Video controlling application Archives

Video controlling application Archives

video controlling application Archives

video controlling application Archives

Live & Local Customer Support: 715-568-4830

April 19, 2019

What’s On TV

Learn More
April 19, 2019
My TV Settings
April 19, 2019
Managing Your TV Recordings
April 19, 2019
Recording TV Programs & Reminders
April 19, 2019
Controlling Live TV
April 19, 2019
Working With TV Favorites Feature
April 19, 2019
On Screen Program Guide
April 19, 2019
Whats Hot App
April 19, 2019
Weather App
April 19, 2019
ReStart TV

Customer Support:

715-568-4830

Address:

1120 15th Ave
Bloomer, WI 54724

Contact Us
© 2020 Bloomer Telephone Company | All rights reserved | This institution is an equal opportunity provider and employer.
Источник: [https://torrent-igruha.org/3551-portal.html]
, video controlling application Archives

CUI Training

The CUI Executive Agent develops training modules for the CUI Program, designed for a widespread audience at multiple levels within the government and beyond.  The modules below can be used to supplement any training or awareness efforts by Executive branch entities or other stakeholders (i.e., Nonfederal organizations).  

Select a subject from the list below to transfer directly to training modules for that topic:

Select the respective title for PowerPoint presentation, transcript, mp4 video or video link to learn about a specific element of the CUI Program:

 

Controlled Environments (August 2018 Edition) presents  examples of two environments, one that is considered suitable for the storage and handling of CUI and one that is not. It discusses why controlled environments are important and the different approaches agencies can take to creating their own controlled environments.

Transcript (August 2018 Edition)

Download mp4 video (August 2018 Edition)

 

Controlled Environments (2017 Edition) describes the requirements for storing CUI in physical and electronic environments.

Transcript (2017 Edition)

Download mp4 video (2017 Edition)

 

CUI Program Overview (2017 Edition) addresses: (1) Definition of CUI, and Distinctions between types of information provided in the CUI Registry; (2) Marking requirements overall, for email, and for packages and standard mail; (3) Controlled Environments, both physical and electronic; (4) Principles of access and sharing as they apply to Lawful Government Purpose and Limited Dissemination Control markings; (5) Reproduction of CUI; (6) FAXing CUI; (7) Incident reporting; (8) Destruction of CUI; and (9) Acceptable indicators for the Decontrol of CUI

Transcript (2017 Edition)

Download mp4 video (2017 Edition)

 

Decontrolling (2017 Edition) describes the requirements for decontrolling   discusses the different destruction methods that are appropriate for CUI when it is no longer needed.

Transcript (2017 Edition)

Download mp4 video (2017 Edition)

 

 

Destruction of CUI (August 2018 Edition) discusses the different destruction methods that are appropriate for CUI when it is no longer needed.

Transcript (August 2018 Edition)

Download mp4 video (August 2018 Edition)

 

Destruction (2017 Edition) describes the requirements for destroying CUI.

Transcript (2017 Edition)

Download mp4 video (2017 Edition)

 

Freedom of Information Act (FOIA) FAQs (August 2018 Edition) addresses some of the most frequently asked questions about CUI and FOIA.

Transcript (August 2018 Edition)

Download mp4 video (August 2018 Edition)

 

Lawful Government Purpose (August 2018 Edition) addresses the principle of Lawful Government Purpose, or the standard for deciding when to share and when not to share CUI.

Transcript (August 2018 Edition)

Download mp4 video (August 2018 Edition)

 

Lawful Government Purpose (2017 Edition) describes the concept of Lawful Government Purpose and the sharing requirements related to CUI.

Transcript (2017 Edition)

Download mp4 video (2017 Edition)

 

Introduction to Marking (August 2018 Edition) provides an overview of how to mark documents, emails, presentations, systems, and other files that contain CUI. It specifically addresses the designation indicator and the CUI banner marking, including the CUI control marking, CUI category markings, and Limited Dissemination Control Markings. It also discusses portion marking, the use of cover sheets, marking multi-page documents, and decontrolling CUI.

Transcript (August 2018 Edition)

Download mp4 video (August 2018 Edition)

 

Introduction to Marking (2017 Edition) provides an introduction and addresses the requirements for marking CUI.

