This document is from the International Consortium of Investigative Journalists' (ICIJ) Offshore Leaks Database. It profiles Craig Willis as being connected to two offshore entities - Gilmar Corp. (incorporated in Seychelles in 2013) and Renford Consultants Limited (incorporated in British Virgin Islands in 2007) - in an intermediary role. The database contains information on over 320,000 offshore entities uncovered by the Panama Papers and Offshore Leaks investigations covering nearly 40 years up to the end of 2015.
This document lists and describes 10 essential free online legal resources. These resources cover a wide range of topics from federal legislation and regulations to case law, legal blogs, municipal codes, and scholarly articles. Some of the key resources mentioned include GPO Access for browsing federal statutes and regulations, Thomas for tracing the legislative history of bills, Findlaw for codes and court decisions, Google Books and Scholar for legal texts, and Martindale for attorney profiles. The resources provide users access to primary legal materials without cost.
1) The document discusses balancing copyright risk when digitizing collections by identifying high-risk materials and leaving them out initially to provide broader access.
2) It describes challenges with unpublished works and "orphan works" where the copyright holder cannot be identified or located. Significant effort to determine copyright status and locate owners often yields inconclusive results.
3) The document advocates for managing risk through assessing collections, being responsive to complaints, and having clear policies, while still promoting open access to collections.
This document discusses library privacy in the modern technological era. It outlines how library privacy is being compromised through the Patriot Act, self-service holds, and library 2.0 initiatives that encourage patrons to share personal information online. While libraries need to evolve with technology, they also have an obligation to protect patron privacy according to the ALA Code of Ethics. The document examines debates around balancing privacy with open access to information and maintaining library relevance.
- Traditional cataloging practices like subject headings can be outdated, inaccurate, lack specificity, and reflect 19th century biases. This limits discoverability and access.
- Indigenous knowledge organization should be developed collaboratively between cultural institutions and non-dominant communities to better represent their cultural heritage.
- Contemporary solutions include changing subject headings based on crowd-sourcing, using institution-specific organization, or building classification systems from the ground up according to community values.
This document discusses the use of linked open data (LOD) in archives and libraries. LOD uses structured data, controlled vocabularies, and URIs to demonstrate relationships between entities on the web. This enables discovery by linking related data and resources. The document provides examples of LOD projects in archives, such as SNAC, and in libraries, such as BIBFRAME. It discusses why LOD is useful for archives, such as improving findability and connectivity of archival resources. Indigenous cataloging using traditional knowledge labels is also summarized as a way to reintroduce historically lost collections and make them accessible according to indigenous community rules.
CHORUS 5-minute Flash Talk at STM Innovations December 4, 2013hratner
A coalition of scholarly journal publishers formed CHOR Inc., a non-profit organization, to develop and implement a partnership with federal research funders to provide public access to peer-reviewed articles reporting federally-funded research. CHORUS, the first service of CHOR Inc., offers an open platform to identify, discover, access, preserve, and ensure compliance of research articles. It leverages existing infrastructure like CrossRef and dark archives while simplifying compliance for stakeholders and providing public access at no significant cost to agencies. Over 80 publishers have signed on to pilot CHORUS, which currently identifies over 13,000 research articles through its identification, discovery, and dashboard services.
Orphan works are copyrighted works whose owners cannot be identified or located. They make up an estimated 55% of materials in research library collections. Libraries are hesitant to make these works publicly available for digitization or other uses due to the risk of legal action and high statutory damages if a later owner emerges. Proposed legislation has attempted to limit this liability for certain uses of orphan works if a diligent search was conducted, but has failed to pass. This leaves many cultural heritage and educational institutions unable to fully utilize important parts of their collections.
This document is from the International Consortium of Investigative Journalists' (ICIJ) Offshore Leaks Database. It profiles Craig Willis as being connected to two offshore entities - Gilmar Corp. (incorporated in Seychelles in 2013) and Renford Consultants Limited (incorporated in British Virgin Islands in 2007) - in an intermediary role. The database contains information on over 320,000 offshore entities uncovered by the Panama Papers and Offshore Leaks investigations covering nearly 40 years up to the end of 2015.
