Skip to main content

Help us improve the Digital Marketplace - send your feedback

Digirati

IIIF Cloud Services

IIIF Cloud Services makes digitised material available to the web via IIIF APIs (https://iiif.io/). It can be used for ad-hoc IIIF production and also scales to IIIF delivery of very large collections through automated workflow integrations.

Features

  • Provides IIIF Image API endpoints, enabling deep zoom.
  • Provides web-ready derivatives for AV masters.
  • Optional access control using the IIIF Auth API.
  • Create, store and serve IIIF Manifests and Collections.
  • IIIF Search API provision over textual content of IIIF resources.
  • Pluggable architecture for latest OCR, AI / Machine Learning libraries.
  • REST API for digitisation and preservation workflows integration.
  • Out-of-the-box digital preservation with Fedora 6 integration.
  • Generation of custom metadata-driven Manifests and PDFs.
  • Additional modules for collection annotation and showcasing user interfaces.

Benefits

  • IIIF delivery of both digitised and born digital archival content.
  • Preservation of digitised content in Oxford Common Filesystem Layout standard.
  • Display, enrich, and curate IIIF-based digital objects at scale.
  • Annotate digitised material through machine and human enrichment workflows.
  • Automatically catalogue and summarise archival content.
  • Automatically identify images and content within images (image recognition).
  • Teach a class using web annotations to enrich digitised material.
  • Crowdsource transcriptions for your digitised collections.
  • Showcase your annotated collections with generous interfaces including search.
  • Suitable for libraries, archives, museums, galleries, universities and schools.

Pricing

£600.00 a terabyte a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@digirati.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 4 2 3 3 7 2 4 2 5 1 9 5 8 8

Contact

Digirati John Baker
Telephone: 0845 643 4370
Email: sales@digirati.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Runs on AWS only
System requirements
A IIIF Cloud Services subscription

User support

Email or online ticketing support
Email or online ticketing
Support response times
24 hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
We use Slack, here is their accessibility statement: https://slack.com/intl/en-gb/help/articles/4455747966739-Accessibility-in-Slack
Web chat accessibility testing
N/a
Onsite support
Yes, at extra cost
Support levels
Digirati offer two levels of support. Our Standard Support level states an up time commitment of 99.5% and the below incident response times. Critical - 2 hours (an incident where the production system is severely impacted or completely down) Major - 1 day (an incident where the production system is functioning with limited capabilities) Minor - 5 days (an incident where the system is fully functional but there are observed errors that do not severely impact the usability of the system). Our Premium Support level provides high availability options up to a guaranteed 99.9% uptime. This option provides an account manager as the main point of contact for service incidents who will appoint a service engineer as appropriate. Premium support also includes the option for defining bespoke response and fix times for the above severity levels. Prices for Standard Support are detailed in our pricing plan options for hosting of the core services and additional modules, extra costs for Premium Support will vary depending on exact client requirements.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide user documentation and online support as standard. Tailored additional training can be provided on request at extra cost.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
The API allows you to extract any metadata you have added to your images. While this is not a preservation system, you might wish to recover source images uploaded to the platform, if those images were tile-ready JPEG2000 images. We can arrange an export of your source images to an S3 bucket for your collection. Annotations and other data from the additional modules will be made available for download by the customer via their APIs.
End-of-contract process
If a subscription term ends and no renewal has been requested, the subscription terminates automatically. Unless a grace period is agreed with the customer, within one month of the end date, Digirati can facilitate an export of asset data and associated metadata using data extraction procedures described above. Other data formats or destinations requested may incur an additional cost. After this exit process completes, Digirati will delete all the applicable data under our control.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
No
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
There is a management dashboard to manage the ingest of images into the system and organise them into folders (called 'spaces'), images can also be arranged as IIIF Manifests. This dashboard also administrates user accounts and permissions; and provides reporting.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
The dashboard is designed to be WCAG 2.1 AA, but currently we have not tested these tools with users of assistive technology. User interfaces generated from asset delivery provided by the platform can conform to whatever standards are chosen by the customer, including user tested with assistive technology, on a case by case basis.
API
Yes
What users can and can't do using the API
The REST HTTP API (https://deploy-preview-2--dlcs-docs.netlify.app/api-doc/overview) is a comprehensive management API which can be used to configure new storage spaces, register images, set thumbnail creation policy, configure access control and generate derivative IIIF Manifests. It is usually integrated into a bespoke workflow or tooling. It can be called from server side workflow processes, or client side tools.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
For image delivery, you can customise: - Whether to produce thumbnails - What sizes to produce those thumbnails at - For access-controlled content, what’s the maximum size that can be viewed by a non-authorised user (e.g., for thumbnail visibility but not larger) For AV, you can customise: - What formats your source material should be transcoded to - For image processing and enrichment, you can customise the service that your enrichment pipeline calls, to take advantage of different components, including your own. This can all be achieved via the API and management tools available to the customer. Additional modules can also be customised but this typically involves professional services. Customisations would typically include: - Deployment of specific machine enrichment libraries - Customisations for showcasing and human enrichment interfaces.

Scaling

Independence of resources
Auto-scaling rules are in place to mitigate this on our shared instance. For large scale users we typically roll out dedicated instances, so that all the load is specific to that customer.

