Monthly Archives: May 2013

Public Art Archive

May 30, 2013

Public Art Archive
http://www.publicartarchive.org/

Public art is for everyone, and this website is a terrific way to learn about the works in your local community. Launched in 2009, the Public Art Archive “helps explorers find information about public art in their world.” We liked that this archive sourced submissions from people across the country, making the site a valuable repository of information about projects large and small. To get a feel for the site, start with the Collections area to travel through pictures of works at the Albany International Airport, Atlanta’s Beltline, and other locales. Or why not mix things up by looking around the By Year area, which is a good way to get a sense of the progress and transformation of public art. Also, the blog is a fine potpourri of updates about calls for new public art, networking opportunities, and more. The Public Art Archive was launched in 2009 as a free resource for comprehensive data and extensive information about thousands of public art installations across the United States. New users should visit the About area for information about the functionality of the site and its history. After a quick visit here, the Browse tab filters this information by artist, collection, location, materials, work type, placement and year. Those unacquainted with the world of public art would do well to start in several large cities like Chicago, San Francisco, Seattle, and Miami. The clickable map interface makes it easy and quite enjoyable to look at different cities and regions quickly. Browsing around by year is interesting as well; the works are listed chronologically all the way back to the year 1802. This has been added to Research Resources Subject Tracer™ Information Blog. From The Scout Report, Copyright Internet Scout 2013. http://scout.wisc.edu/

851 views

CertainStore™ Secure Storage

May 29, 2013

CertainStore™ Secure Storage
http://transcertain.com/Services.html

CertainStore™ is TransCertain’s™ Patent Pending secure storage system. It allows an organization to send a sensitive item, together with specific metadata which identifies the item, to a secure storage vault and then in the future retrieve the item upon presentation of a unique token issued at the time of storage. The sensitive item can be a either a  text item, which is limited to 50 characters (e.g. social security number, credit card number, account number, etc.), or a document item, which can hold up to two gigabytes of data (e.g. image, video, document,  etc.) Storage, updates, and retrieval are guarded by a three level identification mechanism and any and all unauthorized attempts to access  the data are prevented and logged for research, audit and review. Key features provided by CertainStore™ include: a) PCI, PII, PHI and PFI compliant; b) Compatible with any and all types of data including text, documents, and images; c) Proprietary token generation is seeded independently from associated data without seed files for enhanced security and compatibility for all data types 1) Token generation does not use the underlying data; and 2) Tokenization of any and all data,
including images; d) Uses the most robust encryption technology; e) Provisioned with proprietary Rapid-Adapter™ Methodology tool to simplify  customization and integration; and f) Enables sharing of confidential data among permitted parties on a equal, reduced, or temporary basis while maintaining compliance. This will be added to Privacy Resources Subject Tracer™. This will be added to Internet Privacy and Security Resources Digital Linkseries Publications.

941 views

CertainStore™ Secure Storage

May 29, 2013

CertainStore™ Secure Storage
http://transcertain.com/Services.html

CertainStore™ is TransCertain’s™ Patent Pending secure storage system. It allows an organization to send a sensitive item, together with specific metadata which identifies the item, to a secure storage vault and then in the future retrieve the item upon presentation of a unique token issued at the time of storage. The sensitive item can be a either a text item, which is limited to 50 characters (e.g. social security number, credit card number, account number, etc.), or a document item, which can hold up to two gigabytes of data (e.g. image, video, document, etc.) Storage, updates, and retrieval are guarded by a three level identification mechanism and any and all unauthorized attempts to access the data are prevented and logged for research, audit and review. Key features provided by CertainStore™ include: a) PCI, PII, PHI and PFI compliant; b) Compatible with any and all types of data including text, documents, and images; c) Proprietary token generation is seeded independently from associated data without seed files for enhanced security and compatibility for all data types 1) Token generation does not use the underlying data; and 2) Tokenization of any and all data, including images; d) Uses the most robust encryption technology; e) Provisioned with proprietary Rapid-Adapter™ Methodology tool to simplify customization and integration; and f) Enables sharing of confidential data among permitted parties on a equal, reduced, or temporary basis while maintaining compliance. This will be added to Privacy Resources Subject Tracer™. This will be added to Internet Privacy and Security Resources Digital Linkseries Publications.

917 views

Special Key – Free Online Message Encryption

May 29, 2013

Special Key – Free Online Message Encryption
http://www.specialkey.org/

Special Key has zero knowledge about your data. Data compressed and encrypted (uses 256 bits AES) in the browser before sending to server. Supported browser: Modern Browsers (safari, firefox, opera, ie), iPhone/iPad (mobile safari), Android (android browser). Works as follows: 1) You paste your text in the browser and click the “Send” button; 2) A random 256 bits key is generated in the browser; 3) Data is  compressed and encrypted with AES using specialized javascript libraries; 4) Encrypted data is sent to server and stored; 5) The browser displays the final URL with the key; and 6) The key is never transmitted to the server, which therefore cannot decrypt data. This will be added to Privacy Resources Subject Tracer™. This has been added to the tools section of Research Resources Subject Tracer™ Information blog. This will be added to Entrepreneurial Resources Subject Tracer™.