This document lists and describes 10 essential free online legal resources. These resources cover a wide range of topics from federal legislation and regulations to case law, legal blogs, municipal codes, and scholarly articles. Some of the key resources mentioned include GPO Access for browsing federal statutes and regulations, Thomas for tracing the legislative history of bills, Findlaw for codes and court decisions, Google Books and Scholar for legal texts, and Martindale for attorney profiles. The resources provide users access to primary legal materials without cost.
1) The document discusses balancing copyright risk when digitizing collections by identifying high-risk materials and leaving them out initially to provide broader access.
2) It describes challenges with unpublished works and "orphan works" where the copyright holder cannot be identified or located. Significant effort to determine copyright status and locate owners often yields inconclusive results.
3) The document advocates for managing risk through assessing collections, being responsive to complaints, and having clear policies, while still promoting open access to collections.
This document discusses library privacy in the modern technological era. It outlines how library privacy is being compromised through the Patriot Act, self-service holds, and library 2.0 initiatives that encourage patrons to share personal information online. While libraries need to evolve with technology, they also have an obligation to protect patron privacy according to the ALA Code of Ethics. The document examines debates around balancing privacy with open access to information and maintaining library relevance.
- Traditional cataloging practices like subject headings can be outdated, inaccurate, lack specificity, and reflect 19th century biases. This limits discoverability and access.
- Indigenous knowledge organization should be developed collaboratively between cultural institutions and non-dominant communities to better represent their cultural heritage.
- Contemporary solutions include changing subject headings based on crowd-sourcing, using institution-specific organization, or building classification systems from the ground up according to community values.
This document discusses the use of linked open data (LOD) in archives and libraries. LOD uses structured data, controlled vocabularies, and URIs to demonstrate relationships between entities on the web. This enables discovery by linking related data and resources. The document provides examples of LOD projects in archives, such as SNAC, and in libraries, such as BIBFRAME. It discusses why LOD is useful for archives, such as improving findability and connectivity of archival resources. Indigenous cataloging using traditional knowledge labels is also summarized as a way to reintroduce historically lost collections and make them accessible according to indigenous community rules.
CHORUS 5-minute Flash Talk at STM Innovations December 4, 2013hratner
A coalition of scholarly journal publishers formed CHOR Inc., a non-profit organization, to develop and implement a partnership with federal research funders to provide public access to peer-reviewed articles reporting federally-funded research. CHORUS, the first service of CHOR Inc., offers an open platform to identify, discover, access, preserve, and ensure compliance of research articles. It leverages existing infrastructure like CrossRef and dark archives while simplifying compliance for stakeholders and providing public access at no significant cost to agencies. Over 80 publishers have signed on to pilot CHORUS, which currently identifies over 13,000 research articles through its identification, discovery, and dashboard services.
Orphan works are copyrighted works whose owners cannot be identified or located. They make up an estimated 55% of materials in research library collections. Libraries are hesitant to make these works publicly available for digitization or other uses due to the risk of legal action and high statutory damages if a later owner emerges. Proposed legislation has attempted to limit this liability for certain uses of orphan works if a diligent search was conducted, but has failed to pass. This leaves many cultural heritage and educational institutions unable to fully utilize important parts of their collections.
1) The history of ebooks began in 1971 when Michael Hart typed the US Declaration of Independence into a computer, creating the first ebook.
2) In 1968, Alan Kay envisioned laptop and tablet computers with the Dynabook concept, aimed at giving children access to digital media.
3) By 1998, some libraries had begun offering ebooks through services like netLibrary, but managing public expectations and the new costs of ebooks has been challenging for libraries.
4) The document warns that proprietary ebook formats and licensing restrictions mean that consumers do not truly own the ebooks they purchase, and libraries are struggling to balance new ebook services with pressures on their budgets.
1) Academic publishing is facing a crisis due to the high costs of journals charged by major publishers who hold monopolies. These publishers are able to charge exorbitant prices because researchers need access to the journals to get published and tenured.
2) New technologies may disrupt the traditional journal publishing model by allowing articles to become more interactive online resources rather than static PDFs. This would make preservation more challenging.
3) Open access publishing platforms that provide free peer review and access to articles online could challenge the major publishers' control over academic publishing if a large enough system was established.
The document provides a history of the New York Times' online presence from 1996 to 2013. It summarizes the Times' early adoption of digital publishing in 1996 and continuous expansion of its online offerings over time, including the introduction of paid subscriptions, mobile apps, live video, and social media integration. Key events include the launch of TimesSelect in 2005, ending paid content in 2007, and introducing metered paywalls in 2011.
