This presentation was provided by Don Hamparian of OCLC during the two day NISO Live Connections event, Digital Libraries: Authentication, Access and Security of Information Resources, held on May 22-23, 2018 in Baltimore, MD.
This talk was provided by Ann West of InCommon during the two-day NISO Live Connections Event, Digital Libraries: Authentication, Access and Security for Information Resources, held on May 22-23, 2018 in Baltimore, MD.
This presentation was provided by Theda Schwing of OhioLink during the NISO Live Connections event, Digital Libraries: Authentication, Access and Security for Information Resources, held on May 22-23, 2018 in Baltimore, MD
This talk was provided by Phil Leahy of OpenAthens during the NISO Live Connections event, Digital Libraries: Authentication, Access & Security of Information Resources, held on May 22-23, 2018 in Baltimore, MD.
This presentation was provided by Tim LLoyd of LibLynx during the NISO Live Connections event, Digital Libraries: Authentication, Access and Security of Information Resources, held on May 22-23, 2018 in Baltimore, MD.
This document summarizes authentication and access of licensed content in Ohio libraries. It discusses OhioLINK's mission to provide academic resources to students and faculty. It outlines OhioLINK's membership, which includes 121 member libraries at 90 institutions. It also describes OARnet's role in providing technology solutions and infrastructure like fiber optic networks to higher education institutions in Ohio. The document reviews a survey of OhioLINK member libraries on their current authentication methods and technical support structures. It identifies challenges for members in considering new authentication procedures, such as costs, technical relationships on campus, and requiring technical expertise.
This presentation was provided by Heather Flanagan of RA21.org during the NISO Live Connections Event, Digital Libraries: Authentication, Access and Security for Information Resources, held on May 22-23, 2018 in Baltimore MD.
This document discusses the challenges of using IP filtering for access to electronic resources in academic libraries. It notes that the traditional assumptions around IP filtering, such as static IP addresses and on-campus users, no longer apply in an environment with widespread use of mobile devices, virtual private networks, and proxy servers. The document proposes that libraries focus on authenticating users based on their institutional credentials rather than IP address in order to improve security and the user experience across all devices. It also stresses the importance of addressing privacy concerns, walk-in users, and gaining support from library and campus IT for transitioning away from IP filtering.
The document discusses the benefits of using a proxy server for digital library resources. It argues that a proxy server (1) protects user privacy by aggregating usage data, (2) enhances security by allowing the library to control login credentials and monitor for compromised accounts, (3) provides business intelligence through analytics on resource usage to justify budgets, and (4) improves user experience, although more improvements are needed. The proxy server centralizes access management and usage logs which helps address privacy, security, and data collection needs for digital libraries.
This talk was provided by Ann West of InCommon during the two-day NISO Live Connections Event, Digital Libraries: Authentication, Access and Security for Information Resources, held on May 22-23, 2018 in Baltimore, MD.
This presentation was provided by Theda Schwing of OhioLink during the NISO Live Connections event, Digital Libraries: Authentication, Access and Security for Information Resources, held on May 22-23, 2018 in Baltimore, MD
This talk was provided by Phil Leahy of OpenAthens during the NISO Live Connections event, Digital Libraries: Authentication, Access & Security of Information Resources, held on May 22-23, 2018 in Baltimore, MD.
This presentation was provided by Tim LLoyd of LibLynx during the NISO Live Connections event, Digital Libraries: Authentication, Access and Security of Information Resources, held on May 22-23, 2018 in Baltimore, MD.
This document summarizes authentication and access of licensed content in Ohio libraries. It discusses OhioLINK's mission to provide academic resources to students and faculty. It outlines OhioLINK's membership, which includes 121 member libraries at 90 institutions. It also describes OARnet's role in providing technology solutions and infrastructure like fiber optic networks to higher education institutions in Ohio. The document reviews a survey of OhioLINK member libraries on their current authentication methods and technical support structures. It identifies challenges for members in considering new authentication procedures, such as costs, technical relationships on campus, and requiring technical expertise.
This presentation was provided by Heather Flanagan of RA21.org during the NISO Live Connections Event, Digital Libraries: Authentication, Access and Security for Information Resources, held on May 22-23, 2018 in Baltimore MD.
This document discusses the challenges of using IP filtering for access to electronic resources in academic libraries. It notes that the traditional assumptions around IP filtering, such as static IP addresses and on-campus users, no longer apply in an environment with widespread use of mobile devices, virtual private networks, and proxy servers. The document proposes that libraries focus on authenticating users based on their institutional credentials rather than IP address in order to improve security and the user experience across all devices. It also stresses the importance of addressing privacy concerns, walk-in users, and gaining support from library and campus IT for transitioning away from IP filtering.
