This webinar discusses permanent unique identifiers (PUIDs), specifically digital object identifiers (DOIs). It explains that PUIDs are needed for accurate identification, findability, accessibility, interoperability, and reproducibility of research objects. A PUID is a unique text string that permanently identifies a single research object. DOIs are a type of PUID that follow an international standard and have over 145 million objects registered in a global system. The webinar provides details on how to obtain and use DOIs through registration agencies to identify publications, data, and other research outputs.
Open source caqdas what is in the box and what is missingMerlien Institute
This document discusses open source computer-aided qualitative data analysis software (CAQDAS) alternatives to proprietary packages. It provides an overview of the open source movement and free/open source software philosophies. It then summarizes the features and capabilities of several popular open source CAQDAS tools, including QDA Miner Lite, Dedoose, NVivo, Atlas.ti, RQDA, and DReSS. Overall, it finds that while open source CAQDAS packages offer many useful features, their functionality is more limited than proprietary alternatives.
OAI Identifiers: Decentralised PIDs for Research Outputs in Repositoriespetrknoth
OAI identifiers provide a decentralized and free solution for assigning persistent identifiers (PIDs) to research outputs stored in repositories. While DOIs identify canonical versions, OAIs uniquely identify each deposited version in a repository. The CORE repository has over 200 million metadata records and 12,000 data providers, positioning it well to provide an OAI resolver service. Repositories are recommended to use OAIs as PIDs, link to rather than duplicate DOIs, and register with the CORE resolver to activate OAI resolution for deposited outputs. OAIs deserve more recognition as cost-free PIDs supporting the distributed global repository network.
This document summarizes a hackday event focused on building a system called COrDa to combine information from different institutional systems to surface which researchers have an ORCID iD and where that information can be found. The problem is that ORCID iD information is spread across privacy-restricted registry data and various institutional systems like CRIS, repositories, and HR systems. COrDa aims to develop a common abstraction layer and data model to pull this information together into a centralized dashboard. The hackday resulted in an initial technical prototype connecting to sample systems and displaying ORCID iD and repository information. Ongoing work includes further developing the data model and technical components.
This document provides an overview of how open-source intelligence (OSINT) techniques can be used both offensively and defensively. It discusses tools like Shodan, Maltego, Google searches, and malware sandboxes that can be leveraged to gather technical information about targets, infrastructure, and indicators of compromise. The document also emphasizes the importance of automation and privacy when conducting OSINT research to enhance attacks or strengthen defenses.
This webinar discusses permanent unique identifiers (PUIDs), specifically digital object identifiers (DOIs). It explains that PUIDs are needed for accurate identification, findability, accessibility, interoperability, and reproducibility of research objects. A PUID is a unique text string that permanently identifies a single research object. DOIs are a type of PUID that follow an international standard and have over 145 million objects registered in a global system. The webinar provides details on how to obtain and use DOIs through registration agencies to identify publications, data, and other research outputs.
Open source caqdas what is in the box and what is missingMerlien Institute
This document discusses open source computer-aided qualitative data analysis software (CAQDAS) alternatives to proprietary packages. It provides an overview of the open source movement and free/open source software philosophies. It then summarizes the features and capabilities of several popular open source CAQDAS tools, including QDA Miner Lite, Dedoose, NVivo, Atlas.ti, RQDA, and DReSS. Overall, it finds that while open source CAQDAS packages offer many useful features, their functionality is more limited than proprietary alternatives.
OAI Identifiers: Decentralised PIDs for Research Outputs in Repositoriespetrknoth
OAI identifiers provide a decentralized and free solution for assigning persistent identifiers (PIDs) to research outputs stored in repositories. While DOIs identify canonical versions, OAIs uniquely identify each deposited version in a repository. The CORE repository has over 200 million metadata records and 12,000 data providers, positioning it well to provide an OAI resolver service. Repositories are recommended to use OAIs as PIDs, link to rather than duplicate DOIs, and register with the CORE resolver to activate OAI resolution for deposited outputs. OAIs deserve more recognition as cost-free PIDs supporting the distributed global repository network.
This document summarizes a hackday event focused on building a system called COrDa to combine information from different institutional systems to surface which researchers have an ORCID iD and where that information can be found. The problem is that ORCID iD information is spread across privacy-restricted registry data and various institutional systems like CRIS, repositories, and HR systems. COrDa aims to develop a common abstraction layer and data model to pull this information together into a centralized dashboard. The hackday resulted in an initial technical prototype connecting to sample systems and displaying ORCID iD and repository information. Ongoing work includes further developing the data model and technical components.
This document provides an overview of how open-source intelligence (OSINT) techniques can be used both offensively and defensively. It discusses tools like Shodan, Maltego, Google searches, and malware sandboxes that can be leveraged to gather technical information about targets, infrastructure, and indicators of compromise. The document also emphasizes the importance of automation and privacy when conducting OSINT research to enhance attacks or strengthen defenses.
