An edited presentation of an ongoing project to "re-vision" of traditional Cultural Heritage cataloging theory by drawing upon significant ideas from Physics, Anthropology, and Mathematics.
The Gardens of Versailles serve as an introduction to graph theory, and the usefulness of that theory in describing both simple and complex, physical & digital resources.
Edwin Abbott Abbott's "Flatland" is invoked to guide the definition of levels of structural constraint as they apply to Cultural Heritage resource description. (See if you can spot the out-of place level.)
How to depict and reason about analog & digital resources using a diagrammatic method.
The section on conceptual data modeling was removed to direct the viewer's attention to the diagrammatic representation and the "Flatland" analogy.
Designing Digital Products? "Ask" Your UsersRonald Murray
Cultural Heritage institutions regularly find themselves balancing the quality of deliverable digital image content against curatorial estimations of what users need to see as well as IT-managerial concerns like storage, delivered file size, network loads, etc.
Amidst all of these considerations, the parties involved are rarely informed by studies of actual user preferences for online-viewable or hardcopy digital content. Well-established methods for discovering revealed preferences are in active use in the consumer research realm, and can be readily adapted to serve Cultural Heritage.
This slideshow demonstrates how one method, conjoint modeling, can be used to inform a standard for scanning microfilmed newspapers.
The document discusses the development of a modern bibliographic resource description theory. It examines the IFLA FRBR conceptual model and notes some issues with claiming it specifies a strict hierarchy. The document also looks at the origins and objectives of FRBR based on data modeling theory. It analyzes how FRBR relates to theories of information, user needs, and systems implementation. Overall, the document provides an in-depth examination of FRBR and ideas for remodeling it to create a more robust resource description theory.
A presentation of an ongoing "re-visioning" of traditional Cultural Heritage cataloging theory in terms of significant ideas from Physics, Anthropology, and Mathematics.
The Gardens of Versailles serve as an introduction to graph theory, and the utility of that theory for describing simple and complex analog & digital resources.
Edwin Abbott Abbott's "Flatland" is invoked to define levels of structural constraint as applied to Cultural Heritage resource description.
How to depict and reason about analog & digital resources using a diagrammatic method.
FRBR Exemplars: Exploration of Networks of Bibliographic DescriptionsRonald Murray
A presentation of an ongoing "re-visioning" of traditional Cultural Heritage cataloging theory in terms of significant ideas from Physics, Anthropology, and Mathematics.
The lure of hierarchies for biological classification & cataloging is discussed, and the follow-on structure in Biology is introduced. Overlapping tree-like structures (e.g. subject headings) are better appreciated from a network perspective.
Many biologists are now consider hierarchies as non-reticulated networks.
++++
This presentation revisits the benefits of borrowing ideas from the sciences in order to improve the ability to discuss simple and complex arrangements of resources and their descriptions. Also discussed is the development and use of a FRBR paper tool for depicting and reasoning about complex resource description scenarios.
What lies ahead for Cultural Heritage institutions whose roles are challenged by significant changes in modes of resource discovery and access?
• Slides# 2, 4
What is “complicated” and what is “practical” in a resource description context? Resource description theories and the Cultural Heritage professions that create them.
• Slides# 5-8
This document provides an introduction to a tutorial presentation about reimagining bibliographic resource description using FRBR (Functional Requirements for Bibliographic Records) modeling. It discusses the increasing complexity facing cultural heritage institutions in describing various resource types and relationships. The presentation will explore modeling resources and relationships using FRBR entities and properties, and examine how good descriptive theories can be both practical and flexible enough to address complexity. It suggests taking a multidisciplinary approach, drawing from fields like cataloging theory and the history of science.
This is a slightly modified version of a presentation made at the American Library Association 2010 Annual Conference in Washington DC, June 28, 2010.
Cataloging information is presented as observations on one or more library resources, grouped into as many as four levels or Points Of View.
Resource/description complexes can be linked together by one or more relationships into simple and complex structures that can then be explored or extracted and reordered for presentation.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Designing Digital Products? "Ask" Your UsersRonald Murray
Cultural Heritage institutions regularly find themselves balancing the quality of deliverable digital image content against curatorial estimations of what users need to see as well as IT-managerial concerns like storage, delivered file size, network loads, etc.
Amidst all of these considerations, the parties involved are rarely informed by studies of actual user preferences for online-viewable or hardcopy digital content. Well-established methods for discovering revealed preferences are in active use in the consumer research realm, and can be readily adapted to serve Cultural Heritage.
