Take a look at the latest crime facts and statistics from the FBI and other agencies, so you can be prepared and stay projected.
http://www.supercircuits.com/resources/blog/learn-the-facts-about-crime
Intelligence chief defends internet spying programabiross34
WASHINGTON (AP) — Eager to quell a domestic furor over U.S. spying, the nation’s top intelligence official stressed Saturday that a previously undisclosed program for tapping into Internet usage is authorized by Congress, falls under strict supervision of a secret court and cannot intentionally target a U.S. citizen. He decried the revelation of that and another intelligence-gathering program as reckless.
For the second time in three days, Director of National Intelligence James Clapper took the rare step of declassifying some details of an intelligence program to respond to media reports about counterterrorism techniques employed by the government.
‘‘Disclosing information about the specific methods the government uses to collect communications can obviously give our enemies a ‘playbook’ of how to avoid detection,’’ he said in a statement.
Intelligence chief defends internet spying programabiross34
WASHINGTON (AP) — Eager to quell a domestic furor over U.S. spying, the nation’s top intelligence official stressed Saturday that a previously undisclosed program for tapping into Internet usage is authorized by Congress, falls under strict supervision of a secret court and cannot intentionally target a U.S. citizen. He decried the revelation of that and another intelligence-gathering program as reckless.
For the second time in three days, Director of National Intelligence James Clapper took the rare step of declassifying some details of an intelligence program to respond to media reports about counterterrorism techniques employed by the government.
‘‘Disclosing information about the specific methods the government uses to collect communications can obviously give our enemies a ‘playbook’ of how to avoid detection,’’ he said in a statement.
We take a look at the most recent FBI Uniform Crime Report data and analyze the type of crimes being committed. We also explore the safest states and cities in the US as well as provide helpful safety tips for those looking to be more secure.
Marijuana Legalization Helps Solve Violent Crimes Says New StudyEvergreen Buzz
Yes, weed can help, read this https://cannabis.net/blog/news/cannabis-legalization-helps-police-solve-more-violent-crime-cases-says-latest-oregon-study
Lack of Communication, Resources, Trust As Well As Political Interference And...AJHSSR Journal
Crime continues to be a serious problem in South Africa, as the country ranks 3rd on the global
crime index as at 2016. The damaging impact of crime on the safety and security of communities, peace and
stability in the country as well as its effect on the country’s reputation among potential international tourists and
investors, and how all these affect the general quality of life of ordinary citizens need no emphasis. Crime
solutions that work and are cost effective remain elusive. However, due to its success in reducing crime rates in
different parts of the world since its introduction in the United States of America during the 1970s, community
policing is now a standard ideological and policy model guiding mission statements, goals, and reform programs
of most policing agencies across the world. Regardless of its enviable status in the practicing of policing, more
than twenty (20) years after the attainment of democracy, the question beckons whether the inception of
community policing and particularly community policing forums is an effective strategy within the South
African communities to combat and prevent crime. This paper draws from the work of a PhD thesis, submitted
at the University of KwaZulu-Natal. The primary objective of this paper is to explore the challenges of CPFs in
combating crime in two dissimilar residential locations in Durban.A qualitative research approach was adopted,
the findings collected through focus group discussions and semi-structured interviews with a total number of
fifty-five (55) participants comprising of South African Police Service (SAPS) and CPFs representatives,
political leaders and ordinary members of the two communities suggest limited knowledge of and affinity to
CPFs by community members. This owes partly to lack of communication, resources, trust, as well as political
interference and SAPS organisational culture, which affect the functioning of these CPFs. Together, these
findings suggest that more effort is needed from both the community and the police for an effective functioning
of the CPFs.
The growing crime and terrorism in different format is a concern of government and people. Bangladesh government may constitute a committee with strong moral persons to investigate similar study like India,if the is any co-operation between criminals, government officials and politicians.
Background Investigations: A Primer for Nonprofits
Volunteers are an integral part of society. Unfortunately there is that small percent of volunteer contact that is actually harmful. Volunteers are not the only segment that nonprofits need to be concerned with. Employees and board members can also harm an organization and its clientele.