The document discusses the benefits of using a proxy server for digital library resources. It argues that a proxy server (1) protects user privacy by aggregating usage data, (2) enhances security by allowing the library to control login credentials and monitor for compromised accounts, (3) provides business intelligence through analytics on resource usage to justify budgets, and (4) improves user experience, although more improvements are needed. The proxy server centralizes access management and usage logs which helps address privacy, security, and data collection needs for digital libraries.
What can SAML / Shibboleth do for your institution? OpenAthens
This document discusses federated access management using SAML/Shibboleth single sign-on. It describes how federated access management allows users to securely access digital content and services from their home institution with a single credential. Federations like InCommon and OpenAthens allow institutions and publishers to connect once and then reuse the connection for multiple resources, lowering implementation costs. The document also notes some challenges with SAML/Shibboleth like age and network security, and suggests "user-managed access" as a potential next step beyond SAML.
This presentation was provided by Judy Luther of Informed Strategies during the NISO webinar, Engineering Access Under the Hood, held on November 1, 2017
This talk was given by Demian Katz of Villanova University at the NISO Virtual Conference, Using Open Source in Your Institution, held on February 17, 2016
This document discusses OpenAthens, a federated access management system. It provides an overview of OpenAthens' history since 1995, its clients in various sectors including academic, commercial, health and government. It then discusses how federated access management works using SAML/Shibboleth to enable access to resources while maintaining user accountability. It also notes how OpenAthens provides identity and discovery services to help institutions and content providers implement federated access management.
The infrastructure review process and aggregated results, by Rohan SlaughterJisc
Jisc's infrastructure review process involves subject specialists conducting on-site reviews of members' IT infrastructure. The reviews assess strategic, technical, and security aspects of members' infrastructure. Reviews identify pressures on members and opportunities for improvements. Aggregated findings from over 70 reviews show a range of infrastructure environments and needs across members. Reviews are welcomed by members and help Jisc better support members' IT needs.
Contributing to the pursuit of excellence, by Caroline CookeJisc
The document discusses a technology strategy and infrastructure review that was conducted at AECC University College in 2017 by experts from Jisc. The review identified areas for strategic support and developed an IT strategy to embed digital learning and teaching. Key actions included stakeholder meetings, a skills audit, infrastructure review, and staff workshop. This led to a draft strategy, digital learning initiatives, and new staff and resources. Feedback indicated the review provided reassurance, confidence, and a clearer shared vision for digital transformation.
The Strategic Developer: a new role for Higher Education?Paul Walk
The document discusses the need for a strategic developer role in higher education. Currently, developers are often seen as junior roles and not involved in strategic planning. This leads institutions to outsource development work without considering how to integrate systems. Using APIs, a strategic developer based internally could better customize remote services to meet local needs compared to external suppliers. The role would provide technical leadership to align technology with strategic goals and identify new opportunities through digital innovation, filling a gap similar to the CTO role in business. Bringing developers into senior positions would help institutions gain more value from technology investments.
This document discusses vulnerability management and the Greenbone vulnerability assessment tool. It outlines a process for vulnerability management that includes preparing by defining secure configurations, identifying assets and scanning them, classifying vulnerabilities using standards like CVSS and CVE, prioritizing based on scores and asset criticality, assigning remediation tasks, mitigating and remediating issues, storing data to support forensics and repeating the process, and improving over time based on metrics. The presentation was given by Dirk Schrader of Greenbone Networks, which develops open source vulnerability management solutions.
OpenAthens Conference 2018 - Adam Snook - Quick wins for an easier user journ...OpenAthens
The document discusses improving the user experience for accessing online resources through federated authentication. It notes that login can be a barrier and libraries try to improve discovery. The OpenAthens redirector provides a single sign-on link structure to check location and authenticate users. Personalization across platforms is now possible through federated access without compromising privacy. The RA21 initiative aims to facilitate seamless access across devices and locations through alternatives to IP authentication using existing federated technologies. Improving the organization discovery experience, providing personalization linked to login, and account linking features can enhance the user experience.
This is a joint presentation provided by Doug Goans and Chris Helms of the Georgia Tech Library during the first segment of a NISO webinar, Digital Security: Securing Library Systems, held on November 9, 2016.
OpenAthens Conference 2018 - Catherine Micklethwaite - Case study - NHSOpenAthens
The document discusses research conducted by Catherine Micklethwaite on the future of resource discovery in the NHS. It finds that currently NHS libraries use a variety of library management systems, with over 20 different systems in use. Some libraries have discovery systems to search resources. The research aims to understand what systems are wanted for the future, including easy searching, seamless access to resources, and a national inter-library loan system. Realizing these goals faces challenges regarding authentication, getting all NHS libraries to agree to share data and systems, and the financial costs of implementing new national systems.