This slideshow demonstrates how one method, conjoint modeling, can be used to inform a standard for scanning microfilmed newspapers.
The document discusses the development of a modern bibliographic resource description theory. It examines the IFLA FRBR conceptual model and notes some issues with claiming it specifies a strict hierarchy. The document also looks at the origins and objectives of FRBR based on data modeling theory. It analyzes how FRBR relates to theories of information, user needs, and systems implementation. Overall, the document provides an in-depth examination of FRBR and ideas for remodeling it to create a more robust resource description theory.
A presentation of an ongoing "re-visioning" of traditional Cultural Heritage cataloging theory in terms of significant ideas from Physics, Anthropology, and Mathematics.
The Gardens of Versailles serve as an introduction to graph theory, and the utility of that theory for describing simple and complex analog & digital resources.
Edwin Abbott Abbott's "Flatland" is invoked to define levels of structural constraint as applied to Cultural Heritage resource description.
How to depict and reason about analog & digital resources using a diagrammatic method.
FRBR Exemplars: Exploration of Networks of Bibliographic DescriptionsRonald Murray
A presentation of an ongoing "re-visioning" of traditional Cultural Heritage cataloging theory in terms of significant ideas from Physics, Anthropology, and Mathematics.
The lure of hierarchies for biological classification & cataloging is discussed, and the follow-on structure in Biology is introduced. Overlapping tree-like structures (e.g. subject headings) are better appreciated from a network perspective.
Many biologists are now consider hierarchies as non-reticulated networks.
++++
This presentation revisits the benefits of borrowing ideas from the sciences in order to improve the ability to discuss simple and complex arrangements of resources and their descriptions. Also discussed is the development and use of a FRBR paper tool for depicting and reasoning about complex resource description scenarios.
What lies ahead for Cultural Heritage institutions whose roles are challenged by significant changes in modes of resource discovery and access?
• Slides# 2, 4
What is “complicated” and what is “practical” in a resource description context? Resource description theories and the Cultural Heritage professions that create them.
• Slides# 5-8
This document provides an introduction to a tutorial presentation about reimagining bibliographic resource description using FRBR (Functional Requirements for Bibliographic Records) modeling. It discusses the increasing complexity facing cultural heritage institutions in describing various resource types and relationships. The presentation will explore modeling resources and relationships using FRBR entities and properties, and examine how good descriptive theories can be both practical and flexible enough to address complexity. It suggests taking a multidisciplinary approach, drawing from fields like cataloging theory and the history of science.
This is a slightly modified version of a presentation made at the American Library Association 2010 Annual Conference in Washington DC, June 28, 2010.
Cataloging information is presented as observations on one or more library resources, grouped into as many as four levels or Points Of View.
Resource/description complexes can be linked together by one or more relationships into simple and complex structures that can then be explored or extracted and reordered for presentation.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
Creative operations teams expect increased AI use in 2024. Currently, over half of tasks are not AI-enabled, but this is expected to decrease in the coming year. ChatGPT is the most popular AI tool currently. Business leaders are more actively exploring AI benefits than individual contributors. Most respondents do not believe AI will impact workforce size in 2024. However, some inhibitions still exist around AI accuracy and lack of understanding. Creatives primarily want to use AI to save time on mundane tasks and boost productivity.
Organizational culture includes values, norms, systems, symbols, language, assumptions, beliefs, and habits that influence employee behaviors and how people interpret those behaviors. It is important because culture can help or hinder a company's success. Some key aspects of Netflix's culture that help it achieve results include hiring smartly so every position has stars, focusing on attitude over just aptitude, and having a strict policy against peacocks, whiners, and jerks.
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
PepsiCo provided a safe harbor statement noting that any forward-looking statements are based on currently available information and are subject to risks and uncertainties. It also provided information on non-GAAP measures and directing readers to its website for disclosure and reconciliation. The document then discussed PepsiCo's business overview, including that it is a global beverage and convenient food company with iconic brands, $91 billion in net revenue in 2023, and nearly $14 billion in core operating profit. It operates through a divisional structure with a focus on local consumers.
Content Methodology: A Best Practices Report (Webinar)contently
This document provides an overview of content methodology best practices. It defines content methodology as establishing objectives, KPIs, and a culture of continuous learning and iteration. An effective methodology focuses on connecting with audiences, creating optimal content, and optimizing processes. It also discusses why a methodology is needed due to the competitive landscape, proliferation of channels, and opportunities for improvement. Components of an effective methodology include defining objectives and KPIs, audience analysis, identifying opportunities, and evaluating resources. The document concludes with recommendations around creating a content plan, testing and optimizing content over 90 days.
