational Insurence program. Presentation by Berman, Vice President - Major Accounts Manager at AIG. Held at Watson Sweden Summit 2017
Understanding Blockchain and Its Business BenefitsExist
This presentation describes what Blockchain technology is and provides a summary of its use cases. In this talk, you will learn about the business advantages of Blockchain in various verticals and how your organization can take advantage of this technology.
Presentation made at IRMS (Information and Records Management Society conference, UK) May 2018.
Operational steps to make GDPR work. Based on real-world examples.
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...AIIM International
On the heels of introducing breakthrough Artificial Intelligence, Internet of Things, and "Fintech" initiatives into the enterprise, Farmers recognized a need to modernize its records and information management strategy to support and protect these new capabilities. The organization invested in talent, research, eDiscovery tools and policy development to solve some of the highly-regulated industry's most complicated challenges including email retention, legal hold defensibility and records compliance.
Personal Data: How can your residents help you? by William Heath Mydex CIC
William Heath announces Mydex Community Prototype to UK local government
For more information about Mydex, kindly visit http://mydex.org/about/
Or visit the developers site at http://dev.mydex.org
And to become a member of Mydex Personal Data Store, visit http://pds.mydex.org
Also learn more about Mydex-Midata at http://midata.mydex.org
and Mydex-Third Sector at http://thirdsector.mydex.org
Follow Mydex on: -
Twitter: http://www.twitter.com/mydexcic
Facebook: http://www.facebook.com/Mydex.org
Flickr: http://www.flickr.com/photos/mydexcic/
RSS feed: http://feeds.feedburner.com/Mydex
Google Plus: https://plus.google.com/u/1/104992390676431315997/posts
Presentation delivered by David Bloch at AWS Executive day in Auckland, New Zealand. Covering the things that must be true to make Data a Strategic Asset
Mobile Integrated Advisory Solution (MIAS) for financial advisorsMindtree Ltd.
Mindtree Integrates Advisory Solution (MIAS) is an iPad application that provides financial advisors a unified view of all customer and portfolio data. It's in-built Customer Relationship Management (CRM) functionality leverages social media to enhance customer reach. It seamlessly integrates with other systems of the investment advisor for financial planning and portfolio management. This helps provide a complete front office solution.
Blockchain technology is probably the biggest game changer for the Internet. Is this for good or bad? Will it help to make the Internet safer and more secure – and more beneficial?
Author : Patrick Curry, BBFA
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with ITBigID Inc
Dimitri Sirota, CEO, BigID and Blake Bannon, VP of Product, OneTrust, present will detail best practices for synchronizing a privacy office enterprise privacy management platform with a tool for finding, classifying and correlating PI or PII across the data center and cloud.
Access the webinar presentation to learn:
-What the market landscape for privacy-centric products looks like
-Key considerations for evaluating privacy office software
-Key considerations to consider for privacy-oriented data discovery software
-How to ensure your privacy policy is aligned with operational reality
-Integration scenarios and use cases that connect the privacy office with IT
Security best ways to protect your intellectual capitalAconex
In today’s digital world, security needs to be a top priority in organisations across every industry. Cybercrime can severely cripple a company’s livelihood. Don’t lose your intellectual capital, avoid the risk. Leading UK security experts, Phil Brown and Steve Maddison, of Ascentor, provide insights to security in the construction industry, including security challenges for a market that is embracing digitisation & preparing for GDPR.
Internet Governance - Why the Multistakeholder Approach WorksInternet Society
The multistakeholder approach is a set of tools or practices that all share one basis: ‘Individuals and organizations from different realms participating alongside each other to share ideas or develop consensus policy’.
In this session you will hear leading government CIOs share their perspectives of cloud in government and what it means for their respective agencies. We will discuss the state of procurements (current and future) for which the agencies are seeking cloud/saas capabilities, their primary goals and objectives for each agency's cloud initiative, and the metrics for evaluating the ROI.
Moderator:
Michael Binko, President and CEO, kloudtrack
Panelists:
Thomas Bayer, Chief Information Officer, Securities and Exchange Commission
Henry Sienkiewicz, Chief Information Officer, DISA
Kevin Smith, Deputy Chief Information Officer, United States Patent & Trademark
Keith Trippie, Executive Director of Enterprise System Development , Department of Homeland Security
Stephen Warren, Principal Deputy Assistant Secretary, Department of Veterans Affairs
Here's a look at what we discuss at an IANS Connector Event. We bring together a diverse group of high-level information security professionals for collective discussion and problem-solving. Participants will take away actionable insights which will allow them to become more effective leaders.