The document summarizes the development history of VuFind, an open source library resource discovery portal, from its inception at Villanova University in 2006 to its release as open source software in 2007. It describes how the idea was to create a single interface for searching the library catalog and databases, and how the developers aimed to make it compatible with different library systems and easy to install. It also discusses the benefits and challenges of making it an open source project.
Initech's organizational messenger solution
I am sure that you have heard about the internal organization communication revolution brought on by Slack.
It allowed employees to communicate and share information in the same way as they interact with their friends on WhatsApp and Facebook Messenger.
Since then Facebook, Microsoft, and Google have entered this area during the last year, and it's become really hot.
But what about organizations that cannot work with an external messenger that is hosted in the cloud?
Banks and other regulated financial institutions, governmental agencies, public and private healthcare institutions, cyber and homeland security firms: all need an on-premises solution that could operate on their servers behind organizational firewalls and comply with strict internal data protection policies.
We developed an internal organizational messenger to address just that kind of challenges.
Our smart solution enables workflow automation and connection to external communication channels (Facebook Messenger, Site, CRM), employing AI-driven chatbots and much more!
Let's supercharge your organization's internal communication with your private WhatsApp!
Webinar: Role of Open Source in the Digital JourneyWSO2
Open source software plays an important role in digital transformation by enabling cost savings, community involvement, and faster innovation. It provides benefits at multiple levels, from engineering and development to business operations and customer value. Open source acts as an equalizer in relationships, a recruiting tool for top talent, and will increasingly become the default approach for organizations and their software needs. Overall open source is a key enabler for digital strategies by lowering costs and accelerating the pace of innovation.
Kantara Initiative's UMA Work Group published revision 9 of its OAuth-based protocol on March 6 to solve a broad range of "access management 2.0" challenges, and will shortly begin interoperability testing. On Thursday, March 20, at 8am Pacific, the UMA Work Group conducted a free public webinar sponsored by Kantara board member CA Technologies to discuss UMA's benefits for enterprises. This is a capture of the slides from the webinar. The video can be found at http://bit.ly/1iEs30O
Blockchain in Health Research 2019 was the 2nd annual summit hosted at Georgetown University on 27 Apr 2019 by Sean Manion, Science Distributed and Gilles Hilary, Georgetown University.
This document discusses legacy library systems and the benefits of migrating to a library services platform (LSP). It defines legacy systems as those based on outdated technologies that cannot meet new requirements or allow for growth. Most current library systems fall into this category. An LSP is described as a new approach that delivers all library management, administration, and user services through a single, unified experience using microservices and other modern architectures. Key benefits of an LSP include scalability, interoperability, reduced costs, and enabling innovation to support future library trends.
Web 1.0 had a linear process where content was pushed to passive users. It focused on presenting information like a library and lacked user interaction. Scalability was limited.
Web 2.0 enabled non-linear sharing of information where even users could generate content in a community based environment that connected different applications.
Web 3.0, also called the semantic web, will feature more personalized and intelligent search engines that can understand a user's needs, desires, and activities by giving data and content more meaningful context and connections.
Presentation slides from Charleston Library Conference, November 10, 2017 on the Resource Access in the 21st Century Initiative #RA21 presented by Todd Carpenter, Robert Kelshian, Don Hemparian and Ann Gabrail.
Authentication technologies have come a long way from IP recognition and EZ Proxy but most services have not addressed the poor user experience associated with off-campus access, particularly on mobile and tablet devices. In 2017 the conversation around streamlining remote access has moved on from talk to real solutions.
In this webinar Josh Howlett of Jisc will update us on the RA21 initiative, while Phil Leahy will explore why organisations are moving to managed identity management solutions and how OpenAthens has responded to publisher feedback with its new OpenAthens Cloud product.
What can SAML / Shibboleth do for your institution? OpenAthens
This document discusses federated access management using SAML/Shibboleth single sign-on. It describes how federated access management allows users to securely access digital content and services from their home institution with a single credential. Federations like InCommon and OpenAthens allow institutions and publishers to connect once and then reuse the connection for multiple resources, lowering implementation costs. The document also notes some challenges with SAML/Shibboleth like age and network security, and suggests "user-managed access" as a potential next step beyond SAML.
