Daniel Wilksch, Coordinator, Digital Projects, Public Record Office Victoria (PROV), discusses the digital strategy of the PROV and the ways they have made their existing collections into new and exciting online exhibitions to excite and engage users. Daniel will discuss balancing the need for presenting curated records and stories with attention to whole-of-collection data, and how the PROV have become world renown for their web architecture and online strategy
A world-renowned autograph expert, Nelson Deedle has traveled extensively for archival research projects. Before establishing an online celebrity autograph business, Nelson Deedle also worked as an archivist for The Elliott Roosevelt Estate.
This is the PPT of my presentation for the Arizona Archives Summit held at the Arizona Historical Society on January 31, 2014. I introduced the audience to identifying various audiovisual formats, degradation red flags, and minimal required metadata to create preservation priorities and to efficiently and effectively process archival collections with audiovisual materials.
Daniel Wilksch, Coordinator, Digital Projects, Public Record Office Victoria (PROV), discusses the digital strategy of the PROV and the ways they have made their existing collections into new and exciting online exhibitions to excite and engage users. Daniel will discuss balancing the need for presenting curated records and stories with attention to whole-of-collection data, and how the PROV have become world renown for their web architecture and online strategy
A world-renowned autograph expert, Nelson Deedle has traveled extensively for archival research projects. Before establishing an online celebrity autograph business, Nelson Deedle also worked as an archivist for The Elliott Roosevelt Estate.
This is the PPT of my presentation for the Arizona Archives Summit held at the Arizona Historical Society on January 31, 2014. I introduced the audience to identifying various audiovisual formats, degradation red flags, and minimal required metadata to create preservation priorities and to efficiently and effectively process archival collections with audiovisual materials.
comprender la influencia del contexto violento (familiar y escolar), en las ...David Gutiérrez H
Over the last years Pereira has been one of the most violent cities in Colombia. This fact had had several impacts on society, and mostly in the youth. Children had been one of the most affected targets with this phenomenon and day to day we can see how they are starting to act and take customs according to the context where they live.
By studying these characteristics and investigating authors, such as Vigotsky, Peter Berger, Thomas Luckman and Chaux, we will be able to understand the influence that this violent context has on childhood from a psychological and sociological point of view. Also, we will search and support our approaches in statistics made by the DANE and Pereira’s local Police.
By taking surveys to some students in “Liceo Campestre de Pereira” we will aim to gather information to support the hypothesis. Also, these students will show us how they act, and, with some studies, in what way they are being influenced by the context. These students must be under fifteen (15), because in this age some aspects from the Antisocial Personality Disorder begin to develop, and we are going to study mainly the childhood.
This context of violence can lead to high antisocial personality disorder development, and by supporting on Chaux we will prove that the “Circle of aggression” is something that keeps the child under a different consciousness. The child begins to accommodate to the moral context in which it coexists, so he will begin to act as his context does and to consider normal the violence in his life. These acts of accommodation and acting according to the context are called “Representatives”.
Violence can have a high impact in people’s development and life. Some of them accommodate to this “normal” type of life, and only a few won’t be influenced in some way the context. The context will always impact on a person’s evolution and even though the context does not determine the subject, the subject participates in it, and somehow it affects his psychological development.
If you thought you knew about the titanic, then a little bit of further analysis will show how what seemed obvious may not necessarily be the real cause of the issue...
- Snapshot
- Understand what went wrong
- Blame-game and performance evaluation
- Factors during voyage
- Learning from History
- How it relates to the IT field
Hope you find it useful!
Thanks,
Suranthe
This Presentation is prepared for Graduate Students. A presentation consisting of basic information regarding the topic. Students are advised to get more information from recommended books and articles. This presentation is only for students and purely for academic purposes. The pictures/Maps included in the presentation are taken/copied from the internet. The presenter is thankful to them and herewith courtesy is given to all. This presentation is only for academic purposes.