How to Prepare For a Successful Job Search for 2024Albert Qian
The document provides guidance on preparing a job search for 2024. It discusses the state of the job market, focusing on growth in AI and healthcare but also continued layoffs. It recommends figuring out what you want to do by researching interests and skills, then conducting informational interviews. The job search should involve building a personal brand on LinkedIn, actively applying to jobs, tailoring resumes and interviews, maintaining job hunting as a habit, and continuing self-improvement. Once hired, the document advises setting new goals and keeping skills and networking active in case of future opportunities.
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
The document provides career advice for getting into the tech field, including:
- Doing projects and internships in college to build a portfolio.
- Learning about different roles and technologies through industry research.
- Contributing to open source projects to build experience and network.
- Developing a personal brand through a website and social media presence.
- Networking through events, communities, and finding a mentor.
- Practicing interviews through mock interviews and whiteboarding coding questions.
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
1. Core updates from Google periodically change how its algorithms assess and rank websites and pages. This can impact rankings through shifts in user intent, site quality issues being caught up to, world events influencing queries, and overhauls to search like the E-A-T framework.
2. There are many possible user intents beyond just transactional, navigational and informational. Identifying intent shifts is important during core updates. Sites may need to optimize for new intents through different content types and sections.
3. Responding effectively to core updates requires analyzing "before and after" data to understand changes, identifying new intents or page types, and ensuring content matches appropriate intents across video, images, knowledge graphs and more.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
During this webinar, Anand Bagmar demonstrates how AI tools such as ChatGPT can be applied to various stages of the software development life cycle (SDLC) using an eCommerce application case study. Find the on-demand recording and more info at https://applitools.info/b59
Key takeaways:
• Learn how to use ChatGPT to add AI power to your testing and test automation
• Understand the limitations of the technology and where human expertise is crucial
• Gain insight into different AI-based tools
• Adopt AI-based tools to stay relevant and optimize work for developers and testers
* ChatGPT and OpenAI belong to OpenAI, L.L.C.
5. Ethnomathematics
Ethnomathematics is the study of the mathematical practices of
specific cultural groups in the course of dealing with their
environmental problems and activities
• The prefix “ethno” refers to identifiable cultural groups, such as
national-tribal societies, labor groups, children of a certain age
bracket, professional classes, etc. and includes their ideologies,
language, daily practices, and their specific ways of reasoning and
inferring.
• “Mathema” here means to explain, understand and manage reality
specifically by ciphering, counting, measuring, classifying, ordering,
inferring and modeling patterns arising in the environment.
• The suffix “tics” means art or technique.
14. Representing Versailles
A Simplifying Abstraction: From Versailles to
the Versailles Map of Creative Expressions
• You want to create multimedia records of your
experience of Versailles by identifying various
locations within the gardens, and creating and/or
collecting still and motion images of that point plus
the texts, musical performances, etc. that are evoked
by that point.
• How do you organize these collected resources?
19. Thinking About Versailles
A Further Simplifying Abstraction: The Versailles
Graph
We can create a
mathematical
expression of the This set of creative
relationships between expressions would be
the Versailles called a Graph.
Gardens and the
creative expressions
inspired by them.
20. Thinking About Versailles
A Further Simplifying Abstraction: The Versailles
Graph
We construct a set of
nodes (AKA vertices)
and a set of edges This set of creative
(AKA links) that define expressions would be
one or more types of called a Graph.
relationship between
the nodes.
21. Thinking About Versailles
A Further Simplifying Abstraction: The Versailles
Graph
We construct a set of In this example, the
nodes (AKA vertices) nodes represent
and a set of edges locations within the
(AKA links) that define gardens. The links
one or more types of represent a “next_to”
relationship between relationship between
the nodes. two garden locations.
22. Thinking About Versailles
A Further Simplifying Abstraction: The Versailles
Graph
We construct a set of
nodes (AKA vertices) A graph may be
and a set of edges visualized as a
(AKA links) that define network of dots and
one or more types of lines (sometimes
relationship between arrowed)
the nodes.
23. Thinking About Versailles
A Further Simplifying Abstraction: The Versailles
Graph
A graph diagram can
be manipulated to
show relationships
more clearly
28. Data Modeling in General
• Definitions
• About data modeling
• Data models and “Paper Tools”
• Data modeling examples (many!)
