Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...Atmos
Vigilant Urbanism - the rise of Eyespace: A seminar by Alex Haw at the Edinburgh School of Architecture, which involved a talk about how media technologies such as cctv influence the creative processes of atmos studio.
The document discusses NSA surveillance programs and their techniques. It notes that tech companies have started increasing transparency about NSA requests after gag orders were eased. It then provides details on the NSA's hacking tools and techniques, including installing malware on devices, posing as fake servers, cyber attacks, and circumventing encryption. The document argues that while governments have a duty to keep people safe, surveillance should be transparent and respect privacy.
Alex Haw Lecture - 101008 - Media Architecture - 212Atmos
Media Architecture: Alex Haw gives a talk on how media can influence a creative process leading towards the various pieces of art and architecture at atmos studio.
Alex Haw Lectures - 090527 - University of Technology Sydney - Smart Lights S...Atmos
Luminous Surveillance: In this lecture, Alex Haw, director of atmos talks about media technologies and how they spark creativity in his practice's design processes.
Alex Haw Lecture - 100916 - Do-Lectures - Bringing it All Together - 281Atmos
Bring it All Together: A lecture by Alex Haw, director of atmos studio, sharing the intensive design inspirations and processes leading to their intriguing, unconventional projects.
http://dolectures.com/speakers/alex-haw/
Alex Haw Lecture - 110704 - Digital Futures - EyeSpace - 393Atmos
The document appears to be a design proposal for a new type of city centered around principles of sustainability and connection to the natural landscape. It includes diagrams of architectural and infrastructure elements like solar canopies, pedestrian walkways, and terraced buildings nestled into the landscape. Captions describe how the design aims to inhabit the surrounding wadis or valleys, integrate varied public spaces, and harness natural energy sources while providing shade. The proposal presents a vision of a solar-powered city united under a canopy and living as one with the surrounding natural environment.
This document appears to be a presentation on cloud architecture and manufacturing. It includes sections on cloud studies in art, the history of construction from pyramids to modern stadiums, concepts for inflatable and inhabitable cloud structures, and a call for public participation in "cloudraising" projects through contributing pixels/pounds to a cloud structure design. The overall message seems to be presenting a vision for lifting humanity through collaborative cloud-based architecture that harnesses the power of the sky.
Alex Haw Lecture - 080815 - bbc Innovation Unit - atmos Sample Projects - 546Atmos
atmos Sample Projects: Alex Haw talks at the bbc Innovation Unit about a number of key projects by atmos studio emphasizing on the intensive research and speculative inspirations behind their rigorous processses.
Alex Haw Lecture - 090130 - Edinburgh School of Architecture - Vigilant Urban...Atmos
Vigilant Urbanism - the rise of Eyespace: A seminar by Alex Haw at the Edinburgh School of Architecture, which involved a talk about how media technologies such as cctv influence the creative processes of atmos studio.
The document discusses NSA surveillance programs and their techniques. It notes that tech companies have started increasing transparency about NSA requests after gag orders were eased. It then provides details on the NSA's hacking tools and techniques, including installing malware on devices, posing as fake servers, cyber attacks, and circumventing encryption. The document argues that while governments have a duty to keep people safe, surveillance should be transparent and respect privacy.
Alex Haw Lecture - 101008 - Media Architecture - 212Atmos
Media Architecture: Alex Haw gives a talk on how media can influence a creative process leading towards the various pieces of art and architecture at atmos studio.
Alex Haw Lectures - 090527 - University of Technology Sydney - Smart Lights S...Atmos
Luminous Surveillance: In this lecture, Alex Haw, director of atmos talks about media technologies and how they spark creativity in his practice's design processes.
Alex Haw Lecture - 100916 - Do-Lectures - Bringing it All Together - 281Atmos
Bring it All Together: A lecture by Alex Haw, director of atmos studio, sharing the intensive design inspirations and processes leading to their intriguing, unconventional projects.
http://dolectures.com/speakers/alex-haw/
Alex Haw Lecture - 110704 - Digital Futures - EyeSpace - 393Atmos
The document appears to be a design proposal for a new type of city centered around principles of sustainability and connection to the natural landscape. It includes diagrams of architectural and infrastructure elements like solar canopies, pedestrian walkways, and terraced buildings nestled into the landscape. Captions describe how the design aims to inhabit the surrounding wadis or valleys, integrate varied public spaces, and harness natural energy sources while providing shade. The proposal presents a vision of a solar-powered city united under a canopy and living as one with the surrounding natural environment.