This presentation was provided by Judy Luther of Informed Strategies during the NISO webinar, Engineering Access Under the Hood, held on November 1, 2017
This talk was given by Demian Katz of Villanova University at the NISO Virtual Conference, Using Open Source in Your Institution, held on February 17, 2016
This document discusses OpenAthens, a federated access management system. It provides an overview of OpenAthens' history since 1995, its clients in various sectors including academic, commercial, health and government. It then discusses how federated access management works using SAML/Shibboleth to enable access to resources while maintaining user accountability. It also notes how OpenAthens provides identity and discovery services to help institutions and content providers implement federated access management.
The infrastructure review process and aggregated results, by Rohan SlaughterJisc
Jisc's infrastructure review process involves subject specialists conducting on-site reviews of members' IT infrastructure. The reviews assess strategic, technical, and security aspects of members' infrastructure. Reviews identify pressures on members and opportunities for improvements. Aggregated findings from over 70 reviews show a range of infrastructure environments and needs across members. Reviews are welcomed by members and help Jisc better support members' IT needs.
Contributing to the pursuit of excellence, by Caroline CookeJisc
The document discusses a technology strategy and infrastructure review that was conducted at AECC University College in 2017 by experts from Jisc. The review identified areas for strategic support and developed an IT strategy to embed digital learning and teaching. Key actions included stakeholder meetings, a skills audit, infrastructure review, and staff workshop. This led to a draft strategy, digital learning initiatives, and new staff and resources. Feedback indicated the review provided reassurance, confidence, and a clearer shared vision for digital transformation.
The Strategic Developer: a new role for Higher Education?Paul Walk
The document discusses the need for a strategic developer role in higher education. Currently, developers are often seen as junior roles and not involved in strategic planning. This leads institutions to outsource development work without considering how to integrate systems. Using APIs, a strategic developer based internally could better customize remote services to meet local needs compared to external suppliers. The role would provide technical leadership to align technology with strategic goals and identify new opportunities through digital innovation, filling a gap similar to the CTO role in business. Bringing developers into senior positions would help institutions gain more value from technology investments.
This document discusses vulnerability management and the Greenbone vulnerability assessment tool. It outlines a process for vulnerability management that includes preparing by defining secure configurations, identifying assets and scanning them, classifying vulnerabilities using standards like CVSS and CVE, prioritizing based on scores and asset criticality, assigning remediation tasks, mitigating and remediating issues, storing data to support forensics and repeating the process, and improving over time based on metrics. The presentation was given by Dirk Schrader of Greenbone Networks, which develops open source vulnerability management solutions.
OpenAthens Conference 2018 - Adam Snook - Quick wins for an easier user journ...OpenAthens
The document discusses improving the user experience for accessing online resources through federated authentication. It notes that login can be a barrier and libraries try to improve discovery. The OpenAthens redirector provides a single sign-on link structure to check location and authenticate users. Personalization across platforms is now possible through federated access without compromising privacy. The RA21 initiative aims to facilitate seamless access across devices and locations through alternatives to IP authentication using existing federated technologies. Improving the organization discovery experience, providing personalization linked to login, and account linking features can enhance the user experience.
This is a joint presentation provided by Doug Goans and Chris Helms of the Georgia Tech Library during the first segment of a NISO webinar, Digital Security: Securing Library Systems, held on November 9, 2016.
OpenAthens Conference 2018 - Catherine Micklethwaite - Case study - NHSOpenAthens
The document discusses research conducted by Catherine Micklethwaite on the future of resource discovery in the NHS. It finds that currently NHS libraries use a variety of library management systems, with over 20 different systems in use. Some libraries have discovery systems to search resources. The research aims to understand what systems are wanted for the future, including easy searching, seamless access to resources, and a national inter-library loan system. Realizing these goals faces challenges regarding authentication, getting all NHS libraries to agree to share data and systems, and the financial costs of implementing new national systems.
The document summarizes the development history of VuFind, an open source library resource discovery portal, from its inception at Villanova University in 2006 to its release as open source software in 2007. It describes how the idea was to create a single interface for searching the library catalog and databases, and how the developers aimed to make it compatible with different library systems and easy to install. It also discusses the benefits and challenges of making it an open source project.
Initech's organizational messenger solution
I am sure that you have heard about the internal organization communication revolution brought on by Slack.
It allowed employees to communicate and share information in the same way as they interact with their friends on WhatsApp and Facebook Messenger.
Since then Facebook, Microsoft, and Google have entered this area during the last year, and it's become really hot.
But what about organizations that cannot work with an external messenger that is hosted in the cloud?
Banks and other regulated financial institutions, governmental agencies, public and private healthcare institutions, cyber and homeland security firms: all need an on-premises solution that could operate on their servers behind organizational firewalls and comply with strict internal data protection policies.