Capturing the visual in collections metadata / Victoria Webb (Wellcome Collec...CILIP MDG
The collections at Wellcome Collection are strong in visual culture, with over 250,000 prints, paintings, drawings, photographs, and objects. The collection also has a large ephemera collection, plus a considerable amount of visual material among the archives collection. The collections are currently catalogued in management systems for either the library or archives, and until recently there was no consistent approach to metadata creation. We have developed a Metadata Framework to provide a foundation for the cataloguing of our visual collections, to ensure consistency in the data, regardless of the system they are catalogued in. This will support our work now and will future proof the data should it move to a new library, archive, or museum system.
The Framework uses the approach of existing standards: CCO (Cataloguing Cultural Objects) from the VRA, mapping the ideas to the needs of Wellcome’s collections, and the requirements of Spectrum – ensuring our collections data is compliant for UK Museum Accreditation. Elements CDWA and DCRM(G) of were also incorporated. From this framework we are developing system specific cataloguing guidelines, suitable for different formats (currently MARC and ISADG). The paper will look at the creation of the Framework and the issues encountered, discussing consistency for new metadata, dealing with legacy data, the need for transparency when amending existing records, and incorporating evolving approaches to diversity and inclusion. Using examples from the collection to illustrate how it is helping us to showcase new acquisitions and re-discover our historical collections.
The Metadata Framework (https://docs.wellcomecollection.org/visual-material/metadata-framework/metadata-elements/technique) is a living document, developing as we work with our collections. I hope this presentation will spark further conversation; I would value discussions with others working with similar items and issues in their collections.
Paper presented at the CILIP Metadata and Discovery Group (MDG) Conference & UKCoR RDA Day (6th - 8th Sept 2023 at IET Austin Court, Birmingham).
What do you want to discover today? / Janet Aucock, University of St AndrewsCIGScotland
Overview of resource discovery in libraries today. Presented at the CIG Scotland seminar 'Resource Discovery : from catalogues to discovery services' at the National Library of Scotland, Edinburgh, 21st March 2018
Ny archives week- Into to Archival ResearchShawn Smith
Overview of Archival Research
Examples of Research Projects using Archival Materials
Before entering the Archive (How to Prepare)
Components of Archival Collections
Considerations for Archival materials
Entering the Archive (What to Expect)
Handling Archival Materials
Contextualizing findings
Access vs. Use & Permissions
Data Management
Resources to Archives (Where to Begin)
Archival Databases
Local Archives
Digital Archives
comprender la influencia del contexto violento (familiar y escolar), en las ...David Gutiérrez H
Over the last years Pereira has been one of the most violent cities in Colombia. This fact had had several impacts on society, and mostly in the youth. Children had been one of the most affected targets with this phenomenon and day to day we can see how they are starting to act and take customs according to the context where they live.
By studying these characteristics and investigating authors, such as Vigotsky, Peter Berger, Thomas Luckman and Chaux, we will be able to understand the influence that this violent context has on childhood from a psychological and sociological point of view. Also, we will search and support our approaches in statistics made by the DANE and Pereira’s local Police.
By taking surveys to some students in “Liceo Campestre de Pereira” we will aim to gather information to support the hypothesis. Also, these students will show us how they act, and, with some studies, in what way they are being influenced by the context. These students must be under fifteen (15), because in this age some aspects from the Antisocial Personality Disorder begin to develop, and we are going to study mainly the childhood.
This context of violence can lead to high antisocial personality disorder development, and by supporting on Chaux we will prove that the “Circle of aggression” is something that keeps the child under a different consciousness. The child begins to accommodate to the moral context in which it coexists, so he will begin to act as his context does and to consider normal the violence in his life. These acts of accommodation and acting according to the context are called “Representatives”.
Violence can have a high impact in people’s development and life. Some of them accommodate to this “normal” type of life, and only a few won’t be influenced in some way the context. The context will always impact on a person’s evolution and even though the context does not determine the subject, the subject participates in it, and somehow it affects his psychological development.
If you thought you knew about the titanic, then a little bit of further analysis will show how what seemed obvious may not necessarily be the real cause of the issue...
- Snapshot
- Understand what went wrong
- Blame-game and performance evaluation
- Factors during voyage
- Learning from History
- How it relates to the IT field
Hope you find it useful!
