This presentation provides a quick overview of two key, and complementary, tools used to measure trust of digital repositories. First it focusses on Trustworthy Repositories Audit and Certification (TRAC), leading towards another tool, DRAMBORA, that is applied more extensively in the next presentation. The presentation was given as part of the final module of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag ’KeepIt course’ in the project blog http://blogs.ecs.soton.ac.uk/keepit/
A demo by Matthew Addis of Arkivum on using Archivematica with ownCloud on a Mac. Session held at Cardiff University for the Research Data Network event in May 2016.
In this lecture we discuss data quality and data quality in Linked Data. This 50 minute lecture was given to masters student at Trinity College Dublin (Ireland), and had the following contents:
1) Defining Quality
2) Defining Data Quality - What, Why, Costs
3) Identifying problems early - using a simple semantic publishing process as an example
4) Assessing Linked (big) Data quality
5) Quality of LOD cloud datasets
References can be found at the end of the slides
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 (CC-BY-SA-40) International License.
KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donn...JISC KeepIt project
This presentation provides an extensive introduction to the Digital Repository Audit Method Based On Risk Assessment
(DRAMBORA). After considering how the ideas of risk and trust might affect digital repositories, the DRAMBORA methodology is applied using two practical exercises. DRAMBORA can also be applied using an interactive Web-based version of the tool, and the presentation provides an illustrated guided tour of this version of the tool. The presentation was given as part of the final module of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. Concluding by comparing DRAMBORA with DAF, the Data Asset Framework, also produced by the DCC, brings the KeepIt course effectively full circle, as the course began in module 1 with DAF. For more on this and other presentations in this course look for the tag ’KeepIt course’ in the project blog http://blogs.ecs.soton.ac.uk/keepit/
DPE/Planets/CASPAR/nestor
Joint Training Event:
The Preservation challenge: basic concepts and practical applications
March, 23th- 27th 2008
Barcelona, Spain
Christian Keitel
Landesarchiv Baden-Württemberg and nestor
A demo by Matthew Addis of Arkivum on using Archivematica with ownCloud on a Mac. Session held at Cardiff University for the Research Data Network event in May 2016.
In this lecture we discuss data quality and data quality in Linked Data. This 50 minute lecture was given to masters student at Trinity College Dublin (Ireland), and had the following contents:
1) Defining Quality
2) Defining Data Quality - What, Why, Costs
3) Identifying problems early - using a simple semantic publishing process as an example
4) Assessing Linked (big) Data quality
5) Quality of LOD cloud datasets
References can be found at the end of the slides
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 (CC-BY-SA-40) International License.
KeepIt Course 5: DRAMBORA: Risk and Trust and Data Management, by Martin Donn...JISC KeepIt project
This presentation provides an extensive introduction to the Digital Repository Audit Method Based On Risk Assessment
(DRAMBORA). After considering how the ideas of risk and trust might affect digital repositories, the DRAMBORA methodology is applied using two practical exercises. DRAMBORA can also be applied using an interactive Web-based version of the tool, and the presentation provides an illustrated guided tour of this version of the tool. The presentation was given as part of the final module of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. Concluding by comparing DRAMBORA with DAF, the Data Asset Framework, also produced by the DCC, brings the KeepIt course effectively full circle, as the course began in module 1 with DAF. For more on this and other presentations in this course look for the tag ’KeepIt course’ in the project blog http://blogs.ecs.soton.ac.uk/keepit/
DPE/Planets/CASPAR/nestor
Joint Training Event:
The Preservation challenge: basic concepts and practical applications
March, 23th- 27th 2008
Barcelona, Spain
Christian Keitel
Landesarchiv Baden-Württemberg and nestor
How the Core Trust Seal (CTS) Enables FAIR Datadri_ireland
Presentation by Natalie Harrower, Director of the The Digital Repository of Ireland, on how the Core Trust Seal requirements and implementation process help prepare a digital repository for supporting FAIR data.
