Between 2009 and 2012 the Higher Education Funding Council for England (HEFCE) funded a series of programmes to encourage higher education institutions in the UK to release existing educational content as Open Educational Resources (OER) and to embed open practices in the institution. The HEFCE funded UK OER Programmes were run and managed by the JISC and the Higher Education Academy. Over the course of three years about £15M (€17,5M) was invested on projects that investigated the release and collection of OERs by individuals, institutions and subject communities. The Cetis “OER Technology Support Project” provided support for technical innovation across this programme.
In this conference paper we will present our reflections on the technical approaches taken, issues raised and the lessons learnt from the Programmes and the Support Project. The issues covered include resource management, resource description, licensing and attribution, search engine optimisation and discoverability, tracking OERs, and paradata (activity data about learning resources). Technical solutions discussed will include the use of social sharing platforms such as flickr and WordPress for resource dissemination; metadata embedded in HTML documents as RDFa, microdata and using the schema.org ontology; and sharing metadata and paradata using the Learning Registry (a network of schema-free data stores). As well as describing the achievements of the programme, we will also discuss the difficulties encountered and identify areas where further work is required.
Karen Church - A Large-Scale Study of European Mobile Information AccessAIC_UCD
- The document summarizes two large-scale studies conducted in 2005 and 2006 on mobile internet usage in Europe. The second study found that in a 5 month period, the number of search queries doubled, average query length increased, and users performed more searches per session and per user. This indicates mobile search is evolving as the mobile internet grows rapidly.
- Key findings include that browsing still dominates but search is growing, with Google remaining the most popular search engine. The second study found increases in the number of sessions, users, search queries, and bytes downloaded during searches. This suggests the mobile internet is evolving as users generate more content and search more over time.
This document summarizes outcomes from an interoperability experiment on using Shibboleth for access management of geospatial web services. It discusses how Shibboleth can allow single sign-on access to protected spatial data resources across administrative domains. The academic sector helped test and demonstrate modified open source clients that work with Shibboleth-secured services to improve access for research and education. Going forward, expanding the use of Shibboleth and strengthening connections between access management federations could maximize the benefits.
EOSC FAIR Data Session - EOSC Stakeholders Forum 2018EOSCpilot .eu
This document summarizes a presentation on implementing the FAIR data principles. It begins with an introduction to the FAIR principles of findable, accessible, interoperable and reusable data. It then discusses how each of the principles can be achieved, such as through assigning persistent identifiers, providing rich metadata, and using standard vocabularies. The remainder of the document lists the agenda for a panel discussion on implementing FAIR data, which will address questions around university involvement, data reuse, alignment with trusted data repositories, disciplinary vs unified implementation, and training.
Trust and identity in the Géant project - Networkshop44Jisc
The document discusses trust and identity in the GÉANT project. It provides an overview of how identity federations currently work through interoperability via eduGAIN [1]. It then discusses how research environments are becoming more complex, requiring identity solutions that can support more flexible collaboration beyond local campuses [2]. Finally, it outlines some developments underway through the GÉANT project to develop tools and services that can help balance risk while enabling attribute sharing to better support modern research needs like those of the LIGO collaboration [3].
Presentation given at Macquarie University in support of the ARDC 'institutional role in the data commons' project on "Implementing FAIR: Standards in Research Data Management" https://ardc.edu.au/news/data-and-services-discovery-activities-successful-applicants/
Federated access management allows users to access multiple online services using a single username and password. It provides benefits like increased security, reduced workload for organizations, and a better user experience. The UK Access Management Federation provides a standardized way for universities, schools, and other organizations to participate in federated access management. JISC supports the development and adoption of federated access management through funding, guidance materials, and an outreach team.
Results from the FAIR Expert Group Stakeholder Consultation on the FAIR Data ...EOSCpilot .eu
Turning FAIR into Reality report and action plan by Simon Hodson, Executive Director of CODATA, delivered during the FAIR Data Session at the EOSC Stakeholders Forum 2018
The document discusses knowledge and technology transfer through networking among various actors. It describes two main channels of interaction: 1) Among Technology Transfer Offices (TTOs) through international networking and 2) Between TTOs and other local actors through local collaboration networks. Some benefits of networking include positioning organizations internationally, increasing competencies, and professionalizing activities. However, networking can also be time consuming and difficult to finance. Local collaboration helps facilitate open innovation and identify collaboration opportunities through coordinated knowledge sharing networks.
The document summarizes the results of a consultation on the Multi-Annual Roadmap (MAR) for the European Open Science Cloud (EOSC). Over 45 people completed the survey and provided over 500 comments total. The comments covered priorities like engaging researchers, long-term data preservation, standards, and funding. The feedback will be used to update the MAR and align it with the upcoming Horizon Europe work program before publishing a new version in April.