Driving Change to Thrive in a Digital FutureNeil Calvert
Presented at Digital Transformation 2018 #DX2018, this presentation describes the power of enabling information literacy within your business and how this in turn creates opportunities to drive new business value and revenue in response to the expectations of today's consumers in the digital economy.
Understanding Blockchain and Its Business BenefitsExist
This presentation describes what Blockchain technology is and provides a summary of its use cases. In this talk, you will learn about the business advantages of Blockchain in various verticals and how your organization can take advantage of this technology.
Presentation made at IRMS (Information and Records Management Society conference, UK) May 2018.
Operational steps to make GDPR work. Based on real-world examples.
[AIIM18] A "Modern Records Management" Case Study: how the compliance departm...AIIM International
On the heels of introducing breakthrough Artificial Intelligence, Internet of Things, and "Fintech" initiatives into the enterprise, Farmers recognized a need to modernize its records and information management strategy to support and protect these new capabilities. The organization invested in talent, research, eDiscovery tools and policy development to solve some of the highly-regulated industry's most complicated challenges including email retention, legal hold defensibility and records compliance.
Personal Data: How can your residents help you? by William Heath Mydex CIC
William Heath announces Mydex Community Prototype to UK local government
For more information about Mydex, kindly visit http://mydex.org/about/
Or visit the developers site at http://dev.mydex.org
And to become a member of Mydex Personal Data Store, visit http://pds.mydex.org
Also learn more about Mydex-Midata at http://midata.mydex.org
and Mydex-Third Sector at http://thirdsector.mydex.org
Follow Mydex on: -
Twitter: http://www.twitter.com/mydexcic
Facebook: http://www.facebook.com/Mydex.org
Flickr: http://www.flickr.com/photos/mydexcic/
RSS feed: http://feeds.feedburner.com/Mydex
Google Plus: https://plus.google.com/u/1/104992390676431315997/posts
Presentation delivered by David Bloch at AWS Executive day in Auckland, New Zealand. Covering the things that must be true to make Data a Strategic Asset
Mobile Integrated Advisory Solution (MIAS) for financial advisorsMindtree Ltd.
Mindtree Integrates Advisory Solution (MIAS) is an iPad application that provides financial advisors a unified view of all customer and portfolio data. It's in-built Customer Relationship Management (CRM) functionality leverages social media to enhance customer reach. It seamlessly integrates with other systems of the investment advisor for financial planning and portfolio management. This helps provide a complete front office solution.
Blockchain technology is probably the biggest game changer for the Internet. Is this for good or bad? Will it help to make the Internet safer and more secure – and more beneficial?
Author : Patrick Curry, BBFA
BigID, OneTrust, IAPP Webinar: Bridging the Privacy Office with ITBigID Inc
Dimitri Sirota, CEO, BigID and Blake Bannon, VP of Product, OneTrust, present will detail best practices for synchronizing a privacy office enterprise privacy management platform with a tool for finding, classifying and correlating PI or PII across the data center and cloud.
Access the webinar presentation to learn:
-What the market landscape for privacy-centric products looks like
-Key considerations for evaluating privacy office software
-Key considerations to consider for privacy-oriented data discovery software
-How to ensure your privacy policy is aligned with operational reality
-Integration scenarios and use cases that connect the privacy office with IT
Security best ways to protect your intellectual capitalAconex
In today’s digital world, security needs to be a top priority in organisations across every industry. Cybercrime can severely cripple a company’s livelihood. Don’t lose your intellectual capital, avoid the risk. Leading UK security experts, Phil Brown and Steve Maddison, of Ascentor, provide insights to security in the construction industry, including security challenges for a market that is embracing digitisation & preparing for GDPR.
Internet Governance - Why the Multistakeholder Approach WorksInternet Society
The multistakeholder approach is a set of tools or practices that all share one basis: ‘Individuals and organizations from different realms participating alongside each other to share ideas or develop consensus policy’.
In this session you will hear leading government CIOs share their perspectives of cloud in government and what it means for their respective agencies. We will discuss the state of procurements (current and future) for which the agencies are seeking cloud/saas capabilities, their primary goals and objectives for each agency's cloud initiative, and the metrics for evaluating the ROI.