1) The document discusses various views about the role and value of libraries in the digital age.
2) While some see libraries as merely warehouses of dusty books and librarians as unnecessary, others see libraries as temples of knowledge that remain important sources of information.
3) Librarians argue that libraries continue to adapt and provide value through programs and services beyond just physical books, and that they have options for responding to changes in publishing that companies do not.
The document introduces the BibliotheksPolizei team, a group of library enthusiasts who take road trips to various libraries, museums, and historical sites to blog about their adventures and promote literacy programs. It discusses their inspiration, Erwin "Cannon Ball" Baker, a early 20th century motorcycle racer, and events like the Cannonball Run cross-country road race and Gumball 3000 rally that celebrated road freedom. The team aims to eventually start a charity supporting libraries through advocacy and appearances at various sites.
This document summarizes a study of CEO succession events among the largest 100 U.S. corporations between 2005-2015. The study analyzed executives who were passed over for the CEO role ("succession losers") and their subsequent careers. It found that 74% of passed over executives left their companies, with 30% eventually becoming CEOs elsewhere. However, companies led by succession losers saw average stock price declines of 13% over 3 years, compared to gains for companies whose CEO selections remained unchanged. The findings suggest that boards generally identify the most qualified CEO candidates, though differences between internal and external hires complicate comparisons.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
This document discusses the history and ongoing issues surrounding Internet filtering in libraries. It outlines the passage of the Children's Internet Protection Act in 2000, which required libraries to filter computers with Internet access. While this law was challenged and upheld by the Supreme Court, filtering software remains imperfect and blocks access to legitimate information. Libraries must balance filtering to receive federal funding with their commitment to open access of information. Debate continues around how to address these issues as technology and information needs evolve.
This document discusses how interest groups, social movements, and activists are using the internet for political organization and campaigning. It covers traditional interest groups that have adapted their methods to the online space, new forms of online mobilization, and direct internet-based activism such as hacktivism. Examples discussed include MoveOn, WikiLeaks, Anonymous, and the Yes Men.
The annual report of the ACLU of Washington summarizes its work in 2006 to defend civil liberties that were threatened in the name of national security. It fought secret military tribunals, government surveillance without warrants, and other executive overreaches that violated laws and the constitution. The ACLU pursued legislation, lawsuits and public education to rein in the government and restore checks and balances. Key issues included reauthorizing the PATRIOT Act, the NSA warrantless wiretapping program, and surveillance of peaceful groups. The ACLU worked to address these threats at both the state and national levels through litigation, lobbying and raising public awareness.
The document discusses freedom of speech and expression on the internet as protected by the First Amendment. It outlines how various groups and governments have tried to argue for censorship to protect others from offensive content or images. However, the courts have consistently ruled that the government cannot restrict access to words or images online any more than it can censor books or art in other mediums. The document also discusses how groups like the ACLU and Anonymous have fought legal battles against censorship and educated people about their rights.
1) The PROTECT IP Act (PIPA) and Stop Online Piracy Act (SOPA) aimed to curb online piracy but faced strong opposition.
2) Internet companies mobilized users against the bills through website blackouts and petitions, convincing many in Congress the bills could damage the internet.
3) With bipartisan support eroding, both bills were shelved in January 2012 due to concerns they could undermine free speech, national security, and internet stability.
H.R. 4437 is a bill that aims to strengthen immigration enforcement and border security. It proposes making unlawful presence in the U.S. a felony, detaining immigrants and asylum seekers until they are deported, and imposing criminal penalties on those who help undocumented immigrants. The bill passed in the House but faces opposition in its proposals to detain immigrants indefinitely and eliminate programs that grant citizenship. The bill's passage sparked large nationwide protests from immigration advocates and student walkouts.
H.R. 4437 is a controversial bill that aims to strengthen immigration enforcement and border security. It proposes making unlawful presence in the U.S. a felony and punishing individuals and organizations that assist undocumented immigrants. The bill passed in the House but faces opposition in the Senate. Hundreds of thousands have protested the bill nationwide, arguing it is too harsh. Supporters believe the bill will help secure borders and enforce immigration laws, while critics argue it criminalizes immigrants and gives the government too much authority.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
1) The history of ebooks began in 1971 when Michael Hart typed the US Declaration of Independence into a computer, creating the first ebook.
