Maximising Online Resource Effectiveness Workshop Session 4/8 Using the socia...Platypus
Alternative (Brian's) Session 4/8. Using the social web. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Maximising Online Resource Effectiveness Workshop Session 4/8 Using the socia...Platypus
Session 4/8. Using the social web. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Session 2/8. Conventional SEO overview. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Alternative (Brian's) Session 6/8. Promotional strategies. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Maximising Online Resource Effectiveness Workshop Session 4/8 Using the socia...Platypus
Alternative (Brian's) Session 4/8. Using the social web. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Maximising Online Resource Effectiveness Workshop Session 4/8 Using the socia...Platypus
Session 4/8. Using the social web. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Session 2/8. Conventional SEO overview. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Alternative (Brian's) Session 6/8. Promotional strategies. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Maximising Online Resource Effectiveness Workshop Session 7/8 Development str...Platypus
Session 7/8. Development strategy. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Session 8/8. Workshop roundup. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Session 6/8. Promotional strategies. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Session 5/8. Content strategy. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Session 1/8. Introduction. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Session 3/8. Priority issues. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
At the start of 2010 this is one perspective on what to be watching and perhaps working on in 2010. Prepared for a team workshop at Netskills, UK, January 2010, to kick the new year and decade off with some thought.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Maximising Online Resource Effectiveness Workshop Session 7/8 Development str...Platypus
Session 7/8. Development strategy. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Session 8/8. Workshop roundup. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Session 6/8. Promotional strategies. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Session 5/8. Content strategy. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Session 1/8. Introduction. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
Session 3/8. Priority issues. The Strategic Content Alliance, JISC sponsored workshops on Maximising Online Resource Effectiveness, held on different occasions throughout 2010 and delivered by Netskills.
At the start of 2010 this is one perspective on what to be watching and perhaps working on in 2010. Prepared for a team workshop at Netskills, UK, January 2010, to kick the new year and decade off with some thought.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
3. Metadata
It’s all about metadata
‣ data about data
‣ many and varied versions of metadata
‣ add background information, put things in context, add value, make much
more useful by showing relevance
‣ different levels of metadata—may need pointer to further information to fully
explain a piece of metadata or describe how to interpret
‣ enable ways of classifying, connecting, rating, structuring, promoting, that
wouldn't be possible otherwise—especially if a common "vocabulary" for the
metadata terms is used
RDFa
8. Benefits of having meaningful metadata
Seamless use of data in a web page with
desktop applications
‣ use of microformats tools to generate contact information in a web page
‣ viewing of web page containing microformats using Firefox and Operator
extension: https://addons.mozilla.org/en-US/firefox/addon/4106
‣ transfer of data in the web page to desktop address book
http://microformats.org/code-tools http://en.wikipedia.org/wiki/HCard
9.
10.
11.
12. Metadata evolution on the web
9 2 The World Wide Web—HTML, HTTP, URLs
1 9
L
T M
L H
X M D
L pt
T M cr
i
s
X H va
as J a
em
ch S
S ic
C S
a nt
m eb
Se w
a x
Q
L
a j
AR
SP
N
W
L
S O
O J
RDFa
13. Metadata evolution on the web
9 2 The World Wide Web—HTML, HTTP, URLs
1 9
L
T M
L H
X M D
L pt
T M cr
i
s
X H va
as J a
em
ch S
S ic
C S
a nt
m eb
Se w
a x
Q
L
a j
AR
SP
N
W
L
S O
O J
RDFa
14. Metadata evolution on the web
9 2 The World Wide Web—HTML, HTTP, URLs
1 9 Primitive metadata, some semantics about a document L
T M
L H
X M D
L pt
T M cr
i
s
X H va
as J a
em
ch S
S ic
C S
a nt
m eb
Se w
a x
Q
L
a j
AR
SP
N
W
L
S O
O J
RDFa
15. Metadata evolution on the web
9 2 The World Wide Web—HTML, HTTP, URLs
1 9 Primitive metadata, some semantics about a document L
T M
L H
X M Use of meta tags in head of HTML document
D
L pt
T M cr
i
s
X H va
as J a
em
ch S
S ic
C S
a nt
m eb
Se w
a x
Q
L
a j
AR
SP
N
W
L
S O
O J
RDFa
