metadata

In the 21st century, metadata typically refers to digital forms, but traditional card catalogs contain metadata, with cards holding information about books in a library (author, title, subject, etc.).

Metadata is "data that provides information about other data".[1] In other words, it is "data about data." Many distinct types of metadata exist, including descriptive metadatastructural metadataadministrative metadata,[2] reference metadata and statistical metadata.

Metadata means "data about data". Although the "meta" prefix (from the Greek preposition and prefix μετά-) means "after" or "beyond", it is used to mean "about" in epistemology. Metadata is defined as the data providing information about one or more aspects of the data; it is used to summarize basic information about data which can make tracking and working with specific data easier.[12] Some examples include:

  • Means of creation of the data

  • Purpose of the data

  • Time and date of creation

  • Creator or author of the data

  • Location on a computer network where the data was created

  • Standards used

  • File size

  • Data quality

  • Source of the data

  • Process used to create the data

For example, a digital image may include metadata that describes how large the picture is, the color depth, the image resolution, when the image was created, the shutter speed, and other data.[13] A text document's metadata may contain information about how long the document is, who the author is, when the document was written, and a short summary of the document. Metadata within web pages can also contain descriptions of page content, as well as key words linked to the content.[14] These links are often called "Metatags", which were used as the primary factor in determining order for a web search until the late 1990s.[14] The reliance of metatags in web searches was decreased in the late 1990s because of "keyword stuffing".[14] Metatags were being largely misused to trick search engines into thinking some websites had more relevance in the search than they really did.[14]

Metadata can be stored and managed in a database, often called a metadata registry or metadata repository.[15] However, without context and a point of reference, it might be impossible to identify metadata just by looking at it.[16] For example: by itself, a database containing several numbers, all 13 digits long could be the results of calculations or a list of numbers to plug into an equation - without any other context, the numbers themselves can be perceived as the data. But if given the context that this database is a log of a book collection, those 13-digit numbers may now be identified as ISBNs - information that refers to the book, but is not itself the information within the book. The term "metadata" was coined in 1968 by Philip Bagley, in his book "Extension of Programming Language Concepts" where it is clear that he uses the term in the ISO 11179 "traditional" sense, which is "structural metadata" i.e. "data about the containers of data"; rather than the alternative sense "content about individual instances of data content" or metacontent, the type of data usually found in library catalogues.[17][18] Since then the fields of information management, information science, information technology, librarianship, and GIS have widely adopted the term. In these fields the word metadata is defined as "data about data".[19][page needed] While this is the generally accepted definition, various disciplines have adopted their own more specific explanation and uses of the term.

Chain of Trust

chain-of-trust.png

In computer security, a chain of trust is established by validating each component of hardware and software from the end entity up to the root certificate. It is intended to ensure that only trusted software and hardware can be used while still retaining flexibility.

A chain of trust is designed to allow multiple users to create and use software on the system, which would be more difficult if all the keys were stored directly in hardware. It starts with hardware that will only boot from software that is digitally signed. The signing authority will only sign boot programs that enforce security, such as only running programs that are themselves signed, or only allowing signed code to have access to certain features of the machine. This process may continue for several layers.

This process results in a chain of trust. The final software can be trusted to have certain properties, because if it had been illegally modified its signature would be invalid, and the previous software would not have executed it. The previous software can be trusted, because it, in turn, would not have been loaded if its signature had been invalid. The trustworthiness of each layer is guaranteed by the one before, back to the trust anchor.

It would be possible to have the hardware check the suitability (signature) for every single piece of software. However, this would not produce the flexibility that a "chain" provides. In a chain, any given link can be replaced with a different version to provide different properties, without having to go all the way back to the trust anchor. This use of multiple layers is an application of a general technique to improve scalability, and is analogous to the use of multiple certificates in a certificate chain.

Comparing Surgical Masks and Surgical N95 Respirators

The FDA regulates surgical masks and surgical N95 respirators differently based on their intended use.

surgical_mask_0.jpg

surgical mask is a loose-fitting, disposable device that creates a physical barrier between the mouth and nose of the wearer and potential contaminants in the immediate environment. These are often referred to as face masks, although not all face masks are regulated as surgical masks. Note that the edges of the mask are not designed to form a seal around the nose and mouth.

n95_respirator.jpg

An N95 respirator is a respiratory protective device designed to achieve a very close facial fit and very efficient filtration of airborne particles. Note that the edges of the respirator are designed to form a seal around the nose and mouth. Surgical N95 Respirators are commonly used in healthcare settings and are a subset of N95 Filtering Facepiece Respirators (FFRs), often referred to as N95s.

The similarities among surgical masks and surgical N95s are:

  • They are tested for fluid resistance, filtration efficiency (particulate filtration efficiency and bacterial filtration efficiency), flammability and biocompatibility.

  • They should not be shared or reused.

