The document discusses issues around surveillance, privacy, and ethics in the digital age. It notes that personal data is increasingly being collected and stored by governments and companies without proper oversight or user consent. New laws allow intelligence agencies to access people's web browsing histories and communication data. Maintaining privacy has become difficult as technology advances and more entities seek to gather and leverage people's digital information for surveillance or other purposes. Overall it raises concerns about how surveillance has become normalized and privacy eroded in today's digital world.
Operation Ironside began almost three years ago and is the Australian component of a long-term, international, covert investigation.
The FBI and Australian officials developed an encrypted device company which eventually gave them access to hundreds of criminal networks.
Operation Ironside began almost three years ago and is the Australian component of a long-term, international, covert investigation.
The FBI and Australian officials developed an encrypted device company which eventually gave them access to hundreds of criminal networks.
How the Farhang Foundation is Elevating the ArtsMichael Saei
Since 2004, Los Angeles financial professional Michael Saei has served as president of First Financial Capital, a direct portfolio lender providing bridge financing services to the commercial real estate sector. Outside of his professional activities, Michael Saei supports the activities of culturally enriching community organizations such as the Farhang Foundation.
Basketball Analytics Using Motion Tracking DataRajiv Shah
The ability to track player and ball movement has revolutionized sports analytics. This talk will focus on the impact of the SportVu motion technology tracking on basketball analytics. It covers analytic developments in the last five years from using Sportvu data to measure player speed, understanding shooting styles, to team strategy. The presentation will discuss how to use R/Python to analyze a billion rows of motion data as well as introduce algorithmic approaches such as simple distance calculations, bayesian spatio-temporal algorithms, and deep learning. Along the way, resources will be highlighted that allow anyone to start doing basketball analytics. The talk will end by highlighting recent award winning research that shows how basketball analytics broaden the appeal of math and science among youth (STEM education).
I was recently asked to put together a presentation on the fake news phenomenon for discussions with leading journalists and media institutions in a developing country, with extremely poor media literacy but strong growth around social media use, on how to both identify misleading content and also stem its flow, reach and influence.
Download the full presentation as a PowerPoint (with embedded videos) or as an Apple Keynote file, here - https://drive.google.com/open?id=0Bxbk4wYolphwcVk4bV85aEFtYXc
Pemakaman Asri,Pemakaman Baru,Pemakaman Elit,Pemakaman Elite,Pemakaman Gratis Bandung,Pemakaman Gratis,Pemakaman Islam,Pemakaman Muslim Firdaus,Pemakaman Muslim Bandung,Pemakaman Nyaman,Pemakaman Ramah Lingkungan,Pemakaman Sesuai Syariah,Pemakaman Taman Firdaus Bandung,Pemakaman Unik Di Indonesia,Layanan Mobil Jenazah Gratis,Layanan Pengurusan Jenazah,Layanan Jenazah islam,Layanan Mobil Jenazah,Wakaf Pemakaman Islam,Wakaf Pemakaman Jenazah,Wakaf Pemakaman Muslim,Tanah Wakaf Pemakaman,Firdaus Memorial Park Bandung,Memorial Park Di Bandung Indah,Memorial Park Jawa Barat,Memorial Park Bandung Yang Indah,Memorial Park Di Bandung,Pemakaman Muslim Bandung,Jasa Pemakaman Muslim,Pemakaman Orang Islam,Pemakaman Secara Islam,Pemakaman Muslim Firdaus,Jenazah Fakir Dhuafa wanita,Mobil Jenazah Gratis,Taman Firdaus Bandung Barat,Pemakaman Sesuai Syariah Islam,Model Kuburan Islam Modern,Model Kuburan Terbaru,Kuburan Sesuai Syariat Islam,Kubur Cantik,Kubur Islam,Kubur Luas,Kubur Orang Mati,Taman Firdaus Memorial Park,Ambulan Jenazah,Ambulance Bandung,Ambulan Bawa Pasien,Ambulance Emergency,Ambulan Emergensi,Ambulan Gratis Bandung,Ambulan Jenazah,Ambulan Jenazah Gratis,Ambulance Mayat,Wakaf Ambulance,Taman Pemakaman Di Kota,Taman Firdaus,Taman Hijau,Taman Indah,Taman Unik,Pesantren Di Bandung,Pesantren Bandung,Pesantren Gratis Bandung,Pesantren Gratis,Pesantren Tahfidzh Qur'an,Pesantren Tahfidzh Putri,jasa mengurus jenazah,jasa mengurus jenazah muslim,jasa mengurus jenazah anak,jasa mengurus jenazah bayi,jasa mengurus jenazah lengkap,jasa mengurus jenazah laki-laki,jasa mengurus jenazah perempuan,makam paling indah,makam yang indah,makam paling indah di indonesia,makam terindah,Jasa Pemakaman Bagus,Jasa Pemakaman Bandung,Jasa Pemakaman Islam,Jasa Pemakaman Jenazah,Jasa Pemakaman Muslim,Perusahaan Jasa Pemakaman,Pemulasaran Jenazah,Pemulasaran Jenazah Islam
Human Rights & ICTs. A presentation delivered on 1 April 2017 to Amnesty International's 2017 Chairs Assembly and Director's Forum (CADF), held in Colombo, Sri Lanka.
