485 research outputs found

    A national digital data policy for the United States: to be or not to be?

    Get PDF
    As countries worldwide are coming to terms with establishing a national data policy, the United States is approaching the issue in a piecemeal manner. With numerous federal, state and private agencies in control of funding, it is unlikely that a national policy will emerge for the United States in the near future. Regardless, efforts are moving forward on digital initiatives, including open access to scholarly publications, access to digital data-sets, creation of standards for data-set management, and national repositories for scanned images. Consortiums of research libraries such as the Committee on Institutional Cooperation (CIC), Association of Research Libraries (ARL), Coalition of Networked Information (CNI) and the Digital Library Federation (DLF) are facing these issues and assisting with definition of challenges and options. Several not-for-profit agencies are investigating ways in which they can participate, including OCLC, JSTOR, Portico and LOCKSS. Commercial firms such as Google are establishing partnerships with research libraries. Major federal funding agencies including the National Science Foundation and the National Institutes of Health have issued statements about the need for a digital policy. Federal agencies such as the National Archives and the Library of Congress are participating by actively managing massive amounts of data. Although there is activity on numerous fronts, there is no forum for a nationally concerted effort. While it is unlikely that a national policy on digital management will emerge in the United States, it is likely that within five to ten years a patch-work quilt of digital policies will emerge. This paper will explore issues faced by the scientific and technical disciplines and the collaborative approaches developing between the research and library communities to meet these challenges

    Associate Dean for Research: Libraries commitment to Interdisciplinary/Collaborative Sponsored Research in the Libraries and throughout the University.

    Get PDF
    The research role of university librarians is changing. The advent of massive datasets by academic researchers has created the need for collaboration between the researchers and librarians. The National Science Foundation (USA) has recognized the need for management of massive datasets. In response, Purdue University Libraries has created a program and specific positions to help address this need

    The Changing Definition and Role of Collections and Services in the University Research Library

    Get PDF

    Purdue University Libraries & Press: From Collaboration to Integration

    Get PDF
    These are the slides from an invited joint presentation given at the Ithaka Sustainable Scholarship Conference, held in New York on October 22, 2013. It was part of a session entitled “The Evolving Digital Landscape: New Roles and Responsibilities in Higher Education. More about the meeting is available at: http://www.ithaka.org/conference/ithaka-sustainable-scholarship-201

    What do libraries have to do with e-Science? An interview with James L. Mullins, Dean of Purdue University Libraries

    Get PDF
    http://acscinf.org/publications/interviews/mullins2011.phpSvetla Baykoucheva interviews Dr. James L. Mullins, Dean of Purdue University Libraries, on eScience and the role librarians could play in this new field

    Simulating Windows-Based Cyber Attacks Using Live Virtual Machine Introspection

    Get PDF
    Static memory analysis has been proven a valuable technique for digital forensics. However, the memory capture technique halts the system causing the loss of important dynamic system data. As a result, live analysis techniques have emerged to complement static analysis. In this paper, a compiled memory analysis tool for virtualization (CMAT-V) is presented as a virtual machine introspection (VMI) utility to conduct live analysis during simulated cyber attacks. CMAT-V leverages static memory dump analysis techniques to provide live system state awareness. CMAT-V parses an arbitrary memory dump from a simulated guest operating system (OS) to extract user information, network usage, active process information and registry files. Unlike some VMI applications, CMAT-V bridges the semantic gap using derivation techniques. This provides increased operating system compatibility for current and future operating systems. This research demonstrates the usefulness of CMAT-V as a situational awareness tool during simulated cyber attacks and measures the overall performance of CMAT-V

    Genomic Assemblies of Members of Burkholderia and Related Genera as a Resource for Natural Product Discovery.

    Get PDF
    The genomes of 450 members of Burkholderiaceae, isolated from clinical and environmental sources, were sequenced and assembled as a resource for genome mining. Genomic analysis of the collection has enabled the identification of multiple metabolites and their biosynthetic gene clusters, including the antibiotics gladiolin, icosalide A, enacyloxin, and cepacin A
    corecore