Savvy nonprofit organizations realize that there are ways to mitigate the risk of letting the wrong person be a volunteer, employee, or board member; in turn mitigating the risk of fraud, abuse, illegal activity, and negative influence. Background investigations are one of the best ways to mitigate those risks.
Savvy nonprofit organizations also realize that a properly implemented background investigations policy and procedure carries with it the concerns of being time consuming, requires the gathering of sensitive data, is paper heavy, and can be costly.
Learn how to implement an effective volunteer, employee and board background investigations policy and procedure, while learning the ins and outs of background investigations, how to evaluate current background investigations, and how to get buy in from within your organization to enhance or implement a background investigations program.
We take a look at the most recent FBI Uniform Crime Report data and analyze the type of crimes being committed. We also explore the safest states and cities in the US as well as provide helpful safety tips for those looking to be more secure.
Marijuana Legalization Helps Solve Violent Crimes Says New StudyEvergreen Buzz
Yes, weed can help, read this https://cannabis.net/blog/news/cannabis-legalization-helps-police-solve-more-violent-crime-cases-says-latest-oregon-study
Lack of Communication, Resources, Trust As Well As Political Interference And...AJHSSR Journal
Crime continues to be a serious problem in South Africa, as the country ranks 3rd on the global
crime index as at 2016. The damaging impact of crime on the safety and security of communities, peace and
stability in the country as well as its effect on the country’s reputation among potential international tourists and
investors, and how all these affect the general quality of life of ordinary citizens need no emphasis. Crime
solutions that work and are cost effective remain elusive. However, due to its success in reducing crime rates in
different parts of the world since its introduction in the United States of America during the 1970s, community
policing is now a standard ideological and policy model guiding mission statements, goals, and reform programs
of most policing agencies across the world. Regardless of its enviable status in the practicing of policing, more
than twenty (20) years after the attainment of democracy, the question beckons whether the inception of
community policing and particularly community policing forums is an effective strategy within the South
African communities to combat and prevent crime. This paper draws from the work of a PhD thesis, submitted
at the University of KwaZulu-Natal. The primary objective of this paper is to explore the challenges of CPFs in
combating crime in two dissimilar residential locations in Durban.A qualitative research approach was adopted,
the findings collected through focus group discussions and semi-structured interviews with a total number of
fifty-five (55) participants comprising of South African Police Service (SAPS) and CPFs representatives,
political leaders and ordinary members of the two communities suggest limited knowledge of and affinity to
CPFs by community members. This owes partly to lack of communication, resources, trust, as well as political
interference and SAPS organisational culture, which affect the functioning of these CPFs. Together, these
findings suggest that more effort is needed from both the community and the police for an effective functioning
of the CPFs.
The growing crime and terrorism in different format is a concern of government and people. Bangladesh government may constitute a committee with strong moral persons to investigate similar study like India,if the is any co-operation between criminals, government officials and politicians.
Background Investigations: A Primer for Nonprofits
Volunteers are an integral part of society. Unfortunately there is that small percent of volunteer contact that is actually harmful. Volunteers are not the only segment that nonprofits need to be concerned with. Employees and board members can also harm an organization and its clientele.
Savvy nonprofit organizations realize that there are ways to mitigate the risk of letting the wrong person be a volunteer, employee, or board member; in turn mitigating the risk of fraud, abuse, illegal activity, and negative influence. Background investigations are one of the best ways to mitigate those risks.
Savvy nonprofit organizations also realize that a properly implemented background investigations policy and procedure carries with it the concerns of being time consuming, requires the gathering of sensitive data, is paper heavy, and can be costly.
Learn how to implement an effective volunteer, employee and board background investigations policy and procedure, while learning the ins and outs of background investigations, how to evaluate current background investigations, and how to get buy in from within your organization to enhance or implement a background investigations program.
Eduardo Íñiguez, Associate Director Client Services, Iberia & LatAm, reflexiona sobre la importancia de los "insights" para volver a la esencia del branding.
June 2012 1HBCT" Devils Corner" Brigade NewsletterNoel Waterman
The Devil’s Corner 1HBCT Monthly Newsletter is now available and can be found on the 1HBCT webpage on the 1st Infantry Division website at http://www.riley.army.mil/UnitPage.aspx?unit=1bct due to the size, please click on the link to read. We are always up and posting new information on FaceBook! Join us on the Official 1HBCT FaceBook Page at www.facebook.com/1HBCTDEVILBRIGADE?v=wall&ref-sgm.