OSFair2017 Workshop | Towards a Policy Framework for the European Open Scienc...Open Science Fair
The document outlines an agenda for a workshop on developing a policy framework for the European Open Science Cloud (EOSC). The EOSCpilot project aims to identify where policies are needed within EOSC and define relevant policy frameworks. As part of this, the workshop will include world café discussions on topics like open science standards, data stewardship, intellectual property rights, special regimes, data protection, and ethics. The goal is to discuss challenges and help develop policies to support open sharing of research outputs and data across Europe.
This workshop discusses access and identity management (AIM) services. A new Jisc AIM Strategy and Plan has been published to guide the delivery and evolution of AIM for UK education and research. The workshop will highlight solutions from the Identity Management co-design project, which addresses cultural and political barriers to identity management. It also provides an opportunity to learn about Jisc AIM services and discuss any issues with adopting federated identity services.
This document discusses open access (OA) in scholarly communication and the relationship between OA, information and communication technology (ICT), and policy. It notes that while OA has spread as a concept, significant challenges remain regarding global copyright, infrastructure development, and coordination between stakeholders. The document suggests two views on advancing OA - focusing first on added-value services for scholars or first on developing global ICT infrastructure through joint efforts of technical and policy groups.
ELIXIR is a European infrastructure that brings together life science resources from across Europe. It offers databases, tools, computing capabilities, and training opportunities. ELIXIR nodes provide these services and connect national data infrastructures. ELIXIR communities connect infrastructure experts to drive service developments. ELIXIR is funded through a mixed model including public sources. It works to sustain important biological data resources and make data FAIR through recommended standards and interoperability resources. ELIXIR also aims to develop a sustainable tools ecosystem and provides training through its portal.
Survey on metadata management and governance in EuropeSemic.eu
This document summarizes the findings of a survey on metadata management and governance practices in Europe. It identifies the most common roadblocks to effective metadata governance as lack of buy-in from management, lack of methodologies, lack of standards, and inadequate tool support. Case studies of metadata governance approaches used at various European and national institutions are also presented. Examples of good practices identified include distinguishing relevant roles, stakeholder involvement, balancing stability and flexibility, and use of standard reference data. Recommendations include formulating legislation at a high level, documenting processes, using open licensing, and assigning persistent identifiers. Next steps proposed are developing a metadata governance methodology and pilot projects to test it.
1. EDINA develops and hosts services based on licensed data content for academic institutions, using IP address authentication, Athens authentication, or UK federation authentication.
2. To determine if a user is authorized to access its services, EDINA checks the eduPersonScopedAffiliation attribute to identify the user's organization and matches it to a file mapping subscriber organizations to authorized services.
3. EDINA initially generated these mapping files manually but now automatically generates them from an existing database of subscription information keyed by organization codes, cross-referenced with organization DNS names in federation metadata.
The document outlines a focus group to recommend an eportfolio application for a college. It defines eportfolios and lists considerations around content, pedagogy, and technology. The process involves identifying criteria, potential applications, constructing a matrix to evaluate applications, selecting one or more based on the matrix, and submitting a recommendation. A needs assessment and requirements/timeline are also discussed.
Presentation given by Chris Higgens at the Annual Infrastructure for Spatial Information in European (INSPIRE) Conference Krakow, Poland. 22 June 2010.
The document discusses access control for geospatial data using Shibboleth federated identity management. It summarizes work done in the ESDIN project to set up a prototype Shibboleth federation between national mapping agencies. It also describes an OGC interoperability experiment where several software vendors modified their OWS clients to work with Shibboleth single sign-on. The document concludes by discussing potential next steps, such as establishing an INSPIRE Shibboleth federation and holding a workshop at the INSPIRE conference.
EOSC FAIR Data Session - EOSC Stakeholders Forum 2018EOSCpilot .eu
This document summarizes a presentation on implementing the FAIR data principles. It begins with an introduction to the FAIR principles of findable, accessible, interoperable and reusable data. It then discusses how each of the principles can be achieved, such as through assigning persistent identifiers, providing rich metadata, and using standard vocabularies. The remainder of the document lists the agenda for a panel discussion on implementing FAIR data, which will address questions around university involvement, data reuse, alignment with trusted data repositories, disciplinary vs unified implementation, and training.
Trust and identity in the Géant project - Networkshop44Jisc
The document discusses trust and identity in the GÉANT project. It provides an overview of how identity federations currently work through interoperability via eduGAIN [1]. It then discusses how research environments are becoming more complex, requiring identity solutions that can support more flexible collaboration beyond local campuses [2]. Finally, it outlines some developments underway through the GÉANT project to develop tools and services that can help balance risk while enabling attribute sharing to better support modern research needs like those of the LIGO collaboration [3].
