From: Linked Data: what cataloguers need to know. A CIG event. 25 November 2013, Birmingham. #cigld
http://www.cilip.org.uk/cataloguing-and-indexing-group/events/linked-data-what-cataloguers-need-know-cig-event
Accompanying write-up from Catalogue & Index 174: http://discovery.ucl.ac.uk/1449460/
Anglo-American Cataloguing Rules AACR2 to acquire an international adaptability.Cataloging & Classification.AACR1 and AACR2.AACR1 Anglo-American Cataloging Rules. North American text. Chicago: American Library Association, 1967.
AACR1, Chap. 12 Anglo-American Cataloging Rules. North American text. Chapter 12. Chicago: American Library
Association,
1975.
AACR2 Anglo-American Cataloguing Rules. 2nd ed. Chicago: American Library Association, 1
An introductory presentation on the concept of Library Classification by Dr. Keshava, Professor, Department of Studies and Research in Library and Information Science, Tumkur University, Karnataka, INDIA.
From: Linked Data: what cataloguers need to know. A CIG event. 25 November 2013, Birmingham. #cigld
http://www.cilip.org.uk/cataloguing-and-indexing-group/events/linked-data-what-cataloguers-need-know-cig-event
Accompanying write-up from Catalogue & Index 174: http://discovery.ucl.ac.uk/1449460/
Anglo-American Cataloguing Rules AACR2 to acquire an international adaptability.Cataloging & Classification.AACR1 and AACR2.AACR1 Anglo-American Cataloging Rules. North American text. Chicago: American Library Association, 1967.
AACR1, Chap. 12 Anglo-American Cataloging Rules. North American text. Chapter 12. Chicago: American Library
Association,
1975.
AACR2 Anglo-American Cataloguing Rules. 2nd ed. Chicago: American Library Association, 1
An introductory presentation on the concept of Library Classification by Dr. Keshava, Professor, Department of Studies and Research in Library and Information Science, Tumkur University, Karnataka, INDIA.
ALA Digital Reference Publisher Troy Linker joined Amigos Library Services at "RDA @ Your Library: An Online Conference about Resource Description and Access" in early February to present "AACR2 to RDA: Using the RDA Toolkit." He offered background and tips for making a successful transition from AACR2 to RDA and how the RDA Toolkit can help
Evaluating a dictionary: is the process of judging or calculating the quality, importance, amount, or value of dictionary : Evaluation of this new treatment cannot take place until all the data has been collected.
RDA (Resource Description and Access) is a new standard for describing library resources, designed to replace AACR2. Library staff, including public services, systems personnel, and catalogers, may have heard mention of RDA but not know much about it or how it will change their daily work. You may have many questions. What is RDA? We'll give a very little bit of history and theoretical background. What is this going to mean for catalogers, ILS managers, and users in the near term? What are the future implications, or, why are we doing this? What are the juicy bits of controversy in cataloger-land? And finally, Do we HAVE to? We'll talk for a while, have some activities that get you thinking, and find out your thoughts on RDA.
Presented at "Captains & Crew Collaborating," the 8th annual paraprofessional conference at J.Y. Joyner Library, East Carolina University.
CLASSIFIED CATALOGUE
Entries in Classified Catalogue
Different Sections of the Main Entry
Main Entry ( Back Portion)Tracing Section
These notes may be of the following kinds:
The following kinds of added entries are formed in a classified catalogue
These entries can be of the following types
There are many kinds of cross reference index entries ; of which the following five kinds are the main
References
This is an archive on a webinar delivered on January 12, 2012. Description: If you’re really new to cataloging, this session is for you. In this 90-minute online session, facilitated by NEKLS technology librarian Heather Braum, you will:
learn the basic principles behind cataloging,
discover why librarians catalog,
learn to read a basic MARC record,
see what a good MARC record looks like,
learn basic cataloging terminology,
and practice describing different materials.
Special thanks to Robin Fay for allowing me to use a couple of the ideas shared in this webinar and presentation. See her outstanding slides: http://www.slideshare.net/robinfay/cataloging-basics-presentation.