• What to do now
29. Thinking About Mazes and
Formal Gardens
Abstract, Refine, Generalize, Pose Questions
30. Thinking About Mazes and
Formal Gardens
Is the Hampton Court maze transformable
into a section of the Versailles Gardens?
31. Thinking About Mazes and
Formal Gardens
Is there a set of vertices and edges (a
subgraph shape) within the Versailles graph
that matches the Hampton Court Maze?
32. Thinking About Mazes and
Formal Gardens
• Um, probably
• Brute force approach (shape matching) foreclosed by
old brains and unwillingless to go insane
• Did not have a representation that could be used to
decide the question in a more elegant fashion
33. Data Modeling in General
• Definitions
– Conceptual Data Model: A description of a portion of an enterprise in terms of
the fundamental things of interest to it. They are fundamental in that most things
seen by business owners are examples of these.
– Logical Data Model: The organization of data for use with a particular data
management technology. For relational databases, these are tables and columns;
for object-oriented databases, object classes and attributes.
• The MARC bibliographic standard specifies a logical data model that uses tags and
delimiters to structure bibliographic data. In practice, the bibliographic conceptual
data model is tangled up in the logical data model
– Physical Data Model: The organization of data used to place it on specific
storage media. This level refers to “tablespaces” and “cylinders.”
– General Definition: The specification of a final conceptual data model and an
initial logical data model that together meet business requirements, prior to any
performance tuning.
34. About Data Modeling
• Why a Data Model is Important
• What Makes a Good Data Model?
• What Makes a Good Data Modeler?
• What is the Description/Design Question?
35. About Data Modeling
• Why a Data Model is Important
– Leverage: Small changes in the data model have major effects on the
system design and final implementation
– Conciseness: The relatively compact data model takes less time to
review that the functional specification, and in-depth understanding
easier to achieve
– Data Quality: Data quality problems are often traceable to
inconsistent data definition, interpretation, and enforcement
mechanisms
36. About Data Modeling
• Why a Data Model is Important
– It serves as a necessary complement to a function and process
model
• The database system design and implementation process described here can
involve three types of modeling
• A data model describes the information an enterprise must have on hand to
execute its functions
• A function model describes what an enterprise must do
• A process model describes how an enterprise must do it.
– Function and process models are regularly combined during the database
system design process
– It can function as a “Paper Tool” in service of theoretical and
practical ends
37. About Data Modeling
• What Makes a Good Data Model?
– Completeness
– Nonredundancy
– Enforcement of Business Rules
– Data Reusability
– Stability & Flexibility
– Elegance
– Communication
– Integration
38. About Data Modeling
• What is the Description/Design Question?
– Is data modeling best characterized as a descriptive activity, the
objective of which is to document some aspect of the real world?
– Is data modeling best characterized as a design activity, the objective
of which is to create data structures to meet a set of requirements?
– Does the history of the development and implementation of the FRBR
model reflect aspects of this controversy?
Portions quoted from Simsion, Graeme (2007). Data Modeling: Theory and Practice. p.3.
39. About Data Modeling
• How is the Description/Design Issue Manifest?
– Explicit arguments among practitioners and academics, as to
whether the description or design paradigm was correct.
– Clashes between practitioners who subscribed to the descriptive
paradigm, but had produced different models that were difficult
to reconcile.
– Disagreement over the appropriateness of data modelers
introducing new concepts and terminology rather than simply
documenting an established view of business entities.
Quoted from Simsion, Graeme (2007). Data Modeling: Theory and Practice. p.10.
40. About Data Modeling
• How is the Description/Design Issue Manifest (cont.)?
– Difficulty in teaching data modeling using texts and teaching
materials which treated it as a descriptive process.
– Experienced data modeling practitioners struggling to develop
models, and observing that data modeling in practice was much
more difficult than it should be if it was essentially concerned
with describing data requirements.
– Antipathy towards data modelers, who were frequently seen as
pursuing an ideal description of reality rather than contributing
in the most productive way to an information system design.
Quoted from Simsion, Graeme (2007). Data Modeling: Theory and Practice. p.10.
41. About Data Modeling
• Description/Design Issue Findings
– The description/design issue is considered an important
one by data modeling practitioners
• Evenly divided on opinion
– Data modeling extends into the implementation-oriented
Logical Data Model stage
– Database design methods used in practice support the
design paradigm
– Data modeling product variation supports a design
paradigm with many possible models, plus there are
effects of training and personal modeling stylees
From Simsion, Graeme (2007). Data Modeling: Theory and Practice. p.326-3xxx.