Transcript (2017 Edition)

Download mp4 video (2017 Edition)

 

Marking: Non-Traditional (2017 Edition) addresses the various ways to mark or identify CUI.

Transcript (2017 Edition)

Download mp4 video (2017 Edition)

 

Marking Commingled Information (August 2018 Edition) describes how to mark documents that contain both CNSI and CUI. Specifically, it covers portion and banner markings and how to mark emails and presentations.

Transcript (August 2018 Edition)

QuickTime Movie video (August 2018 Edition)

 

Unauthorized Disclosures: Preventing and Reporting assists agency efforts to meet training requirements outlined in the September 8, 2017 White House Memo: "Request for Provision of Training on Unauthorized Disclosures." NOTE: this module covers only unauthorized disclosure of CUI.

Transcript

Download mp4 video

 

This briefing, recorded on January 27, 2017, provides an overview of the CUI Program, its origins, implementation by agencies, and major features, including marking, safeguarding, and destruction.

 

Источник: [https://torrent-igruha.org/3551-portal.html]
video controlling application Archives

Controlling Access

There are many reasons why you may want to control access, such as:

  • For the safety of the activists, victims, or others in high-risk situations whose identities or locations cannot be revealed.
  • To respect the wishes for privacy expressed by the people depicted in your videos.
  • To protect particularly vulnerable people or people who did not give informed consent to be filmed.
  • You do not trust the user who is requesting your video.
  • You want to derive revenue from providing access to your video.
  • You do not have the rights to allow others to use the video.

Ways to Control Access

There are ways to control access without making your collection completely inaccessible:

Vet your users

It is reasonable for you to ask users for details about who they are and why they want your video. This can be done through a one-on-one interaction, or through something like a web submission form.

Create access tiers

Depending on what tools you use to share information and videos, you can provide different levels of access to different types of users, for example, by requiring a login and password.

Create alternate versions

You can create redacted, sharable versions of your videos. Depending on the restrictions required, you can edit out sections, blur faces, or alter voices. You can also create versions that are lower resolution or watermarked.

Copyright licensing

Copyright is a legal mechanism that protects a creator’s exclusive right to copy, distribute, and use their work. If you own the copyright to a video, you can license, or share, some or all of those rights with others. You can license a video to someone one-on-one, or you can use an “open license” such as Creative Commons to share your video with everyone. See the next section on “Understanding Copyright” for more information.

Methods of controlling access are not foolproof. To be on the safe side, you should assume that anything you share or put online can be made public and possibly used without your permission or in a way that you do not agree with. If a video presents a serious risk, do not share unless you are sure it is going to a trusted destination.

Metadata

Any information about a video: from technical information embedded in the file that allows the video to function, such as format and duration, to descriptive information about the content to help you understand or find it--such as keywords, security restrictions, geographic locations, and so on. Metadata is critical to any future use, and is important throughout the archiving process. Despite what is sometimes said, images almost never speak for themselves. They require context and description to make sense, to corroborate their factuality, and to be accessible beyond one person’s memory or desktop. Metadata can be automatically generated and embedded in the file, such as with technical metadata, or it can be manually recorded on an external medium, such as with descriptions, security flags, and keywords in a database. Metadata capture sometimes needs to be manually enabled on your device, such as with GPS or location services.

Metadata Standard

A published document that describes how to create, use, and interpret metadata in a specific domain or for a specific purpose, which is intended to establish a common understanding among its users. A metadata standard defines the structure and meaning of its acceptable data elements, rules, and values. Many communities, including broadcasters, social scientists, and art museums, publish metadata standards to meet their descriptive needs.

Completeness

The quality of having all of the information a record contained when it was created, and that its original context is maintained. Incomplete records are not as reliable as complete ones, since one might not know what information is missing and why. Transcoding a video to another format can reduce the image quality and discard metadata, making the video less complete and therefore less reliable. Keeping original video files, documenting context, and organizing videos in a way that maintains the original order of video files contributes to the completeness of the video records.

Authenticity

The quality of being genuine, not fake or counterfeit, and free from tampering. Authenticity means that an object was actually created by the person represented as its creator, and that it was actually created at the time and place that is represented as its time and place of creation. Video footage that has been manipulated or altered but is represented as if it had not been, for example, is not authentic. To authenticate a video means to verify the relationship between it and its creator and point of creation. Documentation about who created something, when and where it was created, and the chain of custody can provide a starting point for this authentication process.