Analytics

Service usage metrics
Yes
Metrics types
For core services we can provide metrics related to the number of assets stored, their total size and the level of consumption per asset. Usage and behavior metrics can also be provided for the additional modules
Reporting types
Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
All data held within Cloud services such as AWS https://aws.amazon.com/compliance/programs/
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The public REST API provides access to all data that may have been added, in the form of JSON-LD descriptions of the content. This can be used to export data. The images themselves, including generated thumbnails, can be copied to an S3 bucket for collection, or harvested individually via the REST API. An export of all annotations conforming to W3C Web Annotation standards can also be provided via a REST API. Other data for additional modules is also available using the same method.
Data export formats
Other
Other data export formats
  • JPEG2000
  • JSON-LD
  • IIIF Presentation and Image API
  • Annotations can be exported as W3C or Open Annotation standard
  • PDF
  • Single files can be downloaded in their native form
  • AV formats vary depending on configuration
  • ZIP
Data import formats
Other
Other data import formats
  • API interactions are through JSON-LD as specified in public API.
  • Admin portal allows upload of CSV files for bulk ingest.
  • PDF

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
Digital assets are downloaded from source in accordance with customer-specific configuration. We support downloading via SFTP and HTTPS. If data is stored in AWS S3 we can configure secure S3 account to account access to ensure data doesn't leave the AWS network.
Data protection within supplier network
Other
Other protection within supplier network
All services run within a VPC, with all data residing in a private network with no direct external access. Assets are stored in private blob storage, unless explicitly configured to be publicly available. All access follows the principles of least privilege. All external communication is protected with TLS 1.2. Admin access to backend services are IP restricted and require SSH keys. The application layer applies an additional layer of security.

Availability and resilience

Guaranteed availability
Our standard support SLA states an up time commitment of 99.5% and high availability options up to 99.9% are available. Refund options are available for breaches of SLA for premium support customers, in this case the SLA specification and refund policies are agreed on a customer by customer basis.
Approach to resilience
We utilise auto-scaling to ensure resource capacity scales in response to demand. Automated health-checks are used to ensure all individual components are functioning as expected, with nodes automatically replaced should there be a performance degradation. Metrics and monitoring alarms are used to highlight any potential issues that may require further investigation. We use “infrastructure as code” for managing all infrastructure, preserving a record of all changes over time, minimising risk and increasing consistency. For premium customers application redundancy can be added by deployment across multiple cloud availability zones to mitigate issues with a single data centre.
Outage reporting
This is provided via a dedicated customer Slack channel (web chat) integrations and an email alert. Private dashboards are used internally but we do not currently provide access to those for the customer.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Other
Other user authentication
Depends on the user and what access requirements are put in place by the customer. 2FA or federated is our preferred method of authentication. We can deploy customised authentication to match customer requirements.
Access restrictions in management interfaces and support channels
Role-based security Network filtering with user authorisation
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
The Certification Group Limited
ISO/IEC 27001 accreditation date
Originally received certification 26/02/2014, certificate renewed 09/05/2023
What the ISO/IEC 27001 doesn’t cover
ISO27001 Annex A.11.1.6 Delivery and loading areas
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO27001 policies covering: Security Incident, Internal Audit and Review, Risk Assessment and Management, Secure system engineering principles and Development, Encryption Policy, Digirati User Agreement, Information Security Committee and Meetings, Third Party Service Delivery Management, System Planning and Acceptance, Operational Procedures and Responsibilities, Network Topology, Monitoring, HR, Environmental Security and Network Security Management, Document and Record Control, Change Control, Business Continuity and Back-ups, Asset Management. Practices and patterns are under constant review as per ISO27001 guidelines.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Covered by Change Control Procedure in ISO27001.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Covered in ISO27001 documentation.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Realtime error separation to dedicated slack channels, monitor infrastructure drift of IaC. Instance response covered under ISO27001.
Incident management type
Supplier-defined controls
Incident management approach
Incident response and management covered under ISO27001 procedures. Each incident has a director assigned and are discussed at board meetings.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Equal opportunity

Equal opportunity

Digirati ensures that we offer equal opportunities to all in an inclusive workplace. Our principles of opportunity, accountability and integrity are key to our business, this is reflected in our Equality and Diversity Policy which defines our commitment to equality, diversity and inclusion.

Digirati promote:

An environment where we provide support and training to allow each employee to reach their full potential. Selection for employment, promotion, training or any other benefit will be on the basis of aptitude and ability.

An inclusive environment where everyone is heard and valued equally.

Equal pay for everyone carrying out the same role.

Digirati values employees from all backgrounds who can bring a broad range of attributes, experiences, skills and views. We recognise that equality and diversity is enhanced through workforce representation including gender, race, ethnicity, cultural identity, nationality, age, sexual orientation, gender identity, marital status, religion or disability.

Each person working in our team is treated equally and their experience and views are all valued in the same way, in our experience multiple perspectives are beneficial to successful delivery. Our project processes underpin this approach, our work culture allows individuals to think independently and cohesively working towards the same goals, this drives change and innovation.

Pricing

Price
£600.00 a terabyte a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
2GB for 6 months
Link to free trial
https://iiif-cloud.digirati.com/contact

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at sales@digirati.com. Tell them what format you need. It will help if you say what assistive technology you use.