We developed an internal organizational messenger to address just that kind of challenges.
Our smart solution enables workflow automation and connection to external communication channels (Facebook Messenger, Site, CRM), employing AI-driven chatbots and much more!
Let's supercharge your organization's internal communication with your private WhatsApp!
Webinar: Role of Open Source in the Digital JourneyWSO2
Open source software plays an important role in digital transformation by enabling cost savings, community involvement, and faster innovation. It provides benefits at multiple levels, from engineering and development to business operations and customer value. Open source acts as an equalizer in relationships, a recruiting tool for top talent, and will increasingly become the default approach for organizations and their software needs. Overall open source is a key enabler for digital strategies by lowering costs and accelerating the pace of innovation.
Kantara Initiative's UMA Work Group published revision 9 of its OAuth-based protocol on March 6 to solve a broad range of "access management 2.0" challenges, and will shortly begin interoperability testing. On Thursday, March 20, at 8am Pacific, the UMA Work Group conducted a free public webinar sponsored by Kantara board member CA Technologies to discuss UMA's benefits for enterprises. This is a capture of the slides from the webinar. The video can be found at http://bit.ly/1iEs30O
Blockchain in Health Research 2019 was the 2nd annual summit hosted at Georgetown University on 27 Apr 2019 by Sean Manion, Science Distributed and Gilles Hilary, Georgetown University.
This document discusses legacy library systems and the benefits of migrating to a library services platform (LSP). It defines legacy systems as those based on outdated technologies that cannot meet new requirements or allow for growth. Most current library systems fall into this category. An LSP is described as a new approach that delivers all library management, administration, and user services through a single, unified experience using microservices and other modern architectures. Key benefits of an LSP include scalability, interoperability, reduced costs, and enabling innovation to support future library trends.
Web 1.0 had a linear process where content was pushed to passive users. It focused on presenting information like a library and lacked user interaction. Scalability was limited.
Web 2.0 enabled non-linear sharing of information where even users could generate content in a community based environment that connected different applications.
Web 3.0, also called the semantic web, will feature more personalized and intelligent search engines that can understand a user's needs, desires, and activities by giving data and content more meaningful context and connections.
Presentation slides from Charleston Library Conference, November 10, 2017 on the Resource Access in the 21st Century Initiative #RA21 presented by Todd Carpenter, Robert Kelshian, Don Hemparian and Ann Gabrail.
Authentication technologies have come a long way from IP recognition and EZ Proxy but most services have not addressed the poor user experience associated with off-campus access, particularly on mobile and tablet devices. In 2017 the conversation around streamlining remote access has moved on from talk to real solutions.
In this webinar Josh Howlett of Jisc will update us on the RA21 initiative, while Phil Leahy will explore why organisations are moving to managed identity management solutions and how OpenAthens has responded to publisher feedback with its new OpenAthens Cloud product.
RA21 is working on pilots to improve off-campus access to library resources. The Privacy Preserving Persistent WAYF pilot aims to enhance the Shibboleth identity provider discovery process. It will incorporate additional authentication hints, improve the sign-in flow, and enable cross-provider persistence of user choices. The WAYF Cloud pilot seeks to provide seamless access similar to IP authentication by leveraging existing authentication systems and forming standards for exchanging user data between publishers through a central WAYF Cloud software. Both pilots aim to improve the user experience for off-campus access.
Presentation by Todd Carpenter given at the American Library Association Conference on June 25, 2017 about the Resource Access in the 21st Century (RA21) project. The RA21 project is focused on improving the access control systems for digital content subscribed to by libraries.
What Do Records Managers Need to Know About Open Source, Open Standards, Open...Cheryl McKinnon
What do records and information managers need to know about the Web's Three Os? Open Source, Open Standards and Open Data? ARMA Ottawa IM Days - Nov 28, 2012
1. The document summarizes a presentation on the RA21 (Resource Access in the 21st Century) Task Force, which aims to address challenges with the current IP-based system for accessing scholarly resources and propose new solutions.
2. It outlines problems with the current system such as inconsistent user experiences for off-campus access and discusses the task force's work to date including developing draft principles and plans to test solutions through pilot programs in 2017.
3. Stakeholders are encouraged to get involved by taking a survey or expressing interest in participating in pilots to help develop best practices for improved access systems beyond IP authentication.
Digital Preservation - Manage and Provide AccessMichaelPaulmeno
This document discusses managing and providing access to digital content over the long term. It covers several key points:
- Digital preservation involves managing content through its entire lifecycle, from initial creation through long-term storage and access.