This document appears to be a presentation on cloud architecture and manufacturing. It includes sections on cloud studies in art, the history of construction from pyramids to modern stadiums, concepts for inflatable and inhabitable cloud structures, and a call for public participation in "cloudraising" projects through contributing pixels/pounds to a cloud structure design. The overall message seems to be presenting a vision for lifting humanity through collaborative cloud-based architecture that harnesses the power of the sky.
Alex Haw Lecture - 080815 - bbc Innovation Unit - atmos Sample Projects - 546Atmos
atmos Sample Projects: Alex Haw talks at the bbc Innovation Unit about a number of key projects by atmos studio emphasizing on the intensive research and speculative inspirations behind their rigorous processses.
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Atmos
This document discusses and summarizes information about surveillance practices and legislation in the UK and US. It outlines how lawful interception of communications has led to arrests and drug seizures. It also discusses new US guidelines encouraging police to question people photographing in public. The document summarizes UK institutions and legislation governing surveillance, exemptions allowing surveillance for crime prevention, and rights around organizational versus private surveillance. It also discusses future surveillance technologies like brain fingerprinting and sentiment analysis of internet users.
Alex Haw Lecture 130708 ETH Zurich - ALIVE conference - Building Nature -326Atmos
This document summarizes a presentation by Alex Haw from CAAD, ETH Zurich about designing structures that incorporate and are inspired by nature. Some key points discussed include letting nature inform design solutions, cultivating performance as both art and infrastructure, designing with global rhythms and information, and building nature through projects like the mobile orchard, timber tentacles structure, and London Leaves installation. The overall message is that the design process involves growing solutions that enhance interaction and inhabit data while embracing the body and celebrating nature.
Alex Haw Lecture - 081026 - Surveillance Symposium London - Surveying Surveil...Atmos
Surveying Surveillance: Alex Haw gives a talk at the Surveillance Symposium, London where he discusses the speculative idea of making surveillance visible to the public.
Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770Atmos
The document discusses several emerging technologies that could allow for new forms of surveillance and data collection, including sentiment analysis of internet users and brain fingerprinting. It notes that the FBI terrorist watchlist now contains over 900,000 names. The technologies described include using brain scans to detect familiarity with certain information and analyzing language patterns online to identify potential extremists or suicide bombers. Privacy groups are concerned about the potential for these methods to infringe on civil liberties.
Alex Haw lecture 140313 - University of Hertfordshire - Embellish -- Alex HawAtmos
over an hour of exploration into the evolution of our work at atmos - starting with Alex's last student project (his masters thesis exploring the translation of music into architecture - which the final project also explores). an evolution from the ethereal to the material.
Alex Haw Lecture - 100824 - Dortmund ISEA - Auto Atmospheres and Artificial e...Atmos
Auto Atmospheres and Artificial Ecologies: A lecture given at the ISEA Dortmund by Alex Haw about installations or pieces that generate different atmospheres and experiences once applied to the human body. The lecture continues to talk about how the projects at atmos studio challenge the experiences provided every day atmospheres. More can be seen at the link below:
http://www.isea2010ruhr.org/files/redaktion/pdf/isea2010_proceedings_p24_haw.pdf
Alex Haw Lecture - 1000507 - Manchester University - Rewire London - The Arch...Atmos
The Architecture of the Invisible: Alex Haw gave a lecture at Manchester University about a group of projects done by his practice, atmos studio.
http://www.slideshare.net/upload?from_source=loggedin_newsfeed
Alex Haw Lecture - 140212 - Design Museum - Atmos Works -589Atmos
This document appears to be a presentation by Alex Haw of their design studio Atmos. It includes sections titled Installations, Designs, and Homes which feature various projects by Atmos. The projects span a wide range of scales and types, including installations, spaces, maps, products, and homes. Images are included to showcase examples of Atmos' work across these different categories.
Alex haw lecture 140225 sustain ethical business network -- sustain?Atmos
A lecture on the broader design issues and opportunities facing sustainability, explore what we could expect from sustainability in our built and social environment, and asking questions like -
How can we enhance our engagements with the natural environment - and each other?
How can we make opportunities while we meet the responsibilities and challenges?
Where do beauty, pleasure and emotions fit in?