16. Metadata evolution on the web
9 2 The World Wide Web—HTML, HTTP, URLs
1 9 Primitive metadata, some semantics about a document L
T M
L H
X M Use of meta tags in head of HTML document
D
L pt
T M Need for standards and common vocabularies
cr
i
s
X H va
as J a
em
ch S
S ic
C S
a nt
m eb
Se w
a x
Q
L
a j
AR
SP
N
W
L
S O
O J
RDFa
17. Metadata evolution on the web
9 2 The World Wide Web—HTML, HTTP, URLs
1 9 Primitive metadata, some semantics about a document L
T M
L H
X M Use of meta tags in head of HTML document
D
L pt
T M Need for standards and common vocabularies
cr
i
s
X H va
as Early vocabularies J a
em
ch S
S ic
C S
a nt
m eb
Se w
a x
Q
L
a j
AR
SP
N
W
L
S O
O J
RDFa
18. Metadata evolution on the web
9 2 The World Wide Web—HTML, HTTP, URLs
1 9 Primitive metadata, some semantics about a document L
T M
L H
X M Use of meta tags in head of HTML document
D
L pt
T M Need for standards and common vocabularies
cr
i
s
X H va
as Early vocabularies J a
em
ch Resource Description Framework S
S ic
C S
a nt
m eb
Se w
a x
Q
L
a j
AR
SP
N
W
L
S O
O J
RDFa
19. Metadata evolution on the web
9 2 The World Wide Web—HTML, HTTP, URLs
1 9 Primitive metadata, some semantics about a document L
T M
L H
X M Use of meta tags in head of HTML document
D
L pt
T M Need for standards and common vocabularies
cr
i
s
X H va
as Early vocabularies J a
em
ch Resource Description Framework S
S ic
C S
a nt
m eb RDF files and separate metadata records
Se w
a x
Q
L
a j
AR
SP
N
W
L
S O
O J
RDFa
20. Metadata evolution on the web
9 2 The World Wide Web—HTML, HTTP, URLs
1 9 Primitive metadata, some semantics about a document L
T M
L H
X M Use of meta tags in head of HTML document
D
L pt
T M Need for standards and common vocabularies
cr
i
s
X H va
as Early vocabularies J a
em
ch Resource Description Framework S
S ic
C S
a nt
m eb RDF files and separate metadata records
Se w
a x
Q
L Issues with RDF a j
AR
SP
N
W
L
S O
O J
RDFa
21. Metadata evolution on the web
9 2 The World Wide Web—HTML, HTTP, URLs
1 9 Primitive metadata, some semantics about a document L
T M
L H
X M Use of meta tags in head of HTML document
D
L pt
T M Need for standards and common vocabularies
cr
i
s
X H va
as Early vocabularies J a
em
ch Resource Description Framework S
S ic
C S
a nt
m eb RDF files and separate metadata records
Se w
a x
Q
L Issues with RDF a j
R
S PA
Microformats and similar grassroots driven pragmatic solutions
N
W
L
S O
O J
RDFa
22. Metadata evolution on the web
9 2 The World Wide Web—HTML, HTTP, URLs
1 9 Primitive metadata, some semantics about a document L
T M
L H
X M Use of meta tags in head of HTML document
D
L pt
T M Need for standards and common vocabularies
cr
i
s
X H va
as Early vocabularies J a
em
ch Resource Description Framework S
S ic
C S
a nt
m eb RDF files and separate metadata records
Se w
a x
Q
L Issues with RDF a j
R
S PA
Microformats and similar grassroots driven pragmatic solutions
N
W
L Embedded metadata
S O
O J
RDFa
23. Metadata evolution on the web
9 2 The World Wide Web—HTML, HTTP, URLs
1 9 Primitive metadata, some semantics about a document L
T M
L H
X M Use of meta tags in head of HTML document
D
L pt
T M Need for standards and common vocabularies
cr
i
s
X H va
as Early vocabularies J a
em
ch Resource Description Framework S
S ic
C S
a nt
m eb RDF files and separate metadata records
Se w
a x
Q
L Issues with RDF a j
R
S PA
Microformats and similar grassroots driven pragmatic solutions
N
W
L Embedded metadata
S O
O J
RDFa
RDFa
24. What is RDFa?
RDFa =
Resource Description Framework
in
attributes
http://www.w3.org/TR/rdfa-syntax/ http://www.w3.org/TR/xhtml-rdfa-primer/
25. What is RDFa?
Generic model for the provision of metadata
RDFa =
Resource Description Framework
in
attributes
http://www.w3.org/TR/rdfa-syntax/ http://www.w3.org/TR/xhtml-rdfa-primer/
26. What is RDFa?
Generic model for the provision of metadata
RDFa =
Resource Description Framework
in
attributes
HTML
http://www.w3.org/TR/rdfa-syntax/ http://www.w3.org/TR/xhtml-rdfa-primer/
27. Google webmaster help pages on RDFa
Marking up content using RDFa
RDFa is a way to label content to describe a specific type of
information, such as a restaurant review, an event, a person, or a
product listing. These information types are called entities. Each
entity has a number of properties.
In general, RDFa uses simple attributes in XHTML tags (usually with
<span> or <div>) to assign brief and descriptive names to entities
and properties.
http://www.google.com/support/webmasters/bin/answer.py?hl=en&answer=146898
28. Entities
Entities supported by Google
i.e. Google provides a standard set of properties for each of the
following:
‣ person
‣ organisation
‣ event
‣ review
‣ recipe
Each corresponding set of properties, that can be assigned using
RDFa in a web page, is recognised by Google crawler/spider software
and handled in a special way when search results that include the
web page are listed (rich snippets).