Presentation given at Macquarie University in support of the ARDC 'institutional role in the data commons' project on "Implementing FAIR: Standards in Research Data Management" https://ardc.edu.au/news/data-and-services-discovery-activities-successful-applicants/
Federated access management allows users to access multiple online services using a single username and password. It provides benefits like increased security, reduced workload for organizations, and a better user experience. The UK Access Management Federation provides a standardized way for universities, schools, and other organizations to participate in federated access management. JISC supports the development and adoption of federated access management through funding, guidance materials, and an outreach team.
Results from the FAIR Expert Group Stakeholder Consultation on the FAIR Data ...EOSCpilot .eu
Turning FAIR into Reality report and action plan by Simon Hodson, Executive Director of CODATA, delivered during the FAIR Data Session at the EOSC Stakeholders Forum 2018
The document discusses knowledge and technology transfer through networking among various actors. It describes two main channels of interaction: 1) Among Technology Transfer Offices (TTOs) through international networking and 2) Between TTOs and other local actors through local collaboration networks. Some benefits of networking include positioning organizations internationally, increasing competencies, and professionalizing activities. However, networking can also be time consuming and difficult to finance. Local collaboration helps facilitate open innovation and identify collaboration opportunities through coordinated knowledge sharing networks.
The document summarizes the results of a consultation on the Multi-Annual Roadmap (MAR) for the European Open Science Cloud (EOSC). Over 45 people completed the survey and provided over 500 comments total. The comments covered priorities like engaging researchers, long-term data preservation, standards, and funding. The feedback will be used to update the MAR and align it with the upcoming Horizon Europe work program before publishing a new version in April.
OSFair2017 Workshop | Towards a Policy Framework for the European Open Scienc...Open Science Fair
The document outlines an agenda for a workshop on developing a policy framework for the European Open Science Cloud (EOSC). The EOSCpilot project aims to identify where policies are needed within EOSC and define relevant policy frameworks. As part of this, the workshop will include world café discussions on topics like open science standards, data stewardship, intellectual property rights, special regimes, data protection, and ethics. The goal is to discuss challenges and help develop policies to support open sharing of research outputs and data across Europe.
This workshop discusses access and identity management (AIM) services. A new Jisc AIM Strategy and Plan has been published to guide the delivery and evolution of AIM for UK education and research. The workshop will highlight solutions from the Identity Management co-design project, which addresses cultural and political barriers to identity management. It also provides an opportunity to learn about Jisc AIM services and discuss any issues with adopting federated identity services.
This document discusses open access (OA) in scholarly communication and the relationship between OA, information and communication technology (ICT), and policy. It notes that while OA has spread as a concept, significant challenges remain regarding global copyright, infrastructure development, and coordination between stakeholders. The document suggests two views on advancing OA - focusing first on added-value services for scholars or first on developing global ICT infrastructure through joint efforts of technical and policy groups.
ELIXIR is a European infrastructure that brings together life science resources from across Europe. It offers databases, tools, computing capabilities, and training opportunities. ELIXIR nodes provide these services and connect national data infrastructures. ELIXIR communities connect infrastructure experts to drive service developments. ELIXIR is funded through a mixed model including public sources. It works to sustain important biological data resources and make data FAIR through recommended standards and interoperability resources. ELIXIR also aims to develop a sustainable tools ecosystem and provides training through its portal.
Survey on metadata management and governance in EuropeSemic.eu
This document summarizes the findings of a survey on metadata management and governance practices in Europe. It identifies the most common roadblocks to effective metadata governance as lack of buy-in from management, lack of methodologies, lack of standards, and inadequate tool support. Case studies of metadata governance approaches used at various European and national institutions are also presented. Examples of good practices identified include distinguishing relevant roles, stakeholder involvement, balancing stability and flexibility, and use of standard reference data. Recommendations include formulating legislation at a high level, documenting processes, using open licensing, and assigning persistent identifiers. Next steps proposed are developing a metadata governance methodology and pilot projects to test it.
1. EDINA develops and hosts services based on licensed data content for academic institutions, using IP address authentication, Athens authentication, or UK federation authentication.
2. To determine if a user is authorized to access its services, EDINA checks the eduPersonScopedAffiliation attribute to identify the user's organization and matches it to a file mapping subscriber organizations to authorized services.
3. EDINA initially generated these mapping files manually but now automatically generates them from an existing database of subscription information keyed by organization codes, cross-referenced with organization DNS names in federation metadata.
The document outlines a focus group to recommend an eportfolio application for a college. It defines eportfolios and lists considerations around content, pedagogy, and technology. The process involves identifying criteria, potential applications, constructing a matrix to evaluate applications, selecting one or more based on the matrix, and submitting a recommendation. A needs assessment and requirements/timeline are also discussed.
