7,005 research outputs found
Astronomical Data Management
We present a summary of the major contributions to the Special Session on
Data Management held at the IAU General Assembly in Prague in 2006. While
recent years have seen enormous improvements in access to astronomical data,
and the Virtual Observatory aims to provide astronomers with seamless access to
on-line resources, more attention needs to be paid to ensuring the quality and
completeness of those resources. For example, data produced by telescopes are
not always made available to the astronomical community, and new instruments
are sometimes designed and built with insufficient planning for data
management, while older but valuable legacy data often remain undigitised. Data
and results published in journals do not always appear in the data centres, and
astronomers in developing countries sometimes have inadequate access to on-line
resources. To address these issues, an 'Astronomers Data Manifesto' has been
formulated with the aim of initiating a discussion that will lead to the
development of a 'code of best practice' in astronomical data management.Comment: Proceedings of Special Session SPS6 (Astronomical Data Management) at
the IAU GA 2006. To appear in Highlights of Astronomy, Volume 14, ed. K.A.
van der Huch
Open educational resources : conversations in cyberspace
172 p. : ill. ; 25 cm.Libro ElectrĂłnicoEducation systems today face two major challenges: expanding the reach of education and improving its quality. Traditional solutions will not suffice, especially in the context of today's knowledge-intensive societies. The Open Educational Resources movement offers one solution for extending the reach of education and expanding learning opportunities. The goal of the movement is to equalize access to knowledge worldwide through openly and freely available online high-quality content. Over the course of two years, the international community came together in a series of online discussion forums to discuss the concept of Open Educational Resources and its potential. This publication makes the background papers and reports from those discussions available in print.--Publisher's description.A first forum : presenting the open educational resources (OER) movement. Open educational resources : an introductory note / Sally Johnstone --
Providing OER and related issues : an introductory note / Anne Margulies, ... [et al.] --
Using OER and related issues : in introductory note / Mohammed-Nabil Sabry, ... [et al.] --
Discussion highlights / Paul Albright --
Ongoing discussion. A research agenda for OER : discussion highlights / Kim Tucker and Peter Bateman --
A 'do-it-yourself' resource for OER : discussion highlights / Boris Vukovic --
Free and open source software (FOSS) and OER --
A second forum : discussing the OECD study of OER. Mapping procedures and users / Jan Hylén --
Why individuals and institutions share and use OER / Jan Hylén --
Discussion highlights / Alexa Joyce --
Priorities for action. Open educational resources : the way forward / Susan D'Antoni
The Australian Cyber Security Centre threat report 2015
Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for malicious activities even if they do not think the information held on their networks is valuable, or that their business would be of interest to cyber adversaries.
This first unclassified report by the ACSC describes the range of cyber adversaries targeting Australian networks, explains their motivations, the malicious activities they are conducting and their impact, and provides specific examples of activity targeting Australian networks during 2014. This report also offers mitigation advice on how organisations can defend against these activities.
The ACSC’s ability to detect and defend against sophisticated cyber threats continues to improve. But cyber adversaries are constantly improving their tradecraft in their attempts to defeat our network defences and exploit the new technologies we embrace.
There are gaps in our understanding of the extent and nature of malicious activity, particularly against the business sector. The ACSC is reaching out to industry to build partnerships to improve our collective understanding. Future iterations of the Threat Report will benefit from these partnerships and help to close gaps in our knowledge
Digital Image Access & Retrieval
The 33th Annual Clinic on Library Applications of Data Processing, held at the University of Illinois at Urbana-Champaign in March of 1996, addressed the theme of "Digital Image Access & Retrieval." The papers from this conference cover a wide range of topics concerning digital imaging technology for visual resource collections. Papers covered three general areas: (1) systems, planning, and implementation; (2) automatic and semi-automatic indexing; and (3) preservation with the bulk of the conference focusing on indexing and retrieval.published or submitted for publicatio
- …