In this issue you will find:
*We are on the web
*Devil 6 Comments
*Devil 7 Comments
*Chaplains Corner
*FRSA Contact Information
*What makes you?
*Soldier highlights
*Victory Week Results
*Devil Stakes
*Calling all Commander and 1SG Spouse Seminar
*Big Red One Soldiers take part in CLS Training
*Gary Sinise and the Lieutenant Dan Band Free Concert
*Defiant Soldiers, Trained, Ready for next phase of Reset
*Dreadnaught Soldier Receives MOVSM with Silver Star
*Custer Hill Golf Course Summer Events
*Army Family Team Building Training
*2012 Summer Kids Series at the Movies
*Band of Brothers
*The US Army Soldier Show – get your free tickets
*Dining Facility Weekend and holiday Schedule
*K-State Extension offers cooking classes
*Victory Week 2012- One to Remember
*Sundown Salute Information
*1HBCT t-shirt and glass sales
*Crimes and Punishments
* Don’t deal with a problem alone. Reach out a helping hand
Sweaty palms, quivering voice and brain cramps delivering a painless presenta... Colorado State Library
Do you find the idea of speaking in front of people to rank right up there with poking your eyes out? Relax, you aren’t alone! Delivering a presentation can be a frightening experience but if you’re prepared it can be utterly painless! This session will help you size up your audience and identify their needs. You will learn how to fine tune your delivery. We’ll also address ways to make presentations painless for your audience, by reviewing common design issues, and working through ways to remedy them.
These PowerPoint presentations are intended for use by crime prevention practitioners who bring their experience and expertise to each topic. The presentations are not intended for public use or by individuals with no training or expertise in crime prevention. Each presentation is intended to educate, increase awareness, and teach prevention strategies. Presenters must discern whether their audiences require a more basic or advanced level of information.
NCPC welcomes your input and would like your assistance in tracking the use of these topical presentations. Please email NCPC at trainings@ncpc.org with information about when and how the presentations were used. If you like, we will also place you in a database to receive updates of the PowerPoint presentations and additional training information. We encourage you to visit www.ncpc.org to find additional information on these topics. We also invite you to send in your own trainer notes, handouts, pictures, and anecdotes to share with others on www.ncpc.org.
Student #1 I have chosen to write about the history of data anal.docxjohniemcm5zt
Student #1
I have chosen to write about the history of data analysis for the Los Angeles Police Department. While I currently reside in Colorado Springs, Colorado and work as a deputy sheriff in Denver, Colorado I grew up in the greater Los Angeles area and I know that they should have a large amount of data to draw from.
Currently the Los Angeles Police Department uses COMPSTAT to compile their data. They have a unit, known as the COMPSTAT unit, whose sole job is to compile crime statistics and analyze the data (Los Angeles Police Department, 2016) COMPSTAT is short for computer statistics. COMPSTAT was developed by Police Commissioner William Bratton in 1994 for use by the New York Police Department. According to the University of Maryland by the year 2000 over a third of police agencies with over 100 officers were utilizing some sort of COMPSTAT like program (University of Maryland, 2015). In 2002 William Bratton became the Chief of Police for the Los Angeles Police Department and brought with him the concept of COMPSTAT. During the first six years of his tenure Los Angeles saw a steady decrease in the cities crime rates thanks largely in part to COMPSTAT policing.
Mean, mode and median play a large part in analyzing criminal data. The mean is the average number. An example of this for crime data analysis would be in neighborhood C there was 14 robberies committed on Monday between 1 and 3 AM, 17 robberies on Tuesday at the same time period and 9 on Wednesday during the same time period. The mean would be 13.3 robberies per night for those 3 nights. Knowing this is high for the city the data could be used to justify extra police presence in Neighborhood C. An example of the mode would be if in the same neighborhood in the same week there were 17 robberies on both Friday and Saturday, 12 on Thursday and 11 on Sunday. The mode would be 17 and it would also be a reason to add extra police presence in the neighborhood until a significant decrease was seen in the amount of robberies taking place. Finally we come to the median. This is simply line the numbers up for the week and take the number that falls in the middle. In the case of the robberies occurring in neighborhood C the number would be 14. All of this data can be combined to show watch commanders and captain’s areas where they should be focusing their officer’s time. If there is a neighborhood that has seen only one or two robberies during the week, it is definitely not in as much need of a heavy police presence as Neighborhood C is.