Presentation given by Chris Higgens at the Annual Infrastructure for Spatial Information in European (INSPIRE) Conference Krakow, Poland. 22 June 2010.
The document discusses access control for geospatial data using Shibboleth federated identity management. It summarizes work done in the ESDIN project to set up a prototype Shibboleth federation between national mapping agencies. It also describes an OGC interoperability experiment where several software vendors modified their OWS clients to work with Shibboleth single sign-on. The document concludes by discussing potential next steps, such as establishing an INSPIRE Shibboleth federation and holding a workshop at the INSPIRE conference.
The document summarizes a workshop on using Shibboleth federations to securely access spatial data infrastructure (SDI) resources. It describes an interoperability experiment conducted by the Open Geospatial Consortium to test modifying open source clients to access web services secured by Shibboleth. Several organizations demonstrated desktop and browser-based clients accessing web feature and map services hosted in test identity federations. The experiment showed securing SDI resources with Shibboleth is practical and could help address cross-border data sharing challenges.
- The document summarizes a workshop about using Shibboleth federations to securely access spatial data infrastructure (SDI) resources through web services.
- An interoperability experiment was conducted where several organizations modified their web service client software to work with Shibboleth single sign-on across administrative domains.
- The experiment demonstrated that using Shibboleth to securely access web feature and map services through single sign-on is practical and does not require major software changes. This could help address interoperability barriers for cross-border applications needing to access protected spatial resources.
Web 2.0 Core Concepts, Applications, and ImplicationsTomáš Pitner
The document discusses the concepts of Web 2.0 including its core characteristics and applications. It provides examples of Web 1.0 applications and their Web 2.0 successors. It also analyzes the functionality and qualities that Web 2.0 services provide like user participation, content sharing and contextualization. The document further discusses trends in Web 2.0 including identity consolidation, universal accessibility, interoperability and the semantic web.
1. The document discusses using Shibboleth Access Management Federations as an organizational model for securing Spatial Data Infrastructures (SDIs) under INSPIRE.
2. Access Management Federations allow secure sharing of authentication information across administrative domains through a "circle of trust" and can provide single sign-on for cross-border applications to access protected geospatial resources.
3. The 12 attributes proposed in the paper argue that Access Management Federations based on open standards like SAML satisfy the security, privacy, and interoperability requirements for pan-European SDIs under INSPIRE.
OpenAthens and the future of access and identity managementEduserv Foundation
The document discusses OpenAthens, an identity and access management framework being developed by Eduserv. It aims to support multiple federations and evolving standards through an open and modular architecture. OpenAthens will provide identity management solutions for users, institutions, and service providers, allowing seamless access to resources across different federations. It provides a cost-effective way for institutions to join the UK Access Management Federation through outsourced services, while supporting evolving user needs and technologies over the long term.
The document provides an update on various working groups related to cloud computing and data sharing initiatives within the US federal government. It discusses the responsibilities and activities of working groups focused on cloud computing services, standards, governance, and communications. It also summarizes several events and discussions around implementing semantic technologies and linked open data practices on Data.gov and within federal agencies.
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...BlueFish
The document discusses the eRulemaking initiative to enable public participation in federal rulemaking. It describes how Lockheed Martin and Blue Fish Development Group helped build an electronic system called FDMS that allows the public to access and comment on agency rules and regulations through a single online portal. The system provides benefits like increased transparency and cost savings compared to paper-based processes. It also discusses challenges in developing a flexible system that all agencies can customize while maintaining common services and standards.
Web 2.0: How Should IT Services and the Library Respond?lisbk
Slides used by Brian Kelly, UKOLN at a meeting on "Web 2.0: How Should IT Services and the Library Respond?" held at the University of Nottingham, on 16 November 2006.
The document discusses the transition from the centralized Athens access management service to a federated access management model in the UK. Key points include:
- JISC will support federated access as the preferred solution and continue funding Athens until July 2008, when it will be available via subscription.
- The UK Access Management Federation will launch in November 2006 with early adopters in August 2006, transitioning members from the successful SDSS pilot federation.
- Federated access involves authentication at the institution with attributes shared between institutions and service providers to determine access.
ATMOSPHERE was invited to be a speaker at Think Milano event, on 6th June from 14.30 to 17.30, to join a panel discussion called “L’infrastruttura cloud ready protagonista del future” on how cloud infrastructures are important for different market sectors.
This talk is about data-driven transformation and its contribution to Digital transformation. The first part shows the necessity to adopt the "software revolution" to adapt constantly to the customer’s environment. I then speak about " Exponential Information Systems" that the the foundation for the data-driven ambitions : Enterprise-wide flows, Customer-time data freshness, Future-proof unified semantics, etc.