Alex Haw Lecture - 090527 - University of Technology Sydney - Smartlight Sydn...Atmos
Luminous Surveillance: In this lecture, Alex Haw, director of atmos talks about media technologies and how they spark creativity in his practice's design processes.
Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...Atmos
Sex and Movement, Space and Light: Alex Haw talks about sexuality and space from a human geography perspective and highlights the differences between different times and cultures.
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...Atmos
This document discusses various technologies related to surveillance and data collection, including how brain activity and internet data can be analyzed. It also mentions the use of electronic tags to track expensive meat in stores in anticipation of crime increases, and the goals and components of a project called COTS Dust that aims to create a network of environmental sensors using off-the-shelf parts.
Human tracking devices seem as though they are a long time to come, but in reality it is not as far away as most of us seem to think. Experiments have been conducted since the early to mid 1940\'s.
The document discusses the emerging threat of hardware trojans - malicious code implanted directly into computer chips during the manufacturing process. This could allow attackers to manipulate data, shut down systems, or turn devices into bugs. While difficult to do, it could be done by intelligence agencies or well-funded criminals. Experts are developing techniques like hardware modeling to detect trojans in chip designs before manufacturing. Government agencies are also releasing best practices for organizations to evaluate supplier trustworthiness and mitigate these risks.
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocationsferguspitt
This document summarizes a discussion on sensors in journalism that touched on the following key points:
1. A brief history of sensors being used in journalism including examples from the Beijing Olympics and environmental monitoring projects.
2. The types of data that can be sensed including location, environmental conditions, and personal health data.
3. The different modes of reporting with sensor data including journalists using sensors, citizens reporting data, and accessing data from infrastructure sensors.
4. Some of the legal and ethical issues around privacy, intellectual property, ensuring accuracy, and tensions between open data and individual privacy.
5. Several provocations around developing principles for an "Internet of Things Bill of Rights", standards for validating sensor
Dr. Murray presented current issues with IoT technologies at the Information Systems Security Association (ISSA). The ISSA Colorado Springs Chapter - Cyber Focus Day on Wednesday, March 25, 2015 at the University of Colorado Colorado Springs (UCCS). The theme for CFD 2015 was “Cybercrime”.
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
In-Depth Presentation for the Cybersecurity Workshop that was Jointly Organised by the UN/ITU and CITEL in Salta City, Argentina - November 2010. The presentation focuses on the implementation of the recommended UN/ITU (International Telecommunications Union) Global Cybersecurity Agenda and the importance of CERTs (Computer Emergency Response Teams)
Alex Haw Lecture - 081101 - Kiss: Castlefield Gallery, Manchester - Surveying...Atmos
This document discusses and summarizes information about surveillance practices and legislation in the UK and US. It outlines how lawful interception of communications has led to arrests and drug seizures. It also discusses new US guidelines encouraging police to question people photographing in public. The document summarizes UK institutions and legislation governing surveillance, exemptions allowing surveillance for crime prevention, and rights around organizational versus private surveillance. It also discusses future surveillance technologies like brain fingerprinting and sentiment analysis of internet users.
Alex Haw Lecture 130708 ETH Zurich - ALIVE conference - Building Nature -326Atmos
This document summarizes a presentation by Alex Haw from CAAD, ETH Zurich about designing structures that incorporate and are inspired by nature. Some key points discussed include letting nature inform design solutions, cultivating performance as both art and infrastructure, designing with global rhythms and information, and building nature through projects like the mobile orchard, timber tentacles structure, and London Leaves installation. The overall message is that the design process involves growing solutions that enhance interaction and inhabit data while embracing the body and celebrating nature.
Alex Haw Lecture - 081026 - Surveillance Symposium London - Surveying Surveil...Atmos
Surveying Surveillance: Alex Haw gives a talk at the Surveillance Symposium, London where he discusses the speculative idea of making surveillance visible to the public.
Alex Haw Lecture - 091017 - AA 1st Year - SECTS - 770Atmos
The document discusses several emerging technologies that could allow for new forms of surveillance and data collection, including sentiment analysis of internet users and brain fingerprinting. It notes that the FBI terrorist watchlist now contains over 900,000 names. The technologies described include using brain scans to detect familiarity with certain information and analyzing language patterns online to identify potential extremists or suicide bombers. Privacy groups are concerned about the potential for these methods to infringe on civil liberties.
