IIIF Cloud Services
IIIF Cloud Services makes digitised material available to the web via IIIF APIs (https://iiif.io/). It can be used for ad-hoc IIIF production and also scales to IIIF delivery of very large collections through automated workflow integrations.
Features
- Provides IIIF Image API endpoints, enabling deep zoom.
- Provides web-ready derivatives for AV masters.
- Optional access control using the IIIF Auth API.
- Create, store and serve IIIF Manifests and Collections.
- IIIF Search API provision over textual content of IIIF resources.
- Pluggable architecture for latest OCR, AI / Machine Learning libraries.
- REST API for digitisation and preservation workflows integration.
- Out-of-the-box digital preservation with Fedora 6 integration.
- Generation of custom metadata-driven Manifests and PDFs.
- Additional modules for collection annotation and showcasing user interfaces.
Benefits
- IIIF delivery of both digitised and born digital archival content.
- Preservation of digitised content in Oxford Common Filesystem Layout standard.
- Display, enrich, and curate IIIF-based digital objects at scale.
- Annotate digitised material through machine and human enrichment workflows.
- Automatically catalogue and summarise archival content.
- Automatically identify images and content within images (image recognition).
- Teach a class using web annotations to enrich digitised material.
- Crowdsource transcriptions for your digitised collections.
- Showcase your annotated collections with generous interfaces including search.
- Suitable for libraries, archives, museums, galleries, universities and schools.
Pricing
£600.00 a terabyte a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 4 2 3 3 7 2 4 2 5 1 9 5 8 8
Contact
Digirati
John Baker
Telephone: 0845 643 4370
Email: sales@digirati.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Runs on AWS only
- System requirements
- A IIIF Cloud Services subscription
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 24 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- We use Slack, here is their accessibility statement: https://slack.com/intl/en-gb/help/articles/4455747966739-Accessibility-in-Slack
- Web chat accessibility testing
- N/a
- Onsite support
- Yes, at extra cost
- Support levels
- Digirati offer two levels of support. Our Standard Support level states an up time commitment of 99.5% and the below incident response times. Critical - 2 hours (an incident where the production system is severely impacted or completely down) Major - 1 day (an incident where the production system is functioning with limited capabilities) Minor - 5 days (an incident where the system is fully functional but there are observed errors that do not severely impact the usability of the system). Our Premium Support level provides high availability options up to a guaranteed 99.9% uptime. This option provides an account manager as the main point of contact for service incidents who will appoint a service engineer as appropriate. Premium support also includes the option for defining bespoke response and fix times for the above severity levels. Prices for Standard Support are detailed in our pricing plan options for hosting of the core services and additional modules, extra costs for Premium Support will vary depending on exact client requirements.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide user documentation and online support as standard. Tailored additional training can be provided on request at extra cost.
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- The API allows you to extract any metadata you have added to your images. While this is not a preservation system, you might wish to recover source images uploaded to the platform, if those images were tile-ready JPEG2000 images. We can arrange an export of your source images to an S3 bucket for your collection. Annotations and other data from the additional modules will be made available for download by the customer via their APIs.
- End-of-contract process
- If a subscription term ends and no renewal has been requested, the subscription terminates automatically. Unless a grace period is agreed with the customer, within one month of the end date, Digirati can facilitate an export of asset data and associated metadata using data extraction procedures described above. Other data formats or destinations requested may incur an additional cost. After this exit process completes, Digirati will delete all the applicable data under our control.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- There is a management dashboard to manage the ingest of images into the system and organise them into folders (called 'spaces'), images can also be arranged as IIIF Manifests. This dashboard also administrates user accounts and permissions; and provides reporting.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- The dashboard is designed to be WCAG 2.1 AA, but currently we have not tested these tools with users of assistive technology. User interfaces generated from asset delivery provided by the platform can conform to whatever standards are chosen by the customer, including user tested with assistive technology, on a case by case basis.
- API
- Yes
- What users can and can't do using the API
- The REST HTTP API (https://deploy-preview-2--dlcs-docs.netlify.app/api-doc/overview) is a comprehensive management API which can be used to configure new storage spaces, register images, set thumbnail creation policy, configure access control and generate derivative IIIF Manifests. It is usually integrated into a bespoke workflow or tooling. It can be called from server side workflow processes, or client side tools.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- For image delivery, you can customise: - Whether to produce thumbnails - What sizes to produce those thumbnails at - For access-controlled content, what’s the maximum size that can be viewed by a non-authorised user (e.g., for thumbnail visibility but not larger) For AV, you can customise: - What formats your source material should be transcoded to - For image processing and enrichment, you can customise the service that your enrichment pipeline calls, to take advantage of different components, including your own. This can all be achieved via the API and management tools available to the customer. Additional modules can also be customised but this typically involves professional services. Customisations would typically include: - Deployment of specific machine enrichment libraries - Customisations for showcasing and human enrichment interfaces.
Scaling
- Independence of resources
- Auto-scaling rules are in place to mitigate this on our shared instance. For large scale users we typically roll out dedicated instances, so that all the load is specific to that customer.