Thanks,
Suranthe
This Presentation is prepared for Graduate Students. A presentation consisting of basic information regarding the topic. Students are advised to get more information from recommended books and articles. This presentation is only for students and purely for academic purposes. The pictures/Maps included in the presentation are taken/copied from the internet. The presenter is thankful to them and herewith courtesy is given to all. This presentation is only for academic purposes.
Capturing the visual in collections metadata / Victoria Webb (Wellcome Collec...CILIP MDG
The collections at Wellcome Collection are strong in visual culture, with over 250,000 prints, paintings, drawings, photographs, and objects. The collection also has a large ephemera collection, plus a considerable amount of visual material among the archives collection. The collections are currently catalogued in management systems for either the library or archives, and until recently there was no consistent approach to metadata creation. We have developed a Metadata Framework to provide a foundation for the cataloguing of our visual collections, to ensure consistency in the data, regardless of the system they are catalogued in. This will support our work now and will future proof the data should it move to a new library, archive, or museum system.
The Framework uses the approach of existing standards: CCO (Cataloguing Cultural Objects) from the VRA, mapping the ideas to the needs of Wellcome’s collections, and the requirements of Spectrum – ensuring our collections data is compliant for UK Museum Accreditation. Elements CDWA and DCRM(G) of were also incorporated. From this framework we are developing system specific cataloguing guidelines, suitable for different formats (currently MARC and ISADG). The paper will look at the creation of the Framework and the issues encountered, discussing consistency for new metadata, dealing with legacy data, the need for transparency when amending existing records, and incorporating evolving approaches to diversity and inclusion. Using examples from the collection to illustrate how it is helping us to showcase new acquisitions and re-discover our historical collections.
The Metadata Framework (https://docs.wellcomecollection.org/visual-material/metadata-framework/metadata-elements/technique) is a living document, developing as we work with our collections. I hope this presentation will spark further conversation; I would value discussions with others working with similar items and issues in their collections.
Paper presented at the CILIP Metadata and Discovery Group (MDG) Conference & UKCoR RDA Day (6th - 8th Sept 2023 at IET Austin Court, Birmingham).
What do you want to discover today? / Janet Aucock, University of St AndrewsCIGScotland
Overview of resource discovery in libraries today. Presented at the CIG Scotland seminar 'Resource Discovery : from catalogues to discovery services' at the National Library of Scotland, Edinburgh, 21st March 2018
Ny archives week- Into to Archival ResearchShawn Smith
Overview of Archival Research
Examples of Research Projects using Archival Materials
Before entering the Archive (How to Prepare)
Components of Archival Collections
Considerations for Archival materials
Entering the Archive (What to Expect)
Handling Archival Materials
Contextualizing findings
Access vs. Use & Permissions
Data Management
Resources to Archives (Where to Begin)
Archival Databases
Local Archives
Digital Archives
I use this presentation as a brief introduction to the Special Collections and Institutional Archives Department at Reese Library, Augusta University when hosting classes and instruction sessions.
10-31-13 “Researcher Perspectives of Data Curation” Presentation SlidesDuraSpace
“Hot Topics: The DuraSpace Community Webinar Series, " Series Six: Research Data in Repositories” Curated by David Minor, Research Data Curation Program, UC San Diego Library. Webinar 3: “Researcher Perspectives of Data Curation”
Presented by: David Minor, Research Data Curation Program, UC San Diego Library, Dick Norris, Professor, Scripps Institution of Oceanography & Rick Wagner, Data Scientist, San Diego Supercomputer Center.
Tanya Szrajber, The British Museum Collection DatabaseAndrew Prescott
'The British Museum Collection Database: How to Create and Manage over 2,000,000 Records': seminar by Tanya Szrajber, Head of Documentation, The British Museum, to Department of Digital Humanities, King's College London, 20 November 2012
For many museums, undertaking digitization projects can be intimidating. What does it take to provide the widest possible access to works of art? This panel will discuss the conception, challenges, and outcomes of recent collections access initiatives at the Detroit Institute of Arts.