42. About Data Modeling
• Description/Design Issue Implications for FRBR
– Expect FRBR data modeling efforts to encounter similar
issues
– In compensation, develop an approach that allows theory
to guide (but not dictate) FRBR design efforts
• Design data structures that meet requirements
• Test data models - as Paper Tools - in theory-driven scenarios,
and allow each to mutually inform and creatively correct one
another
–Employ multiple sources for theory
–Employ data modeling conventions and patterns
From Simsion, Graeme (2007). Data Modeling: Theory and Practice. p.326-3xxx.
46. A Simplifying Abstraction:
Resource Diagram Drawing Conventions
A Resource
A Named
Resource
(Resource Plus
Minimal Description:
ID and Name)
A “Backbone” for
Optional Resource
Descriptions
47. A Simplifying Abstraction:
Resource Diagram Drawing Conventions
A Resource
A Named
Resource
(Resource Plus
Minimal Description:
ID and Name)
A “Backbone” for
Optional Resource
Optional Resource
Descriptions
Descriptions
48. A Simplifying Abstraction:
Resource Diagram Drawing Conventions
A Resource
Four Different Kinds
of Descriptions are A Named
Associated With This Resource
Resource (Resource Plus
Minimal Description:
ID and Name)
A “Backbone” for
Optional Resource
Optional Resource
Descriptions
Descriptions
49. A Simplifying Abstraction:
Resource Diagram Drawing Conventions
It’s Convenient to Group Descriptions
Logically, Changing the Shape of the
Resource Holder as Needed
(e.g., library vs. archive vs. museum)
50. Resource Modeling
Via a Diagrammatic Method
• Things of interest in the world can be treated as
Resources
– Resources are represented by dots
• Resources must be described in order to be findable,
navigable, and accessible
– Resource descriptions (in attribute form, apart from the minimum) are
represented by color-coded boxes
• Different types of Resource descriptions can be defined
for the same Resource
– Co-occurring Resource description boxes are attached to a backbone
51. Resource Modeling
Via a Diagrammatic Method
• Relationships can be defined between Resources
– Labeled lines can be drawn between related Resource descriptions
• Diagram drawing and manipulation rules reflect relevant
attributes of real world Resources and their relationships
– Only certain entities and relationships can be defined and described
• Extension and/or modification of the drawing rules can
reveal Resource attributes and relationships that are not
apparent or impossible using the usual approaches
– Memory or legacy record-keeping system overload/failure is
eliminated by changes in representation and/or record-keeping
systems
52. FRBR-Centric Resource Modeling
Using a Diagrammatic Method
(A FRBR “Paper Tool”)
• What is a paper tool?
• Who uses a diagrammatic method like this?
• Why use a paper tool to reason about bibliographic
(etc.) relationships among resources?
• How do we use it?
53. The Precedent From Physics
Feynman Diagrams & Diagramming Rules†
† http://www2.slac.stanford.edu/vvc/theory/feynman.html. Kaiser, David. Drawing Theories Apart: The Dispersion of
Feynman Diagrams in Postwar Physics. Chicago, IL: University of Chicago Press. 2005.
54. Working With A Paper Tool
• Paper Tool† - A collection of symbolic elements (diagrams,
characters, etc.), whose construction and manipulation follow
rules and constraints of one or more guiding theories
– Paper tool manipulation permits rapid, flexible, and creative exploration of
phenomena of interest
– Paper tool/user dialogs can generate unprecedented manipulations, and
change the interests and goals of a modeling effort
– One can work theoretically as well as practically with a paper tool
• Examples abound in the Sciences
• We can use a paper tool as a bookkeeping device during resource
description (cataloging) and for FRBR theory formation and testing
• Proper paper tool design aids in specification of appropriate data
structures that meet user requirements for discovery and access
† Klein, Ursula (2001) ‘Paper Tools in Experimental Cultures’, Studies in History and Philosophy of Science 32: 265–302.
55. Working With Paper Tools
• Why use a paper tool for reasoning about bibliographic (or any
other) relationships among resources?
– Efficient presentation of entities, attributes, relationships, and business
rules
– Diagram construction can be heavily constrained by (FRBR) theory
• What levels of descriptions are appropriate?
• What relationships exist between Resources and/or descriptions?
• What emergent structural properties emerge from a given Resource/
description?
– Can validate obvious and non-obvious aspects of resource descriptions ahd
relationships by creating and validating simple and complex model
diagrams
57. From flat-file record ...
Author: Lee, T. B.
Title: Cataloguing has a future
Content type: Spoken word
Carrier type: Audio disc
Subject: Metadata
Provenance: Donated by the author
58. Bibliographic description Name authority
Author: Name: Lee, T. B.