In an era of algorithms and highly personalized recommendations, anything that is unavailable as data is very unlikely to be found or recommended. Whereas other industries have long made their contents readily discoverable by machines, the live performance sector lags behind. Linked open data could enable performing arts organizations to catch up. Together.
The document discusses the Digital Object Identifier (DOI) system. Some key points:
- DOI provides persistent identifiers for content on digital networks, governed by the International DOI Foundation. It is implemented through Registration Agencies that allocate prefixes and register DOI names.
- DOIs have a prefix-suffix syntax (e.g. doi:10.314/56789) and can resolve to metadata and services about the associated entity. This metadata can describe relationships and provide additional discovery capabilities.
- The system aims to enable persistent access and citation of digital resources through long-term identifier resolution and curation. It has growing coverage of academic publications, research datasets, and other content types.
Shibboleth: Open Source Distributed Authentication and AuthorizationGlen Newton
This document provides an overview of Shibboleth, an open source system for distributed authentication and authorization. It discusses how Shibboleth addresses issues related to resource users accessing resources across domains, such as single sign-on and increased privacy. It also compares Shibboleth to competing systems like Liberty Alliance and Microsoft Passport. Key points are that Shibboleth is based on attribute sharing between organizations in a federated model, while maintaining user privacy. It has been implemented by many universities and research organizations.
Hacktrikz - Introduction to Information Security & Ethical HackingRavi Sankar
This is a basic seminar presentation which gives an introduction to Information security & Ethical Hacking. This features some basic demos of ethical hacking & explains about some career oppurtunities in this feild.
The traditional process of achieving metadata standards has failed, and I know what I’m talking about because of Dublin Core, BagIt, Z39.50, URLs, and ARKs.
We must think outside the box or we will keep failing. YAMZ (Yet Another Metadata Zoo) is not a standard. Instead it is a dictionary of terms, some fixed and others still evolving, that are meant to be selectively referenced by future standards. Terms are otherwise decoupled from standards that reference them. Each term is a kind of nano-specification with a unique persistent identifier that tracks the term from evolving to mature to deprecated.
Smart Bombs: Mobile Vulnerability and ExploitationSecureState
This document discusses common vulnerabilities found in mobile applications. It begins by outlining the types of sensitive data stored on mobile devices and used by mobile apps. It then covers tools for analyzing the file system, application layer, and transport layer of mobile apps. Specific vulnerabilities are highlighted from the OWASP Mobile Top 10 list, including insecure data storage, weak server-side controls, and insufficient transport layer protection. Examples of vulnerabilities found in popular apps like Facebook, Evernote, MyFitnessPal, and LinkedIn are provided. The document concludes by emphasizing that mobile security issues go beyond just application vulnerabilities.
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
Cloud-based file sharing and collaboration solutions are ripe for the picking, but what’s right for one organization might not be right for another. Accellion presented the pros and cons of various cloud computing choices at the InfoSec World 2013 Conference & Expo last month. To learn more about the top cloud considerations for file sharing and collaboration and to find out where you stand on the privacy and public cloud debate, check out this presentation entitled ”Do You Know Where Your Data Is?
Nextcloud provides file sharing and collaboration capabilities. The presenter discusses their vision for ethical artificial intelligence, including their work on an open source AI assistant for Nextcloud called Nextcloud Assistant. The presenter advocates for open source and local AI that respects privacy, is non-discriminatory, and has a low carbon footprint. They argue an evolved open source definition is needed to ensure AI models and training data are also available under open terms.
Decentralised identifiers for CLARIAH infrastructure vty
Slides of the presentation for CLARIAH community on the ideas how to make controlled vocabularies sustainable and FAIR (Findable, Accessible, Interoperable, Reusable) with the help of Decentralized Identifiers (DIDs).
Slides for the iDB summer school (Sapporo, Japan) http://db-event.jpn.org/idb2013/
Typically, Web mining approaches have focused on enhancing or learning about user seeking behavior, from query log analysis and click through usage, employing the web graph structure for ranking to detecting spam or web page duplicates. Lately, there's a trend on mining web content semantics and dynamics in order to enhance search capabilities by either providing direct answers to users or allowing for advanced interfaces or capabilities. In this tutorial we will look into different ways of mining textual information from Web archives, with a particular focus on how to extract and disambiguate entities, and how to put them in use in various search scenarios. Further, we will discuss how web dynamics affects information access and how to exploit them in a search context.
This presentation was provided by Don Hamparian of OCLC during the two day NISO Live Connections event, Digital Libraries: Authentication, Access and Security of Information Resources, held on May 22-23, 2018 in Baltimore, MD.
Large Scale Search, Discovery and Analytics in ActionGrant Ingersoll
The document discusses large scale search, discovery, and analysis. It describes how search has evolved beyond basic keyword search to require a holistic view of both user data and user interactions. It provides examples of use cases where advanced search, discovery, and analytics can provide insights from large amounts of data. Key challenges discussed include balancing performance, relevance, and operations across computation and storage systems.
