7,005 research outputs found

    Astronomical Data Management

    Full text link
    We present a summary of the major contributions to the Special Session on Data Management held at the IAU General Assembly in Prague in 2006. While recent years have seen enormous improvements in access to astronomical data, and the Virtual Observatory aims to provide astronomers with seamless access to on-line resources, more attention needs to be paid to ensuring the quality and completeness of those resources. For example, data produced by telescopes are not always made available to the astronomical community, and new instruments are sometimes designed and built with insufficient planning for data management, while older but valuable legacy data often remain undigitised. Data and results published in journals do not always appear in the data centres, and astronomers in developing countries sometimes have inadequate access to on-line resources. To address these issues, an 'Astronomers Data Manifesto' has been formulated with the aim of initiating a discussion that will lead to the development of a 'code of best practice' in astronomical data management.Comment: Proceedings of Special Session SPS6 (Astronomical Data Management) at the IAU GA 2006. To appear in Highlights of Astronomy, Volume 14, ed. K.A. van der Huch

    Open educational resources : conversations in cyberspace

    Get PDF
    172 p. : ill. ; 25 cm.Libro ElectrónicoEducation systems today face two major challenges: expanding the reach of education and improving its quality. Traditional solutions will not suffice, especially in the context of today's knowledge-intensive societies. The Open Educational Resources movement offers one solution for extending the reach of education and expanding learning opportunities. The goal of the movement is to equalize access to knowledge worldwide through openly and freely available online high-quality content. Over the course of two years, the international community came together in a series of online discussion forums to discuss the concept of Open Educational Resources and its potential. This publication makes the background papers and reports from those discussions available in print.--Publisher's description.A first forum : presenting the open educational resources (OER) movement. Open educational resources : an introductory note / Sally Johnstone -- Providing OER and related issues : an introductory note / Anne Margulies, ... [et al.] -- Using OER and related issues : in introductory note / Mohammed-Nabil Sabry, ... [et al.] -- Discussion highlights / Paul Albright -- Ongoing discussion. A research agenda for OER : discussion highlights / Kim Tucker and Peter Bateman -- A 'do-it-yourself' resource for OER : discussion highlights / Boris Vukovic -- Free and open source software (FOSS) and OER -- A second forum : discussing the OECD study of OER. Mapping procedures and users / Jan Hylén -- Why individuals and institutions share and use OER / Jan Hylén -- Discussion highlights / Alexa Joyce -- Priorities for action. Open educational resources : the way forward / Susan D'Antoni

    The Australian Cyber Security Centre threat report 2015

    Get PDF
    Introduction: The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for malicious activities even if they do not think the information held on their networks is valuable, or that their business would be of interest to cyber adversaries. This first unclassified report by the ACSC describes the range of cyber adversaries targeting Australian networks, explains their motivations, the malicious activities they are conducting and their impact, and provides specific examples of activity targeting Australian networks during 2014. This report also offers mitigation advice on how organisations can defend against these activities. The ACSC’s ability to detect and defend against sophisticated cyber threats continues to improve. But cyber adversaries are constantly improving their tradecraft in their attempts to defeat our network defences and exploit the new technologies we embrace. There are gaps in our understanding of the extent and nature of malicious activity, particularly against the business sector. The ACSC is reaching out to industry to build partnerships to improve our collective understanding. Future iterations of the Threat Report will benefit from these partnerships and help to close gaps in our knowledge

    Digital Image Access & Retrieval

    Get PDF
    The 33th Annual Clinic on Library Applications of Data Processing, held at the University of Illinois at Urbana-Champaign in March of 1996, addressed the theme of "Digital Image Access & Retrieval." The papers from this conference cover a wide range of topics concerning digital imaging technology for visual resource collections. Papers covered three general areas: (1) systems, planning, and implementation; (2) automatic and semi-automatic indexing; and (3) preservation with the bulk of the conference focusing on indexing and retrieval.published or submitted for publicatio
    • …
    corecore