Start Today: Digital Stewardship Communities & CollaborationsTrevor Owens
The increasingly digital records of our communities and our organizations require all of us to become digital stewardship and digital preservation practitioners. The challenge seems daunting but the good news is we don’t have to do it alone. A distributed network of practitioners and learners across the country are increasingly finding ways to learn together and share and pool their resources to tackle these challenges and provide enduring access to our digital heritage. Owens’ talk will provide examples of how archivists are rising to the challenge and practical guidance for both digital preservation beginners and experts.
Make it Last: Principals for Digital Preservation and ConservationTrevor Owens
The document provides an overview of principles for digital preservation and conservation from a guest lecture given by Trevor Owens. It defines digital preservation as working to ensure enduring access to digital content. It then outlines 16 axioms of digital preservation, such as institutions being key enablers of long-term preservation and how digital preservation requires ongoing work and resources. It concludes with six practical steps anyone can take to start improving digital preservation efforts.
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...Natasha Khramtsovsky
Презентация доклада д-ра Лючианы Дюранти о проблемах обеспечения аутентичности электронных документов и доверия к ним, а также о руководимом ею новом международном проекте InterPARES Trust. Презентация была подготовлена к организованному компанией "Электронные Офисные Системы" семинару в Москве 23 сентября 2013 года. Расширенная версия содержит значительное количество дополнительных материалов и предназначена для более глубокого ознакомления участников семинара с рассматриваемыми на нём вопросами.
Presentation of Dr. Luciana Duranti (Director, Centre for the International Study of Contemporary Records and Archives, University of British Columbia; Director, InterPARES Trust project) on the authenticity and trust in electronic environment and on InterPARES Trust project. The presentation was prepared for the seminar in Moscow on September 23, 2013. The extended version contains numerous additional materials which are helpful for deeper understanding of the issues in question.
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignDr. Ann Cavoukian
1. Ann Cavoukian argues that privacy and data analytics can co-exist through strong de-identification of data and embedding privacy into new technologies from the start.
2. She proposes replacing "versus" thinking with "and" thinking to create win-win scenarios where privacy and data analytics are not at odds.
3. Cavoukian outlines seven foundational principles for Privacy by Design that proactively embed privacy into the design of new technologies and business practices from the outset.
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...Dana Gardner
A transcript of a discussion on how comprehensive cloud security solutions need to go beyond on-premises threat detection and remediation to significantly strengthen extended digital business workflows.
This document discusses cloud computing and its applications in libraries. It begins by outlining the basic functions of libraries in providing organized collections and access to information for users. It then discusses how libraries are moving towards digital access and remote access beyond physical boundaries. The document outlines several cloud computing models including private, public, hybrid and community clouds. It discusses how libraries can utilize infrastructure, platform and software as a service models of cloud computing. Finally, it provides examples of existing cloud library services like OCLC, Library Thing, Reed Elsevier and Kindle that leverage cloud computing.
Start Today: Digital Stewardship Communities & CollaborationsTrevor Owens
The increasingly digital records of our communities and our organizations require all of us to become digital stewardship and digital preservation practitioners. The challenge seems daunting but the good news is we don’t have to do it alone. A distributed network of practitioners and learners across the country are increasingly finding ways to learn together and share and pool their resources to tackle these challenges and provide enduring access to our digital heritage. Owens’ talk will provide examples of how archivists are rising to the challenge and practical guidance for both digital preservation beginners and experts.
Make it Last: Principals for Digital Preservation and ConservationTrevor Owens
The document provides an overview of principles for digital preservation and conservation from a guest lecture given by Trevor Owens. It defines digital preservation as working to ensure enduring access to digital content. It then outlines 16 axioms of digital preservation, such as institutions being key enablers of long-term preservation and how digital preservation requires ongoing work and resources. It concludes with six practical steps anyone can take to start improving digital preservation efforts.
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...Natasha Khramtsovsky
Презентация доклада д-ра Лючианы Дюранти о проблемах обеспечения аутентичности электронных документов и доверия к ним, а также о руководимом ею новом международном проекте InterPARES Trust. Презентация была подготовлена к организованному компанией "Электронные Офисные Системы" семинару в Москве 23 сентября 2013 года. Расширенная версия содержит значительное количество дополнительных материалов и предназначена для более глубокого ознакомления участников семинара с рассматриваемыми на нём вопросами.
Presentation of Dr. Luciana Duranti (Director, Centre for the International Study of Contemporary Records and Archives, University of British Columbia; Director, InterPARES Trust project) on the authenticity and trust in electronic environment and on InterPARES Trust project. The presentation was prepared for the seminar in Moscow on September 23, 2013. The extended version contains numerous additional materials which are helpful for deeper understanding of the issues in question.
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignDr. Ann Cavoukian
1. Ann Cavoukian argues that privacy and data analytics can co-exist through strong de-identification of data and embedding privacy into new technologies from the start.
2. She proposes replacing "versus" thinking with "and" thinking to create win-win scenarios where privacy and data analytics are not at odds.
3. Cavoukian outlines seven foundational principles for Privacy by Design that proactively embed privacy into the design of new technologies and business practices from the outset.
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...Dana Gardner
A transcript of a discussion on how comprehensive cloud security solutions need to go beyond on-premises threat detection and remediation to significantly strengthen extended digital business workflows.
This document discusses cloud computing and its applications in libraries. It begins by outlining the basic functions of libraries in providing organized collections and access to information for users. It then discusses how libraries are moving towards digital access and remote access beyond physical boundaries. The document outlines several cloud computing models including private, public, hybrid and community clouds. It discusses how libraries can utilize infrastructure, platform and software as a service models of cloud computing. Finally, it provides examples of existing cloud library services like OCLC, Library Thing, Reed Elsevier and Kindle that leverage cloud computing.
