The document discusses how personal privacy is achieved in modern times. It defines personal privacy as being free from public attention. It notes that achieving privacy is getting harder due to digital footprints left by electronic devices and internet use. Some ways to increase privacy online include limiting social media accounts, being selective about sharing information, and not using public WiFi. Offline, people can close blinds, lock doors, be discreet on phones, and avoid sharing sensitive details to maintain more privacy.
La pandemia de COVID-19 ha tenido un impacto significativo en la economía mundial. Muchos países experimentaron fuertes caídas en el PIB y aumentos en el desempleo debido a los cierres generalizados y las restricciones a los viajes. Aunque las vacunas han permitido la reapertura de muchas economías, los efectos a largo plazo de la pandemia en sectores como el turismo y los viajes aún no están claros.
El documento habla sobre las teorías de la etiquetación y la desviación, incluyendo las contribuciones de Frank Tannenbaum, Edwin Lemert y Howard Becker al desarrollo de estas teorías.
The document discusses how personal privacy is achieved in modern times. It defines personal privacy as being free from public attention. It notes that achieving privacy is getting harder due to digital footprints left by electronic devices and internet use. Some ways to increase privacy online include limiting social media accounts, being selective about sharing information, and not using public WiFi. Offline, people can close blinds, lock doors, be discreet on phones, and avoid sharing sensitive details to maintain more privacy.
La pandemia de COVID-19 ha tenido un impacto significativo en la economía mundial. Muchos países experimentaron fuertes caídas en el PIB y aumentos en el desempleo debido a los cierres generalizados y las restricciones a los viajes. Aunque las vacunas han permitido la reapertura de muchas economías, los efectos a largo plazo de la pandemia en sectores como el turismo y los viajes aún no están claros.
El documento habla sobre las teorías de la etiquetación y la desviación, incluyendo las contribuciones de Frank Tannenbaum, Edwin Lemert y Howard Becker al desarrollo de estas teorías.
Protecting Preserving and Passing Your Digital Estate (2)KC Marie Knox
This document discusses protecting and passing digital assets after death. It notes that digital assets can have financial, emotional, and administrative value, estimating the average value at $55,000. Digital assets are defined as any information created, stored, or communicated electronically, including intellectual property, social media accounts, online accounts, virtual currency, and more. The document outlines a four step plan to handle digital assets: 1) identify all digital assets and locations, 2) appoint an executor, 3) grant the executor access, and 4) provide instructions on handling each asset.
This wonderful presentation, appropriate for teens and young adults, was created by Symantec's Rayane Hazimeh for the Dubai Techfest, 2013. We thank her for generously sharing her content with the SlideShare community.
This document summarizes Simon Willison's presentation on building the social web with OpenID. It discusses four problems with traditional usernames and passwords: they are insecure, creating new accounts is tedious, online identities are fragmented, and social software has too much overhead. OpenID is presented as a decentralized solution for single sign-on that allows users to authenticate using a URL as their identity. The document covers how OpenID works, considerations for implementing it, and its potential to help tie together a user's online profiles and identities across different services.
The document discusses internet safety and provides advice for using the internet responsibly. It introduces concepts like web 2.0, social networking, and how future employers may check people's online profiles. The document recommends using Firefox as a web browser and installing parental control or accountability software to monitor internet usage.
Digital Assets Inventory Presentation-BMO-04-22.pdfBarbara O'Neill
This document discusses how to inventory and protect your digital assets. It defines digital assets as any personal information stored electronically, and notes that the average American has 25 logins and $55,000 worth of digital assets. It recommends creating a detailed digital asset inventory, determining goals for your digital assets, considering revisions to estate planning documents, and regularly reviewing your inventory. Key steps include identifying asset categories, using a password manager, and designating a digital executor to access accounts after death.
Recent hacking attacks have compromised several popular websites by fraudulently obtaining their SSL certificates. This allowed pirates to pose as legitimate websites and steal users' identities and financial information. To prevent this, websites should use extended validation (EV) SSL certificates, which provide the highest level of security by requiring more thorough verification procedures. EV certificates clearly display the organization's name in the browser address bar to build user trust in online transactions.
The document discusses the realities of digital communications and online privacy. It notes that deleting digital content does not make it fully gone, and that digital content can easily be shared or reposted without the original poster's consent. It provides tips for managing privacy settings on social media, emails, and other online accounts. It also offers advice on using secure passwords, identifying phishing attempts, and being cautious with personal information online and when using public computers.
The document discusses the realities of digital communications and online privacy. It notes that deleting digital content does not make it fully gone, and that digital content can easily be shared or reposted without the original poster's consent. It provides tips for managing privacy settings on social media, email clients, and other online accounts. It also offers advice on using strong and unique passwords, being wary of phishing scams, and taking precautions with personal information online and on public computers.