Presentation at the 'Services to Support FAIR data' workshop in Vienna on 24th April 2019. Workshop series supported by OpenAire, the Research Data Alliance, FAIRsFAIR and the EOSChub
How core trust seal enables FAIR data - Natalie HarrowerOpenAIRE
How core trust seal enables FAIR data presented Natalie Harrower during the OpenAIRE workshop Services to support FAIR data, Vienna: https://www.openaire.eu/openaire-workshop-making-services-fair-vienna-april-24th-2019
Core Trust Seal for Trustworthy Data Repositories, 2018-04-19Ciarán Quinn
The CONUL Research Group sponsored a workshop on the certification of digital repositories, focusing on the CoreTrustSeal framework. The workshop was presented by Dr John B Howard of University College Dublin, a founding member of the CoreTrustSeal Board of Directors.
The workshop reviewed the concept of "trust" in the context of data management and Open Science, identifying stakeholders and the issues that identify trustworthiness as a significant issue for managers of digital repository services. An overview of initiatives and services that provide a basis for the certification of digital repositories will be provided, including the European Framework for Audit & Certification of Digital Repositories.
Focus was made on the CoreTrustSeal, a framework that represents a merger of the previously separate Data Seal of Approval and ICSU/World Data Systems assessment and certification approaches. Attendees were introduced to the assessment process and requirements, including a walk through the 17 assessment categories in the CTS questionnaire.
A benchmarking tool developed by the DCC to assess research data infrastructure. The presentation also outlines alternative versions developed by the University of the West of England and an EPSRC-compliance version
If Big Data is data that exceeds the processing capacity of conventional systems, thereby necessitating alternative processing measures, we are looking at an essentially technological challenge that IT managers are best equipped to address.
The DCC is currently working with 18 HEIs to support and develop their capabilities in the management of research data and, whilst the aforementioned challenge is not usually core to their expressed concerns, are there particular issues of curation inherent to Big Data that might force a different perspective?
We have some understanding of Big Data from our contacts in the Astronomy and High Energy Physics domains, and the scale and speed of development in Genomics data generation is well known, but the inability to provide sufficient processing capacity is not one of their more frequent complaints.
That’s not to say that Big Science and its Big Data are free of challenges in data curation; only that they are shared with their lesser cousins, where one might say that the real challenge is less one of size than diversity and complexity.
This brief presentation explores those aspects of data curation that go beyond the challenges of processing power but which may lend a broader perspective to the technology selection process.
Archive service accreditation digital developments for ARA Conference 2016Melinda Haunton
Joint paper with William Kilbride, Digital Preservation Coalition, introducing the digital repository standards landscape and how this will lead to development of Archive Service Accreditation standard and application approach
Introduction to Digital Humanities: Metadata standards and ontologies LIBIS
Guest Lecture from Roxanne Wyns (KU Leuven Libraries - LIBIS) given on November 6th 2017. Subject: Introduction to Digital Humanities (B-KUL-G0R03A) for the Master of Digital Humanities: Metadata standards and ontologies.
This short presentation is intended as a light interlude linking two practical sessions in a workshop connecting preservation planning with tools provided for use with EPrints repository software.
Preserving repository content: practical steps for repository managers by Mig...JISC KeepIt project
The JISC-funded KeepIt project is working with a series of different types of digital repository to enable the participating repository managers to formulate practical and achievable preservation plans. From the point of view of the repository manager, this presentation summarises the activities of the KeepIt project, describes the impact that the project has had on the participating repositories, and suggests 7 steps to preservation readiness that other repository managers might take. The presentation was first given at the international Open Repositories 2010 conference during July in Madrid. For more updates see the project blog http://blogs.ecs.soton.ac.uk/keepit/
More Related Content
Similar to Keepit Course 5: Tools for Assessing Trustworthy Repositories
How the Core Trust Seal (CTS) Enables FAIR Datadri_ireland
Presentation by Natalie Harrower, Director of the The Digital Repository of Ireland, on how the Core Trust Seal requirements and implementation process help prepare a digital repository for supporting FAIR data.