The last part talks about Exponential Technologies, such as Artificial intelligence and machine learning, to drive more value from data
The document discusses moving from silo-based development to a modular, open architecture based on service-oriented architecture (SOA). It notes that typical IT budgets spend 70-90% on maintenance due to rigid, monolithic applications. SOA defines services as modular, loosely coupled units that can be reused. The document recommends a phased approach to SOA implementation and provides examples of SOA adoption in Israel, highlighting challenges around monitoring, operations, and organizational issues.
IMTs testimonials: The case of IMAPS in the GR Public SectorYannis Charalabidis
The document discusses the use of the IMAPS framework to evaluate the interoperability of digital services in Greece. It summarizes two case studies applying IMAPS to services from the Social Security Service (IDIKA) and the Ministry of Rural Development's fisheries services. For both cases, IMAPS identified areas for improvement, such as a lack of multilingual support, incomplete accessibility, and minimal use of standards for semantic and technical interoperability. The document concludes with suggestions to deepen IMAPS' analysis of semantic interoperability and progress toward more automated assessments.
This document proposes selecting appropriate Rich Internet Application (RIA) technologies to meet user and business demands. It presents RIA technologies like AJAX, Adobe Flex, and Microsoft Silverlight, compares their features, and recommends usage scenarios. As a case study, it evaluates developing the Palestinian Encyclopedia (PalPedia) using RIA best practices for user experience, performance, and compatibility. The document concludes by discussing developing PalPedia further and including additional RIA technologies in future comparisons.
This document discusses concepts of assurance within research and education federations. It defines federations and distinguishes them from communities of practice. It explores where assurance is added, such as through metadata registration with federations or identity proofing with institutions. The document also discusses identity assurance profiles, registration and aggregation of metadata, and assumptions around levels of assurance. It proposes several actions to further develop understanding and standards around assurance, such as collecting assurance requirements and case studies.
- The document discusses issues around allowing non-institutional authentication systems like Facebook to join identity federations and how this affects assurance and trust.
- It raises questions about what membership in a federation "club" means and what goals are aimed to be achieved by allowing or disallowing certain members.
- It explores how assurance can be provided at the point of metadata registration with a federation and separately for end-user identity proofing at the institution level. Issues around identity assurance profiles are also discussed.
The UK federation has over 600 members, with high participation rates in higher and further education. Membership is free and growing, especially among schools. The UK federation focuses on facilitating access to licensed resources through centralized negotiation. Interfederation with InCommon is being explored to allow international access to UK resources and services with an international audience, though legal and policy changes would be required.
The document discusses virtual organizational tools and the CUCKOO project which aims to investigate identity management and access control using Shibboleth. It summarizes the goals of exploring tools like Grouper and Signet to centrally manage user groups and privileges. While these tools showed potential benefits, challenges included a lack of real-time synchronization and the need for custom application integration. Further work is needed to improve the user interfaces and reduce setup complexity.
1) Identity management is becoming increasingly important due to stricter privacy regulations being enacted worldwide. The identity management software market is projected to reach $4.9 billion by 2012.
2) As more business and personal activities move online, assured digital identity that can be attested to is becoming more valuable, especially for high-value interactions. Most experts argue for trusted identity providers to fulfill this role.
3) Funding of approximately £2.5 million was provided for identity management from 2008 to 2011 by the UK, though identity was not a high priority in other published strategy documents and frameworks.
The document provides an overview of new features in Shibboleth 2.0 including an updated IdP architecture with improved configuration, SAML 2 support, enhanced attribute filtering and logging. It also outlines upcoming features in version 2.1 such as a unified I/O layer and additional scripting language support for attribute filters.
The document discusses the results of an identity management survey and audits conducted by the Identity Project in UK higher education institutions. It found that while IDM is becoming more important, practices are decentralized and inconsistent across institutions. The audits revealed issues with data quality and integration when implementing IDM systems. Recommendations include raising awareness, building capacity through funding and resources, and further research on authentication assurance levels and toolkits.
The document provides an overview and definitions of key concepts related to installing and configuring Shibboleth identity provider (IdP) software, including:
1) It describes the directory structure and files included in a default Shibboleth IdP installation.
2) It explains how metadata from identity providers and service providers is loaded and managed through metadata providers configured in the relying-party.xml file.
3) It provides an example configuration of the UK Federation metadata provider to load metadata over HTTP and validate signatures.
4) It discusses login handler and authentication mechanism configurations in handler.xml to define how users authenticate to the IdP.