- Effective management requires addressing organizational needs, technological opportunities and changes, and available resources. It involves designating responsible people, policies, and technology.
- When providing access, it is important to use proven, sustainable technologies and deliver content completely and accurately according to access policies.
- Legal and rights issues must be considered to ensure appropriate access to content over time based on factors like donor agreements or confidential information.
- Understanding current and future users is essential for developing access strategies
The document discusses the Vikram Sarabhai Library's experience implementing the open source integrated library system (ILS) Koha. Some key points:
1) The library needed to upgrade its old ILS to better support features like web 2.0, federated searching, and digital collections. It chose Koha due to its flexibility and low cost as an open source option.
2) Implementing Koha was a long process that involved migrating data, validating records, identifying requirements, and drawing workflows. All staff were involved in planning and testing.
3) Initial returns have been positive, including streamlined recommendation, acquisition, and circulation processes. Future plans include SMS integration and a mobile interface.
Access interrupted? How changes in browser technology may impact researchers'...OpenAthens
This document discusses how upcoming changes in browser technology aimed at improving user privacy could impact researchers' access to scholarly resources through federated authentication. The SeamlessAccess coalition is working to support continued identity federation by engaging with browser vendors, testing new proposed technologies like Federated Credentials Management, and raising awareness of these changes within the academic community. Resources are provided on understanding these changes and their potential effects.
Identity and Access Management for User login and departmental level and federation level. User can be easily manageable through identity and access Management
Building and Deploying a Global Intranet with Liferayrivetlogic
Enterprise 2.0 is no longer a hype but a necessity in a new era where more enterprises are starting to have a global presence. As users' expectations of intranets grow it has become crucial for global enterprises to rise to the challenge and stay competitive by providing their employees with an effective means of collaboration, communication and socialization to not just increase productivity, but also strengthen employee loyalty.
This presentation will discuss how Liferay Portal facilitates the architecture of global intranets that meet these challenges, along with practical examples of how it can be used to achieve the results expected from an Enterprise 2.0 intranet.
Software management plans in research softwareShoaib Sufi
Slides from the 14th August 2019 webinar presentation as part of the Best Practices for HPC Software Developers (Webinar) series - https://ideas-productivity.org/events/hpc-best-practices-webinars/ - more info at https://www.exascaleproject.org/event/smp-rp/ and a recording on YouTube is at - https://www.youtube.com/watch?v=7sELeZStzdY&feature=youtu.be
Abstract:
Software is a necessary by-product of research. Software in this context can range from small shell scripts to complex and layered software ecosystems. Dealing with software as a first class citizen at the time of grant formulation is aided by the development of a Software Management Plan (SMP). An SMP can help to formalize a set of structures and goals that ensure your software is accessible and reusable in the short, medium and long term. SMP’s aim at becoming for software what Data Management Plans (DMP’s) have become for research data (DMP’s are mandatory for National Science Foundation grants). This webinar takes you through the questions you should consider when developing a Software Management Plan, how to manage the implementation of the plan, and some of the current motivation driving discussion in this area of research management.
The document discusses strategies for developing customer-centric content. It recommends performing user research such as surveys, interviews and usability tests to develop personas representing key user groups. User stories are then created based on the personas to outline tasks and goals. Content strategies should be tailored to specific use cases and ensure content is task-focused, personalized and available across channels. Iterative testing and evolution is important as customer needs change over time.
Lessons from the front line: Next generation knowledge management using socia...Velrada
Now more than ever, we are witnessing the dynamic and interconnected relationship between technology and human interaction impacting the KM space. This is being driven in part by consumer device proliferation and changing user expectations exhibited by the extraordinary rise in use of social networking platforms – with the opportunities and challenges that they bring. The way we are using the web in our personal lives and the effectiveness of this form of online engagement, coupled with a deeper understanding of how social methodologies can be integrated into the business world is forcing large, corporate organisations - which have traditionally been challenged in adopting new ways of working or processing and integrating information – to change their approach to KM, treating information and knowledge as an asset, and can be used to drive value creation through sustaining and improving competitive advantage, delivering insights and enhancing team and organisational productivity.
This document describes the Science Gateways Community Institute (SGCI), a new NSF-funded institute aimed at helping the scientific community more effectively build online gateways and resources for research. The SGCI will provide consulting services, training, developer support, opportunities for students and educators, and a forum for the gateway community to connect and exchange knowledge. The goal is for the SGCI to become a central resource for all aspects of building and supporting science gateways.