Presentation at the 'Services to Support FAIR data' workshop in Vienna on 24th April 2019. Workshop series supported by OpenAire, the Research Data Alliance, FAIRsFAIR and the EOSChub
How core trust seal enables FAIR data - Natalie HarrowerOpenAIRE
How core trust seal enables FAIR data presented Natalie Harrower during the OpenAIRE workshop Services to support FAIR data, Vienna: https://www.openaire.eu/openaire-workshop-making-services-fair-vienna-april-24th-2019
Core Trust Seal for Trustworthy Data Repositories, 2018-04-19Ciarán Quinn
The CONUL Research Group sponsored a workshop on the certification of digital repositories, focusing on the CoreTrustSeal framework. The workshop was presented by Dr John B Howard of University College Dublin, a founding member of the CoreTrustSeal Board of Directors.
The workshop reviewed the concept of "trust" in the context of data management and Open Science, identifying stakeholders and the issues that identify trustworthiness as a significant issue for managers of digital repository services. An overview of initiatives and services that provide a basis for the certification of digital repositories will be provided, including the European Framework for Audit & Certification of Digital Repositories.
Focus was made on the CoreTrustSeal, a framework that represents a merger of the previously separate Data Seal of Approval and ICSU/World Data Systems assessment and certification approaches. Attendees were introduced to the assessment process and requirements, including a walk through the 17 assessment categories in the CTS questionnaire.
A benchmarking tool developed by the DCC to assess research data infrastructure. The presentation also outlines alternative versions developed by the University of the West of England and an EPSRC-compliance version
If Big Data is data that exceeds the processing capacity of conventional systems, thereby necessitating alternative processing measures, we are looking at an essentially technological challenge that IT managers are best equipped to address.
The DCC is currently working with 18 HEIs to support and develop their capabilities in the management of research data and, whilst the aforementioned challenge is not usually core to their expressed concerns, are there particular issues of curation inherent to Big Data that might force a different perspective?
We have some understanding of Big Data from our contacts in the Astronomy and High Energy Physics domains, and the scale and speed of development in Genomics data generation is well known, but the inability to provide sufficient processing capacity is not one of their more frequent complaints.
That’s not to say that Big Science and its Big Data are free of challenges in data curation; only that they are shared with their lesser cousins, where one might say that the real challenge is less one of size than diversity and complexity.
This brief presentation explores those aspects of data curation that go beyond the challenges of processing power but which may lend a broader perspective to the technology selection process.
Archive service accreditation digital developments for ARA Conference 2016Melinda Haunton
Joint paper with William Kilbride, Digital Preservation Coalition, introducing the digital repository standards landscape and how this will lead to development of Archive Service Accreditation standard and application approach
Introduction to Digital Humanities: Metadata standards and ontologies LIBIS
Guest Lecture from Roxanne Wyns (KU Leuven Libraries - LIBIS) given on November 6th 2017. Subject: Introduction to Digital Humanities (B-KUL-G0R03A) for the Master of Digital Humanities: Metadata standards and ontologies.
This short presentation is intended as a light interlude linking two practical sessions in a workshop connecting preservation planning with tools provided for use with EPrints repository software.
Preserving repository content: practical steps for repository managers by Mig...JISC KeepIt project
The JISC-funded KeepIt project is working with a series of different types of digital repository to enable the participating repository managers to formulate practical and achievable preservation plans. From the point of view of the repository manager, this presentation summarises the activities of the KeepIt project, describes the impact that the project has had on the participating repositories, and suggests 7 steps to preservation readiness that other repository managers might take. The presentation was first given at the international Open Repositories 2010 conference during July in Madrid. For more updates see the project blog http://blogs.ecs.soton.ac.uk/keepit/
Update on the JISC KeepIt Repository Preservation Exemplars Project, June 2010JISC KeepIt project
This short presentation was originally given at an informal small group discussion of JISC preservation exemplar projects, current at June 2010, and acts as an update and progress report on the JISC KeepIt project. Another aim was to frame an agenda for the remaining few months of the project to seek advice and direction from our expert colleagues. For more information and commentary on this presentation, see the accompanying blog entry on 18 June 2010 at http://blogs.ecs.soton.ac.uk/keepit/
Transforming repositories: from repository managers to institutional data man...JISC KeepIt project
The last decade has seen support for digital preservation transformed. There are now a multitude of organisations, training courses, and software development tools to help guide managers of digital data towards preservation decisions and solutions. But how well do these approaches understand the needs and requirements of users? This presentation was given at ECA 2010, a conference for digital archiving professionals. But not everyone can be a digital archiving specialist. At a time of exploding volumes of digital content, especially on the Web, many non-specialists need help in preserving digital content. The presentation looks at the applicability and practicality of all this support for one class of user, digital repositories, and in particular institutional repositories (IRs) and their managers. We report on a course on digital preservation tools, designed by repository managers as part of the JISC KeepIt project. Positive feedback from the evaluations of this course have show that the emergence of the tools used in this course is a great story for digital preservation.