La gestione dell'energia ed il controllo della qualita' energetica degli edif...Pasquale Capezzuto
La presentazione illustra le opportunita' oggi a disposizione dei Comuni per intraprendere un percorso di trasformazione della Citta' in Citta' Sostenibile ed Intelligente
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
When compared with certain other jurisdictions, Sri Lankan legal framework on cyber-crimes is much effective. Yet, there is much potential for it to develop into a more effective legal framework. The chapter suggested certain measures that can be implemented to national level as well as in international level to provide for the irregularities that exist in system while giving examples from few main jurisdictions. Legal measures in order to identify existing and new offences, to provide interpretations for undefined yet commonly used terms and measures to implement lenient measures in relation to admissibility of computer evidence were suggested while social measures to increase public awareness and IT literacy and measures to provide required training expertise to investigators were also suggested. Base of ICT Law is technology. Therefore, answers to certain irregularities could also be found through technology. Thus, technical measures such as implementing national encryption policy and monitoring and surveillance system were recommended. Recommendations were proposed for the international community on how to enhance mutual legal assistance and on empowering international criminal justice system on cyber-crimes.
Reply to post 1 & 2 with 250 words each.Post 11. What vafelipaser7p
Reply to post 1 & 2 with 250 words each.
Post 1
1. What value does Open Source information have for law enforcement intelligence?
In today’s information age, open source information is extremely valuable to law enforcement today. The modernization of technology is accelerating at a fast pace. In the very near future, almost everything that someone says or does will be recorded in some way or another. The way open source information is used today has already shown a great potential in solving past crimes, addressing current crimes, and predicting crimes of the future. According to Friedman (1998), there are several categories of open source information, and some of the major sources are the media, databases, and everyone’s favorite, the internet. The reason why it is extremely valuable in law enforcement is because open source information is a repository of information. Some examples of open source information are DNA repositories, social media posts, photos with geotags, and statistical information. Just from the four examples mentioned, one can see the relevance to law enforcement. DNA databases can be used to link DNA evidence; statistical information can be used to develop crime maps, and help in predictive policing (Joh, 2014). Not so smart felons can leave geotags on photos or have Instagram photos that show their whereabouts.
2. Provide two examples of Open Sources that can be beneficial to law enforcement and explain what those benefits are.
Something that comes quickly to mind is that open source information can be used to develop a pattern of life of an area. Using information gained from public databases, law enforcement officials can identify where the next crime might occur. Another way to use open source information is to monitor social media. Social media posts can indicate where protests will occur, or even where a crime is occurring. Recently, a mass shooting in New Zealand was live-streamed on social media. There are some things that law enforcement can learn from that video in terms of the attacker’s timeline and tactics he employed. Joh (2014) posits that open source information from the internet can be used in mass surveillance, and in predictive policing.
3. What concerns must be factored in if utilizing Open Source information?
The top concern with open source information is the validity of it. Additionally, is the information from a reputable source? How old is the information? The validity of the information critical especially with the internet; there is a lot of junk information on the web that must be disregarded by intelligence experts. Something else to also consider is that open source information can also be used by criminals. For example, criminals can observe the actions of a police force if the media is doing a live-broadcast of a crime in progress.
4. Can police lawfully use insincere or fraudulent means to access social media information? (LinkedIn, Facebook, Twitter, Pinterest...)
As state ...
How the Farhang Foundation is Elevating the ArtsMichael Saei
Since 2004, Los Angeles financial professional Michael Saei has served as president of First Financial Capital, a direct portfolio lender providing bridge financing services to the commercial real estate sector. Outside of his professional activities, Michael Saei supports the activities of culturally enriching community organizations such as the Farhang Foundation.
Basketball Analytics Using Motion Tracking DataRajiv Shah
The ability to track player and ball movement has revolutionized sports analytics. This talk will focus on the impact of the SportVu motion technology tracking on basketball analytics. It covers analytic developments in the last five years from using Sportvu data to measure player speed, understanding shooting styles, to team strategy. The presentation will discuss how to use R/Python to analyze a billion rows of motion data as well as introduce algorithmic approaches such as simple distance calculations, bayesian spatio-temporal algorithms, and deep learning. Along the way, resources will be highlighted that allow anyone to start doing basketball analytics. The talk will end by highlighting recent award winning research that shows how basketball analytics broaden the appeal of math and science among youth (STEM education).