2) In 1968, Alan Kay envisioned laptop and tablet computers with the Dynabook concept, aimed at giving children access to digital media.
3) By 1998, some libraries had begun offering ebooks through services like netLibrary, but managing public expectations and the new costs of ebooks has been challenging for libraries.
4) The document warns that proprietary ebook formats and licensing restrictions mean that consumers do not truly own the ebooks they purchase, and libraries are struggling to balance new ebook services with pressures on their budgets.
1) Academic publishing is facing a crisis due to the high costs of journals charged by major publishers who hold monopolies. These publishers are able to charge exorbitant prices because researchers need access to the journals to get published and tenured.
2) New technologies may disrupt the traditional journal publishing model by allowing articles to become more interactive online resources rather than static PDFs. This would make preservation more challenging.
3) Open access publishing platforms that provide free peer review and access to articles online could challenge the major publishers' control over academic publishing if a large enough system was established.
The document provides a history of the New York Times' online presence from 1996 to 2013. It summarizes the Times' early adoption of digital publishing in 1996 and continuous expansion of its online offerings over time, including the introduction of paid subscriptions, mobile apps, live video, and social media integration. Key events include the launch of TimesSelect in 2005, ending paid content in 2007, and introducing metered paywalls in 2011.
1) The document discusses various views about the role and value of libraries in the digital age.
2) While some see libraries as merely warehouses of dusty books and librarians as unnecessary, others see libraries as temples of knowledge that remain important sources of information.
3) Librarians argue that libraries continue to adapt and provide value through programs and services beyond just physical books, and that they have options for responding to changes in publishing that companies do not.
The document introduces the BibliotheksPolizei team, a group of library enthusiasts who take road trips to various libraries, museums, and historical sites to blog about their adventures and promote literacy programs. It discusses their inspiration, Erwin "Cannon Ball" Baker, a early 20th century motorcycle racer, and events like the Cannonball Run cross-country road race and Gumball 3000 rally that celebrated road freedom. The team aims to eventually start a charity supporting libraries through advocacy and appearances at various sites.
This document summarizes a study of CEO succession events among the largest 100 U.S. corporations between 2005-2015. The study analyzed executives who were passed over for the CEO role ("succession losers") and their subsequent careers. It found that 74% of passed over executives left their companies, with 30% eventually becoming CEOs elsewhere. However, companies led by succession losers saw average stock price declines of 13% over 3 years, compared to gains for companies whose CEO selections remained unchanged. The findings suggest that boards generally identify the most qualified CEO candidates, though differences between internal and external hires complicate comparisons.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
This document discusses the history and ongoing issues surrounding Internet filtering in libraries. It outlines the passage of the Children's Internet Protection Act in 2000, which required libraries to filter computers with Internet access. While this law was challenged and upheld by the Supreme Court, filtering software remains imperfect and blocks access to legitimate information. Libraries must balance filtering to receive federal funding with their commitment to open access of information. Debate continues around how to address these issues as technology and information needs evolve.
This document discusses how interest groups, social movements, and activists are using the internet for political organization and campaigning. It covers traditional interest groups that have adapted their methods to the online space, new forms of online mobilization, and direct internet-based activism such as hacktivism. Examples discussed include MoveOn, WikiLeaks, Anonymous, and the Yes Men.
The annual report of the ACLU of Washington summarizes its work in 2006 to defend civil liberties that were threatened in the name of national security. It fought secret military tribunals, government surveillance without warrants, and other executive overreaches that violated laws and the constitution. The ACLU pursued legislation, lawsuits and public education to rein in the government and restore checks and balances. Key issues included reauthorizing the PATRIOT Act, the NSA warrantless wiretapping program, and surveillance of peaceful groups. The ACLU worked to address these threats at both the state and national levels through litigation, lobbying and raising public awareness.
The document discusses freedom of speech and expression on the internet as protected by the First Amendment. It outlines how various groups and governments have tried to argue for censorship to protect others from offensive content or images. However, the courts have consistently ruled that the government cannot restrict access to words or images online any more than it can censor books or art in other mediums. The document also discusses how groups like the ACLU and Anonymous have fought legal battles against censorship and educated people about their rights.
1) The PROTECT IP Act (PIPA) and Stop Online Piracy Act (SOPA) aimed to curb online piracy but faced strong opposition.