This is the final part of the KeepIt course. It guides evaluation of the course, and offers some concluding thoughts on where preservation should fit in the mission and priorities of digital repositories. The presentation was given as part of the final module of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag ’KeepIt course’ in the project blog http://blogs.ecs.soton.ac.uk/keepit/
This course revision presents a rapid recap of all the tools covered in the KeepIt course. It reproduces selected slides from each of the presentations given during the course to illustrate three aspects of each of the tools encountered: what they do, what they look like, what we did with them. The presentation was given as part of the final module of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag ’KeepIt course’ in the project blog http://blogs.ecs.soton.ac.uk/keepit/
This is the opening presentation for module 5, the final module of this course on digital preservation tools for repository managers, presented by the JISC KeepIt project. This module examines tools for measuring the trustworthiness of digital repositories and the effectiveness with which they are implementing preservation strategies. For more on this and other presentations in this course look for the tag ’KeepIt course’ in the project blog http://blogs.ecs.soton.ac.uk/keepit/
Preservation Planning using Plato, by Hannes Kulovits and Andreas RauberJISC KeepIt project
This presentation, part of an extensive practical tutorial on logical and bit-stream preservation using Plato (a preservation planning tool) and EPrints (software for creating digital repositories), reviews preservation planning workflow, shows how to identify requirements using a mindmap approach and then how to upload the output to Plato to run experiments and produce results. The presentation was given as part of module 4 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag ’KeepIt course’ in the project blog http://blogs.ecs.soton.ac.uk/keepit/
Physical preservation with EPrints: 1 Storage, by Adam Field, David Tarrant, ...JISC KeepIt project
This presentation, part of an extensive practical tutorial on logical and bit-stream preservation using Plato (a preservation planning tool) and EPrints (software for creating digital repositories), presents a new storage controller for EPrints providing selectable storage options locally and in the cloud. The presentation was given as part of module 4 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag ’KeepIt course’ in the project blog http://blogs.ecs.soton.ac.uk/keepit/
KeepIt Course 4: digital preservation recap, by Andreas Rauber, Hannes Kulovi...JISC KeepIt project
This presentation, the first part of an extensive practical tutorial on logical and bit-stream preservation using Plato (a preservation planning tool) and EPrints (software for creating digital repositories), provides a rapid recap on the principles and reasons for digital preservation. The presentation was given as part of module 4 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag ’KeepIt course’ in the project blog http://blogs.ecs.soton.ac.uk/keepit/
KeepIt Course 4: Putting storage, format management and preservation planning...JISC KeepIt project
This is the opening presentation for module 4 of the 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. This module puts storage, format management and preservation planning in the repository, by making such functions available from within the familiar repository interface. This introduction briefly reviews the previous module, which acted as a primer on preservation workflow, formats and characterisation, as preparation for the preservation planning tools to be encountered in this module. For more on this and other presentations in this course look for the tag ’KeepIt course’ in the project blog http://blogs.ecs.soton.ac.uk/keepit/
Keepit Course 3: Provenance (and OPM), based on slides by Luc MoreauJISC KeepIt project
This presentation offers a brief introduction to provenance, a record of the process that led to the current state of an object, based on a new descriptive model designed to allow provenance information to be exchanged between systems, the Open Provenance Model (OPM). It was given as part of module 3 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag 'KeepIt course' in the project blog http://blogs.ecs.soton.ac.uk/keepit/
KeepIt Course 3: Applying Preservation Metadata to RepositoriesJISC KeepIt project
This presentation is a short introduction to preservation metadata and PREMIS, and involves a practical exercise to show how information already being collected by digital repositories can be described by entries in the PREMIS Data Dictionary. It was given as part of module 3 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag 'KeepIt course' in the project blog http://blogs.ecs.soton.ac.uk/keepit/