Alex Haw lecture 140313 - University of Hertfordshire - Embellish -- Alex HawAtmos
over an hour of exploration into the evolution of our work at atmos - starting with Alex's last student project (his masters thesis exploring the translation of music into architecture - which the final project also explores). an evolution from the ethereal to the material.
Alex Haw Lecture - 100824 - Dortmund ISEA - Auto Atmospheres and Artificial e...Atmos
Auto Atmospheres and Artificial Ecologies: A lecture given at the ISEA Dortmund by Alex Haw about installations or pieces that generate different atmospheres and experiences once applied to the human body. The lecture continues to talk about how the projects at atmos studio challenge the experiences provided every day atmospheres. More can be seen at the link below:
http://www.isea2010ruhr.org/files/redaktion/pdf/isea2010_proceedings_p24_haw.pdf
Alex Haw Lecture - 1000507 - Manchester University - Rewire London - The Arch...Atmos
The Architecture of the Invisible: Alex Haw gave a lecture at Manchester University about a group of projects done by his practice, atmos studio.
http://www.slideshare.net/upload?from_source=loggedin_newsfeed
Alex Haw Lecture - 140212 - Design Museum - Atmos Works -589Atmos
This document appears to be a presentation by Alex Haw of their design studio Atmos. It includes sections titled Installations, Designs, and Homes which feature various projects by Atmos. The projects span a wide range of scales and types, including installations, spaces, maps, products, and homes. Images are included to showcase examples of Atmos' work across these different categories.
Alex haw lecture 140225 sustain ethical business network -- sustain?Atmos
A lecture on the broader design issues and opportunities facing sustainability, explore what we could expect from sustainability in our built and social environment, and asking questions like -
How can we enhance our engagements with the natural environment - and each other?
How can we make opportunities while we meet the responsibilities and challenges?
Where do beauty, pleasure and emotions fit in?
Alex Haw Lecture - 090527 - University of Technology Sydney - Smartlight Sydn...Atmos
Luminous Surveillance: In this lecture, Alex Haw, director of atmos talks about media technologies and how they spark creativity in his practice's design processes.
Alex Haw Lecture - 09301 - London Kinetic Art Fair - Sex and Movement, Space ...Atmos
Sex and Movement, Space and Light: Alex Haw talks about sexuality and space from a human geography perspective and highlights the differences between different times and cultures.
Alex Haw Lecture - 081106 - Welsh School of Architecture - a brief burst of a...Atmos
This document discusses various technologies related to surveillance and data collection, including how brain activity and internet data can be analyzed. It also mentions the use of electronic tags to track expensive meat in stores in anticipation of crime increases, and the goals and components of a project called COTS Dust that aims to create a network of environmental sensors using off-the-shelf parts.
Human tracking devices seem as though they are a long time to come, but in reality it is not as far away as most of us seem to think. Experiments have been conducted since the early to mid 1940\'s.
The document discusses the emerging threat of hardware trojans - malicious code implanted directly into computer chips during the manufacturing process. This could allow attackers to manipulate data, shut down systems, or turn devices into bugs. While difficult to do, it could be done by intelligence agencies or well-funded criminals. Experts are developing techniques like hardware modeling to detect trojans in chip designs before manufacturing. Government agencies are also releasing best practices for organizations to evaluate supplier trustworthiness and mitigate these risks.
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocationsferguspitt
This document summarizes a discussion on sensors in journalism that touched on the following key points:
1. A brief history of sensors being used in journalism including examples from the Beijing Olympics and environmental monitoring projects.
2. The types of data that can be sensed including location, environmental conditions, and personal health data.
3. The different modes of reporting with sensor data including journalists using sensors, citizens reporting data, and accessing data from infrastructure sensors.
4. Some of the legal and ethical issues around privacy, intellectual property, ensuring accuracy, and tensions between open data and individual privacy.
5. Several provocations around developing principles for an "Internet of Things Bill of Rights", standards for validating sensor
Dr. Murray presented current issues with IoT technologies at the Information Systems Security Association (ISSA). The ISSA Colorado Springs Chapter - Cyber Focus Day on Wednesday, March 25, 2015 at the University of Colorado Colorado Springs (UCCS). The theme for CFD 2015 was “Cybercrime”.