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
This document provides guidance on protecting cryptocurrency private keys and securing digital assets. It outlines various threats like theft, destruction, and privacy concerns. It then describes several tools that can be used to safeguard private keys, including memorizing seed phrases, using hardware wallets to generate and sign transactions, generating unique addresses per transaction, creating dead man's switches, drafting wills, and using multisignature addresses. The document advocates storing keys across different mediums like hardware wallets, software wallets, and bank vaults to create tiered security.
Digital Assets: A Path To Fiduciary AccessHoward Collens
Presented at State Bar of Michigan Elder Law and Disability Rights Section 2014 Fall Conference. Explores Fiduciary Access to Digital Assets, the Uniform Law Commission FADA, and Michigan's legislative changes to the Probate law.
Protecting Bitcoin and cryptocurrency Keysdimitrist
This document provides guidance on securely protecting cryptocurrency private keys and self-custodying digital assets. It discusses threats like theft, destruction, or loss of private keys and recommends tools to mitigate these risks. These include memorizing seed phrases, storing seeds in hardware wallets or cryptosteels, using multisignature wallets, generating watch-only and cold storage wallets, and setting up dead man's switches or last will and testaments. The document emphasizes that when storing cryptocurrency, users should self-custody their private keys rather than leaving them with exchanges or custodial services.
Beyond Accidental Data Leakage is a company that provides services to help identify, minimize, and manage security threats from data leakage. They conducted a survey of over 200,000 hours of user activity and found that most data theft occurred through mobile devices, webmail, removable media, and web applications. Their findings showed that existing security policies were not being implemented or enforced by companies. They recommend prevention steps like implementing a data classification scheme, security awareness training, defensive monitoring measures, and enforcing policies to help combat accidental and intentional data leakage.
How to protect your clients and your law firm from money transfer scamsGabor Szathmari
This document outlines how cybercriminals target legal practices and describes money transfer scams. It discusses how payment redirection fraud works in two phases by collecting passwords through phishing or data breaches, then using those credentials to change payment instructions. The document provides five steps to protect legal practices: implementing email spoofing protections, using two-factor authentication, better antivirus software, browser extensions, and enterprise security solutions. It concludes by suggesting resources for legal practices to get help, such as the Law Council of Australia and Lawcover.
Security everywhere digital signature and digital fingerprint v1 (personal)Paul Yang
This is the slide I used to train people about the security concepts, such as digital signature and digital fingerprint.
I tried to use friendly way to explain the topic with animation and many example in real life.
Hope it helps for you.
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
Ever wonder what you should or shouldn’t share on the internet? Do you see users who are posting everything thing they possibly could on the internet and wonder how to help educate them to protect themselves?
All of this collective sharing, creates a data gold mine for hackers to do their evil bidding. In this session we will talk about what to post on the internet and what not too. We will also look into what hackers can use from the information you’ve posted on the internet and how they can use it to gain access to your and your users personal lives, accounts, credit cards, and more. During this session, we’ll dive into building a strategy plan to help limit and hopefully eliminate these references from your digital footprint to help ensure you are more secure than you were when you first started this session.
By the end of this webinar, attendees will have a virtual toolkit and strategies to help educate users on protecting themselves while online.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
More Related Content
Similar to 2012 turing-security freedom WendyMoncur
Protecting Preserving and Passing Your Digital Estate (2)KC Marie Knox
This document discusses protecting and passing digital assets after death. It notes that digital assets can have financial, emotional, and administrative value, estimating the average value at $55,000. Digital assets are defined as any information created, stored, or communicated electronically, including intellectual property, social media accounts, online accounts, virtual currency, and more. The document outlines a four step plan to handle digital assets: 1) identify all digital assets and locations, 2) appoint an executor, 3) grant the executor access, and 4) provide instructions on handling each asset.
This wonderful presentation, appropriate for teens and young adults, was created by Symantec's Rayane Hazimeh for the Dubai Techfest, 2013. We thank her for generously sharing her content with the SlideShare community.
This document summarizes Simon Willison's presentation on building the social web with OpenID. It discusses four problems with traditional usernames and passwords: they are insecure, creating new accounts is tedious, online identities are fragmented, and social software has too much overhead. OpenID is presented as a decentralized solution for single sign-on that allows users to authenticate using a URL as their identity. The document covers how OpenID works, considerations for implementing it, and its potential to help tie together a user's online profiles and identities across different services.