Original Files

In the digital realm, the “original file” is any copy of a file that is exactly the same (i.e. bit-for-bit) as the file in question when it was created. This means that there are no accidental or deliberate alterations to any aspect of the file, including its format and technical specifications.

Malware

A term derived from "malicious software," and that refers to all computer viruses, worms, Trojans, and spyware.

Selection

The process of identifying materials to be acquired, or to be preserved, because of their enduring value. Having selection criteria, or a selection policy, helps ensure you acquire and save only what is most important.

Chain of Custody

Chronological documentation that shows who has held or controlled a video file from the moment it was created. The ability to show an unbroken chain of custody is one important indicator of the authenticity of a video, and therefore a factor in using video as evidence.

Download

To receive data from a remote computer system and save it in a local computer system. The inverse of download is "upload."

Upload

To send data from a local computer system to a remote one. The inverse of upload is "download."

Master

The earliest generation or highest-quality output of a video from which duplicates are made.

Original Order

The archival principle of maintaining files in the same order they were created. Original order is important to preserve context and the relationship between individual files, so that you can make sense of each file and of the whole. Keeping files in their original context makes them more complete and reliable.

Integrity

The quality of being whole, unaltered, and uncorrupted. A file that is not intact may not be usable or may have decreased informational and evidential value. Videos files can lose their integrity if they are accidentally mishandled, deliberately tampered with, or if data corruption occurs in transfer or storage due to hardware or software malfunction. The best way to ensure integrity is to establish a system to check file fixity regularly (e.g. by computing hashes and checking them against a registry of previously computed hashes) and to restore any corrupted files from an intact copy.

Copyright

A legal protection intended to give the creator of original work exclusive rights to their work for a designated length of time. It gives the creator the exclusive right to copy, use, adapt, show, and distribute their own work, and the right to determine who else can copy, use, adapt, show, and distribute the work.

Transcode

To re-encode a digital file to a different encoding scheme, such as converting an H.264/MPEG-4 AVC video to Apple ProRes. Transcoding is usually done when a video’s encoding is not supported by the system that needs to use it. Transcoding fundamentally alters the file, although lossless methods can allow the original data to be reconstructed from the transcoded data.

Derivative

A copy of a video generated from a master that is usually in a different format and of lower quality than the master. Derivatives can be made for various uses, such as web upload or DVD.

File Format

The specification by which a digital file is encoded. Some file formats are designed to store particular kinds of data while others are more like containers that can hold many kinds of data. Common video file formats like Quicktime (.mov), AVI, and mp4 are container formats that contain video and audio streams, metadata, subtitle tracks, etc.

Command-Line Interface

A way of interacting with a computer program which involves typing lines of text in a command-line shell. Some programs are only available with command-line interfaces, which facilitate their automation and use in programming scripts. However, command-line interfaces can be harder for casual computer users to interact with than graphical user interfaces (GUI), which use windows, icons, menus, and pointers.

Embedded Metadata

Metadata that is stored within the digital object it describes. Some embedded metadata, such as file size, are essential to the functioning of the file, and are always written to the file by the device or software system. Other embedded metadata are non-essential and can be optionally added (e.g. rights information). Embedded metadata is not guaranteed to be accurate—for example, if your camera is set to the wrong date. Embedded metadata stay with the digital object as long as the object is intact, but can be intentionally stripped or altered. Embedded metadata can be lost if a file is transcoded to another format.

Graphical User Interface

A way of interacting with a computer program that involves using windows, icons, menus, and pointers. Most computer users are familiar with graphical user interfaces. GUIs can be easier for casual users to interact with than command-line interfaces (CLI), which require commands to be typed as lines of text.

Hash Function

An algorithm that computes a hash value or checksum from any set of data, like a file. Common hash functions include MD5 and SHA1. Hash functions are used to check file integrity and for security purposes.

Hash Value

The string of alphanumeric characters that results from running a hash function algorithm on data or a file. The hash value of a file will always remain the same as long as the file is unchanged, so it can be used to identify altered, corrupted, and duplicated files.