Moderator:
Michael Binko, President and CEO, kloudtrack
Panelists:
Thomas Bayer, Chief Information Officer, Securities and Exchange Commission
Henry Sienkiewicz, Chief Information Officer, DISA
Kevin Smith, Deputy Chief Information Officer, United States Patent & Trademark
Keith Trippie, Executive Director of Enterprise System Development , Department of Homeland Security
Stephen Warren, Principal Deputy Assistant Secretary, Department of Veterans Affairs
Here's a look at what we discuss at an IANS Connector Event. We bring together a diverse group of high-level information security professionals for collective discussion and problem-solving. Participants will take away actionable insights which will allow them to become more effective leaders.
Driving Change to Thrive in a Digital FutureNeil Calvert
Presented at Digital Transformation 2018 #DX2018, this presentation describes the power of enabling information literacy within your business and how this in turn creates opportunities to drive new business value and revenue in response to the expectations of today's consumers in the digital economy.
Event Logs: What kind of data does process mining require?Wil van der Aalst
The starting point for process mining is an event log. How to get this data in a format suitable for process mining? This slide show will explain this.
Each event in such a log refers to an activity (i.e., a well-defined step in some process) and is related to a particular case (i.e., a process instance). The events belonging to a case are ordered and can be seen as one "run" of the process. Event logs may store additional information about events. In fact, whenever possible, process-mining techniques use extra information such as the resource (i.e., person or device) executing or initiating the activity, the timestamp of the event, or data elements recorded with the event (e.g., the size of an order).
LODチャレンジ実行委員会 関西支部長 古崎晃司
LODチャレンジ実行委員会/Linked Open Data Initiative理事 松村冬子
Linked Open Dataの基本的な技術の解説,利用事例の紹介に加え,簡単なサンプルプログラムの紹介など,ハッカソンに活用できるLOD技術や情報ソースについて解説します.
第3回Linked Open Dataハッカソン関西(1日目)アイデアソン
開催日:2014年2月11日(火)
David WITH Goliath: How Big Companies Do Deals with Small Cloud and Social Me...William Tanenbaum
Conventional deal structures do not always work when big companies engage small cloud and social media companies as part of marketing and digital business. To go live you need to go smart. Legal documents need to enable, not delay. Due diligence is important: Are you picking a winner or a loser? Would you invest in this company? Is security backed in or will you be subject to a privacy breach and a reputational hit? Are the investors in it for the long haul or are they taking a flier?
8 - Making Information Pay 2011 -- REID, MARLIN, SHATZKIN (Rights Management)bisg
"The State of Current Rights Management Systems: Initial Findings from BISG & CCC’s Joint Survey of Publishers and Vendors"
Many publishers see a trend that may be, like e-books a couple years back, an early indicator of sea-change for our industry. While book sales are becoming more and more elusive, opportunities to sell licenses of content fragments for websites, apps and derived books are growing.
Consequently, the mismanaging of rights associated with these fragments can have severe impacts on a publisher’s brand and bottom line.
Unfortunately, figuring out who owns all rights available to a work often requires costly research and negotiation that can eat up potential profits before they’re realized. Often, this discourages publishers from responding to rights licensing requests at all. Those who do struggle to track collections and expend costly resources on managing revenues. And when they do license content, they struggle to track collections and expend costly resources on managing revenues.
Under direction from BISG, rights experts from the Copyright Clearance Center (CCC) and MetaComet Systems, with the help of The Idea Logical Company, have researched the extent of this challenge across the industry. It is hoped that results from this research can lead to recommend best practices for rights management.
During this three-part presentation, Heather Reid (CCC), David Marlin (MetaComet), and Mike Shatzkin (Idea Logical Company) present the results of BISG’s research, describe the challenge, and detail what they believe are the next steps toward an industry-wide solution.
TrustArc-Webinar-Slides-2022-02-22-Incorporating privacy when leveraging AITrustArc
To improve their services and stay competitive, companies use artificial intelligence to understand their customers' needs and preferences. The data collected to this end requires a certain level of protection. Thus, companies need to get a lot smarter about the way they collect, store, protect, and use information.
Can data privacy truly coexist with data intelligence? In addition to regulating personal data protection, should we control responsible data use?