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Sean Whalen
Respond proactively to threats like a defense contractor. It’s more realistic than you might think!
A practical guide of how to build intelligence-driven cyber defenses using open source software, based on real implementations of best practices, adapted from the Lockheed Martin Cyber Kill Chain model.
This document discusses reasons for disliking digital forensics and identifies areas for improvement. It begins by introducing the author's background and motivation. The document then examines issues with naming conventions, tools/practices, standards/definitions, training/certification, and subfields. Key problems highlighted include a lack of standardization, compatibility issues between tools, outdated mindsets, and insufficient computing foundations in training. The author advocates treating digital forensics as an engineering science and applying best computing practices. Overall, the document critically analyzes challenges currently facing the field and questions how these issues may impact the future if not addressed.
Building a global listening platform with Solr presents technical and global challenges. The speaker will demonstrate a platform they built in 3 months using Solr and Basis Technology products for content acquisition, analysis including language identification and entity extraction, and search visualization. Key aspects include distributed processing pipelines for analysis, language-specific indexing, and dashboard interfaces beyond basic search results.
The document provides an agenda and introduction for a two-day software design training.
Day 1 covers introduction to software design principles, object oriented concepts and design, and evaluating software design. Day 2 covers software design patterns and clean code.
The introduction defines software design, contrasts it with architecture and coding, and outlines principles of software design such as SOLID and DRY. It also discusses software design considerations, modeling, and checkpoints. Later sections explain object oriented concepts, design principles including GRASP, and techniques for evaluating design quality.
On digital object identifiers for research publication, presented virtually at the Eko Konnect Users Conference, Lagos, Nigeria on January 25, 2023.
The slides contains useful basic information about DOI and a use case that would be relevant to anyone who wants to understand this onerous scholarly communication digital infrastructure.
An overview of the results of the 2021 FIAT/IFTA Timeline Survey, as presented by Adrienne Warburton during the 2021 FIAT/IFTA World Conference (online).
The FIAT/IFTA Most Wanted List may be a new initiative of FIAT/IFTA. The aim is to create a central hub of Most Wanted Lists, provided by broadcast and audiovisual archives worldwide.
On these lists we would put those programmes, media fragments, excerpts or even complete series that archives are desperately looking for. Via a contact button, other archives could put themselves in contact with the archive that has published its list, in order to to signal a possible trouvaille.
All further explanations and a link to a survey to measure the interest are in this presentation.
More Related Content
Similar to Drewry universal identifiers throughout production chain, overview and interoperability
In an era of algorithms and highly personalized recommendations, anything that is unavailable as data is very unlikely to be found or recommended. Whereas other industries have long made their contents readily discoverable by machines, the live performance sector lags behind. Linked open data could enable performing arts organizations to catch up. Together.
The document discusses the Digital Object Identifier (DOI) system. Some key points:
- DOI provides persistent identifiers for content on digital networks, governed by the International DOI Foundation. It is implemented through Registration Agencies that allocate prefixes and register DOI names.
- DOIs have a prefix-suffix syntax (e.g. doi:10.314/56789) and can resolve to metadata and services about the associated entity. This metadata can describe relationships and provide additional discovery capabilities.
- The system aims to enable persistent access and citation of digital resources through long-term identifier resolution and curation. It has growing coverage of academic publications, research datasets, and other content types.
Shibboleth: Open Source Distributed Authentication and AuthorizationGlen Newton
This document provides an overview of Shibboleth, an open source system for distributed authentication and authorization. It discusses how Shibboleth addresses issues related to resource users accessing resources across domains, such as single sign-on and increased privacy. It also compares Shibboleth to competing systems like Liberty Alliance and Microsoft Passport. Key points are that Shibboleth is based on attribute sharing between organizations in a federated model, while maintaining user privacy. It has been implemented by many universities and research organizations.
Hacktrikz - Introduction to Information Security & Ethical HackingRavi Sankar
This is a basic seminar presentation which gives an introduction to Information security & Ethical Hacking. This features some basic demos of ethical hacking & explains about some career oppurtunities in this feild.
The traditional process of achieving metadata standards has failed, and I know what I’m talking about because of Dublin Core, BagIt, Z39.50, URLs, and ARKs.
We must think outside the box or we will keep failing. YAMZ (Yet Another Metadata Zoo) is not a standard. Instead it is a dictionary of terms, some fixed and others still evolving, that are meant to be selectively referenced by future standards. Terms are otherwise decoupled from standards that reference them. Each term is a kind of nano-specification with a unique persistent identifier that tracks the term from evolving to mature to deprecated.