Title: Cataloguing has a future Biography:
...
Content type: Spoken word
Carrier type: Audio disc
Subject authority
Subject:
Term: Metadata
Provenance: Donated by the author Definition:
...
... to relational record
59. Name authority
Name: Lee, T. B.
Biography:
Work ...
Author:
Subject authority
Subject:
Term: Metadata
Expression
Definition:
Content type: Spoken word
...
Manifestation
Title: Cataloguing has a future
Carrier type: Audio disc
Item
Provenance: Donated by the author ... to FRBR record
60. Representing Bibliographic
Information: Prior Art
• Simplifying abstractions center on the catalog card
–The text-bearing card becomes the information-
bearing record
• Card text becomes Resource attributes
• Card text becomes Resource relationships
–Catalog record evolution reflects theoretical &
pragmatic concerns
• More diverse record types (Name & Subject
Authorities)
• Assumption of hierarchical Resource structure
• Related Term (RT) cross-referencing employed as a
pragmatic access strategy
61. Representing Bibliographic
Information
Work Information
Author: Lee. T. B.
W
Subject: Cataloging -- Philosophy
E
Expression Information
Content type: Spoken Word M
I
Manifestation Information
Title: Cataloguing has a future
Carrier type: Audiodisc
Item Information
Provenance: Donated by the author
All four kinds of FRBR data
are nested in a standard
information carrier that is
2
A catalog card “attached” to the Resource
62. Representing Bibliographic
Information
Work Information
Author: Lee. T. B.
W
Subject: Cataloging -- Philosophy
E
Expression Information
Content type: Spoken Word M
I
Manifestation Information
Title: Cataloguing has a future
Carrier type: Audiodisc
Item Information
Provenance: Donated by the author
All four kinds of FRBR data
are nested in a standard
information carrier that is
2
A catalog card “attached” to the Resource
63. Representing Bibliographic
Information
Work Information
Author: Lee. T. B.
W
Subject: Cataloging -- Philosophy
E
Expression Information
Content type: Spoken Word M
I
Manifestation Information
Title: Cataloguing has a future
Carrier type: Audiodisc
Item Information
Provenance: Donated by the author
All four kinds of FRBR data
are nested in a standard
information carrier that is
2
A catalog card “attached” to the Resource
64. FRBR Paper Tool Primer &
Example
The basic diagram element
represents a resource and the
overall description of that
resource
Work
Expression
Manifestation
Item
65. FRBR Paper Tool Primer &
Example
A black-filled circle means
that a resource and a resource
description are both present. A
clear circle means that no
resource is present
Work
Expression
Manifestation
Item
66. FRBR Paper Tool Primer &
Example
Work
Expression
Manifestation The color squares designate different
Item descriptions of the resource. In this
case, they reflect FRBR rules for
resource description.
67. FRBR Paper Tool Primer &
Example
Work
Expression
Connections between descriptions are
Manifestation
made according to the rules for the
Item
point of view being represented.
68. FRBR Paper Tool Primer &
Example
Work
Expression
Squares placed next to one another are
Manifestation
linked together by the appropriate
Item relationship. No lines are visible.
69. FRBR Paper Tool Primer &
Example
Work
Expression
If a color square is solid, that means
Manifestation that a full resource description is
Item present.
70. FRBR Paper Tool Primer &
Example
Work
Expression
Manifestation If a color square is hollow, that means
Item that this description points to one or
more descriptions of the same type. It
acts as a container.
71. FRBR Paper Tool Primer &
Example
A container description must be linked to one
or more descriptions of the same Type. (This is
a Business Rule at work.)
In this example, an Item (acting as a container)
is composed of two other Items.
Work
Expression
Manifestation
Item
Has Part
Has Part
72. FRBR Paper Tool Primer &
Example
In Item can act as a container because it is a
type of Resource. In our modeling of
bibliographic information, a Resource can be
composed of other Resources.
Resource subtypes like Item may inherit this
ability, depending on business rules.
Work
Expression
Manifestation
Item
Has Part
Has Part
73. FRBR Paper Tool Primer &
Example
A Mildly Complex Example
A serial publication consists of a number of articles (one is
two-part) gathered into issues under a single journal title. Some
author, publisher, and other role-based information is known.
Only two subject headings have been assigned so far.
Work
In addition to routine issue publication, a number of articles
Expression
have been selected by the editors for a special issue on
Manifestation
Cosmology, as well as for an ongoing “Best Of” collection of
Item
articles.