Stay competitive while maintaining your customer’s trust. Whether you're building AI internally or selecting a vendor who uses it, join the TrustArc, Outschool, and The Cantellus Group privacy experts as they help you define and execute your data and AI strategy.
This webinar reviews:
- The best way to collect, store, protect, and use information
- How to include data and AI in your business processes
- How to balance the right to collect data with the right to privacy
Towards a Systematic Understanding on the Challenges of Procuring Artificial ...Dr. Keegan McBride
This presentation is titled "Towards a Systematic Understanding on the Challenges of Procuring Artificial Intelligence in the Public Sector" and was created for the DG grow webinar "Public procurement of AI 2: building trust for citizens and business".
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
As IoT insecurity creates vulnerabilities, policymakers become concerned about the health of the Internet. How can public policy address these concerns in a smart way, targeting their efforts to improve IoT security without imposing unnecessary costs across the Internet ecosystem or creating unintended effects? What is the role of government versus industry?
Gerald Faulhaber
Professor Emeritus, Business Economics & Public Policy, Wharton School
https://www.cablelabs.com/informed/
GreenBiz 18 Workshop Slides: Innovative Financing for Sustainability Projects...GreenBiz Group
Even at cash rich companies, the fight for internal capital can leave compelling energy projects unfunded. Join this workshop to learn how companies are overcoming this challenge through innovative financing mechanisms including green bonds, internal venture capital funds, carbon pricing, and more.
Webinar presented live on February 27, 2018.
Introducing the OMG’s Data Residency Maturity Model
With the rise of managed IT services and cloud computing, sensitive data is regularly moved across countries and jurisdictions, which can be in direct conflict with various international, national or local regulations dictating where certain types of data can be stored (e.g., the European Union’ General Data Protection Regulation, or GDPR). Data residency is also a consideration of data owners responsible for protecting and securing data from unintended access.
The Object Management Group® (OMG®), a technology standards consortium, launched a working group in 2015 to address the challenges of data residency and define a standards roadmap to help stakeholders manage the location of their data and metadata.
Given the complexity of the issue, a stepwise improvement plan is necessary. This webinar will introduce a new Data Residency Maturity Model (DRMM) proposed in December 2017. Similar to the Capability Maturity Model (CMM) invented in 1990 at the Software Engineering Institute (SEI), the DRMM contains five maturity levels aimed at helping an organization improve their practices and governance of data residency. The OMG seeks feedback on the DRMM and calls on all interested parties to contribute to this work.
Discovery, risk, and insight mean something different to every organization, even at different locations within the same company.
Do you find answers by trial and error? Do you stumble across information, or find it when it is too late to make good use of it? In this session Concept Searching and technology partner, Netwrix, give a detailed view of risk mitigation for data security, compliance, and operational intelligence.
With the combination of the conceptClassifier platform and Netwrix Auditor, see firsthand the automatic generation and use of semantic metadata. The overview of this state-of-the-art solution shows how to proactively prepare to mitigate risk, regardless of where or why it occurs.
Speakers:
Robert Piddocke – Vice President of Channel and Business Development at Concept Searching
Ilia Sotnikov – Vice President of Product Management at Netwrix
Jeff Melnick – Manager of Sales Engineering at Netwrix
Beyond GDPR Compliance - Role of Internal AuditOmo Osagiede
More than the requirement to comply with the regulation, GDPR encourages good practices for data privacy and data protection beyond May 2018. This slide deck shares examples of areas where Internal Audit can play a significant role in ensuring that the right controls are built-in at the front-end of the compliance journey. This is in-line with the increasing expectation from stakeholders for IA to add value to more strategic areas of risk to the business.
Digital Content in Public Libraries: What do Patrons Think? bisg
From the NISO/BISG ALA 10th annual summit which took place in Orlando in June of 2016, this presentation by Publishers Weekly's Andrew Albanese covers the results of a survey conducted by Nielsen of public library patrons' attitudes towards digital and print content in libraries.
What Your Metadata Does When You're Not Looking with Joshua Tallentbisg
Metadata expert Joshua Tallent will rip back the curtain and show you how different trading partners are using your metadata, with real life examples and suggestions for getting better results. He will also provide you with an overview of some industry best practices for the most important metadata elements, and discuss the pros and cons of common metadata workflows and management strategies. Learn what keywords to use in book metadata feeds, which fields to populate, which retailers and libraries are using which fields, and how to optimize your book's metadata for discoverability.
