An short introduction to the PRIME (Publisher, Repository and Institutional Metadata Exchange) project, by Brian Hole, at the JISC Managing Research Data programme launch workshop in Nottingham, UK, October 25th 2012.
Sustainable, Successful Open Data PublicationBrian Hole
Slides from a presentation given by Brian Hole from Ubiquity Press at the 9th International Digital Curation Conference, San Francisco, February 25 2014.
Sustainable, Successful Open Data PublicationBrian Hole
Slides from a presentation given by Brian Hole from Ubiquity Press at the 9th International Digital Curation Conference, San Francisco, February 25 2014.
Introducing PRIME:Publisher, Repository and Institutional Metadata ExchangeBrian Hole
"Introducing PRIME:Publisher, Repository and Institutional Metadata Exchange" – Brian Hole, Ubiquity Press.
OpenAIRE Interoperability Workshop - University of Minho, Braga, Portugal, 8 February 2013
The Journal of Open Archaeology Data and PRIME: Incentivising Open Data Archi...Brian Hole
An introduction to the Journal of Open Archaeology Data (JOAD) and the Publisher, Repository and Institutional Metadata Exchange (PRIME) project, by Brian Hole. Presentation given at the 7th World Archaeological Congress (WAC 7), at the Dead Sea, Jordan, in 18 January 2013.
Talk given at the “Shareable by Design: Making research data available for access” workshop, London School of Hygiene and Tropical Medicine, November 12 2014
A talk from 11 Febrary 2013, part of the University College London “Research Programming in Practice” seminar series. Brian Hole, founder of Ubiquity Press and creator of the Journal of Open Research Software wspeaks about a thorny problem for computationally-focused researchers: how do you best build a publication record and enhance your academic reputation when your primary output as a researcher is software? The Journal of Open Research Software is one potential solution, associating a software entity with a peer-reviewed journal publication.
Introducing PRIME:Publisher, Repository and Institutional Metadata ExchangeBrian Hole
"Introducing PRIME:Publisher, Repository and Institutional Metadata Exchange" – Brian Hole, Ubiquity Press.
OpenAIRE Interoperability Workshop - University of Minho, Braga, Portugal, 8 February 2013
The Journal of Open Archaeology Data and PRIME: Incentivising Open Data Archi...Brian Hole
An introduction to the Journal of Open Archaeology Data (JOAD) and the Publisher, Repository and Institutional Metadata Exchange (PRIME) project, by Brian Hole. Presentation given at the 7th World Archaeological Congress (WAC 7), at the Dead Sea, Jordan, in 18 January 2013.
Talk given at the “Shareable by Design: Making research data available for access” workshop, London School of Hygiene and Tropical Medicine, November 12 2014
A talk from 11 Febrary 2013, part of the University College London “Research Programming in Practice” seminar series. Brian Hole, founder of Ubiquity Press and creator of the Journal of Open Research Software wspeaks about a thorny problem for computationally-focused researchers: how do you best build a publication record and enhance your academic reputation when your primary output as a researcher is software? The Journal of Open Research Software is one potential solution, associating a software entity with a peer-reviewed journal publication.
Anthony Plamondon, Vice President, The Lukens Company
Join Anthony to learn how your nonprofit can use Facebook custom audience retargeting techniques and digital advertising to drive awareness and reach niche audiences. They will discuss Seattle Art Museum’s Teen Night Out Case Study and share insights on using Facebook and Twitter for advanced demographic targeting.
Reactive programming and Hystrix fault tolerance by Max MyslyvtsevJavaDayUA
Reactive programming is a new paradigm that provides asynchronous event-based flow control. Java implementation is called rxJava and is being developed by Netfix. They have also released Hystrix — a non-functional layer that provides fault tolerance and latency features which also exposes reactive API.
Culture is everywhere we look, and (perhaps more importantly) everywhere we don’t look. It informs our work, our purchases, our usage, our expectations, our comfort, and our communications (indeed, if you aren’t familiar with a specific geographic and historical set of experiences, the presumably clever title for this talk will instead be perhaps bland). In this presentation, Steve will explore the ways we can experience, observe, and understand diverse cultures to foster successful collaborations, usable products, and desirable experiences.
Yes, My Tuatara Loves to Cha-Cha Improv, Creativity and DesignSteve Portigal
From UX New Zealand 2015 - Improv is not ‘stand-up comedy’ but a series of games that offer huge degrees of freedom within a set of constraints. During improv, we bring out quickly-understood-and-communicated rules of culture that are implicit, not explicit.
Design and improv have important similarities. Both practices involve collaboration and brainstorming; an emphasis on breakthrough thinking; in-the-moment aspects and ‘Aha!’ moments; a balance of process, structure, and unfettered creativity; an enormous unspoken interaction; and the need to learn upon reflection.
Playing with improv can help us to be more mindful of the power of listening, to create a more collaborative work culture, to develop our own creativity, and to warm up teammates and clients in workshops and design sessions.
In this interactive presentation, you’ll learn about improv, listening, and creativity, and how each supports the others. No tuataras will be harmed.
Open Access: Advantages, Funding, Opportunities Brian Hole
"Open Access: Advantages, Funding, Opportunities" - talk given to the Oxford Publishing Society, Oxford Brookes University, by Brian Hole, October 24th 2012.