83. What libraries
can do: supply a
subject term for
an article
What libraries can do: supply
a controlled name for a
person, corporation, etc.
mentioned in or having to do
with an article
84.
85. The subject
portion of this
network of
bibliographic
entities and
relationships
may seem
hierarchical
when viewed
in isolation,
(but anomalies
begin to appear).
89. When the entities and relationships are taken all together, the
network structure of this mildly complex conceptual data
model of a serial publication is readily apparent.
90. The ability to represent this serial publication diagrammatically is
dependent on FRBR theory’s ability to prescribe diagram elements and
construction rules in a conceptually valid fashion.
If significant aspects of the publication’s structure and content cannot be
expressed in the diagram, it is an indication that the theory needs work.
Just as in architectural or engineering design, management of complex data
model diagrams may require computerized assistance.
91. The ability to accept and use diagrammatic representations of FRBR
theoretical elements may be dependent on that party’s position on the
Description/Design Issue.
Catalogers may already be accustomed to a descriptive stance due to
personal inclination reinforced by professional training. Software
developers must take a design stance towards their work, and are already
conversant with diagrammatic representation.
Whether either group will be able to reason theoretically using diagrams (á
la Feynman) is an open question.
92. Working With Paper Tools:
Exemplars
• Exemplars† - A set of “typical” Resource and content description
scenarios, solutions to which encourage (a.) selection of the best
Paper Tool from available choices, (b.) the refinement of Resource
description skills, and (c.) the creation of conceptual and logical data
models that reflect Paper Tool capabilities
– A manuscript (individual and related multiples, published but host to history,
imaginary)
– A monograph in one edition (individual and related multiples)
– A monograph in multiple editions (individual and related multiples)
– A publication in multiple media
– A continuing publication (individual and related multiples publications, special
editions) network
– A library multimedia resource and resource description network
– A World Wide Web page and its underlying multimedia resource network
†Kuhn’s The Structure of Scientific Revolutions & Kaiser’s Drawing Theories Apart: The Dispersion of Feynman Diagrams in Postwar Physics
93. Archiveland, Libraryland, Webland and
Beyond: A Modern Mathematical Tale
• It is possible to adopt an Ethnomathematically informed
perspective on Cultural Heritage Resource description:
• Resource description in general and cataloging in particular
involves the construction of descriptive structures - entities with
attributes - and the definition of relationships between entities
• These descriptive structures can be represented in graph form - as
sets of nodes and links that represent Resources and Resource
relationships
• Resource description graphs display varying degrees of complexity
in terms of node and link quantities and types
- Graph-theoretical expressions of complexity can be given meaning
from a Resource description and cataloging theory point of view
94. We All Speak Prose Here: Graph Structures In
Resource Description And Access
• Define increasingly complex graph structures that
could represent bibliographic Resource
descriptions
• Indicate which combinations of graph structures
characterize different Cultural Heritage institutions
• Identify a number of graph characteristics that
could support a dimensional view on Resource
description graphs
95. We All Speak Prose Here: Graph Structures In
Resource Description And Access
Graph Type Graph Diagram Comments
A B A null graph consists of a set of nodes without
relationships: {{A B C D E F}, {Ø}}.
D
Null C
* Retrieval sets from Online Public Access Catalogs can
E F be represented as null graphs, accept Boolean operations
- and be ordered temporarily for display purposes.
* Nontrivial trees have at least two end nodes.
A D E F * The deletion of any tree link disconnects the tree.
* There is only one travel path between any two nodes in
Tree B C a tree.
(AKA A Connected B C
* Trees are minimally - most economically - connected
Acyclic Graph)
structures.
D E F A
* A forest is a graph whose components are trees
From Buckley & Lewinter (2003)
A D E F
Hierarchies are represented by tree graphs with arrowed
Directed Tree B C
B C links that specify the direction of a relationship.
(Hierarchy) * A polyhierarchy is a forest of hierarchies(?)
D E F A
96. We All Speak Prose Here: Graph Structures In
Resource Description And Access
Graph Type Graph Diagram Comments
The graph is separable into k non-
overlapping sets, based on a specified
A S2 S1 relationship.
This example illustrates a library graph
B C S4 S5 S6 S3
k-Partite separated into a bipartite graph by
D E F S4 S4
“subject_of” relationships (dashed links in
diagram) that link Subject Heading
Resource nodes (“S1”) and Managed
Named Resource nodes (“A”).
Multiple relationships (directional or
A H I
nondirectional) can exist between nodes.