Similar to Hamparian - IP Authentication for STEM e-Content Access (20)
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the closing segment of the NISO training series "AI & Prompt Design." Session Eight: Limitations and Potential Solutions, was held on May 23, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the seventh segment of the NISO training series "AI & Prompt Design." Session 7: Open Source Language Models, was held on May 16, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the sixth segment of the NISO training series "AI & Prompt Design." Session Six: Text Classification with LLMs, was held on May 9, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the fifth segment of the NISO training series "AI & Prompt Design." Session Five: Named Entity Recognition with LLMs, was held on May 2, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the fourth segment of the NISO training series "AI & Prompt Design." Session Four: Structured Data and Assistants, was held on April 25, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the third segment of the NISO training series "AI & Prompt Design." Session Three: Beginning Conversations, was held on April 18, 2024.
This presentation was provided by Kaveh Bazargan of River Valley Technologies, during the NISO webinar "Sustainability in Publishing." The event was held April 17, 2024.
This presentation was provided by Dana Compton of the American Society of Civil Engineers (ASCE), during the NISO webinar "Sustainability in Publishing." The event was held April 17, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, during the second segment of the NISO training series "AI & Prompt Design." Session Two: Large Language Models, was held on April 11, 2024.
This presentation was provided by Teresa Hazen of the University of Arizona, Geoff Morse of Northwestern University. and Ken Varnum of the University of Michigan, during the Spring ODI Conformance Statement Workshop for Libraries. This event was held on April 9, 2024
This presentation was provided by William Mattingly of the Smithsonian Institution, during the opening segment of the NISO training series "AI & Prompt Design." Session One: Introduction to Machine Learning, was held on April 4, 2024.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the eight and final session of NISO's 2023 Training Series on Text and Data Mining. Session eight, "Building Data Driven Applications" was held on Thursday, December 7, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the seventh session of NISO's 2023 Training Series on Text and Data Mining. Session seven, "Vector Databases and Semantic Searching" was held on Thursday, November 30, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the sixth session of NISO's 2023 Training Series on Text and Data Mining. Session six, "Text Mining Techniques" was held on Thursday, November 16, 2023.
This presentation was provided by William Mattingly of the Smithsonian Institution, for the fifth session of NISO's 2023 Training Series on Text and Data Mining. Session five, "Text Processing for Library Data" was held on Thursday, November 9, 2023.
This presentation was provided by Todd Carpenter, Executive Director, during the NISO webinar on "Strategic Planning." The event was held virtually on November 8, 2023.
More from National Information Standards Organization (NISO) (20)
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Hamparian - IP Authentication for STEM e-Content Access
1. May 2018 • NISO
IP Authentication for STEM e-Content Access –
Going, Going, Gone? Past, Present, and Futures
Don Hamparian
Sr. Product Manager, OCLC
2. IP Authentication for STEM e-Content
Access – Going, Going, Gone?
Past, Present, and Futures
Foundational Technologies Panel
Digital Libraries: Authentication, Access & Security for
Information Resources
NISO
3. Americas
10,938 members
in 28 countries
EMEA
4,009 members
in 72 countries
Asia Pacific
1,601 members
in 23 countries
As of 31 December 2017
A global network of libraries
4.
5. Today’s Conversation
• IP authentication, past & present
• IP authentication’s challenges
• Alternative authentication & authorization methods
• Challenges and opportunities for libraries
7. IP Authentication
• Traditional Access Control Mechanism for 25 years
• Nearly all STEM publishers support it
• Libraries understand it and are comfortable with it
• Back in 2000 the topology for administration was simpler
• Still seen as easy to administer today
• Actual software to manage access is pretty straightforward
• “Silent” authentication and authorization for users
8. By Source (WP:NFCC#4), Fair use, https://en.wikipedia.org/w/index.php?curid=42693963
As IP authentication was being implemented
9. Early evolution in STEM access
Not all users were on the library/institution IP network,
so solutions to this problem sprung up:
• VPN access
• Virtual Desktop aka Citrix
• Proxy Servers aka EZproxy
All was good for many years
10. More recently, new challenges
• Piracy
• Disconnection of discovery from fulfillment technologies
• Native mobile apps
• Desire for more personalization at publishers web sites
• More complex network topologies
• Video and streaming content
11. A deeper look at piracy
• Some pirates are sophisticated, some simple
• Some are large-scale and systematic
• Some are for money, some for pirate’s principles
• Generally, attack vectors are simple:
– Steal credentials via Dictionary attacks, phishing, searching for
exposed credentials
– Spoof IP Address (more rare)
– Man in the middle attacks (more rare)
12. Credentials
• Mostly id/password at institutions, Some still just id(!), a
few MFA
• Not well managed by users, institutions or content
providers
• Not an IP-only problem
• Multi-factor helps significantly
• Short-lived passwords can help
• Complex passwords can help
13. Some solutions for these problems for IP
authentication exist, but should we be thinking
more broadly?