Classified Catalogue Code ,Classified catalogue code (CCC), S.R. Ranganathan, Information system, OPAC, Database management system (DBMS) card catalogue and online catalogue, and emphasises on the need of developing computer-based library information systems and services. It describes database technology, kinds of databases, database management system, computerised library information system, and management information system. It coven in detail the database design and compatibility of cataloguing codes for developing databases of computer-based library information systems.
A comparative analysis of library classification systemsAli Hassan Maken
We use classification each & every moment of the life by intentionally or unintentionally. Classification has always been the backbone of all Library operations and without it, library is definitely going to suffer in its recourse and to find a particular piece of information from unorganized heap of knowledge is almost impossible. The library classification is core instrument for organizing and retrieval of the documents stored in a library. At present era they are the navigation tools for locating and retrieving documents in more precisely and relevantly. The electronic versions of the DDC and UDC and other classification schemes make it possible to realize the potential of library classification to improve subject retrieval.
ALA Digital Reference Publisher Troy Linker joined Amigos Library Services at "RDA @ Your Library: An Online Conference about Resource Description and Access" in early February to present "AACR2 to RDA: Using the RDA Toolkit." He offered background and tips for making a successful transition from AACR2 to RDA and how the RDA Toolkit can help
Evaluating a dictionary: is the process of judging or calculating the quality, importance, amount, or value of dictionary : Evaluation of this new treatment cannot take place until all the data has been collected.
RDA (Resource Description and Access) is a new standard for describing library resources, designed to replace AACR2. Library staff, including public services, systems personnel, and catalogers, may have heard mention of RDA but not know much about it or how it will change their daily work. You may have many questions. What is RDA? We'll give a very little bit of history and theoretical background. What is this going to mean for catalogers, ILS managers, and users in the near term? What are the future implications, or, why are we doing this? What are the juicy bits of controversy in cataloger-land? And finally, Do we HAVE to? We'll talk for a while, have some activities that get you thinking, and find out your thoughts on RDA.
Presented at "Captains & Crew Collaborating," the 8th annual paraprofessional conference at J.Y. Joyner Library, East Carolina University.
CLASSIFIED CATALOGUE
Entries in Classified Catalogue
Different Sections of the Main Entry
Main Entry ( Back Portion)Tracing Section
These notes may be of the following kinds:
The following kinds of added entries are formed in a classified catalogue
These entries can be of the following types
There are many kinds of cross reference index entries ; of which the following five kinds are the main
References
This is an archive on a webinar delivered on January 12, 2012. Description: If you’re really new to cataloging, this session is for you. In this 90-minute online session, facilitated by NEKLS technology librarian Heather Braum, you will:
learn the basic principles behind cataloging,
discover why librarians catalog,
learn to read a basic MARC record,
see what a good MARC record looks like,
learn basic cataloging terminology,
and practice describing different materials.
Special thanks to Robin Fay for allowing me to use a couple of the ideas shared in this webinar and presentation. See her outstanding slides: http://www.slideshare.net/robinfay/cataloging-basics-presentation.
Classified Catalogue Code ,Classified catalogue code (CCC), S.R. Ranganathan, Information system, OPAC, Database management system (DBMS) card catalogue and online catalogue, and emphasises on the need of developing computer-based library information systems and services. It describes database technology, kinds of databases, database management system, computerised library information system, and management information system. It coven in detail the database design and compatibility of cataloguing codes for developing databases of computer-based library information systems.
A comparative analysis of library classification systemsAli Hassan Maken
We use classification each & every moment of the life by intentionally or unintentionally. Classification has always been the backbone of all Library operations and without it, library is definitely going to suffer in its recourse and to find a particular piece of information from unorganized heap of knowledge is almost impossible. The library classification is core instrument for organizing and retrieval of the documents stored in a library. At present era they are the navigation tools for locating and retrieving documents in more precisely and relevantly. The electronic versions of the DDC and UDC and other classification schemes make it possible to realize the potential of library classification to improve subject retrieval.