How Effective Are Masks and Other Facial Coverings at Stopping Coronavirus?

One of the biggest areas of uncertainty during this ongoing pandemic has been over what seems like a relatively simple question: “What should I wear on my face to protect myself from getting COVID-19?”.

Answering that question requires understanding some key concepts about how the novel coronavirus (SARs-CoV-2) spreads and how various masks protect (and fall short) against those transmission methods. 

Understanding Particles, Droplets and Aerosols

We know SARs-CoV-2 is spread through respiratory droplets expelled by an infected person, such as during a cough or sneeze. Depending on the person and force of their breath, these droplets could be large enough to see (e.g., spittle during a hacking cough) or so tiny that they hang in the air and are invisible to the naked eye (e.g., during regular breathing).

Safety and health professionals have a term for these tiny particles that get suspended in the air – aerosols. The consensus is that SARs-CoV-2 particles can become aerosolized, which is critical to understanding how the virus spreads. That’s because gravity forces larger particles to the ground fairly quickly, but smaller, aerosolized particles can linger in the air for much longer. Being suspended in the air makes it much more likely for a virus to be breathed in, versus being on a surface and needing to be brought to our face by our hands.

The potential for airborne transmission – getting the virus from simply being in a room with an infected person for an extended period of time – is what’s driving the recommendations over masks and other facial coverings. So will any of these masks actually protect you from the virus?

Comparing N95s, Surgical Masks and Cloth Masks

First, let’s be clear that there’s no comparison between a correctly worn respirator, such as an N95, and other types of masks and facial coverings. Respirators are designed – and scientifically proven – to filter extremely small particles from the air. N95s and more protective options like elastomeric or half-face respirators are so effective because they form a tight seal to the wearer’s face, which forces all the inhaled air to pass through the filter.

Unfortunately, this is also why N95s are in such short supply. Knowing that it’s not realistic for everyone to wear an N95 respirator, let’s take a look at the potential benefits and limitations of other options in more detail.

Surgical Mask

Effective for: The primary purpose of these masks is to protect other people from the wearer’s respiratory droplets. These masks also give some barrier protection against larger respiratory droplets from other people.

Limitations: Because there’s no facial seal, surgical masks don’t reliably filter enough smaller airborne particles to count as respiratory protection. One study found surgical masks can filter about 60 percent of smaller, inhaled particles. (By comparison, an N95 would filter 95 percent of these particles.)

Paper Mask

Effective for: These masks are intended to filter larger nuisance dusts from the air, such as pollen or sawdust, which are much larger than virus particles. Like surgical masks, they provide some barrier protection for the wearer and those in close contact with the wearer.

Limitations: Though made of filtering material, they are not designed to filter inhaled particles as small as viruses and don’t form a face seal.

Homemade Cloth/Fabric Mask

Effective for: Homemade masks provide some barrier protection from large respiratory droplets expelled by other people. Perhaps most importantly, they reduce the spread of respiratory droplets emitted by the wearer. In one study, coughing through a cotton mask significantly reduced the amount of SARs-CoV-2 particles transferred to a test surface.

Limitations: As above, these masks don’t form a tight seal to the face and don’t reliably filter small inhaled particles. Attempts to measure the effectiveness of cloth masks to filter small particles show a wide range of results: cotton T-shirt (seven percent), shop towel (19 percent), coffee filter (49 percent). Material type and thickness (e.g., cotton, denim, canvas), fit to face (e.g., flexible nose bridge) and use of an internal filter (e.g., coffee filter) are just some of the variables that affected filtering efficiency.

Summarizing Available Mask Benefits and Limitations

The overall evidence shows that surgical masks, paper masks, cloth masks and other facial coverings all provide the wearer with some protection against SARs-CoV-2. Those benefits include a protective barrier for virus particles to land on instead of our mouth and nose, and a level of particle filtration (even though nothing comes close to an N95 respirator). In short, wearing a mask offers some protection against the virus, but there’s a big gap between some protection and effective protection.

While these alternative mask options are far from perfect, we should keep in mind that the biggest benefit of wearing them is likely for the people around you. We know small virus particles can hang in the air, and we know people can spread the virus without ever having symptoms. Any steps we can take to contain our coughs, sneezes and regular breaths behind a mask can help limit how far the virus travels. That alone is reason enough to put on a mask.

While homemade masks are far from a perfect level of protection, the reality is that slowing the spread of SARs-CoV-2 requires us to take advantage of every opportunity we have. We should also remember two other important points. First, no mask is a silver bullet. Even an N95 won’t protect you if you touch your face with contaminated hands right after taking it off. That’s why masks have to be used in combination with physical distancing, hand hygiene, cough etiquette and other precautions. Second, the reason we’re wearing homemade masks is so we can hopefully leave N95s and other more protective respirators for the healthcare workers and frontline workers who desperately need them.