On one side, they’re arguably the most important task of every
IT professional. Protecting your company’s most critical data
really means protecting your company itself, and therefore your
own livelihood. But on the other side, backups are so often
accomplished using technology that hasn’t evolved much past
the reel-to-reel days. In 2010, most IT organizations still find
themselves clinging desperately to ancient tape-based technologies;
technologies that indeed back up data, but do so slowly,
painfully, and sometimes with catastrophic failure.
EDF2013: Keynote Stefan Decker: Big Data In Ireland - Linked Data and beyondEuropean Data Forum
Keynote of Stefan Decker, Professor for Digital Enterprise & Director of DERI, National University of Ireland, Galway, at the European Data Forum 2013, 9 April 2013 in Dublin, Ireland: Big Data In Ireland - Linked Data and beyond
Slides for talk by Prof Christopher Millard on "Cloud Computing: Opportunities and Risks" at the International Bar Association Annual Meeting 2010, Vancouver, Canada, October 2010
The document summarizes a presentation given by Estella Cohen from the Information and Privacy Commissioner's Office of Ontario, Canada. The presentation focused on educating youth about online privacy and ensuring privacy is built into technologies from the start through principles like Privacy by Design. It discussed the Commissioner's Office's role in education and outreach, as well as partnerships with organizations like Facebook to increase privacy protections for users.
This document discusses strategies for document capture in enterprise content management (ECM) systems. It describes the importance of document capture and outlines three main approaches: centralized, distributed, and hybrid. In a centralized approach, all scanning and processing is done at a central location, but this has disadvantages like transport costs, latency, and dedicated staffing needs. Distributed capture allows scanning and indexing to occur wherever documents originate, addressing some of the issues with centralized models. The document analyzes factors to consider in building an effective document capture strategy.
Patching your employee's brain (by NVISO - Pieter Danhieux)NVISO
Phishing tests
2. Metrics of the People
– # of Phishing emails reported
– # of security incidents reported
– Employee survey on awareness and behavior
3. Metrics of the Business
– # of security incidents
– Downtime and costs due to security incidents
4. Continuous Improvement
– Adapt program based on metrics and feedback
This document summarizes a presentation on cookies and data privacy regulations. It begins by defining what cookies are and noting the confusion around their technical definitions. It then summarizes the key aspects of the EU ePrivacy Directive regarding consent requirements for storing cookies. There is discussion of varying levels of compliance among industries and challenges in interpreting and applying the regulations. The presentation argues for a shift towards viewing cookies as data assets and focusing on privacy over technology. It suggests that self-regulation combined with sensible enforcement could help drive improved privacy practices.
This document discusses electronic discovery (eDiscovery) which refers to the discovery of electronically stored information in legal cases. It notes that eDiscovery costs are skyrocketing, averaging over $1.5 million per corporate lawsuit. The document outlines typical eDiscovery costs including collecting, processing, reviewing data which can cost thousands or millions depending on the size of the case. It emphasizes that proactive information management is key to addressing eDiscovery by developing policies to help employees manage information and only retain necessary records.
Slides for talk by Prof Chris Reed, Cloud Legal Project http://cloudlegalproject.org on who owns information in the cloud, at Cloud Computing: Legal, Organisational and Technological Issues conference, University of the West of England, on 23 February 2011, Bristol, UK.
It is the Wild Wild West in the world of ‘Things’. We can make anything smart. Everything from a trash can, a diaper or a wall is now a smart thing.
With so many applications, there are as many risks.
Governments, Std. bodies across the world are grappling with a question - do we need any regulations? Or is it going to stifle innovation?
One may think regulations just don’t work here. That may be true. But with no regulations, we may be facing serious problems.
Will we end up creating crippling constraints for innovation? Will it be abused so much that consumers shun adoption?
We debate whether it makes sense to introduce regulations or let the market forces correct the problems. Or is there any other options?
This document discusses common myths and facts about cloud security. It addresses five myths: 1) the cloud is inherently less secure than physical servers, 2) securing the cloud is solely the provider's responsibility, 3) cloud breaches are more frequent, 4) cloud security is too difficult to maintain, and 5) businesses can't find out what providers do with their data. For each myth, it provides facts that dispel the myth. For example, it notes that cloud computing can involve both public and private solutions, not just external hosting, and that businesses still control security policies when using cloud services. The overall message is that many fears about cloud security stem from myths rather than realities about how cloud systems can be securely implemented and managed
This is Willbros Senior GIS Consultant Peter Veenstra's presentation from the 2012 GITA Oil & Gas Pipeline Conference. The presentation address cloud computing security concerns and explains how cloud computing can help with data integrity management.
Building Security: Protecting Your People & Property with Bulletproof SystemsNicholas Tancredi
This document provides 1 continuing professional education (CPE) unit for completing a training titled "Building Security: Protecting Your People & Property with Bulletproof Systems" presented by Nicholas Tancredi on December 6, 2020. The training focused on building security and protecting people and property with bulletproof systems.
This presentation discusses what digital ‘stuff’ the National Library of Australia is responsible for and explores some of the main issues regarding digital preservation of this ‘stuff’. It was delivered at the New South Wales State Library on February 15, 2011 by David Pearson
Setting a Course for Success: Getting Started with Digital Preservation in Yo...WiLS
This document provides an overview of digital preservation basics and responsibilities. It discusses three phases of a digital preservation project from 2012-2019 that included research, workshops, and professional institutes. It outlines the Open Archival Information System (OAIS) model and its key concepts. The document also provides templates for a basic digital inventory, decision flowchart, and offers suggestions for getting started with digital preservation from scratch with limited resources. The overall message is that digital preservation requires ongoing management but models and standards should not paralyze action and the goal is to implement good, practical solutions.
Implementing Sustainable Digital Preservationneilgrindley
There has been a lot of investment and activity in digital preservation over the last decade and a lot of it has been supported by grant funded activity and research projects. The ‘learn by doing’ approach and the prodigious number of beta systems and project reports have all played their part in helping to mature the digital preservation field - and judging by the changing tone of conferences over the years, the community has come a long way. So far - in fact - that a lot of organisations are now at the stage when theory is less important than action. They need to work out the best implementation paths and make procurement choices.
