Here are the slides from a Barcamp Omaha talk I presented on September 8, 2012 about avatars. It is complete with a misspelling of my own name.
The fonts got a little gross and the animated gifs aren't animating.
http://imgur.com/q2tqz
Inspira graphics- The Brilliant DesignersSBL DIGITAL
Best Designers, a Unit of Solace Biotech Limited. Here in Inspira Graphics, We used to design Creative Company Logos, Product Packaging, Visual Aids, Corporate Stationary Designing, Brochures, Leaflets, Banners, Posters & Standy and all are on reasonable prices. This slide show is showing few of the Visuals which are made by our team. CONTACT FOR ANY SORT OF DESIGNING WORKS.
This short document promotes a website selling headphones and encourages visiting http://www.monsterbeatsbydrepro.com/ to find more gorgeous headphones for sale.
Summary of secondary research improvementsLewisB2013
The document summarizes research conducted in various media to inform concept art for characters, environments, and weapons for a fantasy game. It includes summaries of research done on weapons, environments, characters from films and games, and print media. This research provided ideas on sword and shield designs to match characters, environment color palettes, peculiar armor styles and varied character proportions, and characters from works like Thor and Witcher 3.
The document summarizes research conducted for a game concept project. It includes summaries of research into weapon art, environment art, character art, films, and games. The weapon art research led to the conclusion that drawings will mostly feature swords and shields matching each character's theme. The environment art research involved collecting ideas to create concept art using color palettes. The character art research indicated continuing to design characters wearing peculiar armor in different proportions. The film research examined real character proportions. And the game research analyzed character and weapon designs from medieval fantasy games.
Summary of secondary research improvementsLewisB2013
The document summarizes research conducted in various media to inform the creation of concept art for characters, environments, and weapons for a fantasy game. It describes analyzing weapon concept art to draw swords and shields matching character themes. It also discusses collecting environment ideas to create concept art using color palettes. Additionally, it mentions looking at films, games, and print media to find inspiration for characters of varying proportions and armor styles to make the concepts believable.
The document summarizes research conducted for a fantasy art project. It includes summaries of research into weapons, environments, characters, films, and games. The research will inform the creation of concept art for characters, weapons, and environments with unique proportions and styles that match different character themes. Color palettes and ideas from the environment research will be used to create a fantasy world in a game engine.
The document summarizes research conducted for a fantasy art project. It includes summaries of research into weapons, environments, characters, films, and games. For weapons, the artist concluded they will draw swords and shields to match character themes. For environments, they will use collected ideas to create concept art in Gamemaker Engine. For characters, they will continue creating peculiar armor and differently proportioned bodies based on sketches. Film research involved judging proportions for believable characters. Game research looked at varied character proportions to aid drawing characters and weapons.
The document summarizes research conducted in various areas to inform the creation of concept art for a game project. It discusses researching weapons and shields to match character themes. It also discusses researching environment concepts using color palettes and researching character proportions by looking at sketches, armor styles, and films. Game research on medieval fantasy titles was also summarized to help with drawing characters and weapons.
Inspira graphics- The Brilliant DesignersSBL DIGITAL
Best Designers, a Unit of Solace Biotech Limited. Here in Inspira Graphics, We used to design Creative Company Logos, Product Packaging, Visual Aids, Corporate Stationary Designing, Brochures, Leaflets, Banners, Posters & Standy and all are on reasonable prices. This slide show is showing few of the Visuals which are made by our team. CONTACT FOR ANY SORT OF DESIGNING WORKS.
This short document promotes a website selling headphones and encourages visiting http://www.monsterbeatsbydrepro.com/ to find more gorgeous headphones for sale.
Summary of secondary research improvementsLewisB2013
The document summarizes research conducted in various media to inform concept art for characters, environments, and weapons for a fantasy game. It includes summaries of research done on weapons, environments, characters from films and games, and print media. This research provided ideas on sword and shield designs to match characters, environment color palettes, peculiar armor styles and varied character proportions, and characters from works like Thor and Witcher 3.
The document summarizes research conducted for a game concept project. It includes summaries of research into weapon art, environment art, character art, films, and games. The weapon art research led to the conclusion that drawings will mostly feature swords and shields matching each character's theme. The environment art research involved collecting ideas to create concept art using color palettes. The character art research indicated continuing to design characters wearing peculiar armor in different proportions. The film research examined real character proportions. And the game research analyzed character and weapon designs from medieval fantasy games.
Summary of secondary research improvementsLewisB2013
The document summarizes research conducted in various media to inform the creation of concept art for characters, environments, and weapons for a fantasy game. It describes analyzing weapon concept art to draw swords and shields matching character themes. It also discusses collecting environment ideas to create concept art using color palettes. Additionally, it mentions looking at films, games, and print media to find inspiration for characters of varying proportions and armor styles to make the concepts believable.
