This presentation was delivered during the joint DPE/Planets/CAPAR/nestor training event, ‘The Preservation challenge: basic concepts and practical applications’ (Barcelona, March 2009). It explains how CASPAR aims to solve, from the technical point of view, the problem of accessibility and intelligibility of digital data in the long term.CASPAR approach is presented as an implementation of the OAIS functional model, introducing CASPAR Key Components, i.e. the main building blocks which constitute CASPAR architecture, and giving an overview of their functionalities, their usage and their role in the digital preservation workflow. The objective is to clarify how the digital preservation workflow is realised within CASPAR architecture.
Symantec Data Insight for Storage helps organizations better understand and control the sharp growth of unstructured data, including files such as documents, spreadsheets and emails. Data Insight for Storage provides new visibility and control into the ownership and usage of unstructured data to help organizations reduce storage costs and align their information assets to business goals.
PLEDGE: A POLICY-BASED SECURITY PROTOCOL FOR PROTECTING CONTENT ADDRESSABLE S...IJNSA Journal
In this paper we present PLEDGE, an efficient and scalable security ProtocoL for protecting fixedcontent objects in contEnt aDdressable storaGe (CAS) architEctures. PLEDGE follows an end-to-end policy-driven security approach to secure the confidentiality, integrity, and authenticity of fixed-content entities over the enterprise network links and in the nodes of the CAS device. It utilizes a customizable and configurable extensible mark-up language (XML) security policy to provide flexible, multi-level, andfine-grained encryption and hashing methodologies to fixed content CAS entities. PLEDGE secures data objects based on their content and sensitivity and highly overcomes the performance of bulk and raw encryption protocols such as the Secure Socket Layer (SSL) and the Transport Layer Security (TLS) protocols. Moreover, PLEDGE transparently stores sensitive objects encrypted (partially or totally) in the CAS storage nodes without affecting the CAS storage system operation or performance and takes into consideration the processing load, computing power, and memory capabilities of the client devices which may be constrained by limited processing power, memory resources, or network connectivity. PLEDGE complies with regulations such as the Health Insurance Portability and Accountability Act (HIPAA) requirements and the SEC Rule 17a-4 financial standards. The protocol is implemented in a real CAS network using an EMC Centera backend storage device. The application secured by PLEDGE in the sample implementation is an X-Ray radiography scanning system in a healthcare network environment. The experimental test bed implementation conducted shows a speedup factor of three over raw encryption security mechanisms.
Symantec Data Insight for Storage helps organizations better understand and control the sharp growth of unstructured data, including files such as documents, spreadsheets and emails. Data Insight for Storage provides new visibility and control into the ownership and usage of unstructured data to help organizations reduce storage costs and align their information assets to business goals.
PLEDGE: A POLICY-BASED SECURITY PROTOCOL FOR PROTECTING CONTENT ADDRESSABLE S...IJNSA Journal
In this paper we present PLEDGE, an efficient and scalable security ProtocoL for protecting fixedcontent objects in contEnt aDdressable storaGe (CAS) architEctures. PLEDGE follows an end-to-end policy-driven security approach to secure the confidentiality, integrity, and authenticity of fixed-content entities over the enterprise network links and in the nodes of the CAS device. It utilizes a customizable and configurable extensible mark-up language (XML) security policy to provide flexible, multi-level, andfine-grained encryption and hashing methodologies to fixed content CAS entities. PLEDGE secures data objects based on their content and sensitivity and highly overcomes the performance of bulk and raw encryption protocols such as the Secure Socket Layer (SSL) and the Transport Layer Security (TLS) protocols. Moreover, PLEDGE transparently stores sensitive objects encrypted (partially or totally) in the CAS storage nodes without affecting the CAS storage system operation or performance and takes into consideration the processing load, computing power, and memory capabilities of the client devices which may be constrained by limited processing power, memory resources, or network connectivity. PLEDGE complies with regulations such as the Health Insurance Portability and Accountability Act (HIPAA) requirements and the SEC Rule 17a-4 financial standards. The protocol is implemented in a real CAS network using an EMC Centera backend storage device. The application secured by PLEDGE in the sample implementation is an X-Ray radiography scanning system in a healthcare network environment. The experimental test bed implementation conducted shows a speedup factor of three over raw encryption security mechanisms.