So the economic landscape for digital preservation has shifted and the onus is now on many organisations to look closely at their needs and their objectives and to make investment choices that are sustainable as part of the business needs of their organisation rather than as an adjunct activity that is supported by ‘soft’ research money. Work being taken forward by the 4C Project is looking at providing resources to support organisations to make sustainable digital preservation investment choices and this webinar will describe some of that work.
But budgets are hard to secure and digital preservation remains a difficult case to argue so collaboration with like-minded organisations and the establishment of shared services should support the arguments and drive down the cost. This is one of the core messages that underpins the Aligning National Approaches to Digital Preservation (ANADP) initiative and this will also be described and explained during the webinar.
Cultural heritage collections in a web 2Lynne Thomas
Lynne M. Thomas gave a presentation on cultural heritage collections in a Web 2.0 world. She discussed how new technologies like social media, crowdsourcing, and cloud computing are changing how cultural institutions interact with users. She emphasized the importance of having an online presence where users are already engaging through platforms like blogs, wikis, and social networks. However, she also stressed that digital preservation is challenging due to issues like rapid technological changes, lack of standards, and funding constraints. Collaboration and open-source solutions can help smaller institutions address these challenges.
Preparation, Proceed and Review of preservation of Digital Library Asheesh Kamal
My paper focuses on the future information to preserve and use in a user-friendly environment; and also digital preservation methods and strategy, the life cycle of digital media, especially in the digital library.
Collections Databases; Making the system work for youirowson
This document provides an overview of Ian Rowson's presentation on selecting and implementing a Museum Collections Management System (CMS). Some key points:
- CMS projects involve significant time and resources, so it is important to minimize risks by following best practices. Rowson outlines seven "golden rules" to help with this.
- Choosing a flexible, standards-compliant system is important to allow for future changes and data exchange. Homegrown databases often fail to meet long-term needs.
- Ensuring you can export data in an open format is essential to avoid being locked into one system forever. Suppliers should demonstrate this capability.
- Getting support from various departments and an experienced supplier can help navigate technical
This document provides definitions for terms related to digital preservation and resources. It begins with an introduction stating that a lack of precise definitions can make communication problematic in emerging disciplines like digital preservation. It then provides definitions for key terms such as access, authentication, authenticity, "born digital", digital archiving, digital materials, digital preservation, documentation, and metadata. The document also defines different types of digital resources including e-journals, e-books, aggregated resources, databases, and more. It provides examples of molecular viewer and chemical calculator software. Finally, it discusses the importance of life cycle assessment for managing digital collections over time.
On one side, they’re arguably the most important task of every
IT professional. Protecting your company’s most critical data
really means protecting your company itself, and therefore your
own livelihood. But on the other side, backups are so often
accomplished using technology that hasn’t evolved much past
the reel-to-reel days. In 2010, most IT organizations still find
themselves clinging desperately to ancient tape-based technologies;
technologies that indeed back up data, but do so slowly,
painfully, and sometimes with catastrophic failure.
EDF2013: Keynote Stefan Decker: Big Data In Ireland - Linked Data and beyondEuropean Data Forum
Keynote of Stefan Decker, Professor for Digital Enterprise & Director of DERI, National University of Ireland, Galway, at the European Data Forum 2013, 9 April 2013 in Dublin, Ireland: Big Data In Ireland - Linked Data and beyond
Slides for talk by Prof Christopher Millard on "Cloud Computing: Opportunities and Risks" at the International Bar Association Annual Meeting 2010, Vancouver, Canada, October 2010
The document summarizes a presentation given by Estella Cohen from the Information and Privacy Commissioner's Office of Ontario, Canada. The presentation focused on educating youth about online privacy and ensuring privacy is built into technologies from the start through principles like Privacy by Design. It discussed the Commissioner's Office's role in education and outreach, as well as partnerships with organizations like Facebook to increase privacy protections for users.
This document discusses strategies for document capture in enterprise content management (ECM) systems. It describes the importance of document capture and outlines three main approaches: centralized, distributed, and hybrid. In a centralized approach, all scanning and processing is done at a central location, but this has disadvantages like transport costs, latency, and dedicated staffing needs. Distributed capture allows scanning and indexing to occur wherever documents originate, addressing some of the issues with centralized models. The document analyzes factors to consider in building an effective document capture strategy.
Patching your employee's brain (by NVISO - Pieter Danhieux)NVISO
Phishing tests
2. Metrics of the People
– # of Phishing emails reported
– # of security incidents reported
– Employee survey on awareness and behavior
3. Metrics of the Business
– # of security incidents
– Downtime and costs due to security incidents
4. Continuous Improvement
– Adapt program based on metrics and feedback
This document summarizes a presentation on cookies and data privacy regulations. It begins by defining what cookies are and noting the confusion around their technical definitions. It then summarizes the key aspects of the EU ePrivacy Directive regarding consent requirements for storing cookies. There is discussion of varying levels of compliance among industries and challenges in interpreting and applying the regulations. The presentation argues for a shift towards viewing cookies as data assets and focusing on privacy over technology. It suggests that self-regulation combined with sensible enforcement could help drive improved privacy practices.
This document discusses electronic discovery (eDiscovery) which refers to the discovery of electronically stored information in legal cases. It notes that eDiscovery costs are skyrocketing, averaging over $1.5 million per corporate lawsuit. The document outlines typical eDiscovery costs including collecting, processing, reviewing data which can cost thousands or millions depending on the size of the case. It emphasizes that proactive information management is key to addressing eDiscovery by developing policies to help employees manage information and only retain necessary records.
Slides for talk by Prof Chris Reed, Cloud Legal Project http://cloudlegalproject.org on who owns information in the cloud, at Cloud Computing: Legal, Organisational and Technological Issues conference, University of the West of England, on 23 February 2011, Bristol, UK.
It is the Wild Wild West in the world of ‘Things’. We can make anything smart. Everything from a trash can, a diaper or a wall is now a smart thing.