Smart Bombs: Mobile Vulnerability and ExploitationSecureState
This document discusses common vulnerabilities found in mobile applications. It begins by outlining the types of sensitive data stored on mobile devices and used by mobile apps. It then covers tools for analyzing the file system, application layer, and transport layer of mobile apps. Specific vulnerabilities are highlighted from the OWASP Mobile Top 10 list, including insecure data storage, weak server-side controls, and insufficient transport layer protection. Examples of vulnerabilities found in popular apps like Facebook, Evernote, MyFitnessPal, and LinkedIn are provided. The document concludes by emphasizing that mobile security issues go beyond just application vulnerabilities.
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
Cloud-based file sharing and collaboration solutions are ripe for the picking, but what’s right for one organization might not be right for another. Accellion presented the pros and cons of various cloud computing choices at the InfoSec World 2013 Conference & Expo last month. To learn more about the top cloud considerations for file sharing and collaboration and to find out where you stand on the privacy and public cloud debate, check out this presentation entitled ”Do You Know Where Your Data Is?
Nextcloud provides file sharing and collaboration capabilities. The presenter discusses their vision for ethical artificial intelligence, including their work on an open source AI assistant for Nextcloud called Nextcloud Assistant. The presenter advocates for open source and local AI that respects privacy, is non-discriminatory, and has a low carbon footprint. They argue an evolved open source definition is needed to ensure AI models and training data are also available under open terms.
Decentralised identifiers for CLARIAH infrastructure vty
Slides of the presentation for CLARIAH community on the ideas how to make controlled vocabularies sustainable and FAIR (Findable, Accessible, Interoperable, Reusable) with the help of Decentralized Identifiers (DIDs).
Slides for the iDB summer school (Sapporo, Japan) http://db-event.jpn.org/idb2013/
Typically, Web mining approaches have focused on enhancing or learning about user seeking behavior, from query log analysis and click through usage, employing the web graph structure for ranking to detecting spam or web page duplicates. Lately, there's a trend on mining web content semantics and dynamics in order to enhance search capabilities by either providing direct answers to users or allowing for advanced interfaces or capabilities. In this tutorial we will look into different ways of mining textual information from Web archives, with a particular focus on how to extract and disambiguate entities, and how to put them in use in various search scenarios. Further, we will discuss how web dynamics affects information access and how to exploit them in a search context.
This presentation was provided by Don Hamparian of OCLC during the two day NISO Live Connections event, Digital Libraries: Authentication, Access and Security of Information Resources, held on May 22-23, 2018 in Baltimore, MD.
Large Scale Search, Discovery and Analytics in ActionGrant Ingersoll
The document discusses large scale search, discovery, and analysis. It describes how search has evolved beyond basic keyword search to require a holistic view of both user data and user interactions. It provides examples of use cases where advanced search, discovery, and analytics can provide insights from large amounts of data. Key challenges discussed include balancing performance, relevance, and operations across computation and storage systems.
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Sean Whalen
Respond proactively to threats like a defense contractor. It’s more realistic than you might think!
A practical guide of how to build intelligence-driven cyber defenses using open source software, based on real implementations of best practices, adapted from the Lockheed Martin Cyber Kill Chain model.
This document discusses reasons for disliking digital forensics and identifies areas for improvement. It begins by introducing the author's background and motivation. The document then examines issues with naming conventions, tools/practices, standards/definitions, training/certification, and subfields. Key problems highlighted include a lack of standardization, compatibility issues between tools, outdated mindsets, and insufficient computing foundations in training. The author advocates treating digital forensics as an engineering science and applying best computing practices. Overall, the document critically analyzes challenges currently facing the field and questions how these issues may impact the future if not addressed.
Building a global listening platform with Solr presents technical and global challenges. The speaker will demonstrate a platform they built in 3 months using Solr and Basis Technology products for content acquisition, analysis including language identification and entity extraction, and search visualization. Key aspects include distributed processing pipelines for analysis, language-specific indexing, and dashboard interfaces beyond basic search results.
The document provides an agenda and introduction for a two-day software design training.
Day 1 covers introduction to software design principles, object oriented concepts and design, and evaluating software design. Day 2 covers software design patterns and clean code.
The introduction defines software design, contrasts it with architecture and coding, and outlines principles of software design such as SOLID and DRY. It also discusses software design considerations, modeling, and checkpoints. Later sections explain object oriented concepts, design principles including GRASP, and techniques for evaluating design quality.
On digital object identifiers for research publication, presented virtually at the Eko Konnect Users Conference, Lagos, Nigeria on January 25, 2023.
The slides contains useful basic information about DOI and a use case that would be relevant to anyone who wants to understand this onerous scholarly communication digital infrastructure.
Similar to Drewry universal identifiers throughout production chain, overview and interoperability (20)
An overview of the results of the 2021 FIAT/IFTA Timeline Survey, as presented by Adrienne Warburton during the 2021 FIAT/IFTA World Conference (online).
The FIAT/IFTA Most Wanted List may be a new initiative of FIAT/IFTA. The aim is to create a central hub of Most Wanted Lists, provided by broadcast and audiovisual archives worldwide.