Cataloging

Creating and organizing descriptive information in a structured way so that resources can be found, used, and understood. Cataloging expands on basic metadata, and enables users to access content in multiple ways.

Media Management

The process of keeping track of media, such as the video files in your collection, and overseeing any actions performed on your media, such as backup, refreshment or migration. Media management can be performed manually, or with the aid of a software system (e.g. a media asset management (MAM) system).

Output

To export a completed video at the end of the post-production process. It is important to always output a master.

Edit Decision List (EDL)

A document used in video post-production that contains a list of clips used in an edited video. EDLs originate from older film and video workflows when editing was a two stage process. Today, they can be used to move editing projects from one software or system to another. EDLs also provide useful documentation, showing what source files were used to create an edited video.

Unique Identifier

A number, word, or symbol for unambiguously identifying and distinguishing an object from other objects in a set. Common everyday unique identifiers include computer logins, credit card numbers, tax ID numbers, and so on. Applying unique identifiers to video files makes it easier to identify, distinguish, and organize videos and related documents.

Information Package

A self-describing container - usually a clearly named folder or directory - used to keep media and its related documentation or metadata together.

Findability

The ability of a user to easily find what they are looking for.

Backup

A copy of data, stored in a secondary location, which is used to restore data in the primary storage location that is corrupted or lost. Restoring involves copying data from the backup to the primary storage to replace the corrupted or lost files. Backing up is a storage strategy that allows you to recover from data loss.

Interoperability

In an information technology (IT) system, the quality of being able to exchange information with another system and being able to use that information. Using widely adopted formats, metadata standards, and controlled vocabularies enhances interoperability.

Repository

A system that acquires, stores, monitors, preserves, and provides access to its resources, run by an organization committed to providing long-term access to authenticated content to its users. A repository requires significant infrastructure to build and maintain.

Redundant Array of Independent Disks (RAID)

A storage technology that combines multiple hard drives together to provide fault tolerance and better performance. Data is spread out across the drives, along with additional calculated data, so that data can be re-generated if part of the array fails. RAID protects you against data loss in the case of hardware failure. Unlike backup, RAID does not offer protection against file corruption or deletion, or data loss to malware, theft, or natural disaster.

Synchronization

The process of ensuring that computer files in one location are copied to one or more other locations on a regular basis. Synchronization is also referred to as mirroring or replication. Unlike backup, synchronization does not allow you to go "back in time" to recover lost or altered files.

Refreshing

The process of copying data from one storage medium to another to ensure continued access to the information as the storage medium becomes obsolete or degrades over time. It is one strategy for avoiding loss of digital information.

Fixity

Related to integrity, the quality of being unchanged over a given period of time. Fixity maintains the authenticity of an object over time, and is key to the concept of preservation. Long-term fixity requires good policies and handling practices, sustainable infrastructure, and strong security. Regular fixity checks (e.g. computing and comparing checksums) are used to detect changes.

Firewire

An interface standard for transferring data between digital devices, especially audio and video equipment. Developed by Apple in the 1990s, FireWire is becoming obsolete.

Encryption

The process of encoding your files using a cryptographic algorithm so that only authorized parties with a “key” (e.g. a password) can decrypt them. The two main types of encryption are symmetric-key and public-key. Symmetric-key encryption uses the same key, or password, to encrypt and decrypt information. Public-key encryption uses one key to encrypt, and a different one to decrypt, and is more secure.

Network Attached Storage (NAS)

Computer data storage that is accessed through a network. A NAS appliance is a computer that is specially designed to store and serve files over a network.

Storage Area Network (SAN)

A dedicated network of storage devices shared among multiple servers, designed for fast access and large data transfers.

Data Model

A description of the way that data is structured in a database. It can define what types of things the data describe, what types of data are included in the descriptions, and how different types of things relate to each other.

Controlled Vocabulary

A predefined list of terms used to ensure consistency in cataloging. Since there is usually more than one way to describe or refer to a concept, choosing one term eliminates guesswork and circumvents the normal ambiguities of language (and spelling). Imagine searching for “Doctors” only to later learn that some records use the term “Physicians”. Consistent vocabularies increase the findability of records.