This document summarizes the steps to install and configure a Shibboleth 2.0 Service Provider on CentOS including generating keys and certificates, configuring the entityID, testing connections to an Identity Provider, enabling lazy sessions, modifying logging and metadata settings, and using content settings like the .htaccess file and RequestMap to control authentication requirements.
SARoNGS provides coherent electronic access for UK researchers to computational and data resources required for research, independent of location. It uses Shibboleth for access management across 4 core sites and 7 partners. SARoNGS aims to broaden user base, ease access, encourage collaboration, prevent unauthorized access, and deliver a production service for accessing National Grid Service resources.
The document discusses the Names Project, which aims to create a name authority service for UK institutional repositories. It provides background on institutional repositories in the UK and the scope and goals of the Names Project prototype. The prototype involves building a database based on the Functional Requirements for Authority Records (FRAD) data model and creating records for UK institutions and individuals. It will allow individuals to claim and update their data and provide interfaces for repositories and other services to query the database and help users enter consistent metadata across repositories.
Studies in advanced access mgmt: GFIVO project (Cal Racey)JISC.AM
Caleb Racey from Newcastle University in the UK discusses Newcastle's implementation of Grouper, an open source system for managing user groups and access control. Some key points:
1) Grouper allows Newcastle to centralize fragmented group and identity management across various systems and applications in a standardized way.
2) Their implementation is taking a phased approach, starting with simple integrations using the Grouper Shell and later adding the Grouper web interface and web services.
3) Benefits include consistency in access control, reusability of groups, and giving applications and users a coherent interface to previously incoherent identity data. Challenges include technical prerequisites and helping users understand new group concepts.
The document discusses future directions for digital identity, including Identity 2.0 which more closely resembles offline identity systems but with advantages of a digital medium, and OpenID which allows users more control over their login credentials and reduces frustration by letting users manage their identity across multiple sites. OpenID is described as an 'identity layer' that can sit on top of current authentication methods.
Shintau And VPMan proejcts (David Chadwick)JISC.AM
The Information Systems Security Research Group at the University of Kent specializes in researching and developing open source software that provides fine-grained access control based on user-specified policies. Their goal is to create software like Shintau and VPMan that gives users control over how their data is accessed in a federated environment.
OpenID is an identity network that allows users to control their online identity and choose who holds their personal information. It uses existing web technologies to provide a consistent login process across sites without requiring each site to separately verify a user's identity. While some users may not see the need to change from usernames and passwords, OpenID could significantly improve online security by reducing identity theft and phishing.
'Connecting poeple to resources' by Nicole Harris at UKSG 2007JISC.AM
JISC will centrally support federated access management from July 2008 as the preferred access system in UK higher and further education. This will be enabled by the UK Access Management Federation run by UKERNA. Institutions will need to implement authentication and authorisation systems to participate. Federated access management aligns with international standards, improves flexibility and access to resources, and is required to meet strategic goals around e-learning and collaboration.
The document discusses user-centric identity and managing identity online. It talks about concepts like Identity 2.0, where users have more control over their identity and claims about themselves. The document raises questions about when institutions should host resources for users, manage user identities, verify identities for service providers, and broker access to resources. It discusses the role of OpenID in providing infrastructure to allow moving towards more user-managed digital identities and single identities across different services. The document also outlines some identity-related projects and studies being undertaken by JISC.
This document discusses key concepts of federated access management (FAM) including:
1) FAM allows for single sign-on access to online resources across domains through distributing authentication, authorization, and accounting functions to appropriate parties like identity providers and service providers.
2) Identity providers handle authentication of their users while service providers control authorization based on attributes like role and affiliation.
3) Standards like SAML and Shibboleth facilitate trust between identity providers and service providers so users' access is managed according to their home institution's policies.
Subtitled "Why carry two cards into the Library, when you already have one?", this presentation outlines the concepts and terminology of Federated Access Management, and how it works, with a preamble using the analogy of (and differences between) bank ATM cards and library membership cards. Prepared for and presented at SCONUL Access Conference, at Leeds University, on 11-Jun-2007
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfAbi john
Analyze the growth of meme coins from mere online jokes to potential assets in the digital economy. Explore the community, culture, and utility as they elevate themselves to a new era in cryptocurrency.
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc
Most consumers believe they’re making informed decisions about their personal data—adjusting privacy settings, blocking trackers, and opting out where they can. However, our new research reveals that while awareness is high, taking meaningful action is still lacking. On the corporate side, many organizations report strong policies for managing third-party data and consumer consent yet fall short when it comes to consistency, accountability and transparency.
This session will explore the research findings from TrustArc’s Privacy Pulse Survey, examining consumer attitudes toward personal data collection and practical suggestions for corporate practices around purchasing third-party data.