With so many applications, there are as many risks.
Governments, Std. bodies across the world are grappling with a question - do we need any regulations? Or is it going to stifle innovation?
One may think regulations just don’t work here. That may be true. But with no regulations, we may be facing serious problems.
Will we end up creating crippling constraints for innovation? Will it be abused so much that consumers shun adoption?
We debate whether it makes sense to introduce regulations or let the market forces correct the problems. Or is there any other options?
This document discusses common myths and facts about cloud security. It addresses five myths: 1) the cloud is inherently less secure than physical servers, 2) securing the cloud is solely the provider's responsibility, 3) cloud breaches are more frequent, 4) cloud security is too difficult to maintain, and 5) businesses can't find out what providers do with their data. For each myth, it provides facts that dispel the myth. For example, it notes that cloud computing can involve both public and private solutions, not just external hosting, and that businesses still control security policies when using cloud services. The overall message is that many fears about cloud security stem from myths rather than realities about how cloud systems can be securely implemented and managed
This is Willbros Senior GIS Consultant Peter Veenstra's presentation from the 2012 GITA Oil & Gas Pipeline Conference. The presentation address cloud computing security concerns and explains how cloud computing can help with data integrity management.
Building Security: Protecting Your People & Property with Bulletproof SystemsNicholas Tancredi
This document provides 1 continuing professional education (CPE) unit for completing a training titled "Building Security: Protecting Your People & Property with Bulletproof Systems" presented by Nicholas Tancredi on December 6, 2020. The training focused on building security and protecting people and property with bulletproof systems.
This presentation discusses what digital ‘stuff’ the National Library of Australia is responsible for and explores some of the main issues regarding digital preservation of this ‘stuff’. It was delivered at the New South Wales State Library on February 15, 2011 by David Pearson
Setting a Course for Success: Getting Started with Digital Preservation in Yo...WiLS
This document provides an overview of digital preservation basics and responsibilities. It discusses three phases of a digital preservation project from 2012-2019 that included research, workshops, and professional institutes. It outlines the Open Archival Information System (OAIS) model and its key concepts. The document also provides templates for a basic digital inventory, decision flowchart, and offers suggestions for getting started with digital preservation from scratch with limited resources. The overall message is that digital preservation requires ongoing management but models and standards should not paralyze action and the goal is to implement good, practical solutions.
Implementing Sustainable Digital Preservationneilgrindley
There has been a lot of investment and activity in digital preservation over the last decade and a lot of it has been supported by grant funded activity and research projects. The ‘learn by doing’ approach and the prodigious number of beta systems and project reports have all played their part in helping to mature the digital preservation field - and judging by the changing tone of conferences over the years, the community has come a long way. So far - in fact - that a lot of organisations are now at the stage when theory is less important than action. They need to work out the best implementation paths and make procurement choices.
So the economic landscape for digital preservation has shifted and the onus is now on many organisations to look closely at their needs and their objectives and to make investment choices that are sustainable as part of the business needs of their organisation rather than as an adjunct activity that is supported by ‘soft’ research money. Work being taken forward by the 4C Project is looking at providing resources to support organisations to make sustainable digital preservation investment choices and this webinar will describe some of that work.
But budgets are hard to secure and digital preservation remains a difficult case to argue so collaboration with like-minded organisations and the establishment of shared services should support the arguments and drive down the cost. This is one of the core messages that underpins the Aligning National Approaches to Digital Preservation (ANADP) initiative and this will also be described and explained during the webinar.
Cultural heritage collections in a web 2Lynne Thomas
Lynne M. Thomas gave a presentation on cultural heritage collections in a Web 2.0 world. She discussed how new technologies like social media, crowdsourcing, and cloud computing are changing how cultural institutions interact with users. She emphasized the importance of having an online presence where users are already engaging through platforms like blogs, wikis, and social networks. However, she also stressed that digital preservation is challenging due to issues like rapid technological changes, lack of standards, and funding constraints. Collaboration and open-source solutions can help smaller institutions address these challenges.
Preparation, Proceed and Review of preservation of Digital Library Asheesh Kamal
My paper focuses on the future information to preserve and use in a user-friendly environment; and also digital preservation methods and strategy, the life cycle of digital media, especially in the digital library.
Collections Databases; Making the system work for youirowson
This document provides an overview of Ian Rowson's presentation on selecting and implementing a Museum Collections Management System (CMS). Some key points:
- CMS projects involve significant time and resources, so it is important to minimize risks by following best practices. Rowson outlines seven "golden rules" to help with this.
- Choosing a flexible, standards-compliant system is important to allow for future changes and data exchange. Homegrown databases often fail to meet long-term needs.
- Ensuring you can export data in an open format is essential to avoid being locked into one system forever. Suppliers should demonstrate this capability.
- Getting support from various departments and an experienced supplier can help navigate technical
This document provides definitions for terms related to digital preservation and resources. It begins with an introduction stating that a lack of precise definitions can make communication problematic in emerging disciplines like digital preservation. It then provides definitions for key terms such as access, authentication, authenticity, "born digital", digital archiving, digital materials, digital preservation, documentation, and metadata. The document also defines different types of digital resources including e-journals, e-books, aggregated resources, databases, and more. It provides examples of molecular viewer and chemical calculator software. Finally, it discusses the importance of life cycle assessment for managing digital collections over time.
Community IT Academy
expensive servers and software licences).
The document discusses key points about using cloud services for charities. It notes that within 2 years, using cloud services will be the norm rather than exception. A survey found that 67% of charities employ no staff to maintain technology, so cloud solutions could offer more stable and secure infrastructure while saving money. The document provides tips for charities considering cloud services, such as using free tools first before spending, investing in training, starting with crucial tools, backing up data, and ensuring new tools help achieve goals. Commenters discuss embracing cloud strategically but also properly assessing costs, risks, and legal frameworks. They note cloud can help collaboration but requires investment and staff resources
This document discusses digital preservation and common misconceptions about it. Digital preservation involves maintaining digital content, context, and metadata over time despite technological changes. It requires ongoing maintenance and migration to new formats. While challenging, digital preservation is necessary, achievable through collaboration, and can be planned for with current skills and resources. The document urges education about digital preservation and taking initial steps like collection planning and seeking funding.