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
In-Depth Presentation for the Cybersecurity Workshop that was Jointly Organised by the UN/ITU and CITEL in Salta City, Argentina - November 2010. The presentation focuses on the implementation of the recommended UN/ITU (International Telecommunications Union) Global Cybersecurity Agenda and the importance of CERTs (Computer Emergency Response Teams)
Electronic Surveillance of Communications 100225Klamberg
The document discusses electronic surveillance of communications and legislation around signal intelligence. It provides context on changes in technology and threats that created demands for new legislation. It describes how signal intelligence works, including intercepting messages and metadata, as well as traffic analysis and social network analysis. Legislation in Sweden and other countries regulates agencies conducting signal intelligence and their mandates, clients, and oversight. Key aspects of Swedish law include the Defence Radio Establishment's mandate for surveillance, its clients and review mechanisms, methods like traffic analysis, and the scope of interception and data collection.
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...g8briel
In light of new revelations about government warrantless wiretapping and electronic surveillance what role do librarians have in educating our patrons about digital privacy and security issues? Given that digital privacy is further complicated by for-profit Internet companies services, such as those provided by Facebook and Google, are our users savvy enough to understand threats to their information in this increasingly complex digital landscape? This presentation will explore issues related to current events and information security with an eye towards the implications for information literacy standards; brief examination of tools used to enhance information privacy; and discuss how librarians might play a role in helping users become more information aware.
The document discusses the results of a study on the security of UK home Wi-Fi networks. Some of the key findings include:
- Nearly 40,000 home Wi-Fi networks were identified as being "high-risk" and vulnerable to hacking within 5 seconds due to a lack of encryption or weak security settings.
- The majority (82%) of people mistakenly believe their home network is secure, even though nearly a quarter have no password. Hackers can breach typical passwords in seconds.
- Only 4% of people know for certain their network has been used without permission, indicating most are unaware if their network has been accessed illegally.
- 18-24 year olds are the most
The document discusses various topics related to surveillance and privacy. It provides definitions and information on surveillance, privacy, and privacy laws. It discusses the history of surveillance in the US including the Watergate scandal. It also examines current and potential future uses of surveillance technology in public and private spaces, and discusses concerns about privacy raised by expanding surveillance capabilities.
TOTEM: Threat Observation, Tracking, and Evaluation ModelJohn Gerber
Merriam-Webster defines a totem as any supposed entity that watches over or assists a group of people, such as a family, clan, or tribe. In this presentation I will focus on how TOTEM assists in watching over and evaluating the threat an IP represents. The idea behind TOTEM is simple: compare threat information from sources such as watchlists (DShield, Emerging Threats, SenderBase, etc.) to activities with the organization (IDS/IPS, flow logs, etc.) and other locations (SANS ISC, DOE federated model, etc.). As new threat information and activity sources are added, a better evaluation can be rendered.
Privacy is being threatened by new technologies that collect and track personal data. Companies are developing facial recognition in phones and cameras, location tracking in vehicles, and smart home meters. The NSA also engages in mass surveillance programs like collecting cell phone metadata and infecting millions of devices with malware. While governments and businesses claim this data is used for security and research, it often leads to abuses of power over individuals. Strong privacy laws and oversight of data collection are needed to curb these threats and restore trust between technology and users.
Could your iPhone be used to make you sick or your Amazon Echo rip off your bank account? Imagine yourself waking up in your own home with what seemed to be a migraine headache never having any major head trauma or any real health issues before. You would take an aspirin and when the excruciating pain persisted you would see your doctor but your doctor could not help.
The document discusses various topics related to surveillance, including Jeremy Bentham's Panopticon model of surveillance, increased surveillance of both public and virtual spaces, and examples of creative practitioners using online strategies to critique surveillance and globalization. It also shares several news articles about issues like government censorship of Wikipedia, data breaches at the tax office, and a student cracking the government's internet porn filter.
Modern policing is being transformed by new technologies that help solve, prevent, and enable new forms of crime. Surveillance cameras are becoming more widespread and advanced, using facial recognition and the ability to track suspects. New forensic techniques like DNA analysis and digital evidence collection are helping identify criminals. The role of intelligence analysts is growing to understand new threat environments and develop police strategies. Wearable cameras on officers and digital recordings of interrogations are increasing transparency and accountability.