Attendees will learn:
- Consumer awareness around data brokers and what consumers are doing to limit data collection
- How businesses assess third-party vendors and their consent management operations
- Where business preparedness needs improvement
- What these trends mean for the future of privacy governance and public trust
This discussion is essential for privacy, risk, and compliance professionals who want to ground their strategies in current data and prepare for what’s next in the privacy landscape.
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxJustin Reock
Building 10x Organizations with Modern Productivity Metrics
10x developers may be a myth, but 10x organizations are very real, as proven by the influential study performed in the 1980s, ‘The Coding War Games.’
Right now, here in early 2025, we seem to be experiencing YAPP (Yet Another Productivity Philosophy), and that philosophy is converging on developer experience. It seems that with every new method we invent for the delivery of products, whether physical or virtual, we reinvent productivity philosophies to go alongside them.
But which of these approaches actually work? DORA? SPACE? DevEx? What should we invest in and create urgency behind today, so that we don’t find ourselves having the same discussion again in a decade?
HCL Nomad Web – Best Practices and Managing Multiuser Environmentspanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-and-managing-multiuser-environments/
HCL Nomad Web is heralded as the next generation of the HCL Notes client, offering numerous advantages such as eliminating the need for packaging, distribution, and installation. Nomad Web client upgrades will be installed “automatically” in the background. This significantly reduces the administrative footprint compared to traditional HCL Notes clients. However, troubleshooting issues in Nomad Web present unique challenges compared to the Notes client.
Join Christoph and Marc as they demonstrate how to simplify the troubleshooting process in HCL Nomad Web, ensuring a smoother and more efficient user experience.
In this webinar, we will explore effective strategies for diagnosing and resolving common problems in HCL Nomad Web, including
- Accessing the console
- Locating and interpreting log files
- Accessing the data folder within the browser’s cache (using OPFS)
- Understand the difference between single- and multi-user scenarios
- Utilizing Client Clocking
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnell’s ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...SOFTTECHHUB
I started my online journey with several hosting services before stumbling upon Ai EngineHost. At first, the idea of paying one fee and getting lifetime access seemed too good to pass up. The platform is built on reliable US-based servers, ensuring your projects run at high speeds and remain safe. Let me take you step by step through its benefits and features as I explain why this hosting solution is a perfect fit for digital entrepreneurs.
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
How Can I use the AI Hype in my Business Context?Daniel Lehner
𝙄𝙨 𝘼𝙄 𝙟𝙪𝙨𝙩 𝙝𝙮𝙥𝙚? 𝙊𝙧 𝙞𝙨 𝙞𝙩 𝙩𝙝𝙚 𝙜𝙖𝙢𝙚 𝙘𝙝𝙖𝙣𝙜𝙚𝙧 𝙮𝙤𝙪𝙧 𝙗𝙪𝙨𝙞𝙣𝙚𝙨𝙨 𝙣𝙚𝙚𝙙𝙨?
Everyone’s talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know 𝗵𝗼𝘄.
✅ What exactly should you ask to find real AI opportunities?
✅ Which AI techniques actually fit your business?
✅ Is your data even ready for AI?
If you’re not sure, you’re not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
Generative Artificial Intelligence (GenAI) in BusinessDr. Tathagat Varma
My talk for the Indian School of Business (ISB) Emerging Leaders Program Cohort 9. In this talk, I discussed key issues around adoption of GenAI in business - benefits, opportunities and limitations. I also discussed how my research on Theory of Cognitive Chasms helps address some of these issues
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...Alan Dix
Talk at the final event of Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence funded by the British Council UK-Saudi Challenge Fund 2024, Cardiff Metropolitan University, 29th April 2025
https://alandix.com/academic/talks/CMet2025-AI-Changes-Everything/
Is AI just another technology, or does it fundamentally change the way we live and think?
Every technology has a direct impact with micro-ethical consequences, some good, some bad. However more profound are the ways in which some technologies reshape the very fabric of society with macro-ethical impacts. The invention of the stirrup revolutionised mounted combat, but as a side effect gave rise to the feudal system, which still shapes politics today. The internal combustion engine offers personal freedom and creates pollution, but has also transformed the nature of urban planning and international trade. When we look at AI the micro-ethical issues, such as bias, are most obvious, but the macro-ethical challenges may be greater.
At a micro-ethical level AI has the potential to deepen social, ethnic and gender bias, issues I have warned about since the early 1990s! It is also being used increasingly on the battlefield. However, it also offers amazing opportunities in health and educations, as the recent Nobel prizes for the developers of AlphaFold illustrate. More radically, the need to encode ethics acts as a mirror to surface essential ethical problems and conflicts.