Student Attitudes Toward content in Higher Education: Nadine Vassallo, Projec...bisg
New insights based on over 1,600 student responses to the latest survey in BISG's ongoing study tracking the content and tools students say they actually use, points to the increasing role of technology in shaping the future of higher education
The Inclusive Access Model, presented by Jason Lorgan, Stores Director, Unive...bisg
Jason Lorgan's presentation, given at BISG's Higher Ed Conference 2015: Adapt, Learn, Innovate, outlines an innovative new business model pioneered at the campus store at The University of California Davis that addresses student reluctance to embrace digital course material. The program's remarkably promising results for content providers and distributors include improved sell through for stores and publishers and significantly reduced student costs.
Navigating the Transition from ONIX 2.1 to 3.0 bisg
Graham Bell, Executive Director of EDItEUR, focuses on the migration from ONIX 2.1 to ONIX 3.0, detailing the key differences between the two message standards, and the benefits and extra functionality offered by the new format. This presentation will outline the areas of the message where the changes are simple to deal with, and offer advice on those areas of the message where more significant modifications will be required.
ONIX: Migrating from 2.1 to 3.0, presented by Graham Bell, Executive Director...bisg
This presentation was originally give as part of a BISG webcast on October 14, 2014, and then again on November 12, 2014. The webcast focused on the migration from ONIX 2.1 to ONIX 3.0, detailing the key differences between the two message standards, and the benefits and extra functionality offered by the new format. EDItEUR's Graham Bell outlined the areas of the message where the changes are simple to deal with and offered advice on those areas of the message where more significant modifications will be required. This presentation is particularly timely because of the impending sunset of ONIX 2.1 support at the end of 2014.
Product Development for Common Core Standards, presented by Emma Williams, Co...bisg
The second of two presentations given during BISG's webcast "Product Development for Common Core Standards," co-hosted by Patricia Payton (Senior Manager of Publisher Relations and Content Development for Bowker), featuring Ashley Andersen Zantop (Group Publisher and General Manager at Capstone) and Emma Williams (Collection Development Manager at Booksource).
The implementation of Common Core State Standards is changing how teachers and librarians select classroom material, with significant consequences for publishers' product development and marketing programs. The series of three webcasts will help you understand educator needs, provide guidance for developing and marketing content that teachers and librarians will look for, and optimize its discoverability by showing you how to include details of a title's conformance with common core state standards in its metadata.
Emma Williams is the Collection Development Manager at Booksource. She helped develop Booksource's Common Core State Standards book collections and is well-versed in the Language Arts Reading Standards. In addition to her buying and collection duties, Emma edits Booksource's blog, "Booksource Banter," and is part of the social media strategy team. Emma has a B.A. in English from Truman State University and has worked in the book industry for the past eight years.
XBITS 101, a presentation for BISG by Diane Degener, IT Business Analyst & Pr...bisg
XBITS (XML Book Industry Transaction Standards) is a Working Group of IDEAlliance and a BISG committee that is designing and maintaining the standard XML (Extensible Markup Language) eDocuments to facilitate bi-directional electronic data exchanges between a diverse trading partners comprised of book publishers, manufacturers, paper mills, and component suppliers. The XBITS electronic transaction standard is based upon the papiNet Standard which is open, free and easy to adopt, providing common benefits to supply chain partners supporting both traditional and digital print manufacturing.
In this webcast, Diane Degener, Co-Chair of the XBITS Committee, will explain how to best implement the XBITS standard in your business and answer any questions you may have about XBITS best practices.
This 45-minute presentation will be followed by a 15-minute Q&A session.
Thema: The new, global subject classification system- Julie Morris- BISG/NISO...bisg
Presentation at the 8th Annual BISG/NISO Changing Standards Landscape Forum at the American Library Association (ALA) Annual Conference on June 27, 2014 in Las Vegas, NV. Julie Morris (BISG) presenting on Thema: The new, global subject classification scheme for books. Event info (and other event slides) here: http://www.niso.org/news/events/2014/alaannual/2014nisobisgforum/
Best Practices for Keywords in Metadata, with Jenny Bullough, Manager of Digi...bisg
What are keywords, and how can they help you sell more books? As book purchasing and discovery increasingly moves online, judicious use of keywords can help make your book more visible to readers. Learn how to choose and use keywords for your book product metadata – join us for an online webinar where we’ll review the just-published BISG Best Practices for Keywords in Metadata. Join Jenny Bullough, Manager of Digital Assets at Harlequin Press and Chair of BISG's Keywords Working Group, and Julie Morris, BISG's Project Manager of Standards and Best Practices, as they explain why keywords should be used, how to choose the best keywords for your content, what to avoid when making that choice, and some best practices for structuring and updating keywords in ONIX, and more.