On these lists we would put those programmes, media fragments, excerpts or even complete series that archives are desperately looking for. Via a contact button, other archives could put themselves in contact with the archive that has published its list, in order to to signal a possible trouvaille.
All further explanations and a link to a survey to measure the interest are in this presentation.
This document presents the results of a survey conducted by the FIAT/IFTA Media Management Commission to understand where member organizations are on the digital archiving timeline. The survey asked about preservation formats, content management systems, access methods, metadata creation, and public connections. 79 organizations responded, mostly broadcasters and audiovisual archives. The results show most have transferred files to mass storage, use digital asset management systems, provide online access, and feature content on websites and social media. The document compares 2020 responses to previous years.
As presented by Johan Oomen (Sound an Vision) and Vasilis Mezaris (Information Technologies Institute Thessaloniki) at the 2019 FIAT/IFTA World Conference in Dubrovnik, Croatia.
BUCHMAN Digitisation of quarter inch audio tapes at DR (FRAME Expert)FIAT/IFTA
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
CULJAT (FRAME Expert) Public procurement in audiovisual digitisation at RTÉFIAT/IFTA
This document discusses procurement rules and approaches for converting physical archive media like tapes, films, and collections into a digital archive. It considers two approaches: conducting digitization in-house versus outsourcing. It also covers national and EU tendering processes, different types of procurement competitions, and factors to consider like internal resources and timelines, technical specifications, and supplier capabilities and costs. The goal is to establish the most efficient and compliant approach to digitizing a large physical archive collection.
HULSENBECK Value Use and Copyright Comission initiativesFIAT/IFTA
The document discusses concepts related to copyright including value, use, creative reuse, intellectual property rights, open access, and the Value, Use & Copyright Commission (VUC). It provides links to external resources on copyright including flowcharts and case studies. The document poses questions about these copyright-related topics.
This document discusses the challenges and benefits of digitizing a film archive. It notes that the challenges of digitizing include a lack of funding, film handling skills, and local telecine facilities, as well as unreliable metadata and unsuitable equipment. However, the benefits would include increased access and reuse of the archive, improved search capabilities, preservation of fragile originals, improved collection building, and development of film skills.
LORENZ Building an integrated digital media archive and legal depositFIAT/IFTA
The document discusses building an integrated digital media archive and legal deposit system for preserving film and video assets in Slovenia. It summarizes the requirements presented by Vladimir Torov from the Ministry of Justice in Slovenia, which include analyzing the current analog system, choosing standards, identifying hardware and software solutions, and creating workflows. The key requirements are for hardware like high-end servers and film scanners, and customized software for a media asset management system, flexible workflow system, quality control checks, and user rights management. The presentation then discusses how Cube-Tec can provide solutions to meet these requirements, including verification of assets and metadata, a web-based media player, database import/export, and a flexible workflow system.
CANTU VT is TV The History of Argentinian Video Art and Television Archives P...FIAT/IFTA
This document discusses the history of video art and television in Argentina, mentioning several important figures and events. It references the dictatorship of Augusto Pinochet in Chile and the military dictatorship in Argentina led by General Leopoldo Galtieri. It also lists several Argentine video artists and their works that helped establish video art as a new form of creative expression during this political period.
Over 8 million people in Western Europe are living with dementia. Music has been described as "the profoundest nonchemical medication" by Oliver Sacks. The document discusses using music and reminiscence work to help those with dementia, as well as a goal for everyone with dementia in the UK to have access to music by 2020. It also considers how television and radio archives can support this by improving lives through their archived content and partnerships.
PERVIZ Automated evolvable media console systems in digital archivesFIAT/IFTA
Al Jazeera Media Network has a large daily influx of content that needs to be ingested and stored in their central archive. They are implementing automated and AI-based media console systems to help manage this content more efficiently. The systems will use machine learning to analyze videos, enrich metadata, and translate scripts and text. This will help improve content discovery, retrieval and accessibility across Al Jazeera's many language channels and platforms.
LYCKE Artificial intelligence, hype or hope?FIAT/IFTA
This document discusses the potential for using artificial intelligence to help manage an archive of media content at VRT, a Belgian public broadcaster. It notes that the archive department is facing budget cuts and growing amounts of content to archive. It considers using AI for tasks like speech recognition to generate metadata for older content lacking it. While AI could create metadata quickly without human effort, challenges include the quality of AI-generated metadata and needing to train models on archive-specific data. The conclusion is that AI shows both hype and hope for archives - it may help with searchability over time with focused use cases, but will require experimentation and expertise to apply effectively for the archive's needs.
AZIZ BABBUCCI Let's play with the archiveFIAT/IFTA
RSI is developing an augmented reality mobile application called RSI ARchive to provide access to archival audiovisual content from RSI in a novel way. Using AR and GPS technologies, the app will allow users to discover contextually relevant archival content linked to their real-world location. Metadata including titles, descriptions and coordinates will offer users an enriched experience of exploring the archival materials and learning about the history of different regions. The goals are to strengthen the connection between archival content and locations, make quality historical content accessible, and enable new collaborations with partners such as in tourism and museums.