B C G J K N
Network One or more travel paths can exist
D E F L M between any two nodes.
Networks can be richly connected
97. Shelfland Binland, Libraryland, & Beyond:
A Cautionary Tale About Resource
Description & Access Subcultures
• Shelfland - Resources aggregated without any attempt
at organization by Resource characterstic.
• Binland - Resources aggregated by one or more
Resource characteristics. Bins may be nested in other
bins.
• Archiveland - A Binland operated by a responsible
party, following established Resource collection,
binning, and preservation procedures.
98. Shelfland Binland, Libraryland, & Beyond:
A Cautionary Tale About Resource
Description & Access Subcultures
• Libraryland - Resources organized into bins,
hierarchies, and de-facto networks following one or
more “authoritative” set of cataloging rules.
Structured or unstructured reference Resources are
used to support access
• Webland - Resources organized into bins, hierarchies,
de-facto and explicit networks. Organization is
variable, because a Webland can contain one or more
of all of the other lands
99. We All Speak Prose Here: Graph Structures In
Support of Resource Description And Access
A B
Shelf
D
Null C
- - -
E F
A B
A B
B G
Null, D
Bin - -
D L
K
C C I
Subgraphs E F H
M
O
N
E F
A B
Null,
A D E F
A B
B G
D
Archive - -
L
Subgraph
D K B C
C C I B C
O
Hierarchy
E F H
M N D E F A
E F
Null, A B
A B
B
G
A D E F A S2 S1
Subgraph D
Library -
D L B C S4 S5 S6 S3
K B C
C C I B C
Hierarchy, E F H
M
O
N D E F A
D E F S4 S4
E F
k-Partite
Null,
Subgraph A B
Hierarchy,
A D E F A S2 S1 A H I
A B
B G
D
Web
L B C S4 S5 S6 S3 B C G J K N
k-Partite,
D K B C
C C I B C
O
De-Facto &
E F H D E F S4 S4 D E F L M
M N D E F A
E F
Explicit
Network
100. Binland, Libraryland, Webland, & Beyond:
Levels of Graph-Friendly Resource
Description
• Weblanders, who are the most free in defining Resource
graphs do not view Libraryland as a highly informative but
graph-constrained Resource space
• Confusion in attribute and relationship definitions while data
modeling combine with institutional hierarchical
assumptions
• Librarylanders do not view Archiveland as a highly
informative but graph-constrained Resource space
101. Binland, Libraryland, Webland, & Beyond:
Levels of Graph-Friendly Resource
Description
• Librarylanders do not view Webland as a graph-enhanced
Resource space
• Institutional missions and systems available for
representation strongly shape reflect different institutional
assumptions and governance
• Authoritative control and user direction vs. distributed
creation, ownership, dissemination, and discovery
• Permitted nodes, attributes, relationships, and parties
• Archivelanders, Librarylanders and Weblanders all have
trouble viewing Binland as an informative but most strongly
graph-constrained space!
• Resource descriptions with few attributes
102. Archiveland, Libraryland, Webland and
Beyond: A Modern Mathematical Tale
• Resource description graphs in Cultural Heritage institutions
can be related to institutional and other factors that have guided
the creation, etc. of those structures
• As in Abbott’s Flatland, lack of awareness of a common
underlying structure threatens understanding and action
• It endangers efforts to make Resource descriptions created at one
level accessible to other levels.
• It reduces opportunities for parties working at one level of
Resource description to share experience and tools across levels
• It denies end-users improved and varied access to Resources
• Enlightenment becomes the ability to engage in Resource-oriented,
graph-theoretical thinking independently of institutional level
103. Placing The FRBR Data Model In A
Widening Context
• What kinds of “things of interest” are FRBR entities?
– Of what types or subtypes are they?
• Who else is out there creating information about
things that are of interest to us
– Where do our paths cross?
• Design Decisions
– Model FRBR entities as subtypes of a larger, more familiar
type of entity, as Resources
– Descriptions of resources can themselves be resources
– Business Rules constrain a more flexible data structure
104. The Role of Conceptual Data Modeling
In Cultural Heritage Institutions
• Definitions
– Conceptual, Logical, Physical, General
• About data modeling
– Modeling process, model, modeler
• Data models as “Paper Tools”
– Efficient reasoning about simple and complex models
• Data modeling examples
– FRBR entities are defined in the context of a Resource
• What to do now
– Revisit current modeling efforts; secure professional
involvement in the modeling process; build, lease, buy
modeling tools, training, education, taking leadership