What identity management systems are
available for STEM access?
14. Introducing Shibboleth
Bright and shiny and new in 2003
• Shibboleth 1.0 introduced in 2003
• Included in implementation is the Security Assertion
Markup Language (SAML)
• Brought us web browser single sign-on
• For many years, adoption was slow and painful
• In spite of the startup pain, it was transformative
15. Shibboleth: much less painful today
• Preciseness Alert: Federated Identity Systems Implementing SAML
Browser SSO profile
• Easier implementation
• Many apps and publishers are “Shibbolized”
• Wide adoption at academic institutions
• Mature identity federations
• Many providers offering consulting or turnkey offerings
• Privacy preserving and controlled by institution IT
• https://www.shibboleth.net/
17. Central Authentication Service (CAS)
• Introduced around 2004
• Apache 2.0 Open Source
• Originally developed at Yale, now provided by Apereo
Foundation
• Can participates in identity federations such as InCommon
• https://apereo.github.io/cas/5.2.x/index.html
18. Identity Federations
• Glue that Empowers SSO at the global scale
• Simpler service provider integration
• Common policies, technology, legal terms & conditions
• Normally defined at national level
19. OpenID Connect
• An authentication layer on top of OAuth 2.0
• Specification controlled by the OpenID Foundation
• Good mobile support (especially for Android)
• Good support for API authentication and authorization
• Adoption for STEM access at a very early point
• Traditional identity management interoperation also at a very early
point
• Academic institution adoption at a very early point
• https://openid.net/connect/
20. And now a short commercial break
for RA21
• RA21: Resource Access for the 21st Century
• Joint initiative of the International Association of
STM Publishers (STM) and the National Information
Standards Organization (NISO)
• Aimed at optimizing access protocols across key
stakeholder groups
• Corporate and university subscribers, libraries, software vendors,
publishers, identity federation operators, etc.
21. And now a short commercial break
for RA21
• Purpose: To a facilitate seamless user experience to
licensed STEM content beyond IP address recognition,
supporting usability, network security and user privacy
• https://ra21.org/
22. RA21 Goals
Recommend new solutions for access
strategies beyond IP recognition in joint
collaboration with software vendors, libraries,
federation operators, publishers and service
providers
23. RA21 Goals
• Test and improve solutions by organizing pilots in
a variety of environments
• Establish best practices and publish via the NISO
Recommended Practice process
• New: Prepare for post-project phase by identifying
potential parties to operate any necessary
centralized infrastructure
24. User Experience
P3W
RA21 Workstreams
2
Two technical pilots exploring different
implementation approaches
Two cross-cutting
workstreams
exploring topics
common to both
approaches
Privacy and Security
Corporate
Pilot
WAYF
Cloud
Pilot exploring needs of
corporate segment
25. RA21 Opportunities
RA21 needs to:
• Improve UX for the researcher – the “compelling”
factor
• Communicate the how-to’s and benefits for the
institution
• Demonstrate privacy preservation
• Have more library participation
26. That’s the authentication landscape
Let’s shift to libraries
What are the challenges and opportunities
in this changing landscape?
27. First, it's a long evolution
• RA21 is about developing patterns for adoption of
SAML/SSO
• Patterns take time to turn into production systems
• My prediction is at least a five-year window for larger
publishers
• Smaller (long-tail) publishers will take longer
• Take home: IP authentication is going to be around for a
long time - EZproxy is not going away
28. Second, it’s an important evolution
SAML/SSO have many advantages to the end user:
• Privacy protection more formalized
• Single sign-on through institution and publisher applications
• Website personalization adds functionality to applications
SAML/SSO have many advantages to the institution:
• Good foundation to protect student assets
• Common vocabulary and implementation patterns to draw upon
29. But libraries need to be planning…
or challenges and opportunities
• Does the library have the IT relationships necessary to start the
conversation?
• Does institution IT have a plan? Be ready to participate and guide
• Watch trends in the identity management space – it’s evolving too
• Don’t withdraw from the institution-level conversation about identity
management – libraries have valuable insight
• Get involved with your federation operators
• Get involved in RA21
30. Publishers also have work to do
• Make sure you know your libraries’ challenges and adjust
planning accordingly
• Develop success plans with your libraries
• Have compelling UX
31. Closing thoughts
• It’s a long migration not a hot cutover
• RA21 and implementers needs to produce compelling UX
• Libraries need to stay engaged in identity management
trends and implementation
• Libraries need to advocate for their patrons
• EZproxy is there the whole way