The document discusses internet safety and provides advice for using the internet responsibly. It introduces concepts like web 2.0, social networking, and how future employers may check people's online profiles. The document recommends using Firefox as a web browser and installing parental control or accountability software to monitor internet usage.
Digital Assets Inventory Presentation-BMO-04-22.pdfBarbara O'Neill
This document discusses how to inventory and protect your digital assets. It defines digital assets as any personal information stored electronically, and notes that the average American has 25 logins and $55,000 worth of digital assets. It recommends creating a detailed digital asset inventory, determining goals for your digital assets, considering revisions to estate planning documents, and regularly reviewing your inventory. Key steps include identifying asset categories, using a password manager, and designating a digital executor to access accounts after death.
Recent hacking attacks have compromised several popular websites by fraudulently obtaining their SSL certificates. This allowed pirates to pose as legitimate websites and steal users' identities and financial information. To prevent this, websites should use extended validation (EV) SSL certificates, which provide the highest level of security by requiring more thorough verification procedures. EV certificates clearly display the organization's name in the browser address bar to build user trust in online transactions.
The document discusses the realities of digital communications and online privacy. It notes that deleting digital content does not make it fully gone, and that digital content can easily be shared or reposted without the original poster's consent. It provides tips for managing privacy settings on social media, emails, and other online accounts. It also offers advice on using secure passwords, identifying phishing attempts, and being cautious with personal information online and when using public computers.
The document discusses the realities of digital communications and online privacy. It notes that deleting digital content does not make it fully gone, and that digital content can easily be shared or reposted without the original poster's consent. It provides tips for managing privacy settings on social media, email clients, and other online accounts. It also offers advice on using strong and unique passwords, being wary of phishing scams, and taking precautions with personal information online and on public computers.
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
This document provides guidance on protecting cryptocurrency private keys and securing digital assets. It outlines various threats like theft, destruction, and privacy concerns. It then describes several tools that can be used to safeguard private keys, including memorizing seed phrases, using hardware wallets to generate and sign transactions, generating unique addresses per transaction, creating dead man's switches, drafting wills, and using multisignature addresses. The document advocates storing keys across different mediums like hardware wallets, software wallets, and bank vaults to create tiered security.
Digital Assets: A Path To Fiduciary AccessHoward Collens
Presented at State Bar of Michigan Elder Law and Disability Rights Section 2014 Fall Conference. Explores Fiduciary Access to Digital Assets, the Uniform Law Commission FADA, and Michigan's legislative changes to the Probate law.
Protecting Bitcoin and cryptocurrency Keysdimitrist
This document provides guidance on securely protecting cryptocurrency private keys and self-custodying digital assets. It discusses threats like theft, destruction, or loss of private keys and recommends tools to mitigate these risks. These include memorizing seed phrases, storing seeds in hardware wallets or cryptosteels, using multisignature wallets, generating watch-only and cold storage wallets, and setting up dead man's switches or last will and testaments. The document emphasizes that when storing cryptocurrency, users should self-custody their private keys rather than leaving them with exchanges or custodial services.
Beyond Accidental Data Leakage is a company that provides services to help identify, minimize, and manage security threats from data leakage. They conducted a survey of over 200,000 hours of user activity and found that most data theft occurred through mobile devices, webmail, removable media, and web applications. Their findings showed that existing security policies were not being implemented or enforced by companies. They recommend prevention steps like implementing a data classification scheme, security awareness training, defensive monitoring measures, and enforcing policies to help combat accidental and intentional data leakage.
How to protect your clients and your law firm from money transfer scamsGabor Szathmari
This document outlines how cybercriminals target legal practices and describes money transfer scams. It discusses how payment redirection fraud works in two phases by collecting passwords through phishing or data breaches, then using those credentials to change payment instructions. The document provides five steps to protect legal practices: implementing email spoofing protections, using two-factor authentication, better antivirus software, browser extensions, and enterprise security solutions. It concludes by suggesting resources for legal practices to get help, such as the Law Council of Australia and Lawcover.
Security everywhere digital signature and digital fingerprint v1 (personal)Paul Yang
This is the slide I used to train people about the security concepts, such as digital signature and digital fingerprint.
I tried to use friendly way to explain the topic with animation and many example in real life.
Hope it helps for you.
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
Ever wonder what you should or shouldn’t share on the internet? Do you see users who are posting everything thing they possibly could on the internet and wonder how to help educate them to protect themselves?
All of this collective sharing, creates a data gold mine for hackers to do their evil bidding. In this session we will talk about what to post on the internet and what not too. We will also look into what hackers can use from the information you’ve posted on the internet and how they can use it to gain access to your and your users personal lives, accounts, credit cards, and more. During this session, we’ll dive into building a strategy plan to help limit and hopefully eliminate these references from your digital footprint to help ensure you are more secure than you were when you first started this session.