Generative Classifiers: Classifying with Bayesian decision theory, Bayes’ rule, Naïve Bayes classifier.
Discriminative Classifiers: Logistic Regression, Decision Trees: Training and Visualizing a Decision Tree, Making Predictions, Estimating Class Probabilities, The CART Training Algorithm, Attribute selection measures- Gini impurity; Entropy, Regularization Hyperparameters, Regression Trees, Linear Support vector machines.
We are pleased to share with you the latest VCOSA statistical report on the cotton and yarn industry for the month of May 2024.
Starting from January 2024, the full weekly and monthly reports will only be available for free to VCOSA members. To access the complete weekly report with figures, charts, and detailed analysis of the cotton fiber market in the past week, interested parties are kindly requested to contact VCOSA to subscribe to the newsletter.
Did you know that drowning is a leading cause of unintentional death among young children? According to recent data, children aged 1-4 years are at the highest risk. Let's raise awareness and take steps to prevent these tragic incidents. Supervision, barriers around pools, and learning CPR can make a difference. Stay safe this summer!
We are pleased to share with you the latest VCOSA statistical report on the cotton and yarn industry for the month of March 2024.
Starting from January 2024, the full weekly and monthly reports will only be available for free to VCOSA members. To access the complete weekly report with figures, charts, and detailed analysis of the cotton fiber market in the past week, interested parties are kindly requested to contact VCOSA to subscribe to the newsletter.
2. MovieLabs Confidential 2
What this will cover
• Who we are
• What’s an identifier?
• The EIDR identifier system
• Example EIDR applications
• Questions
3. MovieLabs Confidential 3
MOVIELABS FOCUS AREAS
PROPRIETARY & CONFIDENTIAL 3
NEW TECH
R&D
PRODUCTION
TECHNOLOGY
NEXT GEN
FORMATS
CONTENT
PROTECTION
BUSINESS
INTELLIGENCE
DISTRIBUTION
SUPPLY CHAIN
Drive innovation toward tangible solutions that help Hollywood transition to the next generation of production technologies,
distribution platforms and content experiences
4. MovieLabs Confidential 4
EIDR focus areas
• Identifiers
• for audiovisual content
• For video service networks
• Helping people use those identifiers
4
6. MovieLabs Confidential 6
What’s an identifier?
• It’s just a name for something
• Raven, ‘Fanny and Alexander’, Mercury
• Many (most?) things have more than one name
• Raven: Corvis Corax, swan of battle
• ‘Fanny and Alexander’: ‘Fanny och Alexander’
• Some names are ambiguous
• Mercury: Roman god, planet, chemical element, a car made by Ford
• The name itself may not have enough information to know what the name is naming
• Tin’s periodic table name is Sn
• Names can be more or less precise, depending on circumstances
• ‘Dog’ vs ‘Poodle’ vs ‘Miniature poodle’
• People have been dealing with this for a long, long time
• Dictionaries and other reference works
• Binomial naming of species
• Periodic table
• Library call numbers
7. MovieLabs Confidential 7
Why are identifiers so important now?
• The world is more connected via computer networks
• Efficiency makes computers faster and more reliable
• Ambiguity generates inefficiency and errors
• Examples in audiovisual
• Are ‘The Philosopher’s Stone’ and ‘Harry Potter 1’ the same?
• Is ‘The Simpsons: Working Mom’ the same as ‘S30E7’ or ‘Werking
Mom’?
• ‘My Neighbor Totoro’ has at least two different English dubs
• Computer-based or computer-mediated communication doesn’t
work well with this
8. MovieLabs Confidential 8
What makes a good identifier?
• The identifier is unique with its context
• In that environment, one name for one thing
• The same identifier can mean something different in different contexts
• In one system, ’42’ is ‘When Harry Met Sally’ and in another it’s ‘Love and Death’
• The identifier has the right granularity
• Name what you care about
• The identifier’s level of detail has to work for the applications that use it
• There are multiple versions of Blade Runner.
• In some systems they all share the same identifier, and in some they’re all different
• The identifier is resolvable
• Get underlying information that tells you what it is, not just its name
• Non-resolvable identifiers can be useful too
• The identifier should link to other identifiers
• Provide a way of working with systems that use something else
9. MovieLabs Confidential 9
Is that enough?
• ‘Unique in context’ solves the one name for one thing problem
• ‘Right granularity’ solves the naming of versions, variants, and
related things
• ‘Resolvable’ solves the problem of finding out what the name
means
• ‘Link to other identifiers’ solves interacting with items that may
use some other naming scheme
• …so at the philosophical level, it works
• What about the practical world?