2) Internet companies mobilized users against the bills through website blackouts and petitions, convincing many in Congress the bills could damage the internet.
3) With bipartisan support eroding, both bills were shelved in January 2012 due to concerns they could undermine free speech, national security, and internet stability.
H.R. 4437 is a bill that aims to strengthen immigration enforcement and border security. It proposes making unlawful presence in the U.S. a felony, detaining immigrants and asylum seekers until they are deported, and imposing criminal penalties on those who help undocumented immigrants. The bill passed in the House but faces opposition in its proposals to detain immigrants indefinitely and eliminate programs that grant citizenship. The bill's passage sparked large nationwide protests from immigration advocates and student walkouts.
H.R. 4437 is a controversial bill that aims to strengthen immigration enforcement and border security. It proposes making unlawful presence in the U.S. a felony and punishing individuals and organizations that assist undocumented immigrants. The bill passed in the House but faces opposition in the Senate. Hundreds of thousands have protested the bill nationwide, arguing it is too harsh. Supporters believe the bill will help secure borders and enforce immigration laws, while critics argue it criminalizes immigrants and gives the government too much authority.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
4. Grrrrrr
Want to take research which is federally funded
or rather funded by you and make sure that it is
not publicly available.
5. Poop List
What lunatic support this madness?
Association of American Publishers
&
Copyright Alliance
6. Who is opposed?
Scholarly Publishing and Academic Resources
Coalition
the Alliance for Taxpayer Access
the American Library Association
the International Society for Computational
Biology
8. Again…
“But a bill introduced in the House of Representatives last
month threatens to cripple this site. The Research Works
Act would forbid the N.I.H. to require, as it now
does, that its grantees provide copies of the papers they
publish in peer-reviewed journals to the library. If the bill
passes, to read the results of federally funded
research, most Americans would have to buy access to
individual articles at a cost of $15 or $30 apiece. In other
words, taxpayers who already paid for the research
would have to pay again to read the results. ”
http://nyti.ms/yTKdjH
9. Who buy a Politician to do something
so shady?
• If passed, the Research Works Act (RWA) would prohibit the
NIH's public access policy and anything similar enacted by
other federal agencies, locking publicly funded research
behind paywalls. The result would be an ethical disaster:
preventable deaths in developing countries, and an
incalculable loss for science in the USA and worldwide. The
only winners would be publishing corporations such as
Elsevier (£724m profits on revenues of £2b in 2010 – an
astounding 36% of revenue taken as profit).
http://bit.ly/Ar5jyP
10. Preventable Deaths?
“Closed access means people die. I don’t think
anyone can deny the truth of that conclusion. If a
doctor, a patient, a planner, an engineer, cannot
read the appropriate literature then they make
suboptimal decisions. And that means people die.
So the balance is: If we want a closed access
publishing system then we have to accept that the
price is people’s lives.” http://bit.ly/rp8V2a
11. One more time dammit…
“Elsevier-funded NY Congresswoman Carolyn
Maloney Wants to Deny Americans Access to
Taxpayer Funded Research”
http://www.michaeleisen.org/blog/?p=807
12. Issa is pro OPEN AKA
Online Protection and Enforcement of
Digital Trade Act
http://bit.ly/w7T2kW
13. OPEN? (Squint Hard!)
“The OPEN Act was proposed as an alternative to the PROTECT IP Act (PIPA), which
was approved by the United States Senate Judiciary Committee in May 2011, and the
closely related Stop Online Piracy Act (SOPA), which was introduced by House Judiciary
Chairman Lamar Smith (R-TX) in November. After an initial description on December 2
as an outline of possible approaches authored by a bipartisan group of eleven
lawmakers,[14][15] a draft text was made public on December 8, 2011 in advance of a
House Judiciary markup of the SOPA Act the following week. The OPEN Act seeks to
stop transfers of money to foreign websites whose primary purpose is piracy or
counterfeiting, whereas SOPA and PIPA also seek to require Internet providers and
search engines to redirect users away from viewing the sites. The PROTECT IP Act
proposed to do this by blocking domain name resolution, whereas SOPA imposes a
broader requirement for network providers to "prevent access by its subscribers
located within the United States" including blocking by IP address and possibly deep
packet inspection.[3]” http://en.wikipedia.org/wiki/OPEN_Act