Significant Properties - Where Next? (SPs part 6), by Stephen Grace and Garet...JISC KeepIt project
This presentation, the final part of six on the practical analysis of significant properties of digital objects, offers a quick summary of the main points of the other five parts, and provides credits and contact details. The presentation was given as part of module 3 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag 'KeepIt course' in the project blog http://blogs.ecs.soton.ac.uk/keepit/
Supporting Significant Properties in a Working Archive (SPs part 5), by Steph...JISC KeepIt project
This presentation, the fifth of six parts on the practical analysis of significant properties of digital objects, seeks out tools capable of extracting and maintaining properties for an archival-scale number of objects. The presentation was given as part of module 3 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag 'KeepIt course' in the project blog http://blogs.ecs.soton.ac.uk/keepit/
Significant Properties, Practical 2: Stakeholder Analysis (SPs part 4), by St...JISC KeepIt project
This presentation, the fourth of six parts on the practical analysis of significant properties of digital objects, leads participants through a practical exercise to consider the needs of different stakeholders when assessing the properties of the type of digital object considered in the previous exercise, an email message. The presentation was given as part of module 3 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag 'KeepIt course' in the project blog http://blogs.ecs.soton.ac.uk/keepit/
Significant Properties, Practical 1: Object Analysis (SPs part 3), by Stephen...JISC KeepIt project
This presentation, the third of six parts on the practical analysis of significant properties of digital objects, leads participants through an initial practical exercise to determine the properties of particular type of digital object, an email message. The presentation was given as part of module 3 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag 'KeepIt course' in the project blog http://blogs.ecs.soton.ac.uk/keepit/
InSPECT Significant Properties Framework (SPs part 2), by Stephen Grace and G...JISC KeepIt project
This presentation, the second of six parts on the practical analysis of significant properties of digital objects, considers the framework produced by the InSPECT project for assessing significant properties. The presentation was given as part of module 3 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag 'KeepIt course' in the project blog http://blogs.ecs.soton.ac.uk/keepit/
Introducing Significant Properties (SPs part 1), by Stephen Grace and Gareth ...JISC KeepIt project
This presentation, the first of six parts on the practical analysis of significant properties of digital objects, introduces the concepts. The topic concerns the characteristics of digital objects that must be preserved over time in order to ensure the continued accessibility, usability, and meaning of the objects. The presentation was given as part of module 3 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag 'KeepIt course' in the project blog http://blogs.ecs.soton.ac.uk/keepit/
This presentation introduces preservation workflow, a process to manage the risk associated with file formats of different digital objects. It was given as part of module 3 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag 'KeepIt course' in the project blog http://blogs.ecs.soton.ac.uk/keepit/
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Keepit Course 5: Tools for Assessing Trustworthy Repositories
1. Tools for assessing
trustworthy repositories
A quick overview of TRAC leading to DRAMBORA
by Steve Hitchcock
by eurovision_nicola
Haven’t we met somewhere before?
Previously on this JISC KeepIt course…
2. How AIDA was built
1. An Audit Checklist for the Certification of
Trusted Digital Repositories. This is the
document originally produced by RLG-
NARA, which later became Trustworthy
Repositories Audit and Certification (TRAC):
Criteria and Checklist
2. The Cornell University Survey of Institutional
Readiness
3. Summary of RLG-OCLC Framework
Component Characteristics
4. Network of Expertise in long-term STORage
(NESTOR)
3. DRAMBORA and DAF
• DRAMBORA (Digital Repository Audit Method
Based on Risk Assessment)
– Requires much self-insight and preparedness
– Sees everything as risk management
– Predicated on TDR
– A bit complex
• DAF (Data Audit Framework)
– Concerned with one asset type (research data)
– Aims to improve management
– Helps to measure value of research data
4. Overview
• KRDS1 Aim – investigate costs, develop
model and recommendations
• Method – detailed analysis of 4 models:
LIFE1/2 & NASA CET in combination with
OAIS and UK Research TRAC;
• Plus literature review;12 interviews; 4
detailed case studies.