This is the second assignment of IST616 in iSchool Syracuse in Fall 2012. The requirement of this assignment is to analysis an classification. And the classification scheme I chose was Culture Classification designed by Virtual Terrain Project: http://vterrain.org/Culture/culture_class.html
The Buzz About BIBFRAME, by Angela KroegerAngela Kroeger
Overview of the Library of Congress's BIBFRAME initiative, including an overview of the BIBFRAME model and core classes, the necessity of replacing MARC, BIBFRAME alignment with RDA and FRBR, and the kinds of bibliographic functionality BIBFRAME linked data might enable in the future. Presentation by Angela Kroeger of the Criss Library at the University of Nebraska at Omaha, presented at the Amigos Online Conference, "Is RDA on Your RaDAr?" February 20, 2014. Full presenter notes/script and bibliography available upon request. Contact angelajkroeger [at] gmail [dot] com.
This presentation was provided by Bobbi Patham of Springer Nature, as part of the NISO Standards Update on "KBART (Knowledge Bases and Related Tools)" held during ALA Annual on June 25, 2023.
This presentation was delivered by Beacher Wiggins of the Library of Congress during the NISO Virtual Conference, BIBFRAME & Real World Applications of Linked Bibliographic Data, held on June 15, 2016.
An introduction to Metadata Application Profileskcoylenet
These slides are from a DCMI/ASIS&T webinar on metadata application profiles. It gives a high level introduction to profiles, provides examples of what they might look like, and shows some work being done through W3C and DCMI.
BHL Technical Projects Update presented during the BHL Stafff and Technical Meeting on September 26-27, 2012 at the Harvard Museum of Comparative Zoology
Cambridge, Massachusetts
*Updated and reorganised following feedback in the breakouts*
While many librarians have developed mechanisms and
structures for managing local scholarship separate from
their standard resource management practices, the
intersection of the two content streams is occurring at
many institutions. During the past decade the presenters
have dedicated themselves to capturing best practices
of electronic resource management and mapping out
paths for creating open access workflows. Join them for a
lively discussion and interactive session where they outline
ways to bring these two initiatives together and identify the
teams needed.
Graham Stone
Jisc Collections
Peter McCracken
Cornell University
Jill Emery
Portland State University Library
NISO Webinar:
Experimenting with BIBFRAME: Reports from Early Adopters
About the Webinar
In May 2011, the Library of Congress officially launched a new modeling initiative, Bibliographic Framework Initiative, as a linked data alternative to MARC. The Library then announced in November 2012 the proposed model, called BIBFRAME. Since then, the library world is moving from mainly theorizing about the BIBFRAME model to attempts to implement practical experimentation and testing. This experimentation is iterative, and continues to shape the model so that it’s stable enough and broadly acceptable enough for adoption.
In this webinar, several institutions will share their progress in experimenting with BIBFRAME within their library system. They will discuss the existing, developing, and planned projects happening at their institutions. Challenges and opportunities in exploring and implementing BIBFRAME in their institutions will be discussed as well.
Agenda
Introduction
Todd Carpenter, Executive Director, NISO
Experimental Mode: The National Library of Medicine and experiences with BIBFRAME
Nancy Fallgren, Metadata Specialist Librarian, National Library of Medicine, National Institutes of Health, US Department of Health and Human Services (DHHS)
Exploring BIBFRAME at a Small Academic Library
Jeremy Nelson, Metadata and Systems Librarian, Colorado College
Working with BIBFRAME for discovery and production: Linked data for Libraries/Linked Data for Production
Nancy Lorimer, Head, Metadata Dept, Stanford University Libraries
This webinar will provide an overview of the current work undertaken to re-write the techniques for electronic resource management with the incorporation of open access workflow management. This overview will provide insight into the key areas under exploration and outline the feedback compiled from the two interactive sessions held at the UKSG Annual Conference. We will also talk about the next steps we undertake to share the development of this project.