This document discusses digital preservation and common misconceptions about it. Digital preservation involves maintaining digital content, context, and metadata over time despite technological changes. It requires ongoing maintenance and migration to new formats. While challenging, digital preservation is necessary, achievable through collaboration, and can be planned for with proper education and resources. The document urges starting the conversation on campus to understand digital assets and develop preservation plans and funding.
Presentation and speaking notes on a practical approach for privacy protection designed for academic researchers, but open to all working on research, human rights, charities etc.
Strategy and threat modelling
5 Tactics (Go Offline, Technological solutions, Chaos, Transparency, Limitation)
The Challenges
In Search of Simplicity: Redesigning the Digital Bleek and LloydLighton Phiri
DESIDOC Journal of Library & Information Technology: Special Issue on Digital Preservation original submission.
Publication URL: http://goo.gl/yUERj
BibTeX Citation
@article{D2524,
author = {Lighton Phiri and Hussein Suleman},
title = {In Search of Simplicity: Redesigning the Digital Bleek and Lloyd},
journal = {DESIDOC Journal of Library & Information Technology},
volume = {32},
number = {4},
year = {2012},
keywords = {},
abstract = {The Digital Bleek and Lloyd is a collection of digitised historical artefacts on the Bushman people ofSouthern Africa. The underlying software was initially designed to enable access from as many people aspossible so usage requirements were minimal – it was not even necessary to use a web server or database.However, the system was not focused on preservation, extensibility, or reusability. In this article, it is arguedthat such desirable attributes could manifest themselves in a natural evolution of the Bleek and Lloyd softwaresystem in the direction of greater simplicity. A case study demonstrates that this is indeed feasible in the caseof the Digital Bleek and Lloyd and potentially more generally applicable in digital libraries.},
issn = {0976-4658}, url = {http://publications.drdo.gov.in/ojs/index.php/djlit/article/view/2524}
}
This document discusses using digital tools like QR codes and infographics to enhance teaching and learning. It provides examples of how QR codes can be used to quickly access information using a mobile phone. Infographics are presented as a tool to simplify complex concepts, explain processes, and compare information visually. The document also discusses using online portfolios like Google Sites to organize and reflect on learning activities and experiences.
Facilitating Collaborative Life Science Research in Commercial & Enterprise E...Chris Dagdigian
This is a talk I put together for a http://www.neren.org/ seminar called "Bridging the Gap: Research Facilitation". Tried to give a biotech/pharma view for a mostly academic audience.
Personal Digital Archiving Initiatives at the Library of Congresslljohnston
Introduction to the personal digital archiving issues and advice from the Library of Congress National Digital Information Infrastructure and Preservation Program
The document discusses the potential for intelligent content and search through semantic integration and defining intelligence. It argues that current approaches to content management, search, and artificial intelligence have failed to meet expectations by not fully understanding or reproducing human intelligence. True intelligence, it claims, involves enhancing human cognition through tools that extract meaningful relationships from vast stores of human knowledge.
Trust Factory is developing standards-based security technologies using linked data and open credentials to help individuals and organizations securely manage and share their digital records and data on the web. This includes enabling creators to assert rights over their data, describing data using ontologies to improve usability, and providing private and efficient access to verified information through user-defined sharing terms and permissions. The goal is to empower data owners to control how their data is used while supporting effective data storage, accessibility, and applications through open standards and decentralized technologies.
The document summarizes a panel discussion on security and hacking held by the Tech Talent Meetup. The panel of security experts from various companies discussed why security is important, greatest risks and threats, how companies can protect data, career opportunities in security, and tips for personal online security. Some key points included prioritizing security of important data, investing in staff training, focusing on detection over prevention, and using tools like password managers and two-factor authentication.
The document discusses various digital preservation activities the author undertook as part of an assignment, including archiving, harvesting, mirroring files, extracting metadata, and verifying checksums. The author learned how to use tools like PeaZip, Xena, emulators, and metadata extraction software. They created disk images and analyzed them using bulk extractor to identify sensitive data. The author automated a workflow to generate checksums and write them to an Excel file. Overall, the assignment helped the author gain hands-on experience with digital preservation concepts and tools.
Similar to Enduring Digital Access: Establishing, Supporting, and Sustaining Digital Curation Programs (20)
Caring for Digital Collections in the AnthropoceneTrevor Owens
The craft of digital preservation and digital collections care is anchored in the past. It builds off the records, files, and works of those who came before us and those who designed and set up the systems that enable the creation, transmission, and rendering of their work. At the same time, the craft of digital preservation is also the work of a futurist. We must look to the past trends in the ebb and flow of the development of digital media and hedge our bets on how digital technologies of the future will play out. This talk explores key issues for exploring and imagining that future. We start with consideration of some key emerging technologies relevant to digital collections and then zoom out to consider the future of digital collections in the context of technologies of surveillance, precarity of both cultural heritage institutions and cultural heritage workers in the context of neoliberalism, and then explore the broad set of challenges facing the future of collections stemming from the increasing effects of anthropogenic climate change. Drawing on frameworks for maintenance, care, and repair this talk concludes with an opportunity to reflect on and consider how memory and information workers should approach the digital present and future of our institutions and professions.
Theory and Craft of Digital Preservation Lightning TalkTrevor Owens
I’m thrilled and honored to be a finalist for the Dutch Digital Heritage Network Award for Teaching and Communications for my book, The Theory and Craft of Digital Preservation. This is particularly significant to me for two reasons. First, I started out on this book directly as a teaching and communications effort and second because the international digital preservation community that DPC supports and encourages has been so vital in helping me develop and refine the ideas in this book. For this talk, I’m going to give a little context of where the book came from, how it was developed, and the overwhelming response I’ve received for it all of which I think make it a good fit for this particular award.