Data Insight 4.0 is the latest version of Symantec's unstructured data governance solution. It provides actionable intelligence into the ownership and usage of unstructured data, such as documents, presentations, spreadsheets and emails. Symantec Data Insight 4.0 provides new discovery, analysis and remediation capabilities to help organizations better reduce costs, reduce risk, achieve compliance and gain insights into their unstructured data. More Info: http://bit.ly/13ct35w
Symantec Data Insight is a new technology that enables organizations to improve data governance through insights into the ownership and usage of unstructured data, including files such as documents, spreadsheets and emails. Data Insight represents innovation and integration across Symantec’s product portfolio in security and storage, providing organizations a unified approach to data governance. Data Insight is the only integrated technology of its kind to help organizations align their information assets to business goals by simplifying the remediation of exposed critical data and optimizing their storage environment. http://bit.ly/coxHtD
Symantec Data Insight 3.0 is the latest version of the company’s solution that improves information governance by providing intelligence into ownership and usage of unstructured data such as documents, presentations, spreadsheets and emails. Enhancements to Symantec Data Insight help organizations transform storage operations and simplify information governance processes to reduce costs, reduce risk and achieve compliance.
IV Support technologies understands that information management is vital to your business. Precisely why we have implemented a foolproof data backup and recovery plan
Turtles, Trust and The Future of Cybersecurity
Faith in our institutions is collapsing, and GDPR is at the door. What would cybersecurity look like if we started from scratch, right now, in our hybrid, interdependent world? It would focus relentlessly on data. Learn how a data-centric security approach can reduce risk, increase efficiency and re-engineer trust in a society where faith has been shaken by unstoppable breaches.
Information Protection is the ability to positively control and report on the use and modification of your most important information assets. In this whitepaper you will find useful information to protect your organization with Microsoft Technologies,
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...dbpublications
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different fr previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into
multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme.
Data centric security key to cloud and digital businessUlf Mattsson
Recent breaches demonstrate the urgent need to secure enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. The rapid rise of cloud databases, storage and applications has led to unease among adopters over the security of their data. Whether it is data stored in a public, private or hybrid cloud, or used in third party SaaS applications, companies have good reason to be concerned. The biggest challenge in this interconnected world is merging data security with data value and productivity. If we are to realize the benefits promised by these new ways of doing business, we urgently need a data-centric strategy to protect the sensitive data flowing through these digital business systems.
Data Insight 4.0 is the latest version of Symantec's unstructured data governance solution. It provides actionable intelligence into the ownership and usage of unstructured data, such as documents, presentations, spreadsheets and emails. Symantec Data Insight 4.0 provides new discovery, analysis and remediation capabilities to help organizations better reduce costs, reduce risk, achieve compliance and gain insights into their unstructured data. More Info: http://bit.ly/13ct35w
Symantec Data Insight is a new technology that enables organizations to improve data governance through insights into the ownership and usage of unstructured data, including files such as documents, spreadsheets and emails. Data Insight represents innovation and integration across Symantec’s product portfolio in security and storage, providing organizations a unified approach to data governance. Data Insight is the only integrated technology of its kind to help organizations align their information assets to business goals by simplifying the remediation of exposed critical data and optimizing their storage environment. http://bit.ly/coxHtD
Symantec Data Insight 3.0 is the latest version of the company’s solution that improves information governance by providing intelligence into ownership and usage of unstructured data such as documents, presentations, spreadsheets and emails. Enhancements to Symantec Data Insight help organizations transform storage operations and simplify information governance processes to reduce costs, reduce risk and achieve compliance.
IV Support technologies understands that information management is vital to your business. Precisely why we have implemented a foolproof data backup and recovery plan
Turtles, Trust and The Future of Cybersecurity
Faith in our institutions is collapsing, and GDPR is at the door. What would cybersecurity look like if we started from scratch, right now, in our hybrid, interdependent world? It would focus relentlessly on data. Learn how a data-centric security approach can reduce risk, increase efficiency and re-engineer trust in a society where faith has been shaken by unstoppable breaches.
Information Protection is the ability to positively control and report on the use and modification of your most important information assets. In this whitepaper you will find useful information to protect your organization with Microsoft Technologies,
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...dbpublications
Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third party servers and to unauthorized parties. To assure the patients’ control over access to their own PHRs, it is a promising method to encrypt the PHRs before outsourcing. Yet, issues such as risks of privacy exposure, scalability in key management, flexible access, and efficient user revocation, have remained the most important challenges toward achieving fine-grained, cryptographically enforced data access control. In this paper, we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semi trusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file. Different fr previous works in secure data outsourcing, we focus on the multiple data owner scenario, and divide the users in the PHR system into
multiple security domains that greatly reduces the key management complexity for owners and users. A high degree of patient privacy is guaranteed simultaneously by exploiting multi authority ABE. Our scheme also enables dynamic modification of access policies or file attributes, supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme.