1261 views

Formula Sheet – All Your Formulas In One Place

May 29, 2013

Formula Sheet – All Your Formulas In One Place
http://formulasheet.com/

Features include: a) Search for formulas – Search Wikipedia and FormulaSheet for formulas. Instantly get the image or copy the formula to LaTeX or MS Word 2007+; b) Upload formulas – Upload your LaTeX file with a single click. They will find and extract all of your formulas; c) Create formulas – Create formulas from scratch using our intuitive equation editor. Add a title and description to your formula; give it tags so that you can find it again later; d) Store all your formulas in one place – All your formulas will live happily in the cloud, accessible from anywhere with an internet connection. Using our web app, the formulas can be organized into lists, or combined with text and diagrams to create sheets; e) Share your formulas – Share formula lists and sheets with other users, with the entire web, with university classmates or with work colleagues; and f) Render your formulas – Render your formula, list, or sheet as a .pdf document, as a .tex file, or as a .png image. Customize the font, size, color, and image resolution. This has been added to the tools section of Research Resources Subject Tracer™ Information Blog.

979 views

Screenshot Monitor

May 29, 2013

Screenshot Monitor
http://screenshotmonitor.com/

Screenshot Monitor is a tiny desktop app started and stopped by an employee to track the time and take his computer screenshots during work. Company manager can see the time and screenshots through this website. Screenshot Monitor is not a spying tool. Employee is fully aware of when the program runs and what information is being collected. Features include: a) Tracks time worked; b) Tales periodic screenshots; and c) Is started and stopped explicitly by employee himeself. This will be added to the tools section of Research Resources Subject Tracer™ Information Blog. This will be added to Entrepreneurial Resources Subject Tracer™.

886 views

Converseen

May 29, 2013

Converseen
http://converseen.sourceforge.net/

If you are looking for a way to convert, resize, rotate and flip an unlimited number of images, Converseen is worth a look. It’s an open source program that supports over 100 image formats and the user interface is easy to use. The site for the program includes a FAQ area and this version is compatible with Windows and Linux operating systems.  This will be added to the tools section of Research Resources Subject Tracer™ Information Blog. [From The Scout Report, Copyright Internet Scout 1994-2013.  https://www.scout.wisc.edu/]

1751 views

Sheet Music Consortium

May 29, 2013

Sheet Music Consortium
http://digital2.library.ucla.edu/sheetmusic/

For those who love everything from Sousa to show tunes, the Sheet Music Consortium is a fabulous find. The Consortium is comprised of a number of member libraries (including UCLA) who are interested in building “an open collection of digitized sheet music.” Their work has been supported by the Institute of Museum and Library Services and currently offers cross collection searching of 22 sheet music collections, with a total of 226,000 items. Visitors can click on the Virtual Collection to get started with offerings such as “Texas Cowboy Songs” and “The Titanic.” The Browse feature is a great way to get a sense of the materials here. Finally, the Activity Stream provides an updated list of the most recently added items for general consumption. This will be added to the tools section of Research Resources Subject Tracer™ Information Blog. [From The Scout Report, Copyright Internet Scout 1994-2013.  https://www.scout.wisc.edu/]

946 views

ExpertCircle – Discover the Best Products and Vendors for Your Business

May 29, 2013

ExpertCircle – Discover the Best Products and Vendors for Your Business
http://www.expertcircle.com/

Build your custom business profile on ExpertCircle by completing their brief questionnaire. They will be able to tell you the best products and vendors for your particular business needs & situation. Discover which business products and vendors your peers and contacts are using in your LinkedIn and/or Facebook networks. You’ll also be able to see what professionals like you use & recommend. Get updated recommendations of the latest and best products in the categories & industries you care about most. Always be in the know about the most valuable products/vendors for your business. Share your advice on the best products & vendors you use. Endorse, Critique, & Review products to help your peers & contacts grow their businesses more successfully. This has been added to Internet Experts Subject Tracer™ Information Blog. This will be added to Business Intelligence Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™.

1002 views

CertainStore™ Secure Storage

May 29, 2013

CertainStore™ Secure Storage
http://transcertain.com/Services.html

CertainStore™ is TransCertain’s™ Patent Pending secure storage system. It allows an organization to send a sensitive item, together with specific metadata which identifies the item, to a secure storage vault and then in the future retrieve the item upon presentation of a unique token issued at the time of storage. The sensitive item can be a either a text item, which is limited to 50 characters (e.g. social security number, credit card number, account number, etc.), or a document item, which can hold up to two gigabytes of data (e.g. image, video, document, etc.) Storage, updates, and retrieval are guarded by a three level identification mechanism and any and all unauthorized attempts to access the data are prevented and logged for research, audit and review. Key features provided by CertainStore™ include: a) PCI, PII, PHI and PFI compliant; b) Compatible with any and all types of data including text, documents, and images; c) Proprietary token generation is seeded independently from associated data without seed files for enhanced security and compatibility for all data types 1) Token generation does not use the underlying data; and 2) Tokenization of any and all data, including images; d) Uses the most robust encryption technology; e) Provisioned with proprietary Rapid-Adapter™ Methodology tool to simplify customization and integration; and f) Enables sharing of confidential data among permitted parties on a equal, reduced, or temporary basis while maintaining compliance. This will be added to Privacy Resources Subject Tracer™. This will be added to Internet Privacy and Security Resources Digital Linkseries Publications.

979 views