5. Overview
• KRDS1 Aim – investigate costs, develop
model and recommendations
• Method – detailed analysis of 4 models:
LIFE1/2 & NASA CET in combination with
OAIS and UK Research TRAC;
Sorry, wrong TRAC.
This is HEFCE’s Transparent Approach to Costing
• Plus literature review;12 interviews; 4
detailed case studies.
7. Digital Preservation
Reference Models
- Records Management, ISO 15489:2000
- OAIS: Open Archival Information System, ISO 14721:2003
Audit & Certification Initiatives
- RLG- National Archives and Records Administration Digital
Repository Certification Task Force:
Trustworthy Repositories Audit & Certification: Criteria and
Checklist (TRAC)
- NESTOR:
Catalogue of Criteria of Trusted Digital Repositories
- DCC/DPE:
DRAMBORA: Digital Repository Audit Method Based on Risk
Assessment
8. … because good research needs good data
Trustworthy Repositories Audit & Certification (TRAC)
Criteria and Checklist
• RLG/NARA assembled an International Task Force to address the
issue of repository certification
• TRAC is a set of criteria applicable to a range of digital repositories
and archives, from academic institutional preservation repositories to
large data archives and from national libraries to third-party digital
archiving services
• Provides tools for the audit, assessment, and potential
certification of digital repositories
• Establishes audit documentation requirements required
• Delineates a process for certification
• Establishes appropriate methodologies for determining the
soundness and sustainability of digital repositories
www.repositoryaudit.eu
KeepIt #5: University of Northampton, 30 March 2010
9. TRAC: not quite a global standard
• These efforts to merge development of a
certification process highlighted small but
important differences between the criteria in this
audit checklist and the nestor Criteria Catalogue,
for example. For now, a single, standardized set
of criteria and applicable rules have proven
impractical for geopolitical reasons.
http://www.crl.edu/sites/default/files/attachments/pages/trac_0.pdf
Version 1.0, February 2007
Working towards ISO standardisation of Digital Repository Audit and
Certification - wiki
10. Structure of TRAC
There are three primary areas to be assessed within
TRAC:
1. Organizational Infrastructure
2. Digital Object Management
3. Technologies, Technical Infrastructure, Security
11. Ten principles
In January 2007 representatives of four preservation organizations
convened at the Center for Research Libraries in Chicago to seek
consensus on core criteria for digital preservation repositories, to
guide further international efforts on auditing and certifying
repositories.
… ten basic characteristics of digital preservation repositories …
The key premise underlying the core requirements is that for
repositories of all types and sizes preservation activities must be
scaled to the needs and means of the defined community or
communities.
13. Structure of checklist entries
A1.1 Repository has a mission statement that reflects a commitment
to the long-term retention of, management of, and access to
digital information.
The mission statement of the repository must be clearly identified and
accessible to depositors and other stakeholders and contain an
explicit long-term commitment.
Evidence: Mission statement for the repository; mission statement for
the organizational context in which the repository sits; legal or
legislative mandate; regulatory requirements.
15. To certify or not to certify?
That is the question
1. Take a spreadsheet with
all 84 TRAC criteria.
2. Select one.
3. Decide whether you
could certify your
repository for this, based
on where your repository
is now or where you
think it might be after
participating in this
course. by Cayusa
by fabiux
16. TRAC: audit or certification?
• Audit is the basis for comparing local capabilities against a set of
core criteria for a trusted digital repository.
• Certification is a further step that some repositories will and/or
must take for formal, objective recognition at the international or
network level.
• The result of any audit must be viewed in the context in which it
was undertaken.
17. TRAC applicability in diversity
The digital preservation community has come to not only recognize
but embrace the fact that not all repositories will be “equal.”