Diversification, Discovery, and Data: 13 Insights from 13 Years of Safari, pr...bisg
Diversification, Discovery, and Data: 13 Insights from 13 Years of Safari, presented by Andrew Savikas, CEO of Safari Books Online, at Making Information Pay 2014, a track of IDPF's Digital Book 2014, at Book Expo America, on May 29, 2014
Subscription Services in the Context of Market Trends, presented by Jonathan ...bisg
Subscription Services in the Context of Market Trends, presented by Jonathan Stolper, SVP Nielsen Book Americas, at Making Information Pay 2014, a track of IDPF's Digital Book 2014 at Book Expo America, on May 29, 2014
Digital Books and the New Subscription Economy: Preliminary Results from the ...bisg
Digital Books and the New Subscription Economy: Preliminary Results from the BISG Research Study, presented by Ted Hill, President, THA Consulting at Making Information 2014, a track of IDPF's Digital Book 2014 at Book Expo America, May 29, 2014
The International Standard Name Identifier (ISNI): A Close Look, with Laura D...bisg
The International Standard Name Identifier, or ISNI, was created to identify the millions of contributors to creative works and those active in their distribution, including researchers, inventors, writers, artists, visual creators, performers, producers, publishers, aggregators, and more in order to resolve the problem of name ambiguity in search and discovery. Now, Laura Dawson, Product Manager of Identifier Services at Bowker, will show us how ISNI has developed since the standard was first published in 2012. How is it managed? Who receives numbers? What impact has it had on publishing? And how can it be incorporated into current metadata management and distribution?
Metadata: Standards Basics for the Independent Publishing Community, with Gra...bisg
The better your metadata, the better your sales: that's the simple truth. Books with complete metadata sell almost three times better than a book with incomplete metadata, so there's a very good reason to learn about how to format and transmit this information to your industry partners. But where to begin?
In this session, Graham Bell, Chief Data Architect at EDItEUR, will offer practical guidance on writing, formatting, and transmitting metadata in accordance with industry standards and best practices, and help to make your metadata work for you.
This is the third in a three-part series, co-produced by IBPA and hosted by BISG, aimed at demystifying several of the core book industry standards through "101"-style sessions presented by experts in the field.
ISBNs and Identifiers: Standards Basics for the Independent Publishing Commun...bisg
What are identifiers? What purpose do they serve in the book industry?
According to BISG's Best Practices for Identifying Digital Products, an identifier is generally a sequence of alpha-numeric characters that unambiguosly differentiates one thing from another in a particular context.
But while that answer may seem straightforward enough, the fact is there's a lot more to identifiers than one might think.
The book industry employs numerous identifiers for different reasons in its day-to-day operations. This webcast will cover identifiers basics—what they are, how they are developed, and how and why they are used. Special focus will be given to the venerable ISBN and its use in today's digital marketplace, and the difference between the ISBN and proprietary product identifiers.
In this session, Phil Madans, Executive Director Digital Publishing Technology for Hachette Book Group, will discuss how to correctly use identifiers to ensure your books reach the hands of happy readers.
This is the second in a three-part series, co-produced by IBPA and hosted by BISG, aimed at demystifying several of the core book industry standards through "101"-style sessions presented by experts in the field.
Student Attitudes Toward Content in Higher Education, with Nadine Vassallo, P...bisg
The way students learn and instructors teach is undergoing a radical shift, and the role of the traditional print "textbook" as the foundational tool for instruction is changing along with the traditional publishing model. To help shed light on these changes, BISG's Student Attitudes Toward Content in Higher Education survey continues to provide a baseline for tracking the rapid evolution underway in the higher education market. Join Nadine Vassallo, BISG's Project Manager of Research and Information, as she shares data from the most recent volume of Student Attitudes, providing an up-to-the-moment analysis of the current behavioral trends that will inform the development of the higher education industry, and learn more about how Student Attitudes can offer your practical guidance for refining your business strategies in an ever-shifting marketplace.
