From: "Diane Goldenberg-Hart" Sender: To: CNI-ANNOUNCE Date: Wed, 26 Apr 2017 11:37:59 -0400 Message-ID: X-Original-Return-Path: Received: from triplicate-girl.cni.org (account diane@cni.org [192.100.21.35] verified) by cni.org (CommuniGate Pro SMTP 6.1.12) with ESMTPSA id 32498783 for CNI-ANNOUNCE@cni.org; Wed, 26 Apr 2017 10:14:28 -0400 Content-Type: multipart/alternative; boundary="Apple-Mail=_D3015DD6-EF77-4F62-B28F-A2135136B2D5" Subject: Videos: Data Integrity & Ithaka Library Survey '16 X-Original-Date: Wed, 26 Apr 2017 10:14:28 -0400 References: <0F796A84-A8B8-4D20-B8FC-6082ED849B21@cni.org> X-Original-To: CNI-ANNOUNCE -- News from the Coalition X-Original-Message-Id: <10C0A6CC-03AE-4628-8FC4-5ADEF1644488@cni.org> Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2104\)) X-Mailer: Apple Mail (2.2104) --Apple-Mail=_D3015DD6-EF77-4F62-B28F-A2135136B2D5 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Two new videos from CNI=E2=80=99s spring membership meeting have been = posted: -Ithaka S+R US Library Survey 2016, Roger C. Schonfeld (Ithaka S+R) In fall 2016, Ithaka S+R surveyed academic library deans and directors = across the US on key topics including how library leaders are investing = in the future of their organizations, and what kinds of strategies they = are pursuing in support of research, teaching, and learning. With a = response rate of 49%, the project offers a wide array of perspectives on = the opportunities and challenges currently facing academic libraries and = higher education more broadly. The full report was released in = conjunction with CNI=E2=80=99s spring 2017 meeting, and the results are = discussed in this presentation. YouTube: https://youtu.be/2LcJwWzr6NM Vimeo: https://vimeo.com/214693918 -Data Integrity for Librarians, Archivists, and Criminals: What We Can = Steal from Bitcoin, BitTorrent, and Usenet, Jeffrey Spies (Center for = Open Science) Data integrity is important in distributed systems, and the same = characteristics that make these systems robust make maintaining data = integrity challenging. For this reason, hash functions play a central = role in the algorithms and technologies that power Usenet, BitTorrent, = and Bitcoin and its blockchain. This presentation introduces hashes and = their variants, these distributed and sometimes dubious systems, and = what can be learned and practically applied in today's digital = repositories for purposes of auditing, identifying, recovering, and = sharing data. YouTube: https://youtu.be/SRvAGFJO0yw Vimeo: https://vimeo.com/21469433 Also from this meeting, released previously: -Institutional Repository Strategies: What We Learned at the Executive = Roundtables, Clifford Lynch (CNI) Audio Recording: = https://www.cni.org/topics/repositories/institutional-repository-strategie= s-what-we-learned-at-the-executive-roundtables = -Fresh Perspectives on the Future of University-Based Publishing, Amy = Brand (The MIT Press) Vimeo: https://vimeo.com/213545959 YouTube: https://youtu.be/VG8RL1SRMeQ -What Today=E2=80=99s Students Have Taught Us, Alison J. Head (Project = Information Literacy) YouTube: https://youtu.be/a0ep6XAbUjQ Vimeo: https://vimeo.com/212821471 Look for more announcements soon of other video offerings from the = spring 2017 CNI meeting (https://www.cni.org/mm/spring-2017 = ). To see all videos produced by = CNI, visit our video channels on YouTube (www.youtube.com/cnivideo = ) and Vimeo (vimeo.com/channels/cni = ). -- Diane Goldenberg-Hart Communications Coordinator | CNI 202-296-5098 | diane@cni.org www.cni.org | twitter.com/cni_org = facebook.com/cni.org --Apple-Mail=_D3015DD6-EF77-4F62-B28F-A2135136B2D5 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8
Two new = videos from CNI=E2=80=99s spring membership meeting have been = posted:

-Ithaka S+R = US Library Survey 2016, Roger C. Schonfeld (Ithaka S+R)
In fall 2016, Ithaka S+R = surveyed academic library deans and directors across the US on key = topics including how library leaders are investing in the future of = their organizations, and what kinds of strategies they are pursuing in = support of research, teaching, and learning. With a response rate of = 49%, the project offers a wide array of perspectives on the = opportunities and challenges currently facing academic libraries and = higher education more broadly. The full report was released in = conjunction with CNI=E2=80=99s spring 2017 meeting, and the results are = discussed in this presentation.

-Data Integrity for Librarians, Archivists, and Criminals: = What We Can Steal from Bitcoin, BitTorrent, and Usenet, Jeffrey = Spies (Center for Open Science)
Data integrity is = important in distributed systems, and the same characteristics that make = these systems robust make maintaining data integrity challenging. For = this reason, hash functions play a central role in the algorithms and = technologies that power Usenet, BitTorrent, and Bitcoin and its = blockchain. This presentation introduces hashes and their variants, = these distributed and sometimes dubious systems, and what can be learned = and practically applied in today's digital repositories for purposes of = auditing, identifying, recovering, and sharing data.


Also= from this meeting, released previously:

-Institutional Repository Strategies: What We Learned = at the Executive Roundtables, Clifford Lynch = (CNI)
=

-Fresh Perspectives on the Future of University-Based = Publishing, Amy Brand (The MIT = Press)
-What Today=E2=80=99s Students Have Taught Us, = Alison J. Head (Project Information = Literacy)


Look for more = announcements soon of other video offerings from the spring 2017 CNI = meeting (https://www.cni.org/mm/spring-2017). To see all videos = produced by CNI, visit our video channels on YouTube (www.youtube.com/cnivideo) and Vimeo (vimeo.com/channels/cni).

--
Diane Goldenberg-Hart
Communications Coordinator | CNI
202-296-5098 | = diane@cni.org
www.cni.org | = twitter.com/cni_org








= --Apple-Mail=_D3015DD6-EF77-4F62-B28F-A2135136B2D5--