11. MovieLabs Confidential 11
What is EIDR? Technical view
• A unique identifier for audiovisual works and their versions
• With an API for accessing it
• Enough descriptive metadata to distinguish one work from another
• Different episodes of a Series, remakes, director’s cuts, dubbed languages,
etc
• Different requirements at different levels of the hierarchy
• Factual, not interpretive = no genres or plot summaries, e.g.
• Links to other EIDR IDs
• Containing Series, original abstract work, items included in a retail
compilation, etc
• We try pretty hard to make this concrete, not marketing or opinion
• External identifiers
• If they’re resovable, provide the link too
• Optional relationship (SameAs, DerivedFrom, ContainsAllOf, etc)
12. MovieLabs Confidential 12
What is EIDR? Governance and social view
• A central online registry open to everyone
• Free to resolve for any one
• Web UI or by machine
• Free and unlimited registrations for members
• Non-members can register through services provided by members
• Not for Profit, IP Neutral
• Globally, members include
• Studios
• Broadcasters
• Digital service providers
• Archives and academic institutions
• Metadata providers
• Standards bodies
• Infrastructure and service providers
13. MovieLabs Confidential 13
Who is EIDR?
[EIDR uses curated crowdsource metadata from its trusted Participant
organizations.]
18. MovieLabs Confidential 18
EIDR Identifier structure
• An ISO-standard Digital Object Identifier (DOI) Registry
[ISO 26324:2012 | www.doi.org]
• Content ID: A unique ID for audiovisual works, versions, and encodings
• Video Service ID: A unique ID for content delivery services
21. MovieLabs Confidential 21
Basics: Cataloguing and Connectivity
• Registering for an identifier forces you to think about your own
data and models
• Can find opportunities, mistakes, hidden gems
• A shared, linked identifier makes it easier to
• Get data in from other sources
• Send data and content out to ther places
• Collaborate (commercially or otherwise)
• The following example is theatrical, but the paper describes a
broadcast example
22. MovieLabs Confidential 22
This Modern Age
• The Rank Organisation’s answer (1946-1954) to The March of Time
(by Time, Inc.)
• Not the 1931 MGM film (that’s https://doi.org/10.5240/DE76-BA99-3701-6237-
6BCE-I )
• ITV has most of the Rank catalogue; BFI has some of it; CITWF has metadata
for some of it
• All three had partial data
• Combining data from all the sources in the EIDR records gives better overall
information
• All parties can update their records when they want to
• And they can also talk to each other about possible collaborations
• Re-release with supplemental material from BFI, e.g.
• Should also make later researchers’ lives easier
• See https://doi.org/10.5240/E051-49A0-94DB-28CC-9F5F-Z for the results
23. MovieLabs Confidential 23
Using identifiers
• In the previous example, the act of getting the identifiers created
value
• That happens more often than you might think
• More commonly, an identifier’s value comes frm the uses
• EIDR IDs are used in many kinds of applications…
• …which depend on EIDR following the rules of good identifiers
25. MovieLabs Confidential 25
Digital Distribution
• Getting digital assets from a rights holder to a consumer is
complicated
• Using identifiers reduces or removes many problems
• Makes it easier to tie together extras, interactivity, etc
• MDDF is a MovieLabs-led standard way of doing this
28. MovieLabs Confidential 28
• The official definition (from Tim Berners-Lee) is:
1. Use URIs to name (identify) things.
2. Use HTTP URIs so that these things can be looked up (interpreted,
"dereferenced").
3. Provide useful information about what a name identifies when it's
looked up, using open standards such as RDF, SPARQL, etc.
4. Refer to other things using their HTTP URI-based names when
publishing data on the Web.
• This is forward-looking, and visionary, and all that good stuff
• The current world is different
What does Linked Data mean (officially)?
29. MovieLabs Confidential 29
Linked Data and Ontologies, workably
• But the core of the definition is
• Following /resolving identifiers to get to more stuff
• Returning data in a standard way
• So MovieLabs built an ontology
• Forced us to think about the model and the vocabulary
• Much more data that the basic stuff in EIDR
• Treat provenance as an essential item
• Heavy emphasis on which country or region the data applies to/came from
• Implementations
• Start with EIDR IDs
• Follow the alternate identifiers for more data
• Transform that data into the ontology’s structure
30. MovieLabs Confidential 30
What can we use it for?
• Connecting lots of large data sets
• Some with specialized information
• A place to keep data that is generated in other ways
• Machine learning
• Annotations
• Scene-level connections
• Use the data
• We did an analysis of genre across four different genre sets
• Compared the sets to each other
• Did some machine learning on implicit ve explicit genre
• May analyse regional differences next
• Possible because the information is available in a standard form, so different sources
can be compared, used together, etc
• Other applications
• Business analytics
• Character tracking of ‘public characters (Sherlock Holmes, Dracula, Robin Hood,….)