Student #2
Beginning in the mid-1990’s, police in New York began to run statistical analysis of the city’s crime reports, arrests and other police activity known as COMPSTAT. Law enforcement agencies since this analysis began, has implemented their own data-driven approaches to tracking and adapting to crime trends. The LAPD is both heavily armed and thoroughly computerized. The Real-Time Analysis and Critical Response Division is its central processor..
3Victimization inthe United StatesAn OverviewCHAPTE.docxtamicawaysmith
3
Victimization in
the United States:
An Overview
CHAPTER OUTLINE
Crime in the Streets: The Big Picture
The Use and Abuse of Statistics
Making Sense of Statistics
The Two Official Sources of Victimization Data
A First Glance at the Big Picture: Estimates of the
Number of New Crime Victims per Year
A Second Glance at the Big Picture: Looking at the
FBI’s Crime Clock
Taking Another Glance at the Big Picture: Looking at
Victimization Rates
Focusing on the Federal Bureau of Investigation’s
Uniform Crime Report
Focusing on the Bureau of Justice Statistics’ National
Crime Victimization Survey (NCVS)
Comparing the UCR and the NCVS
Tapping into the UCR and the NCVS to Fill in the
Details of the Big Picture
Searching for Changes in the Big Picture: Detecting
Trends in Interpersonal Violence and Theft
Taking a Global View: Making International Comparisons
Putting Crime into Perspective: The Chances of Dying
Violently—or From Other Causes
Summary
Key Terms Defined in the Glossary
Questions for Discussion and Debate
Critical Thinking Questions
Suggested Research Projects
LEARNING OBJECTIVES
To find out what information about crime victims is
collected routinely by the federal government’s
Department of Justice.
To become familiar with the ways that victimologists
use this data to estimate how many people were
harmed by criminal activities and what injuries and
losses they suffered.
To become aware of the kinds of information about
victims that can be found in the Federal Bureau of
Investigation’s annual Uniform Crime Report.
continued
58
R
O
D
D
Y
,
A
N
T
H
O
N
Y
I
S
A
A
C
3
7
2
7
B
U
CRIME IN THE STREETS: THE BIG
PICTURE
Victimologists gather and interpret data to answer
questions such as: How many people are harmed by
criminals each year? How rapidly are the ranks of
people who have suffered misfortunes growing?
And, a matter of particular concern, which groups
are targeted the most and the least often? Research-
ers want to find out where and when the majority
of crimes occur, whether predators on the prowl
intimidate and subjugate their prey with their bare
hands or use weapons, and if so, what kinds? Victi-
mologists also want to determine whether indivi-
duals are attacked by complete strangers or people
they know, and how these intended targets act
when confronted by assailants. What proportion
try to escape or fight back, how many are injured,
what percentage need to be hospitalized, and how
much money do they typically lose in an incident?
The answers to basic questions like these, when
taken together, constitute what can be termed the
big picture—an overview of what is really happen-
ing across the United States during the twenty-first
century. The big picture serves as an antidote to
impressions based on direct but limited personal
experiences, as well as self-serving reports circulated
by organizations with vested interests, misleading
media images, crude stereotypes, and widely held
myths. But putting toge ...
DVR Networking: How to Connect Your DVR to the LANChristian Watson
View step-by-step instructions for connecting your DVR to the LAN, along with screen shots.
http://www.supercircuits.com/resources/learn/dvr-networking-guide/connecting-your-dvr-to-the-lan
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring ProgramChristian Watson
Case study shows how the Dallas Police Department established a covert vehicle program that included covert vehicle monitoring systems to catch car thieves.
6 Steps To protect your baby’s IP camera from HACKERSChristian Watson
There are many ways that your baby can be unsafe that you aren't aware of, and hacking an IP camera is one way hackers can invade your privacy. Keep them safe by recognizing these 6 tips
Common tactics to circumvent illegal border crossing, and effective deterrents of law enforcement to combat them.