Brief overview of linked data, RDA, FRBR, big data and sharing data ; discussion followed (based on Alastair Croll's presentation at ALA). robin fay @georgiawebgurl ; peter murray (lyrasis)
The Progress of BIBFRAME, by Angela KroegerAngela Kroeger
Presentation given at the OLAC-MOUG 2014 conference. Abstract: BIBFRAME is the Library of Congress's current effort to develop a linked data replacement for MARC. BIBFRAME is a work in progress, not yet ready for implementation. In this two-hour session, we will examine how BIBFRAME works, what it is intended to accomplish, and the progress that has been made toward that goal. We'll take a look at the BIBFRAME tools that are under development, including the prototype editor for creating new records. And we'll share a glimpse of what the future holds for library catalogs and cataloging. NOTE: SlideShare seems to have garbled the formatting of some of my slides. To receive a clean copy via email, contact me at angelajkroeger [at] gmail [dot] com.
This presentation was delivered by Carolyn Hansen of the University of Cincinnati during the NISO VIrtual Conference, BIBFRAME & Real World Applications of Linked Bibliographic Data, held on June 15, 2016
On metaphor: a book review of Metaphors we live byKai Li
It is a book review presentation made by Kai Li for Info861 at CCI, Drexel University. The presentation is about the book Metaphors we live by, written by George Lakoff and Mark Johnson.
Grassroots Read: Planning, Marketing and Assessing PlanKai Li
This is the final planning of the Grassroots Read project finished by Mallory Arents, Megan Ashley, Kai Li and Kusturie Moodley, as part of the IST 613 class in iSchool, Syracuse University.
This presentation is an introduction to RDFa, as the fourth assignment of the IST 681 in iSchool, Syracuse University. The presentation is made by Kai Li, who is a library student in Syracuse University..
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
4. Timeline and Documents
• 2011-05-13 Statement of initiation
• 2011-10-31 Initial plan by LoC
• 2012-11-21 BIBFRAME Primer
• 2013-01-26 Launch of BIBFRAME.org
• 2013-04-30 Annotation document (1st draft ver.)
• 2013-05-22 On BF Authority: a discussion paper
• 2013-06-25 Resource Type document: discussion paper
• 2013-08-21 Use Cases and Requirements document
• 2013-08-26 Annotation Model (2nd draft ver.)
6. What is BIBFRAME
• BF can be seen as a replacement of MARC:
• BF can and will serve as an encoding standard for RDA and other content
standards
• But, it’s not only a replacement of MARC:
• BF is an environment/model/ontology focusing on bibliographic data
8. Use Cases
• 15 use cases are
defined by the
Use Cases and
Requirements
document:
• http://bibframe.
org/documentati
on/bibframe-
usecases/
For library users
For librarians
9. Requirements and Design Objectives
• Web oriented architecture
Linked Open Data
Expressed in RDF
• Resource identity
• Property identity
• Vocabulary evolution
• Localized extensibility
• Third party value add
• Defined serialization to support interchange
10. Requirements and Design Objectives
(cont.)
• Minimize ontology mechanics
• Web oriented search
SPARQL (though not a requirement)
• Support legacy and existing search technologies
Search/Retrieval via URL (SRU) / Contextual Query Language (CQL)
Z39.50
OAI-PMH
• Enabling web triggers
• Internationalization
http://bibframe.org/documentation/bibframe-usecases/
11. Model
• Work
• Instance
• Authority
• Annotation
http://de.slideshare.net/zepheiraorg/bibliographic-
14207718
12. Work
• “A BIBFRAME Creative Work, abbreviated simply as Work, reflects a
conceptual cataloging item.”
• But, a BF work is not a FRBR/RDA work:
http://de.slideshare.net/zepheiraorg/alabibframe-lc20130630
13. Instance
• “BIBFRAME Instances reflect an individual, material embodiment of a
BIBFRAME Work that can be physical or digital in nature. “
• Each BF Instance is an instance of one and only one BF work.
• A BF Instance is basically a FRBR Manifestation, because information
about BF Item largely belongs to BF Annotation.
14. Authority
• “BIBFRAME Authorities are key authority concepts that are the target
of defined relationships reflected in the Work and Instance.”