At the macro-ethical level, by the early 2000s digital technology had already begun to undermine sovereignty (e.g. gambling), market economics (through network effects and emergent monopolies), and the very meaning of money. Modern AI is the child of big data, big computation and ultimately big business, intensifying the inherent tendency of digital technology to concentrate power. AI is already unravelling the fundamentals of the social, political and economic world around us, but this is a world that needs radical reimagining to overcome the global environmental and human challenges that confront us. Our challenge is whether to let the threads fall as they may, or to use them to weave a better future.
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. 🌍
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! 🚀
Quantum Computing Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025BookNet Canada
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, transcript, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
3. Some Background 1995: Athens developed by NISS (National Information Services and Systems) at University of Bath as an in-house system. 1996: eLib Study ‘Technologies to Support Authentication in Higher Education’ identified Athens as a potential solution for all JISC Services. 1997: Athens in use in all JISC Data Centres and rolled out across HEIs / FEIs over the next two years. 1998: CNI White Paper on AAA requirements. JISC commits to using as a basis for next-generation technologies. 1997 – 2000: three year contract for Athens provision with University of Bath and then Eduserv. 2000 – 2008: two three year plus one two year contract with Eduserv for Athens provision. 2000: Alan Robiette and JCAS scope requirements for next generation access management system (ANGEL project starts testing Shibboleth and PAPI technologies). 2002 – 2004: AAA Programme – audit of next generation technologies and ratification of requirements. 2004 – 2007: Core Middleware Programmes. JISC decision to support federated access management. 2006 – 2009: Access Management: Transition Programme. Roll-out and embedding.
4. The Requirements A single access management system for: Intra-institutional resources. Third party digital library type resources. Inter-institutional resources for secure long-term collaboration. Inter-institutional resources for ad-hoc (virtual organisation) collaboration. Evolving strategy: Where possible, JISC should focus on fostering development and use of standards rather than specific technologies. Institutions should have the widest possible range of options, from full open source to commercial support. Solutions should be in line with international developments in the field. Solution must provide real benefits to institutions and service providers.
5. Not just about preventing.. Copyright: Getty Images from the Education Image Gallery
7. The UK Development Landscape Athens Gateways CA Bridge eduRoam Gateway Development Level of Assurance – FAME project Identity Management – inter- and intra- NHS / Government N-tier Developments – SPIE project Authorisation Tools - PERMIS, DYVOSE (Authority Delegation) Interfaces / User Tools Virtual Home for Identities Federation Tools Identity / Service Providers outreach support federation Federation Services
10. e-Infrastructure Programme Continued support for integration of UK federation and Grid. Levels of Assurance: ES-LOA. Identity Project. Federated tools: 5 new projects. Federated Identities and virtual organisations with Grouper Virtual Organisations and management of organisations objects Integrated Authorisation for Shibboleth/Grid. Integrating VOMS and PERMIS Virtual Organisation tools Upcoming ITTs / Calls / other work in the areas of…
11. Orphans American evangelist Dwight Lyman Moody (1837 - 1899) with a group of orphans at one of his Chicago missions. Courtesy of the Education Image Gallery Copyright: Getty Images
15. e-Research Access Management for complex data Flexible Service Provider models for virtual organisations Ongoing work with the National Grid Service, including the CA Copyright: Getty Images Education Image Gallery
18. SAML 2.0 Scott Cantor: technical editor of SAML 2.0 specification and lead Shibboleth architect. SC describes it as a ‘vulcan mind-meld’ of SAML 1.1, Shibboleth and Liberty ID-FF 1.2. You can expect in the long-term: Focus on federated identity management. Single log-out. Account linking / management. More features / more complexity. Copyright: Getty Images Education Image Gallery
19. Shibboleth 2.0 Major changes: New and broadening concepts New configuration files Metadata updates Minor installation differences Partial SAML 2.0 support (AuthnRequest, AttributeQuery, SingleLogout). Better session management Better authentication packaged with Shib Better attribute management – particularly attribute filter policy Focus on SP side discovery service (the future?) Better audit and access logs Java Service Provider https://spaces.internet2.edu/display/SHIB/ShibTwoRoadmap .
20. Other Internet2 Stuff More work in collaborative scenarios: virtual organisations etc. Application integration with infrastructure: wikis, SharePoint, Sakai, mailing lists etc. Integrated application providers: yahoo, google, e-bay etc. Easier install IdPs. Information card integration including CardSpace (in place now). Open Liberty Integration
22. Work with our International Partners International Vendor Liaison, with specific emphasis on work with SURF and Internet2. Directory Schema work with TERENA through TF-EMC2. Inter-federation and licensing work with Knowledge Exchange Partners in Netherlands, Germany and Denmark. Inter-federation work with TERENA, Internet2 and DEST. Contributions to the Shibboleth code-base through team at EDINA. Continued international dialogue