The detection of human beings in a camera attracts more attention because of its wide range of applications such as abnormal event detection, person counting in a dense crowd, person identification, fall detection for care to elderly people, etc. Over the time, various techniques have evolved to enhance the visual information. This article presents a novel 3-D intelligent information system for identifying abnormal human activity using background subtraction, rectification, morphology, neural networks and depth estimation with a thermal camera and a pair of hand held Universal Serial Bus (USB) camera to visualize un-calibrated images. The proposed system detects strongest points using Speed-Up Robust Features (SURF). The Sum of Absolute Difference (SAD) algorithm match the strongest points detected by SURF. 3-D object model and image stitching from image sequences are carried out in the proposed work. A series of images captured from different cameras are stitched into a geometrically consistent mosaic either horizontally/vertically based on the image acquisition. 3-D image and depth estimation of un-calibrated stereo images are acquired using rectification and disparity. The background is separated from the scene using threshold approach. Features are extracted using morphological operators in order to get the skeleton. Junction points and end points of the skeleton image are obtained from the skeleton. Data set of abnormal human activity is created using supervised learning such as neural network with a thermal camera and a pair of webcam. The feature vector of an activity is compared with already created data set, if a match occurs the classifier detects abnormal human activity. Additionally the proposed algorithm performs depth estimation to measure real time distance of objects dynamically. The system use thermal camera, Intel computing stick, converter, video graphics array (VGA) to high-definition multimedia interface (HDMI) and webcams. The proposed novel intelligent information system gives 94% maximum accuracy and 89% minimum accuracy for different activities, thus it effectively detects suspicious activity during day and night.
Similar to Alex Haw Lectures - 090826 - ISEA - Belfast - Digital Optics and Surveillance-513 (20)
Alex Haw lecture-160901-The Building Centre-Adaptive StructuresAtmos
a 5-minute presentation for a panel discussion
http://www.buildingcentre.co.uk/events/adaptive-structures-the-future-of-our-built-environment
http://expedition.uk.com/thinking/a-new-design-philosophy-adaptive-structures/
"As part of the Adaptive Structures exhibition, this panel discussion will reflect the possibilities offered by the new engineering design paradigm of adaptive structures.
Expert speakers will explore the meaning of adaptability from both experiential and environmental perspectives.
Speakers include:
- Mike Davies, founding partner of RSH+P
- Stephen Fox, chief executive of BAM Nuttall Ltd
- Alex Haw, director of Atmos Studio
- Ed McCann, director of Expedition Engineering
- John Prewer, architect and designer at Gamechanger Technologies
- Gennaro Senatore, research associate at University College London
- Jane Wernick, director of Jane Wernick Associates
- Chair: Lewis Blackwell, executive director of strategy and development at The Built Environment Trust
This event is free to attend but booking is essential.
Background information
Despite huge technological advancements all around, the way everyday building structures are designed has not changed fundamentally for over 100 years;
design a structure to be strong,
and then check to make sure it does not move around too much.
Why should the built environment industry not rethink this basic assumption?
Recent research and development led by Gennaro Senatore of University College London in collaboration with Expedition Engineering, has demonstrated that unlike conventional structures, adaptive structures can successfully change their shape to prevent excessive movement caused by loads, indicating that we could now achieve super-slender structures that use much less material, less whole-life energy and achieve very high levels of performance.
But is this practical in the real world?"
Alex Haw lecture 160411 - Museum of Architecture - Mobile OrchardAtmos
This document outlines several light art installations created by Atmos Studio including Lighthive which uses light to represent people, Lightfall which represents crowds of people with light, and The Cloud which represents data with light. It also lists other installations like Worldscape that represents populations with light, Arboreal Lightning that uses light as a gesture, and Mobile Orchard that represents rhythm with light. The document promotes Atmos Studio's work in using light-based art and design for cities.
Alex Haw Lecture 151014 - IoM - Lighthouse Glasgow - 573Atmos
A lecture for a conference organised by the Institute for Organic Materials & the Natural Materials Association at the Lighthouse, Glasgow on Sustainability in Natural Materials (14.10.15)
Alex Haw lecture 150511 - Digital Shoreditch - Making Trees Of Light - 308Atmos
an overview of recent work at atmos, focussing on Arboreal Lightning for the Camden Roundhouse, and ending with the Nepalese Fundraiser dinner that Alex Haw co-organised to raise almost £27k post earthquake
video at https://www.youtube.com/watch?v=QxUMPIb-1ys
Alex Haw lecture 150126 -- plexus - The Bartlett, UCL - Arboreal LightningAtmos
This document contains a list of terms related to various artistic and technological concepts proposed by Atmos Studio, including Imogen, Seeds, Lighthive, Lumiskin, Worldscape, Roominaroom, and Floating Forest. At the bottom is the overarching concept of "Arboreal Lightning" and the studio's website.