The document summarizes research conducted for a fantasy art project. It includes summaries of research into weapons, environments, characters, films, and games. The research will inform the creation of concept art for characters, weapons, and environments with unique proportions and styles that match different character themes. Color palettes and ideas from the environment research will be used to create a fantasy world in a game engine.
The document summarizes research conducted for a fantasy art project. It includes summaries of research into weapons, environments, characters, films, and games. For weapons, the artist concluded they will draw swords and shields to match character themes. For environments, they will use collected ideas to create concept art in Gamemaker Engine. For characters, they will continue creating peculiar armor and differently proportioned bodies based on sketches. Film research involved judging proportions for believable characters. Game research looked at varied character proportions to aid drawing characters and weapons.
The document summarizes research conducted in various areas to inform the creation of concept art for a game project. It discusses researching weapons and shields to match character themes. It also discusses researching environment concepts using color palettes and researching character proportions by looking at sketches, armor styles, and films. Game research on medieval fantasy titles was also summarized to help with drawing characters and weapons.
Here is our pitch for Startup Weekend Omaha.
http://www.youtube.com/watch?v=rqX3h0Pg2Ss
Small Potatoes is an online garden surplus for the neighborhood. Anyone who loves locally grown produce can connect with their neighborhood gardeners, purchase their excess harvest, and support their hyper-local food community.
Oh hey!
In this presentation I create a timeline of my entire life and draw themes from life events.
This slide deck doesn't tell the whole story without the rest of the presentation, but I hope you enjoy it anyway.
Weeeeeeeee!
John Henry Müller
P.S. The animated version of slide 206 can be found here:
http://i.imgur.com/q2tqz.gif
-----
TL;DR version:
Life is simple. Make things. Work hard. Be nice.
The document discusses the definition and origins of avatars in Hinduism as incarnations of gods, and how this relates to technological avatars in virtual worlds where users have a virtual body. It explores how emerging technologies are shifting communication from asynchronous to synchronous and representation-based to experience-based, bringing meaning-making back into our bodies through co-creation in shared virtual spaces. The conclusion suggests we may be nearing the end of a media cycle with this rise of simultaneous culture and experience-based relationships online and in virtual worlds.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
The document discusses how personalization and dynamic content are becoming increasingly important on websites. It notes that 52% of marketers see content personalization as critical and 75% of consumers like it when brands personalize their content. However, personalization can create issues for search engine optimization as dynamic URLs and content are more difficult for search engines to index than static pages. The document provides tips for SEOs to help address these personalization and SEO challenges, such as using static URLs when possible and submitting accurate sitemaps.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Here is our pitch for Startup Weekend Omaha.
http://www.youtube.com/watch?v=rqX3h0Pg2Ss
Small Potatoes is an online garden surplus for the neighborhood. Anyone who loves locally grown produce can connect with their neighborhood gardeners, purchase their excess harvest, and support their hyper-local food community.
Oh hey!
In this presentation I create a timeline of my entire life and draw themes from life events.
This slide deck doesn't tell the whole story without the rest of the presentation, but I hope you enjoy it anyway.
Weeeeeeeee!
John Henry Müller
P.S. The animated version of slide 206 can be found here:
http://i.imgur.com/q2tqz.gif
-----
TL;DR version:
Life is simple. Make things. Work hard. Be nice.
The document discusses the definition and origins of avatars in Hinduism as incarnations of gods, and how this relates to technological avatars in virtual worlds where users have a virtual body. It explores how emerging technologies are shifting communication from asynchronous to synchronous and representation-based to experience-based, bringing meaning-making back into our bodies through co-creation in shared virtual spaces. The conclusion suggests we may be nearing the end of a media cycle with this rise of simultaneous culture and experience-based relationships online and in virtual worlds.
How to Build a Dynamic Social Media PlanPost Planner
Stop guessing and wasting your time on networks and strategies that don’t work!
Join Rebekah Radice and Katie Lance to learn how to optimize your social networks, the best kept secrets for hot content, top time management tools, and much more!
Watch the replay here: bit.ly/socialmedia-plan
http://inarocket.com
Learn BEM fundamentals as fast as possible. What is BEM (Block, element, modifier), BEM syntax, how it works with a real example, etc.
The document discusses how personalization and dynamic content are becoming increasingly important on websites. It notes that 52% of marketers see content personalization as critical and 75% of consumers like it when brands personalize their content. However, personalization can create issues for search engine optimization as dynamic URLs and content are more difficult for search engines to index than static pages. The document provides tips for SEOs to help address these personalization and SEO challenges, such as using static URLs when possible and submitting accurate sitemaps.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16