Planning for Digital Preservation in OrganizationsTrevor Owens
This document outlines the key areas of digital preservation that were discussed at a 2019 workshop in Mexico City. The presenter used the Levels of Digital Preservation as an assessment tool to help understand the risks in each area of digital preservation, including storage, integrity, control, metadata, and content.
Testing Our Assumptions: The Centrality of Design Thinking and Scholarship fo...Trevor Owens
This document outlines an approach for the future of library practice that centers design thinking and scholarship. It argues that libraries are vital infrastructure for developing and disseminating knowledge and must grow and learn through dynamic applied research. The document recommends adopting user-centered design as a guiding framework, holistically mapping library ecosystems, developing a well-defined toolkit for projects, and using an iterative approach like Scrum. It also emphasizes considering values and impacts on the entire system level. Next steps include reframing work as places for experimentation, making design the focus of scholarship, including values in practice, and exploring Scrum for organizing teams.
We Have Interesting Problems: Some Applied Grand Challenges from Digital Libr...Trevor Owens
Libraries, Archives and Museums now have massive digital
holdings. There is tremendous potential for library and
information science, computer science and computer engineering
researchers to partner with cultural heritage institutions and
make our digital cultural record more useful and usable. In
particular, there is a significant need to bridge basic research in
areas such as computer vision, crowdsourcing, natural language
processing, multilingual OCR, and machine learning to make this
work directly usable in the practices of cultural heritage
institutions. In this talk, I discuss a series of exemplar projects,
largely funded through the Institute of Museum and Library
Services National Digital Platform initiative, that illustrate some
key principles for building applied research partnerships with
cultural heritage institutions. Building on Ben Schniderman’s
The New ABCs of Research: Achieving Breakthrough
Collaborations, I focus specifically on why the public purpose
and missions of cultural heritage institutions are particularly
valuable in establishing new kinds of collaborations that can
simultaneously advance basic research and the ability for people
of the world to engage with their cultural record.
Scientists’ Hard Drives, Databases, and Blogs: Preservation Intent and Source...Trevor Owens
Carl Sagan’s WordPerfect files, simulations emailed to Edward Lorenz, a database application from the National Library of Medicine, a collection of science blogs, a database of interstellar distances; each of these digital artifacts have been acquired by archives and special collections. Born digital primary sources are no longer a future concern for archivists, librarians, curators and historians. As historians of science turn their attention to the late 20th and early 21st century, they will need to work from these born-digital primary sources. We have already accumulated a significant born digital past and it’s time for work with born digital primary sources to become mainstream. This presentation will give a quick tour of individual born digital artifacts toward two goals. First, I argue for the need for archivists, curators and librarians to reflexively develop approaches to establishing preservation intent for digital content grounded in a dialog with the nature of a given set of digital objects and it’s future research use. Second, for historians, I suggest how trends in computational analysis of information in the digital humanities should be combined with approaches from digital forensics and new media studies to establish historiographic practices for born-digital source criticism. I conclude by suggesting the kinds of technical skills archivists, librarians, curators and historians working with these materials are going to need to develop. Just as historians working with premodern documents require language and paleography skills, historians working with digital artefacts will increasingly need to understand the inscription processes of hard drives, the provenance created by web crawlers, and how to read relational databases of varying vintages.
Platform Thinking: Frameworks for a National Digital Platform State of MindTrevor Owens
Talk presented as a closing keynote to the Biodiversity Heritage Library's National Digital Stewardship Residency program meeting at the National Museum of Natural History. This talk reviews the National Digital Platform framework developed by US IMLS in collaboration with various library, archives and museum stakeholders and presents a series of additional conceptual frameworks on the role of software in society and psychology.
Digital Infrastructures that Embody Library Principles: The IMLS national dig...Trevor Owens
Digital library infrastructures must not simply work. They must also manifest the core principles of libraries and archives. Since 2014, the Institute of Museum and Library Services (IMLS) has engaged with stakeholders from diverse library communities to consider collaborative approaches to building digital library tools and services. The “national digital platform” for libraries, archives, and museums is the framework that resulted from these dialogs. One key feature of the national digital platform (NDP) is the anchoring of core library principles within the development of digital tools and services. This essay explores how NDP-funded projects enact library principles as part of the national framework.
The IMLS National Digital Platform & Your Library: Tools You Can UseTrevor Owens
As libraries increasingly use digital infrastructure to provide access to content and resources, there are more and more opportunities for collaboration around the tools and services that they use to meet their users’ needs. To this end, the Institute of Museum and Library Services (IMLS) is making substantial investments in developing collaborative and sustainable technical and social digital infrastructure for libraries through the National Digital Platform initiative. In this talk, you will learn about a series of digital tools, services, training opportunities and resources IMLS is funding through the National Leadership Grants for Libraries Program and the Laura Bush 21st Century Librarian Program. The presentation will focus on ongoing projects and efforts that you and your library can get involved in and make direct use of. It will also provide insight into how you could develop competitive proposals for projects that could be funded through this national effort.
Next Steps for IMLS's National Digital PlatformTrevor Owens
This keynote, at the Upper Midwest Digital Collections Conference, provides and update on the National Digital Platform and 20 projects supported to enhance it. The national digital platform is a way of thinking about and approaching the digital capability and capacity of libraries across the US. In this sense, it is the combination of software applications, social and technical infrastructure, and staff expertise that provide library content and services to all users in the US. As libraries increasingly use digital infrastructure to provide access to digital content and resources, there are more and more opportunities for collaboration around the tools and services that they use to meet their users’ needs. It is possible for each library in the country to leverage and benefit from the work of other libraries in shared digital services, systems, and infrastructure.