Presentation for the international workshop: Creating a digital research environment as a tool to enhance transnational and comparative research on European colonial built heritage (c. 1850-1970), November 18-20, 2012
Presented at the Marathon County Historical Society, Wausau, Wisconsin, May 14, 2012. Part of the Wisconsin Historical Society's spring workshop series.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Stevens presentation
1. Stevens Institute of Technology
S.C. Williams Library
Michael Satalof, Project Archivist
Spring 2013
Report on Antiques, Artworks, and Special Collections
2. Project Summary
Purpose
• Create a current campus-wide inventory and visual record of
historic artifacts and artworks at Stevens.
• Describe historical context and provenance.
Background
• Used legacy inventories, donor files, and special collections.
• Longtime staff and administrators were invaluable.
3. Project Summary
Inventory
• 520 objects inventoried
– 195 visual artworks
– 259 furnishings
– 53 documentary artifacts
– 13 structural components
• 1,150 images captured
Locations
– Wesley J. Howe Center
– S.C. Williams Library
– Hoxie House
– Alexander House
– Pond House
– Edwin A. Stevens Hall
– Pierce Hall
– Campus grounds
4. Project Summary
Based on 2004 appraisal inventory
• 371 art and historic artifacts documented in 2004
• 355 of these objects located and inventoried in 2013
• More than half are in now new locations
5. Project Summary
Artifacts not inventoried
• The Library’s bibliographic materials
• The Library’s collection of mechanical models
• The Frederick Winslow Taylor and Stevens Family collections
• 16 objects not located from the 2004 inventory
• Non-special collections or antique items
6. Element Definition Example
Object Identifier An unambiguous and unique number assigned to
each object.
01.1.3
Title Title of an object, either given or supplied. Portrait of Rachel Cox Stevens
Creator The artist, agent or agency, maker or manufacturer
responsible for creation of an object.
Unknown (not apparently signed)
Description Description of the object that can include physical,
intellectual, or additional contextual information.
Purportedly after an original by
Gilbert Stuart (via, 2004 appraisal
inventory). In 17th century giltwood
frame.
Date Date of creation. Circa dates are indicated as “Ca.” Mid-19th century
Source Information about the object’s provenance, donor
information, or former campus location.
Formerly located in Castle Stevens,
in the Gold Room, and later
displayed in the Castle Room.
Condition Description of the physical state of an object, based
on visual inspection (from a vocabulary list: Good,
Fair, Poor, Very Poor).
Good – With minor surface
cracking in spots on canvas.
Dimensions Physical dimensions, in inches and feet. 40” w x 47” h
Medium Medium or media comprising an object. Oil painting
Location Current campus location (from a vocabulary list). Hoxie House, Drawing Room
7. Inventory Process
Unique ID number
• Assigned to each object or set
• Classification system based on The Getty’s Art &
Architecture thesaurus
20. Transition to Collective Access
Collective Access for online discovery
• Direct publication of materials online
• Enhance visibility of special collections
• Curate digital “exhibits” and collections
• Will serve as a digital image management system
Maintain Filemaker database locally
• Used to generate reports and for quick search
• Will serve as a backup and database for local use
21. Transition to Collective Access
Filemaker Pro
• Advantages
– Powerful data-sorting abilities
– Ease and speed of use
– Customer service
– Configurable
• Disadvantages
– Limited online access
– Cannot support multiple or
high-res images
– Cannot support audio/video
– Requires a license
Collective Access
• Advantages
– Collections can be accessed online
– Supports multiple/high-res images
– Supports video/audio
– Supports vocabularies/authorities
– Configurable
– Free and open-access
• Disadvantages
– Requires in-depth database setup
– Requires an internet connection
– Slower response time
23. Other Project Outcomes
Preservation and Library storage space
• Harmful storage environments identified
• Artworks and historic artifacts removed
• Environmental damage noted in inventory
• Dedicated storage space for framed artworks
• Approximately 70 framed artworks wrapped and moved
28. Other Project Outcomes
Object Identifier system
Workflow for tagging objects
Opportunities for students
• Engage students with collections and with Stevens history
• Identify particular skills or expertise
• Scanning, photography, tagging, some preservation work
31. Next Steps
Oral history recordings
Further research of historical context
Preservation initiatives for objects
32. Next Steps
Oral history recordings
Further research of historical context
Preservation initiatives for objects
Further inventory of objects not documented