• Insights into management of large franchises
• See also LUCID project in a couple of slides
32. MovieLabs Confidential 32
And others
• TAXI/OBID
• SMPTE spec for binding identifiers at multiple levels of granularity to a stream
• Initial use for audience measuremen,t lot sof other uses
• LUCID
• Project at UCL for rights determination based on machine learning
• Uses ontology based on EIDR and linked identifiers to find contirbutors
• Copyright Hub
• Uses EIDR and ARDI (DOI-based rights statement)
• Ties rights to content via identifier, video fingerprinting, etc
• Makes rights discoverable on th internet
• Academic citations
• Music cue sheets
• Use in other standards
• IMF, other SMPTE standards, MARC, …
34. MovieLabs Confidential 34
A personal view (or, what I wanted)
• Coverage of a wide range of works from global sources (excluding user-
generated content for now)
• Appropriate granularity of identification (covering the abstract concept
of an underlying work and all its many variations)
• Reliable, free access to the identifiers and their metadata (i.e. the
identifiers are resolvable, and anyone can use them)
• Connection to other data sources (information from multiple sources is
more powerful than information from any single source)
• A knowledgeable, engaged user community to help populate the
database (crowd-sourced with a curated crowd.)
• Ease of integration with and use by other pieces of software - databases
aren’t very useful if no one uses them. A UI is just another application.
• Economic viability – cheap is good, and persistence requires longevity,
which requires money
35. MovieLabs Confidential 35
What is EIDR – spiffy marketing version
EIDR Technology Summary
•Interoperable, standards-based infrastructure
•Built on ISO Digital Object Identifier (DOI)
standard
•Application integration through public APIs and
schemas, freely available SDK for members
•Efficient infrastructure for new and existing
applications
EIDR Purpose
•Make digital distribution competitive
•Help reduce costs
•Improve collaboration and automation across
multiple application domains & platforms
•Enable new businesses and create new
efficiencies
What EIDR is
•Global registry for unique identification of movie
and TV content
•Designed for automated machine-to-machine
communication
•Flexible data hierarchy down to the product &
version level, incl. edits, clips, composites,
encodings, and relationships
What EIDR is Not
•Profit-making
•Rich commercial metadata
•Ownership or rights information
•US-only
35
36. MovieLabs Confidential 36
Getting it right – double-shot movies
• Some movies aren’t dubbed
• Scenes are re-shot at more or less the same time in a different
language sometimes with some of the actors different
• These aren’t edits of the same movie – they meet the definition
of a separate work
• Common in the 1930s
• Still done for some Indian productions (Tamil/Hindi, for example)
37. MovieLabs Confidential 37
Double-shot examples
• https://doi.org/10.5240/BD8D-8F89-8F75-FE28-7010-M
• Murder! 1930 GB Double-shot in English (this version) and German.
• https://doi.org/10.5240/C264-EC88-AFA1-2EC2-9B28-Z
• Mary 1931 GB DE Double-shot in English and German (this version).
• https://doi.org/10.5240/1388-8D7E-42D2-7147-D5DB-L
• S.O.S Iceberg 1933 US DE Double-shot in German and English (this version).
• https://doi.org/10.5240/9162-6940-4DC3-ABF9-A67B-0
• S.O.S. Eisberg 1933 DE US Double-shot in English and German (this version).
• https://doi.org/10.5240/C97B-42DD-BF23-B3FF-4A8B-9
• Raavan 6/18/2010 IN Shot simultaneously with the Tamil-language version, Raavanan.
• https://doi.org/10.5240/F635-4E44-475B-158B-9FF4-Z
• Raavanan 6/18/2010 IN Shot simultaneously with the Hindi-language version, Raavan.
• https://doi.org/10.5240/13D5-090F-CA5A-A590-CE47-5
• Mumbai Express 4/15/2005 IN Double-shot in Hindi (this version) and Tamil.
• https://doi.org/10.5240/2492-A8ED-46AE-7631-40F1-H
• Mumbai Express 4/15/2005 IN Double-shot in Hindi and Tamil (this version).
39. MovieLabs Confidential 39
● CIMM (Coalition for Innovative Media Measurement)
○ TAXI: Trackable Asset Cross-Platform Identification
● SMPTE (Society of Motion Picture & Television Engineers)
○ OBID: Open Binding of IDs (ST 2112-10)
■ EIDR Content IDs for programs
■ Ad-IDs for commercials
○ OBID-TLC: OBID-Time Labels to Content (ST 2112-20)
■ EIDR Video Service IDs for delivery channels
CIMM TAXI / SMPTE OBID
40. MovieLabs Confidential 40
• For the same piece of content...
– Producers can add an EIDR Abstraction ID
– Distributors can add their EIDR Edit ID
– Broadcasters/Retailers can add their EIDR
Manifestation ID plus EIDR Video Service ID
• All four EIDR IDs can be detected at playout
• Detection at device-level or acoustically
• Acoustic detection verified for ATSC 3.0
Layering OBID Watermarks
41. MovieLabs Confidential 41
Applications of TAXI/OBID
• Improve speed, accuracy, and accountability os measurement
• Better second screen integration
• Track assets across media platforms