Alex Haw Lecture 140214 Fabricate 2014 - Mobile Orchard -288Atmos
lecture delivered 3pm 14/2/14 as part of the "Material Exuberance " session, Fabricate 2014
http://www.fabricate2014.org/alex-haw/
video : http://www.youtube.com/watch?v=mQy9XhC8S0o
8 pages in associated publication :
http://files.atmosstudio.com/public/217-140213-Fabricate2014_pp158-165.pdf
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise boosts blood flow, releases endorphins, and promotes changes in the brain which help enhance one's emotional well-being and mental clarity.
Alex Haw Lecture - 081205 - University of East London Smart Lab - Future Door...Atmos
The document discusses how expanding one's perceptions can lead to greater wisdom and understanding. It references William Blake's idea that if people's perceptions were "cleansed" they would see that everything is infinite. It then discusses Aldous Huxley's concept of "The Door in the Wall," saying that those who pass through it emerge wiser, happier, and more aware of the limitations of knowledge compared to the inherent "mystery" of existence.
Alex Haw Lectures - 100207 - Kinetic Art Fair - Radiation and Aggregation - 163Atmos
Radiation and Aggregation: Alex Haw gave a lecture at the Kinetic Art Fair 2010, see more on the following lingk http://en.oreilly.com/et2009/public/schedule/speaker/32868
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Alex Haw Lectures - 090826 - ISEA - Belfast - Digital Optics and Surveillance-513
1.
2. digital optics & surveillance
@
ISEA 09 Belfast
alex haw - atmos
26 08 . 09
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20. In June America’s Departments of Justice and Homeland Security
and a grouping of American police chiefs released the “Suspicious
Activity Report—Support and Implementation Project”.
Inspired in part by the approach of the Los Angeles Police
Department, it urges police to question people who, among other
things, use binoculars, count footsteps, take notes, draw diagrams,
change appearance, speak with security staff, and photograph
objects “with no apparent aesthetic value.”
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55. P300 "Brain Fingerprinting": A Very Freaky Future Indeed
http://jeffjonas.typepad.com/jeff_jonas/2007/01/p300_brain_fing.html
We may not be far away from the thoughtcrime described in 1984.
“Apparently, your brain creates a very specific electrical brain
response, known as P300, when one is presented with information
that is already contained in one’s mind.
If you recognize the information (i.e., it is familiar to you), you will
have a P300 response. There is no way to avoid this; it is a
biological/electrical stimulus response event. Sort of like a lie
detector, only (reportedly) always accurate.
P300 is already being used in court as admissible evidence by both
defense and prosecuting attorneys.” On March 5, 2001
Pottawattamie County, Iowa District Court Judge Tim O'Grady ruled
that Brain Fingerprinting® testing is admissible in court.
56. Hsinchun Chen, head of the Artificial Intelligence Lab at the
University of Arizona says “sentiment analysis”, which he performs
for American and international intelligence agencies, is an emerging
and booming field.
The goal is to identify changes in the behaviour and language of
internet users that could indicate that angry young men are becoming
potential suicide-bombers.
The American Civil Liberties Union (ACLU), a lobby, says the list
maintained by the Terrorist Screening Centre at the FBI now has
more than 900,000 names, with 20,000 more every month.
Abdul Bakier, a former official in Jordan’s General Intelligence
Department, says that tips to foil data-mining systems are discussed
at length on some extremist online forums. Tricks such as calling
phone-sex hotlines can help make a profile less suspicious.
57.
58. “Meat tagged in readiness for crime surge”
20 October 08
Alan Hyder
“Retailers preparing for a rapid rise in crime due to the credit crunch
are placing electronic tags on expensive cuts of meat.”
59.
60.
61.
62.
63.
64. COTS Dust
GOALS:
• Create a network of sensors
• Explore system design issues
• Provide a platform to test Dust
components
• Use off the shelf components
65. COTS Dust - RF Motes
– Atmel Microprocessor
– RF Monolithics transceiver
• 916MHz, ~20m range, 4800 bps
– 1 week fully active, 2 yr @1%
N
W
E
S
2 Axis Magnetic
Sensor
2 Axis Accelerometer
Light Intensity
Sensor
Humidity Sensor
Pressure Sensor
Temperature Sensor