Access Points

A predefined list of terms used to ensure consistency in cataloging. Since there is usually more than one way to describe or refer to a concept, choosing one term eliminates guesswork and circumvents the normal ambiguities of language (and spelling). Imagine searching for “Doctors” only to later learn that some records use the term “Physicians”. Consistent vocabularies increase the findability of records.

Entity

In data models, an entity is any "thing" that is identified and described with data. For example, if a database keeps track of the model, year, and license plates of all the cars in a sales lot, each car is an entity.

Preservation

The process of ensuring the long-term accessibility of authenticated content. Digital preservation involves preventing loss or damage to digital objects, and extending their existence beyond the lifespan of their storage media or technology. Preservation requires ongoing resources, commitment and actions.

Obsolescence

The process of becoming out-of-date and unsupported by available technology. Video cameras, video formats, storage media and storage devices, can all become obsolete over time. The obsolete technology is functional but is unusable because the other technologies they depend on no longer support them. An old video camera, for example, may not be able to plug into new computers, or an old video format might not be playable on new desktop video players.

Migration

The process of re-encoding or transferring data from one digital or physical format to another to ensure long-term accessibility of the information as the format becomes obsolete and unusable over time.

Archive

An organization made up of people and systems responsible for preserving records and documents of enduring value and making them available to a designated community. Archives are sometimes parts of larger organizations, such as universities, public libraries, media centers, or museums.

Petabyte

A unit of measure for data. One petabyte (PB) is equivalent to 1,000 terabytes (TB), or 1,000,000 gigabytes (GB).

Application Programming Interface

A protocol that specifies a way for a software application to communicate and integrate with a program that provides a service. Google provides APIs, for example, so that people can use its data, such as location data from Google Maps or video data from YouTube, in their applications.

Finding Aid

A document that contains information about a specific collection within an archive. It is a simple way for users to determine if the content in a collection is relevant to their research. The structure of finding aids differ depending on the material being described; they can contain detailed content lists, a description of the scope of the collection, biographical and historical information, and even restrictions on use or access to the content.

Informed Consent

The process of ensuring that a person identified in a video fully understands the purpose and intended use of the recording, as well as any potential unintended consequences of his or her participation. With this awareness, the person must voluntarily give his or her permission to be identified and for the recording to be used.

Generation

The relationship between a copy and its original. This term originates from the time of analog copying. In the digital realm, where it is possible to create exact copies of originals, generation usually implies a change in format or specifications, such as an H.264 access copy generated from an Apple ProRes master. Having a video available in multiple generations is therefore not a replacement for having exact backup copies of your originals.

File Transfer Protocol (FTP)

The relationship between a copy and its original. This term originates from the time of analog copying. In the digital realm, where it is possible to create exact copies of originals, generation usually implies a change in format or specifications, such as an H.264 access copy generated from an Apple ProRes master. Having a video available in multiple generations is therefore not a replacement for having exact backup copies of your originals.

Intellectual Property

A legal concept that refers to creative works for which exclusive rights are recognized. Common types of IP rights include copyright, trademarks and patents.
Takeaways
  • Identify your key users, how they want to be able to find and access your videos, and if any controls need to be put on usage.
  • Create a finding aid — in the form of a guide, list, index, and/or catalog — with appropriate access points to enable your users to access your videos.
  • Make use copies from your duplication masters or originals as needed, in the format your user requires.
  • Control access to your collection, if necessary, to protect the identities of those in high-risk situations or to respect privacy.
  • Assume that anything you share or put online can be made public or used without your permission or in a way you do not agree with.
  • Be sure you have the legal rights to provide access.
Key Concept: Informed Concent

There are potential consequences to providing access. This is why you obtain informed consent when you film.
Read More

Key Concept: Generation

Provide your users with use copies generated from your duplication master or original.
Read More

Key Concept: Finding Aid

A finding aid is the tool that you provide to your users to help them find what they are looking for.
Read More

Key Concept: Findability

A key aspect of providing access is making it easy for users navigate and locate what they are looking for.
Read More

Источник: [https://torrent-igruha.org/3551-portal.html]
.

What’s New in the video controlling application Archives?

Screen Shot

System Requirements for Video controlling application Archives

Add a Comment

Your email address will not be published. Required fields are marked *