By the end of this webinar, attendees will have a virtual toolkit and strategies to help educate users on protecting themselves while online.
Similar to 2012 turing-security freedom WendyMoncur (20)
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
1. YOUR
DIGITAL INHERITANCE
DR. WENDY MONCUR, FRSA
SCHOOL OF COMPUTING, UNIVERSITY OF DUNDEE
VISITING FELLOW, CENTRE FOR DEATH & SOCIETY, UNIVERSITY OF BATH
3. THE DAYS OF
OUR YEARS
ARE
THREESCORE
YEARS
AND TEN
(PSALM 90:10, KING JAMES
BIBLE)
4.
5. ARE ONLINE & OFFLINE DEATH
SYNCHRONOUS?
http://budgetsmartgirl.files.wordpress.com/2010/10/final-graveyard-sandwich-tray.jpg
6. YOUR REAL-LIFE ASSETS
House
Car
Money
Furniture
Photos, videos, letters
Jewellery
Body
7. YOUR DIGITAL ASSETS
Photos
Blog posts
Emails
Social media accounts
Online contacts
Video
Music
Books
Memberships
Online business
Airmiles accounts
… and more…
8. WHERE ARE YOUR
DIGITAL ASSETS?
Laptop. iPod. Smart phone. Kindle. External hard drive. CD or DVD.
Cloud backup service. Memory stick.
http://blog.redtray.co.uk/2012/07/06/why-training-in-the-cloud-has-become-the-must-have-it-accessory/
12. BEQUEATHING DIGITAL
ASSETS
Can you? Yes, in Oklahoma (House bill 2800)
• social networking site
• micro blogging
• email & short message service websites
Barriers to bequeathal
13. BARRIERS TO BEQUEATHAL
Awareness of account’s existence
Identity –
actual, pseudonymous, anonymous
Password
Ownership of digital asset
http://community.secondlife.com/t5/Inworld/bg-p/blog_inworld/date/2-5-2012
16. OTHER INTERNET
SERVICE PROVIDERS
Facebook: Memorialize or remove the account. Content can be
downloaded if you have password. http://www.facebook.com
Twitter: remove account or assist family members in saving a
backup of deceased‟s public Tweets.
Gmail: May give access if formal evidence of death provided
http://support.google.com/mail/bin/answer.py?hl=en&answer=14300
eBay: You cannot “transfer your eBay account (including feedback) and
user ID to another party without our consent”
http://pages.ebay.co.uk/help/policies/user-agreement.html
/
17. DO YOU HAVE
SKELETONS IN
YOUR CLOSET?
http://fallen-angel42.deviantart.com/art/Skeleton-in-your-closet-
153072854
19. WHAT CAN YOU DO?: 1
Make a list of ALL your digital assets
- ID, Password, Website
Consider using a software tool to store passwords securely
• - E.g. LastPass, 1Password, Clipperz, RoboForm
20. Writing down or sharing your password
may violate the Terms of Service
agreement with your Internet Service
provider.
21. WHAT CAN YOU DO?: 2
Appoint a Digital Executor
DIY method
• Family member
• Friend
• Colleague
• Lawyer
Digital estate services
Posthumous email services
22. DIGITAL ESTATE
SERVICES
Secure online service
• e.g. Legacy Locker, Entrustnet
• May demand death certificate as proof of death
Stores your digital inventory
May also store:
• last wishes
• instructions for funeral
• posthumous email
• instructions in case if brain death
• eg – Legacy Organiser app
23. POSTHUMOUS EMAIL
Online service
• e.g http://www.deadmansswitch.net/
Death may be assumed if you fail to answer 3 emails
from service provider….
Emails sent after you die
24. DO YOU NEED A DIGITAL
ESTATE SERVICE, OR IS
IT OVERKILL?
Security
Password updates
Number of heirs
Your age & health
How good you are with computers
Triggering action
25. SUMMARY
Your digital assets are growing daily
Bequeathing them is not simple
You may wish to:
• Make an inventory of your digital assets
• Choose:
• your digital executor
• What assets you want to pass on, to whom.
Dr. Wendy Moncur
http://www.computing.dundee.ac.uk/staff/wmoncur/
26. Digital Estate Posthumous DIY Method
Services emails
Want stringent 3rd Y Less stringent N
party verification
Death cert check Y N N
Automated digital Y 1/2 N
executor
Digital „heirs‟ Complex Complex Simple
Passwords change Y N N
often
Open new accounts Y N N
frequently
Willing to pay for Maybe Maybe N
service