The entities and properties are visible to both human readers and
computers!
http://www.google.com/support/webmasters/bin/answer.py?hl=en&answer=99170
29. Google’s properties for the “person” entity
http://www.google.com/support/webmasters/bin/answer.py?answer=146646
30. Marking up content with RDFa (extended HTML)
The essence of RDFa...
... is to provide a set of attributes that can be used to carry metadata
in an XML language (hence the 'a' in RDFa). These attributes are:
‣ about—a URI or CURIE specifying the resource the metadata is about
‣ rel and rev—specifying a relationship or reverse-relationship with another
resource
‣ href, src and resource—specifying a related resource
‣ property—specifying a property for the content of an element
‣ content—optional attribute that overrides or supplements the (HTML) content
of the element when using the property attribute
‣ datatype—optional attribute that specifies the datatype of text specified with
the property attribute
‣ typeof—optional attribute that specifies the type(s) of the subject (the
resource that the metadata is about)
http://en.wikipedia.org/wiki/RDFa
31. Thinking it through...
Producing RDFa
‣ identify entities
‣ identify entity properties
‣ identify an appropriate source of entity and property descriptions
(vocabulary, namespace, metadata set, schema, ontology, taxonomy—all
used loosely interchangeably)
‣ markup content using RDFa HTML attributes to provide references to entity
and property types in chosen vocabulary and the corresponding content that
describes each entity instance and property value
‣ ensure nesting of markup implies correct semantic meaning
RDFa
32. Simple RDFa web page
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN"
"http://www.w3.org/MarkUp/DTD/xhtml-rdfa-1.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"
xmlns:v="http://rdf.data-vocabulary.org/#">
<head profile="http://www.w3.org/1999/xhtml/vocab">
<title>Simple RDFa example</title>
</head>
<body>
<div xmlns:v="http://rdf.data-vocabulary.org/#" typeof="v:Person">
My name is <span property="v:name">George Munroe</span>,
also known online as <span property="v:nickname">mungeo</span>.
I am involved in several ventures but my home web site is at:
<a href="http://www.platypusconsultancy.com"
rel="v:url">www.platypusconsultancy.com</a>.
I live in
<span rel="v:address">
<span typeof="v:Address">
<span property="v:locality">Donegal</span>,
<span property="v:region">Ulster</span>
</span>
</span>
and work as a <span property="v:title">consultant trainer</span>
at <span property="v:affiliation">Netskills</span>.
</div>
</body>
</html>
RDFa
33. CSS styles can be added in usual way—use class for <span> blocks...
<!DOCTYPE html>
<html>
<head>
<title>Simple RDFa example</title>
<meta name="description" content="A very simple RDFa web page, using Google webmaster guidelines">
<style type="text/css">
<!--
body {
font: normal 14px Verdana, sans-serif;
background-color: #99ccff;
}
a.url, a.url:visited {
text-decoration: none;
color: #ffffff;
background-color: #000000;
}
a.url:hover {
color: #000000;
background-color: #ffffff;
}
.name {
font-size: 1.5em;
color: #119933;
}
.nickname {
font-size: 1.5em;
color: #993311;
font-style: italic;
}
.address {
font-size: 1.5em;
color: #113399;
}
.title {
font-size: 1.5em;
color: #991199;
}
.affiliation {
font-size: 1.5em;
color: #999911;
}
-->
</style>
</head>
RDFa
34. RDFa markup
Get headings right, XHTML good practice,
RDFa data type dictionary
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN"
"http://www.w3.org/MarkUp/DTD/xhtml-rdfa-1.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head profile="http://www.w3.org/1999/xhtml/vocab">
http://rdfa.info/wiki/How-to-validate
36. Practical exercise
Creating an HTML page containing RDFa
‣ use Notepad or a similar text editor on your PC to create the sample RDFa
file provided by Google in the webmaster help pages, but including
information about yourself
‣ use the W3C validator to check that all markup in your file is correct
‣ open this file with a web browser on your PC and verify that the information
appears correctly (to human readers)
‣ edit your sample file to add additional properties and entities, select some
additional sample material from the Wikipedia RDFa introduction if you have
sufficient time to experiment
‣ after each edit verify that the markup is valid and that the information
appears correctly when viewed with a web browser
37. RDFa markup
Most common mistakes
Not specifying the XHTML+RDFa DTD
‣ <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN" "http://
www.w3.org/MarkUp/DTD/xhtml-rdfa-1.dtd">
Forgetting to declare prefix mappings
‣ <div xmlns:v="http://rdf.data-vocabulary.org/#" typeof="v:Person">
The about attribute should resolve to a URL
‣ all RDFa subjects are URLs, absolute or relative
RDFa XHTML markup should be well formed
‣ if a document is not well formed then parsers may have difficulty producing
the correct output
http://rdfa.info/wiki/Common-publishing-mistakes