We need to bridge gaps between disparate pieces of the existing digital infrastructure, for increased efficiencies, cost savings, access, and services. To this end, IMLS is focusing on the national digital platform as an area of priority in the National Leadership Grants to Libraries program and the Laura Bush 21st Century Librarian program. We are eager to explore how this way of thinking and approaching infrastructure development can help states make the best use of the funds they receive through the Grants to States program. We’re also eager to work with other foundations and funders to maximize the impact of our federal investment
Next Steps for IMLS's National Digital PlatformTrevor Owens
This document summarizes projects funded by the Institute of Museum and Library Services (IMLS) related to developing a National Digital Platform. It describes 7 projects improving open source digital library software tools and communities, 4 projects focused on scaling up shared services, 2 applied research projects related to collections at scale, and 3 projects aimed at improving access for all and inclusion. It provides brief descriptions and links to more information for each of the 20 projects. The overall goal is to expand the digital capability and capacity of libraries across the United States by prioritizing promising digital tools and services.
People, Communities and Platforms: Digital Cultural Heritage and the WebTrevor Owens
Libraries, archives and museums are sites of community memory. The first public computerized bulletin board system was called community memory. Trevor’s talk will explore the connections between the development of the web as a global knowledge base, the open source software movement, and digital strategy for libraries, archives and museums. This keynote talk will synthesize research on the history of online community software with practical experience working on open source digital library projects. This exploration underscores the essential role cultural heritage institutions need to play in this era of the web and some important distinctions between how the concept of community is deployed in discussions of the web.
Macroscopes and Distant Reading: Implications for Infrastructures to Support ...Trevor Owens
A talk exploring the implications for digital library infrastructures in the face of developments in how humanities scholars are engaging in computational research of library collections.
Digital Preservation's Role in the Future of the Digital HumanitiesTrevor Owens
Slides from an invited presentation I gave to the University of Pittsburgh's iSchool.
"Ensuring long term access to digital information sounds like a technical problem. It seems like digital preservation should be a computer science problem. Far from it. In this lecture Trevor Owens, a digital archivist at the Library of Congress argues that digital preservation is in fact a core problem and issue at the heart of the future of the digital humanities. Bringing together perspectives from the history of technology, new media studies, public history, and archival theory, he suggests the critical role that humanities scholars and practitioners should play in framing and shaping the collection, organization, description, and modes of access to the historically contingent digital material records of contemporary society."
Slides for an invited presentation I gave to the the National Archives and Records Administration’s Online Public Access (OPA) Integrated Product Team in College Park, MD in 2013.
This document discusses a student project to create a mobile game interpreting ruins and a glass house. It provides links to student blogs about the project. It includes screenshots from a prototype and discusses what elements of the project are significant - the student reports, storyboards, and reflections, rather than the app itself. It also discusses how meaning and significance can be found in artifacts and their documentation.
The document discusses Viewshare, a tool that allows users to dynamically interact with and understand digital cultural heritage collections by tapping into the temporal, locative, and categorical data within collections. Viewshare is used by librarians, archivists, curators, and researchers to better understand and expand access to their digital collections. It allows users to import, augment, build, and share visual displays and dynamic facets of collections for embedding and exposing as open data on websites.
Doing Less More Often: An Approach to Digital Strategy for Cultural Heritage ...Trevor Owens
Trevor Owens, a digital archivist at the Library of Congress, advocates for a "do less more often" approach to digital strategies for cultural heritage organizations. This involves software, metadata, and processes doing less but serving specific local needs, and making collections available more quickly while still focusing on digital preservation, exhibition, and user access. The approach promotes sustainability through modularity, transparency, and flexibility to shift work between experts, computers, and volunteers.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
6. The Theory and Craft of Digital Preservation
https://osf.io/preprints/lissa/5cpjt/
7.
8. TALK ROADMAP
- My background and orientation to digital preservation
- A short definition of digital preservation
- 16 axioms for digital preservation
- A short list of steps and resources people around the
world can use to improve digital preservation.
21. 1. A REPOSITORY IS NOT
A PIECE OF SOFTWARE
Software cannot preserve anything. Software cannot
be a repository in itself. A repository is the sum of
financial resources, hardware, staff time, and ongoing
implementation of policies and planning to ensure
long-term access to content. Any software system you
use to enable you preserving and providing access to
digital content is by necessity temporary. You need to
be able to get your stuff out of it because it likely will
not last forever. Similarly, there is no software that
“does” digital preservation.
22. 2. INSTITUTIONS MAKE
PRESERVATION POSSIBLE
Each of us will die. Without care and management, the
things that mattered to us will persist for some period
of time related to the durability of their mediums. With
that noted, the primary enablers of preservation for the
long term are our institutions (libraries, archives,
museums, families, religious organizations,
governments, etc.) As such, the possibility of
preservation is enabled through the design and
function of those institutions. Their org charts, hiring
practices, funding, credibility, etc. are all key parts of
the cultural machinery that makes preservation
possible.
23. 3. TOOLS CAN GET IN THE WAY
JUST AS MUCH AS THEY CAN HELP
Specialized digital preservation tools and software are
just as likely to get in the way of solving your digital
preservation problems as they are to help. In many
cases, it’s much more straightforward to start small
and implement simple and discrete tools and practices
to keep track of your digital information using nothing
more than the file system you happen to be working in.
It’s better to start simple and then introduce tools that
help you improve your process then to simply buy into
some complex system without having gotten your
house in order first.
24. 4. NOTHING HAS BEEN PRESERVED,
THERE ARE ONLY THINGS BEING
PRESERVED.
Preservation is the result of ongoing work of people and
commitments of resources. The work is never finished.
This has significant ramifications for how we think about
staffing and resourcing preservation work. If you want to
evaluate how serious an organization is about digital
preservation don’t start by looking at their code, their
storage architecture, or talking to their developers. Start
by talking to their finance people.
25. 5. HOARDING IS NOT
PRESERVATION.
It is very easy to start grabbing lots of digital objects
and making copies of them. This is not preservation.
To really be preserving something you need to be able
to make it discoverable and accessible and that is
going to require that you have a clear and coherent
approach to collection development, arrangement,
description and methods and approaches to provide
access.