BISAC Subject Headings: Standards Basics for the Independent Publishing Commu...bisg
What are BISAC Subject Headings, and how can they help people find your book?
IBPA presents, in association with BISG, the first in a three-part series of webinars aimed at educating members of the independent publishing community about the core fundamentals of industry standards featuring experts in the field. In this installment, Connie Harbison, Director Quality Control at Baker & Taylor, will give a presentation about the 2013 BISAC Subject Headings — how they developed, who sets the standard, who uses them (and why!), and how they help to make your book more marketable and more discoverable.
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
Show drafts
volume_up
Empowering the Data Analytics Ecosystem: A Laser Focus on Value
The data analytics ecosystem thrives when every component functions at its peak, unlocking the true potential of data. Here's a laser focus on key areas for an empowered ecosystem:
1. Democratize Access, Not Data:
Granular Access Controls: Provide users with self-service tools tailored to their specific needs, preventing data overload and misuse.
Data Catalogs: Implement robust data catalogs for easy discovery and understanding of available data sources.
2. Foster Collaboration with Clear Roles:
Data Mesh Architecture: Break down data silos by creating a distributed data ownership model with clear ownership and responsibilities.
Collaborative Workspaces: Utilize interactive platforms where data scientists, analysts, and domain experts can work seamlessly together.
3. Leverage Advanced Analytics Strategically:
AI-powered Automation: Automate repetitive tasks like data cleaning and feature engineering, freeing up data talent for higher-level analysis.
Right-Tool Selection: Strategically choose the most effective advanced analytics techniques (e.g., AI, ML) based on specific business problems.
4. Prioritize Data Quality with Automation:
Automated Data Validation: Implement automated data quality checks to identify and rectify errors at the source, minimizing downstream issues.
Data Lineage Tracking: Track the flow of data throughout the ecosystem, ensuring transparency and facilitating root cause analysis for errors.
5. Cultivate a Data-Driven Mindset:
Metrics-Driven Performance Management: Align KPIs and performance metrics with data-driven insights to ensure actionable decision making.
Data Storytelling Workshops: Equip stakeholders with the skills to translate complex data findings into compelling narratives that drive action.
Benefits of a Precise Ecosystem:
Sharpened Focus: Precise access and clear roles ensure everyone works with the most relevant data, maximizing efficiency.
Actionable Insights: Strategic analytics and automated quality checks lead to more reliable and actionable data insights.
Continuous Improvement: Data-driven performance management fosters a culture of learning and continuous improvement.
Sustainable Growth: Empowered by data, organizations can make informed decisions to drive sustainable growth and innovation.
By focusing on these precise actions, organizations can create an empowered data analytics ecosystem that delivers real value by driving data-driven decisions and maximizing the return on their data investment.
Explore our comprehensive data analysis project presentation on predicting product ad campaign performance. Learn how data-driven insights can optimize your marketing strategies and enhance campaign effectiveness. Perfect for professionals and students looking to understand the power of data analysis in advertising. for more details visit: https://bostoninstituteofanalytics.org/data-science-and-artificial-intelligence/
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
BISG Rights Summit June 11, 2014 (Michael Healy, Copyright Clearance Center)
1. Managing rights data:
Examining friction & exploring solutions
Michael Healy
Executive Director, International Relations
BISG Rights Summit
New York, June 11th 2014
2. Defining our terms
• Rights data = data relating to:
– Primary contracts
– Mandates/delegations of rights
– Rights
– Permissions
– Licenses
2
3. The basics …
• Are there problems?
• Are they sufficiently serious to
justify spending time looking
for solutions?
• Can they be fixed?
• Are they problems susceptible
to systematic, industry-wide
solutions?
• Are they “BISG problems”?
6/17/20143
4. Opinions
• Publishing is a rights business
• Every online transaction is a rights
transaction
• Signs of good practice are evident
• New industry entrants with different
expectations are driving change
5. Challenges
• Failing to see the whole
• Rights silos
• Automation as a threat
• Justifying investments
• Necessary complexity
• Strategic management buy-in
6. Reasons to be cheerful?
• Some foundations in place?
• Linked Content Coalition
• Rights Data Integration project
• UK Copyright Hub