…proliferation of repository types (institutional repositories, open-
access repositories, digital repositories, digital preservation
repositories, digital archives, etc.) on local, regional, national, and
international levels. For many of these repositories, preservation is
not the primary purpose or explicit priority. With that
understanding, it is easy to comprehend why some repositories
may not choose to pursue certification, just as it is easy to see why
others should feel compelled (or perhaps be compelled) to pursue
certification.
18. TRAC in use: CRL reviews Portico
• "Center for Research Libraries’ report marks the first public
disclosure of a digital certification review conducted by an
independent entity.”
• Portico (www.portico.org) is a not-for-profit digital preservation
service providing a permanent archive of electronic journals, books,
and other scholarly content. As of October 2009, the Portico archive
preserved over 14 million e-journal articles and 1,900 e-books.
• CRL has concerns about Portico’s status on 12 of the 84 criteria
http://www.crl.edu/sites/default/files/attachments/pages/CRL%20Report%20on%20P
ortico%20Audit%202010.pdf
19. CRL reviews Portico:
Organisational Infrastructure
• Criteria - A3.2 Repository has procedures and policies in place, and
mechanisms for their review, update, and development as the
repository grows and as technology and community practice evolve.
• Portico policy infrastructure has improved considerably since the
test audit in 2006, but some of these policies still suffer from
internal contradictions and inconsistencies, specifically in the area
of roles & responsibilities and job descriptions.
20. CRL reviews Portico:
Digital Object Management
• Criteria - B2.10 Repository has a documented process for testing
understandability of the information content and bringing the
information content up to the agreed level of understandability.
• Portico needs to continue to identify what its community believes is
necessary for “understandability” or usability of the preserved
content. Portico should develop a process to support ongoing
research into the needs of its community and determine what the
Portico stakeholders think is an understandable e-journal, e-journal
article, e-book, etc. As those needs evolve, Portico should develop
test scenarios to evaluate how well the archive meets those needs.
21. CRL reviews Portico:
System Infrastructure
• Criteria - C2.2 Repository has software technologies appropriate to
the services it provides to its designated community and has
procedures in place to receive and monitor notifications, and
evaluate when software technology changes are needed.
• Portico’s ability to disseminate content to the users in the event of a
major “trigger event” (for example, where all content from a large
publisher with a large user base must be made available) is limited.
This relates to Portico’s status as a dark archive.
22. TRAC in use: eCrystals repository
TRAC, is open-ended and exploratory, taking into account vision and goals
and plans for a repository and therefore more suited to repositories
with an established long-term archival and preservation mandate.
At the current stage of development of the eCrystals data repository we
recommend self-assessment using the DRAMBORA toolkit as an
instrument. The audit process in many ways is more important than
actual certification, since it allows repositories to analyse and
respond to their archives' strengths and weaknesses in a systematic
fashion. Also, DRAMBORA takes a more quantified approach to
assessing repositories and would therefore work best for an
established repository looking for self-assessment.
Patel and Coles, A study of Curation and Preservation Issues in the eCrystals Data
Repository and Proposed Federation, 7 Sept. 2007
http://www.ukoln.ac.uk/projects/ebank-uk/curation/eBank3-WP4-Report%20%28Revised%29.pdf
23. DRAMBORA in use: eCrystals
Patel and Coles
• Due to the recent rapid developments in this area, as well as the
estimated time, effort and cost of undertaking an audit (the
DRAMBORA documentation estimates 28-40 hours, depending on
the scope and objectives), we have been unable to complete an
audit by the end of Phase 3 (June 2007).
24. DRAMBORA in use: eCrystals
Patel and Coles
• Having examined the criteria being used in the various audit
checklists, it is clear that there is a need to establish the scope and
objectives of an audit more explicitly and to relate them to
eCrystals more closely
• For a long-term repository it would be beneficial to have regular
audits, which verify periodically the proper functioning of records
management procedures and systems and the authenticity and
reliability of the records kept. Such monitoring is also useful in
building up a profile of the repository over time in the face of a
continuously changing environment. We suggest that a self-audit be
undertaken at a frequency of once a year
See also Patel, Preservation Planning for Crystallography Data, 25 June
2009http://wiki.ecrystals.chem.soton.ac.uk/images/8/82/ECrystals-WP4-PP-
090625.pdf