• BF Authority are not to compete or replace existing authority
systems, but to provide a “common, light weight abstraction layer”
over these authority efforts to make them more effective.
• According to the discussion paper about BF Authority, nine categories
of Authority are currently defined:
• Family, Jurisdiction, Meeting, Organization, Person, Place, Topic, Classification,
and Temporal Concept
16. Authority Implementation 2: “direct” approach
• This method, by linking directly
to the authority resource, is
desired by most stakeholders;
• It can be used for classification,
if LD versions of DDC and LCC
are to be used in the future;
• However, this approach is less
flexible than the first approach,
making it harder for BF to be a
“common, light weight
abstraction layer”.
17. Authority Implementation 3: role resource
• This method provides
the highest level of
flexibility, especially the
“ability to handle
controlled role
information”;
• However, it may also
result in unnecessary
complexity.
19. Annotation
• “In general, an Annotation asserts information about a resource; a
BIBFRAME Annotation asserts information about a BIBFRAME
resource.”
• Annotation can be linked to both Work and Instance
• Annotation is about institution-specific information
• http://bibframe.org/documentation/annotations/
20. Use Cases/Types of BF Annotation
• 4 use cases are defined by BF Annotation Model (2nd draft ver.):
• Cover art
• Holdings
• Reviews
• Descriptions
• Including summary, abstract, and table of contents
21. An Example of Holding Information
1 <http://xyz.org/bibframeTestCases/Annotations/Annotation/H
olding>
a bf:Holding;
2 bf:annotationAssertedBy < http://id.loc.gov/vocabulary/organizations/dlc> ;
3 bf:dateOfAssertion "20130808" ;
4 bf:holds <http://xyz.org/bibframeTestCases/Annotations/Instance/bluebeard> ;
5 bf:heldBy < http://id.loc.gov/vocabulary/organizations/dlc> ;
6 bf:subLocation "Jefferson or Adams Building Reading Rooms" ;
7 bf:callNumber "PS3572.O5 B5 1987C" ;
8 bf:copyNote "Copy 157" ;
9 bf:copyNote "Signed by the author." ;
10 bf:copyId "71234" ;
11 bf:circulationStatus "non-circulating" ;
12 bf:accessCondition "Access is restricted; consult library for details" .
22. Vocabularies
• BF Vocab is still being established.
• Constant updates are still going on.
http://bibframe.org/vocab/
23. Components of BF Vocabulary
• Resource:
• Four major classes (WIAA), and their specific types
• Properties:
• A resource may have different properties when used with different roles
• Values:
• One of the examples is the resource types in the discussion paper
24. BIBFRAME Resource Types
• Discussion paper
• http://bibframe.org/documentatio
n/resource-types/
• Only include subclasses of the
CreativeWork class, rather than
those of Instance class
• The proposed list is a melding of
MODS, MARC and RDA lists
• Language material: Cartography:
• Dataset:
• Notated music: Notated movement:
• Audio:
• Still image:
• Moving image
• Three dimensional object:
• Software/multimedia:
• Mixed material
• Collection:
• Manuscript:
• Tactile:
25. Observations
• 1. Even though BF seems to have a promising future, it’s still in the
very early stage
• There is a small but active community; conversations are active
• More documents, bridges … need to be designed in the coming years, before
it can actually serve as a replacement of MARC 21, if not more
26. Observations
• 2. Use cases are important
• Nine use cases for BIBFRAME model have been identified from the
perspectives of end users as well as librarians, but…
• More need to be identified for each section of BF, especially for annotation
and authority, from broader scopes:
• “It seems to me that the decision to be made isn't so much about the structure of the
authority but the anticipated uses, including vocabulary maintenance (as you mention)
and linking to other communities that create bibliographic data.” -- Karen Coyle
([BIBFRAME] Authority - Treatment of role data)
• Use cases in local contexts need to be considered for local implementations
27. Questions
• Is it possible to integrate bibliographic data into the bigger data
world?
Editor's Notes
This integration needs a thorough re-design of the current system with creativity and focus on all the details.