Data centric security key to cloud and digital businessUlf Mattsson
Recent breaches demonstrate the urgent need to secure enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. The rapid rise of cloud databases, storage and applications has led to unease among adopters over the security of their data. Whether it is data stored in a public, private or hybrid cloud, or used in third party SaaS applications, companies have good reason to be concerned. The biggest challenge in this interconnected world is merging data security with data value and productivity. If we are to realize the benefits promised by these new ways of doing business, we urgently need a data-centric strategy to protect the sensitive data flowing through these digital business systems.
This presentation will provide an overview of issues in digital preservation. Presentation was delivered during the joint DPE/Planets/CAPAR/nestor training event, ‘The Preservation challenge: basic concepts and practical applications’ (Barcelona, March 2009)
Rebecca Grant - Archiving and Digital Preservation (Figshare Fest)dri_ireland
Presentation given by Rebecca Grant, Digital Archivist with Digital Repository of Ireland, part of a workshop on Digital Archiving and Digital Preservation held as part of Figshare Fest in London, May 12th 2016. Figshare is an online digital repository where researchers can preserve and share their research outputs, including figures, datasets, images, and videos. Its annual Figshare Fest is a chance to gather together institutional clients, advocates and friends to talk about open research.
Brief Introduction to Digital PreservationMichael Day
Presentation slides from a lecture given at the University of the West of England (UWE) as part of the MSc in Library and Library Management, University of the West of England, Frenchay Campus, Bristol, March 10, 2010
Introduction to the Reference Model for an Open Archival Information System (...Michael Day
Slides from a lecture given at the University of Liverpool on the course: Archives and Records Management: HIST 564 Applied Communication and IT Skills, Liverpool, UK, 3 December 2007
The Role of OAIS Representation Information in the Digital Curation of Crysta...ManjulaPatel
A presentation given by Manjula Patel (UKOLN, University of Bath) and Simon Coles (EPSRC NCS, University of Southampton) at the 5th IEEE International Conference on e-Science
9-11th December 2009, Oxford, UK
The Reference Model for an Open Archival Information System (OAIS)Michael Day
Slides from a presentation given at: Principles of Digital Preservation: a Hands-On Approach, DPE/Planets/nestor Joint Training Event, National Library of Lithuania, Vilnius, Lithuania, 1-5 October 2007
Seminar: OAIS Model application in digital preservation projectsMichael Day
Presentation slides from a seminar on the Reference Model for an Open Archival Information System (OAIS) at La preservación del patrimonio digital: conceptos básicos y principales iniciativas, Ministerio de Cultura, Madrid, Spain, March 15th, 2006
Reference Model for an Open Archival Information Systems (OAIS): Overview and...faflrt
ALA/FAFLRT Workshop on Open Archival Information Service (OAIS). Presented by Alan Wood/A.E.Wood & Erickson/Lockheed Martin, Don Sawyer/NASA/GSFC, and Lou Reich/CSC. Sponsored by ALA Federal and Armed Forces Libraries Roundtable (FAFLRT). Presented on June 16, 2001 at the ALA Annual Conference.
Metadata can play a vital role in enabling the effective management, discovery, and re-usability of digital information. Digital preservation metadata provides provenance information, supports and documents preservation activity, identifies technical features, and aids in verifying the authenticity of a digital object. This presentation gives and introduction to Digital preservation matadata and preservation metada in practise. Presentation was delivered during the joint DPE/Planets/CAPAR/nestor training event, ‘The Preservation challenge: basic concepts and practical applications’ (Barcelona, March 2009)
Bollini, Andrea, Ballarini, Emanuele, Buso, Irene, Boychuk, Mykhaylo, Cortese, Claudio, Digilio, Giuseppe, Fazio, Riccardo, Fiorenza, Damiano, Giamminonni, Luca, Lombardi, Corrado, Maffei, Stefano, Negretti, Davide, Orlandi, Sara, Pascarelli, Luigi Andrea, Perelli, Matteo, Scancarello, Immacolata, Scognamiglio, Francesco Pio, & Mornati, Susanna. (2022, June 8). DSpace-CRIS, anticipating innovation. Open Repositories 2022 (OR2022), Denver, Colorado. Zenodo. https://doi.org/10.5281/zenodo.6733234
DSpace-CRIS is the first open source CRIS/RIMS platform in the world. In 2022 the project will reach is 10th anniversary since the first open-source release of the version 1.8.2 alfa took place in November 2012.
Technically it is a fork of the DSpace platform, but the two communities have always walked together with the aim of bringing all the general purposes features of DSpace-CRIS to the main community. With version 7 and, especially, with the introduction of configurable entities in DSpace, the gap between these two "cousin" projects has been drastically reduced. However, thanks to the DSpace-CRIS community's increased experience in dealing with very complex use cases that have only recently found their way into “simple” DSpace, there are still many areas where DSpace-CRIS provides more advanced and still unique functionalities.