When border security comes to mind, people typically think of long lines at border crossing stations, fence lines, and the reported apprehension of illegal immigrants. Although those quintessential images accurately depict daily life at the border, they certainly don’t tell the whole story.
As a private, non-profit organization, Starr Ranch and its parent organization depend on private funding. Encouraging financial support is an ongoing objective at Starr Ranch. Programs and activities that involve and build a fan base from the larger community are essential.
One effective way to encourage people to conserve and support nature in general, and Starr Ranch in particular, is by engaging them virtually—with live video of wildlife living on the Sanctuary.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
1. Be Prepared: Get the Real Facts on Crime
Have you heard the theory “Most crime doesn’t make the news”? According to national statistics,
every 22 seconds a violent crime occurs, varying from assault, to rape, to murder. Property
crimes such as burglary, larceny, auto theft, and more occur every 3 seconds. That's over a
million violent crimes and over 9 million property crimes per year.
Clearly, the media covers just a fraction of these events. Given today’s competitive market and
the public’s need for instantaneous information, news outlets simply don't have the time to cover
even a third of criminal events. Generally they focus on what sells; events like celebrity crimes,
crimes of passion and high profile violent crimes.
As a former police officer, I have worked in some well respected neighborhoods that people
consider “safe”. However, during my tenure, my eyes were routinely opened to what really
happens in “safe” neighborhoods. While the vast majority of these events never made the news,
they were nevertheless tragic and life changing for the victims.
My experience as a police officer and seeing firsthand what crimes are not reported on the news
has changed my personal security posture from being nearly worry-free to being prepared. I know
what streets to avoid, what hot-ticket items crooks are looking for, the methods that crooks are
using, and the most likely timing for given crimes.
Today, serving in the security industry it's still my business to know current crime trends in order
to counter them through technology. I'd like to share with you where I find this data in the hope
that you too will be well informed and will take relevant precautions to secure your home.
2. US Department of Justice: Federal Bureau of
Investigations
Every year the FBI compiles an extensive database of
criminal activity through yearly, consistent surveys of law
enforcement agencies nationwide.
The database is known as UCR, Uniform Crime
Reporting Statistics. Beyond the dynamic reports, you
can also find a library of summaries and guides to help you accurately interpret the data found in
the UCR. Agencies nation wide rely on this report to gauge and prepare for crime in their regions.
Here are a few links to help you navigate quickly through their site:
UCR homepage
Dynamic report nationally and/or state by state
Dynamic report by large local agencies (LA, NYC, Dayton, etc)
Inter-University Consortium for Political and Social Research
The ICPSR is part of the University of Michigan. They archive contributing factors of criminal
activity including crime and social trends. Additionally, you will find a large index of completed
analysis from universities and news organizations nation wide.
Find and analyze data
National Insurance Crime Bureau
Serving the mutual interest of customers and the
insurance industry, the NICB provides a wealth of topical
information about crime.
I have included the NICB because they also provide
information about the forms of fraud such as vehicle
cloning, disaster fraud and staged automobile accident
fraud.
3. Whether the fraud is common or unique, affects us directly or indirectly; we all end up paying the
tab for these crimes. Of course, seeking to minimize claims, you'll find great tips on how to avoid
being a victim of crime and fraud.
View the theft and fraud awareness page.
Real-Time, Local Information
For my personal information, I like reviewing my local police department websites. These sites are
becoming more webcentric by having great tools online for their communities such as crime
maps, offender lists, wanted lists, related agencies websites. And, of course, they provide real-time
information about recent criminal activity.
Progressive police departments understand that the more information they can get to you, the
more empowered you'll be to protect yourself and potentially aid in crime prevention. As an
example of what's available today, here is the Dallas PD's crime information site which includes a
crime map.
I encourage you to be an investigator through these sources and the host of others available
online. In doing so, you can not only inform yourself, but you can inform your friends, neighbors,
and coworkers to increase crime awareness and undertake simple measures to keep yourself
and others secure.
http://www.supercircuits.com/resources/blog/learn-the-facts-about-crime