Analytics
- Service usage metrics
- Yes
- Metrics types
- For core services we can provide metrics related to the number of assets stored, their total size and the level of consumption per asset. Usage and behavior metrics can also be provided for the additional modules
- Reporting types
- Regular reports
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Other
- Other data at rest protection approach
- All data held within Cloud services such as AWS https://aws.amazon.com/compliance/programs/
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The public REST API provides access to all data that may have been added, in the form of JSON-LD descriptions of the content. This can be used to export data. The images themselves, including generated thumbnails, can be copied to an S3 bucket for collection, or harvested individually via the REST API. An export of all annotations conforming to W3C Web Annotation standards can also be provided via a REST API. Other data for additional modules is also available using the same method.
- Data export formats
- Other
- Other data export formats
-
- JPEG2000
- JSON-LD
- IIIF Presentation and Image API
- Annotations can be exported as W3C or Open Annotation standard
- Single files can be downloaded in their native form
- AV formats vary depending on configuration
- ZIP
- Data import formats
- Other
- Other data import formats
-
- API interactions are through JSON-LD as specified in public API.
- Admin portal allows upload of CSV files for bulk ingest.
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- Digital assets are downloaded from source in accordance with customer-specific configuration. We support downloading via SFTP and HTTPS. If data is stored in AWS S3 we can configure secure S3 account to account access to ensure data doesn't leave the AWS network.
- Data protection within supplier network
- Other
- Other protection within supplier network
- All services run within a VPC, with all data residing in a private network with no direct external access. Assets are stored in private blob storage, unless explicitly configured to be publicly available. All access follows the principles of least privilege. All external communication is protected with TLS 1.2. Admin access to backend services are IP restricted and require SSH keys. The application layer applies an additional layer of security.
Availability and resilience
- Guaranteed availability
- Our standard support SLA states an up time commitment of 99.5% and high availability options up to 99.9% are available. Refund options are available for breaches of SLA for premium support customers, in this case the SLA specification and refund policies are agreed on a customer by customer basis.
- Approach to resilience
- We utilise auto-scaling to ensure resource capacity scales in response to demand. Automated health-checks are used to ensure all individual components are functioning as expected, with nodes automatically replaced should there be a performance degradation. Metrics and monitoring alarms are used to highlight any potential issues that may require further investigation. We use “infrastructure as code” for managing all infrastructure, preserving a record of all changes over time, minimising risk and increasing consistency. For premium customers application redundancy can be added by deployment across multiple cloud availability zones to mitigate issues with a single data centre.
- Outage reporting
- This is provided via a dedicated customer Slack channel (web chat) integrations and an email alert. Private dashboards are used internally but we do not currently provide access to those for the customer.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Other
- Other user authentication
- Depends on the user and what access requirements are put in place by the customer. 2FA or federated is our preferred method of authentication. We can deploy customised authentication to match customer requirements.
- Access restrictions in management interfaces and support channels
- Role-based security Network filtering with user authorisation
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 6 months and 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- The Certification Group Limited
- ISO/IEC 27001 accreditation date
- Originally received certification 26/02/2014, certificate renewed 09/05/2023
- What the ISO/IEC 27001 doesn’t cover
- ISO27001 Annex A.11.1.6 Delivery and loading areas
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO27001 policies covering: Security Incident, Internal Audit and Review, Risk Assessment and Management, Secure system engineering principles and Development, Encryption Policy, Digirati User Agreement, Information Security Committee and Meetings, Third Party Service Delivery Management, System Planning and Acceptance, Operational Procedures and Responsibilities, Network Topology, Monitoring, HR, Environmental Security and Network Security Management, Document and Record Control, Change Control, Business Continuity and Back-ups, Asset Management. Practices and patterns are under constant review as per ISO27001 guidelines.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Covered by Change Control Procedure in ISO27001.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Covered in ISO27001 documentation.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Realtime error separation to dedicated slack channels, monitor infrastructure drift of IaC. Instance response covered under ISO27001.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Incident response and management covered under ISO27001 procedures. Each incident has a director assigned and are discussed at board meetings.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Digirati ensures that we offer equal opportunities to all in an inclusive workplace. Our principles of opportunity, accountability and integrity are key to our business, this is reflected in our Equality and Diversity Policy which defines our commitment to equality, diversity and inclusion.
Digirati promote:
An environment where we provide support and training to allow each employee to reach their full potential. Selection for employment, promotion, training or any other benefit will be on the basis of aptitude and ability.
An inclusive environment where everyone is heard and valued equally.
Equal pay for everyone carrying out the same role.
Digirati values employees from all backgrounds who can bring a broad range of attributes, experiences, skills and views. We recognise that equality and diversity is enhanced through workforce representation including gender, race, ethnicity, cultural identity, nationality, age, sexual orientation, gender identity, marital status, religion or disability.
Each person working in our team is treated equally and their experience and views are all valued in the same way, in our experience multiple perspectives are beneficial to successful delivery. Our project processes underpin this approach, our work culture allows individuals to think independently and cohesively working towards the same goals, this drives change and innovation.
Pricing
- Price
- £600.00 a terabyte a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 2GB for 6 months
- Link to free trial
- https://iiif-cloud.digirati.com/contact