The presentation will summarize unique features and characteristics of DSpace-CRIS over DSpace in 7 minutes.
FAIRy stories: the FAIR Data principles in theory and in practiceCarole Goble
https://ucsb.zoom.us/meeting/register/tZYod-ippz4pHtaJ0d3ERPIFy2QIvKqjwpXR
FAIRy stories: the FAIR Data principles in theory and in practice
The ‘FAIR Guiding Principles for scientific data management and stewardship’ [1] launched a global dialogue within research and policy communities and started a journey to wider accessibility and reusability of data and preparedness for automation-readiness (I am one of the army of authors). Over the past 5 years FAIR has become a movement, a mantra and a methodology for scientific research and increasingly in the commercial and public sector. FAIR is now part of NIH, European Commission and OECD policy. But just figuring out what the FAIR principles really mean and how we implement them has proved more challenging than one might have guessed. To quote the novelist Rick Riordan “Fairness does not mean everyone gets the same. Fairness means everyone gets what they need”.
As a data infrastructure wrangler I lead and participate in projects implementing forms of FAIR in pan-national European biomedical Research Infrastructures. We apply web-based industry-lead approaches like Schema.org; work with big pharma on specialised FAIRification pipelines for legacy data; promote FAIR by Design methodologies and platforms into the researcher lab; and expand the principles of FAIR beyond data to computational workflows and digital objects. Many use Linked Data approaches.
In this talk I’ll use some of these projects to shine some light on the FAIR movement. Spoiler alert: although there are technical issues, the greatest challenges are social. FAIR is a team sport. Knowledge Graphs play a role – not just as consumers of FAIR data but as active contributors. To paraphrase another novelist, “It is a truth universally acknowledged that a Knowledge Graph must be in want of FAIR data.”
[1] Wilkinson, M., Dumontier, M., Aalbersberg, I. et al. The FAIR Guiding Principles for scientific data management and stewardship. Sci Data 3, 160018 (2016). https://doi.org/10.1038/sdata.2016.18
Micah Altman, Harvard; Policy-based Data Management
The 2nd Research Data Access and Preservation (RDAP) Summit
An ASIS&T Summit
March 31-April 1, 2011 Denver, CO
In cooperation with the Coalition for Networked Information
http://asist.org/Conferences/RDAP11/index.html
Presentation slides from a lecture given at the University of the West of England (UWE) as part of the MSc in Library and Library Management, University of the West of England, Frenchay Campus, Bristol, March 24, 2009
This presentation was delivered during the joint DPE/Planets/CAPAR/nestor training event, ‘The Preservation challenge: basic concepts and practical applications’ (Barcelona, March 2009). It is aimed at presenting the fundamental problems related to the preservation of intellectual property material, and how some of these problems have been addressed in CASPAR.The objective is to present CASPAR approach to the problem of identifying and preserving all the existing rights related to a digital work.
DPE/Planets/CASPAR/nestor
Joint Training Event:
The Preservation challenge: basic concepts and practical applications
March, 23th- 27th 2008
Barcelona, Spain
Christian Keitel
Landesarchiv Baden-Württemberg and nestor
Building A Sustainable Model for Digital Preservation Services, Clive Billenn...DigitalPreservationEurope
Presentation from 3rd Annual WePreserve Conference in Nice 2008 by Clive Billenness, Programme Manager - Planets. On the future digital preservation models and services.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Infrastructure Training Session
1. An Infrastructure for Preservation Claudio Prandoni Marlis Valentini MetaWare SpA & CASPAR
2.
3.
4.
5.
6.
7.
8.
9.
10. OAIS Information Model Content Information Data Object interpreted using interpreted using Information Package Preservation Description Information Needed for long-term preservation Descriptive Information Needed for discovery Primary focus of archival preservation Representation Information Designated Community Knowledge Base
14. CASPAR key components Creation, maintenance and reuse of OAIS Representation Information Allow search of an object using either a related measurable parameter or a linkage to remote values Construction and unpackaging of OAIS Information Packages Centralised and persistent storage and retrieval of OAIS Representation Information, including PDI OAIS-based Preservation Aware Storage, providing built-in support for bit and logical preservation
15. CASPAR key components Information discovery services Definition and enforcement of access control policies Registration of provenance information on digital works and retrieval of right holding information Maintenance and verification of authenticity in terms of identity and integrity of the digital objects Reception of notifications from Publishers for a specific “topic” and sending of alerts to Subscribers Definition of Designated Communities, identification of missing Representation Information