Advocating Open Access: Before, during and after HEFCENick Sheppard
Since “self-archiving” of research outputs was first mooted in the mid-1990s, initiatives towards “green” Open Access (OA) across the sector have met with generally limited success and coverage in institutional and subject repositories is generally cited at around 20-30%. However, since the Finch report in 2012 combined with OA policies from RCUK, also in 2012, and HEFCE the following year, there is little doubt that a tipping point of awareness has been reached. This session will aim to contextualise the HEFCE policy in the broader history of Open Access and present a case study of a non-research intensive University and how the repository manager has sought to liaise with academic support services in order to facilitate knowledge exchange across the University. - See more at: http://www.cilip.org.uk/events/open-access-advocacy#sthash.9YqReHt0.dpuf
Presentation given at CERN Workshop on Innovations in Scholarly Communication (OAI7) on 22nd June 2011
http://indico.cern.ch/conferenceDisplay.py?confId=103325
The scope of this module is to introduce postgraduate candidates to the principles and practice of information literacy as applied to PhD research and to develop those skills which will enhance the quality of their research, expand their career opportunities in a knowledge-based society and build awareness of both quantitative and qualitative measurement tools.
Open Research comprises open access to the broad range of research outputs, from journal articles and the underlying data to protocols, results (including negative results), software and tools. Open Research increases inclusivity and collaboration, improves transparency and reproducibility of research and underpins research integrity.
This workshop focuses on the benefits of practicing open research for you as a researcher, to improve discoverability and maximise access to your work and to raise your professional profile.
By the end of the session you will:
• Have an understanding of the principles of Open Research
• Understand open licences and how they apply to publications, data and software
• Be able to apply key tools and techniques to increase the visibility of yourself and your research, including repositories, ORCID, social media and altmetrics
• Describe the different ways of making research and data available open access
"Filling the digital preservation gap" with ArchivematicaJenny Mitcham
A presentation given by Jenny Mitcham at the iPRES conference on 6th November 2015 in Chapel Hill, North Carolina. It describes work underway in the "Filling the Digital Preservation Gap" project using Archivematica to preserve research data
Open Scholarship: more important than ever. OA week 2018Brian Hole
Overview of the Ubiquity Press approach to Open Access and Open Scholarship for Open Access Week 2018. Presentation given at the Levy Library at the Icahn School of Medicine at Mt Sinai, New York, October 24th 2018.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
1. PRIME:
Publisher, Repository & Institutional
Metadata Exchange
Brian Hole
JISC MRD – October 25th 2012
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress
2. 1. Introduction
2. Background: The DryadUK
and REWARD projects
3. PRIME (Scenarios)
4. Next steps
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress
5. • “Dryad is an international repository of
data underlying peer-reviewed articles in
the basic and applied biosciences.”
• Improved integration with publisher
workflows:
• Publishers can send metadata to
Dryad either at point of acceptance,
or now also point of submission
• Enabled peer review of data
• Provisional DOIs
• Dryad information available earlier
in production process
• Integration with new journal
management systems
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress
6. INSTITUTE OF ARCHAEOLOGY
2012
75 YEARS OF LEADING GLOBAL ARCHAEOLOGY
UCL LIBRARY SERVICES
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress
7. • A 6-month JISC-funded pilot project to
introduce RDM to the UCL Institute of
Archaeology
• Tested whether using familiar workflows
and tools makes archiving data less
burdensome
• Preparing a data management plan
• Use of an institutional repository
• Publishing a data paper
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress
10. Metajournals
• Highlight research outputs
that would otherwise be
isolated in ‘silos’
• Flexible: different types of
resources and repositories
• Peer reviewed
• Ensure best practice
followed
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress
11. Metajournals
• Use familiar methods – low
barrier to participation
• Focus on high-reuse
potential
• Incentivise openness
• Reward researchers who
may otherwise go
unrecognised
• www.metajnl.com
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress
15. PRIME
Publisher, Repository and Institutional Metadata Exchange
UCL LIBRARY SERVICES
INSTITUTE OF ARCHAEOLOGY
2012
75 YEARS OF LEADING GLOBAL ARCHAEOLOGY
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress
16. PRIME: Project focus
• Developing a system to exchange metadata between:
• the UCL Discovery EPrints institutional repository
• the Archaeology Data Service subject repository
• the Journal of Open Archaeology Data
• Focusing on archaeology data only to pilot the system
• Building on other successful JISC projects:
• DryadUK
• REWARD
• SWORD-ARM
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress
17. PRIME: Use Case #1
• A UCL Researcher deposits data in an external subject repository.
• The subject repository sends the metadata and DOI of the data to the
UCL institutional repository so that it has a record of the output.
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress
18. PRIME: Use Case #2
• A UCL Researcher deposits data in their institutional repository.
• The institutional repository sends the metadata and DOI of the data to
the appropriate subject repository so that it has a record of the output.
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress
19. PRIME: Use Case #3
• A UCL Researcher submits an article to a journal, and is asked to archive the data
as a precondition of publication.
• The journal sends the metadata to the subject repository so that the author does
not have to re-enter it.
• The subject repository sends the metadata and DOI of the data to the
institutional repository so that it has a record of the output, and the DOI back to
the journal to link the article with the data.
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress
20. Next steps
November 14th at UCL:
Workshop to scope and produce a draft metadata schema for
inter-repository exchange.
brian.hole@ubiquitypress.com www.ubiquitypress.com / @ubiquitypress