26. 6. BACKING UP DATA IS NOT
DIGITAL PRESERVATION.
If you start talking about digital preservation and
someone tells you “oh, don’t worry about it, we back
everything up nightly” you need to be prepared to
explain how and why that is not digital preservation.
It’s important to develop your explanation of what the
differences are. Many of the aspects that go into
backing up data for current use are similar to aspects
of digital preservation work but the near term concerns
of being able to restore data are significantly different
from the long term issues related to ensuring access to
content in the future.
27. 7. THE BOUNDARIES OF
DIGITAL OBJECTS ARE FUZZY.
Individual objects reference, incorporate and use
aspects of other objects as part of their everyday
function. You might think you have a copy of a piece of
software by keeping a copy of its installer, but that
installer might call a web service to start downloading
files in which case you can’t install and run that
software unless you have the files it depends on. You
may need a set of fonts, or a particular video codec, or
any number of other things to be able to use
something in the future and it is challenging to
articulate what is actually inside your object and what
is external to it.
28. 8. ONE PERSON’S DIGITAL
COLLECTION IS ANOTHER’S DIGITAL
OBJECT IS ANOTHER’S DATASET.
In some cases the contents of a hard drive can be
managed as a single item, in others they are a
collection of items. In the analog world, the boundaries
of objects were a little bit more straightforward or at
least taken for granted. The fuzziness of boundaries of
digital objects means that the concept of “item” and
“collection” is less clear than with analog items. For
example, a website might be an item in a web archive,
but it is also functionally a serial publication which
changes over time, it is also a collection of files.
29. 9. DIGITAL PRESERVATION IS
MAKING THE BEST USE OF
RESOURCES TO MITIGATE THREATS
AND RISKS.
You are never done with digital preservation. It is not
something that can be accomplished or finished.
Digital preservation is a continual process of
understanding the risks you face for losing content or
losing the ability to render and interact with it and
making use of whatever resources you have to
mitigate those risks.
30. 10. THE ANSWER TO NEARLY ALL-
DIGITAL PRESERVATION QUESTION
IS “IT DEPENDS.”
In almost every case, the details matter. Deciding what
matters about an object or a set of objects is largely
contingent on what their future use might be. Similarly,
developing a preservation approach to a massive and
rapidly growing collection of high-resolution video will
end up being fundamentally different to the approach
an organization would take to ensuring long-term
access to a collection of digitized texts.
31. 11. IT’S LONG PAST TIME TO
START TAKING ACTIONS.
You can read and ponder complicated data models,
schemas for tracking and logging preservation actions,
and a range of other complex and interesting topics for
years but it’s not going to help “get the boxes off the
floor.” There are practical and pragmatic things
everyone can and should do now to mitigate many of
the most pressing risks of loss. So be sure to prioritize
doing those things first before delving into many of the
more open-ended areas of digital preservation work
and research.
32. 12. HIGHLY TECHNICAL DEFINITIONS
OF DIGITAL PRESERVATION ARE
COMPLICIT IN SILENCING THE PAST
Much of the language and specifications of digital
preservation have developed into complex sets of
requirements that obfuscate many of the practical
things anyone and any organization can do to increase
the likelihood of access to content in the future. As
such, a highly technical framing of digital preservation
has resulted in many smaller and less resource rich
institutions feeling like they just can’t do digital
preservation, or that they need to hire consultants to
tell them about complex preservation metadata
standards when what they need to do first is make a
copy of their files.
33. 13. THE AFFORDANCES OF DIGITAL
MEDIA PROMPT A NEED FOR DIGITAL
PRESERVATION TO BE ENTANGLED
IN DIGITAL COLLECTION
DEVELOPMENT.
Digital media affords significant new opportunities for
engaging communities with the development of digital
collections. When digital preservationists take for
granted that their job is to preserve what they are
given, they fail to help an organization rethink what it is
possible to collect. Digital preservation policy should
increasingly be directly connected to and involved in
collection development policy. That is, the affordances
of what can be easily preserved should inform
decisions about what an organization wants to go out
and collect and preserve.
34. 14. ACCEPT AND EMBRACE
THE ARCHIVAL SLIVER.
We’ve never saved everything. We’ve never saved
most things. When we start from the understanding
that most things are temporary and likely to be lost to
history, we can shift to focus our energy on making
sure we line up the resources necessary to protect the
things that matter the most. The ideology of “the
digital” makes it seem like we could or should attempt
to save everything. However, this comes from the
mistaken thinking that digital preservation is primarily a
technical challenge instead of a social and ethical one.
35. 15. THE SCALE AND INHERENT
STRUCTURES OF DIGITAL
INFORMATION SUGGEST WORKING
MORE WITH A SHOVEL THAN WITH
A TWEEZERS.
While we need to embrace the fact that we can’t collect and
preserve everything, we also need to realize that in many
cases the time and resources it takes to make decisions
about individual things could be better used elsewhere. It’s
often best to focus digital preservation decision making at
scale. This is particularly true in cases where you are
dealing with content that isn’t particularly large. Similarly, in
many cases it makes sense to normalize content or to
process any number of kinds of derivative files from it and
keep the originals.
36. 16. DOING DIGITAL PRESERVATION
REQUIRES THINKING LIKE A
FUTURIST
We don’t know the tools and systems that people will
have and use in the future to access digital content. So
if we want to ensure long term access to digital
information we need to, at least on some level, be
thinking about and aware of trends in the development
of digital technologies. This is a key consideration for
risk mitigation. Our preservation risks and threats are
based on the technology stack we currently have and
the stack we will have in the future so we need to look
to the future in a way that we didn’t need to with
previous media and formats.
38. SIX THINGS TO DO
STARTING TODAY
1. Identify what digital stuff you’ve got that you need
to keep
2. Get the digital boxes off the floor
3. Schedule out a plan for improving things and
checking in
4. Read the NDSA levels of Digital Preservation Paper
5. Join the communities of practice
6. Read the Theory and Craft of Digital Preservation