I was recently asked to put together a presentation on the fake news phenomenon for discussions with leading journalists and media institutions in a developing country, with extremely poor media literacy but strong growth around social media use, on how to both identify misleading content and also stem its flow, reach and influence.
Download the full presentation as a PowerPoint (with embedded videos) or as an Apple Keynote file, here - https://drive.google.com/open?id=0Bxbk4wYolphwcVk4bV85aEFtYXc
Pemakaman Asri,Pemakaman Baru,Pemakaman Elit,Pemakaman Elite,Pemakaman Gratis Bandung,Pemakaman Gratis,Pemakaman Islam,Pemakaman Muslim Firdaus,Pemakaman Muslim Bandung,Pemakaman Nyaman,Pemakaman Ramah Lingkungan,Pemakaman Sesuai Syariah,Pemakaman Taman Firdaus Bandung,Pemakaman Unik Di Indonesia,Layanan Mobil Jenazah Gratis,Layanan Pengurusan Jenazah,Layanan Jenazah islam,Layanan Mobil Jenazah,Wakaf Pemakaman Islam,Wakaf Pemakaman Jenazah,Wakaf Pemakaman Muslim,Tanah Wakaf Pemakaman,Firdaus Memorial Park Bandung,Memorial Park Di Bandung Indah,Memorial Park Jawa Barat,Memorial Park Bandung Yang Indah,Memorial Park Di Bandung,Pemakaman Muslim Bandung,Jasa Pemakaman Muslim,Pemakaman Orang Islam,Pemakaman Secara Islam,Pemakaman Muslim Firdaus,Jenazah Fakir Dhuafa wanita,Mobil Jenazah Gratis,Taman Firdaus Bandung Barat,Pemakaman Sesuai Syariah Islam,Model Kuburan Islam Modern,Model Kuburan Terbaru,Kuburan Sesuai Syariat Islam,Kubur Cantik,Kubur Islam,Kubur Luas,Kubur Orang Mati,Taman Firdaus Memorial Park,Ambulan Jenazah,Ambulance Bandung,Ambulan Bawa Pasien,Ambulance Emergency,Ambulan Emergensi,Ambulan Gratis Bandung,Ambulan Jenazah,Ambulan Jenazah Gratis,Ambulance Mayat,Wakaf Ambulance,Taman Pemakaman Di Kota,Taman Firdaus,Taman Hijau,Taman Indah,Taman Unik,Pesantren Di Bandung,Pesantren Bandung,Pesantren Gratis Bandung,Pesantren Gratis,Pesantren Tahfidzh Qur'an,Pesantren Tahfidzh Putri,jasa mengurus jenazah,jasa mengurus jenazah muslim,jasa mengurus jenazah anak,jasa mengurus jenazah bayi,jasa mengurus jenazah lengkap,jasa mengurus jenazah laki-laki,jasa mengurus jenazah perempuan,makam paling indah,makam yang indah,makam paling indah di indonesia,makam terindah,Jasa Pemakaman Bagus,Jasa Pemakaman Bandung,Jasa Pemakaman Islam,Jasa Pemakaman Jenazah,Jasa Pemakaman Muslim,Perusahaan Jasa Pemakaman,Pemulasaran Jenazah,Pemulasaran Jenazah Islam
Human Rights & ICTs. A presentation delivered on 1 April 2017 to Amnesty International's 2017 Chairs Assembly and Director's Forum (CADF), held in Colombo, Sri Lanka.
La gestione dell'energia ed il controllo della qualita' energetica degli edif...Pasquale Capezzuto
La presentazione illustra le opportunita' oggi a disposizione dei Comuni per intraprendere un percorso di trasformazione della Citta' in Citta' Sostenibile ed Intelligente
RECOMMENDATIONS AND LESSONS FROM OTHER JURISDICTIONS TO ENHANCE THE EFFECTIV...Vishni Ganepola
When compared with certain other jurisdictions, Sri Lankan legal framework on cyber-crimes is much effective. Yet, there is much potential for it to develop into a more effective legal framework. The chapter suggested certain measures that can be implemented to national level as well as in international level to provide for the irregularities that exist in system while giving examples from few main jurisdictions. Legal measures in order to identify existing and new offences, to provide interpretations for undefined yet commonly used terms and measures to implement lenient measures in relation to admissibility of computer evidence were suggested while social measures to increase public awareness and IT literacy and measures to provide required training expertise to investigators were also suggested. Base of ICT Law is technology. Therefore, answers to certain irregularities could also be found through technology. Thus, technical measures such as implementing national encryption policy and monitoring and surveillance system were recommended. Recommendations were proposed for the international community on how to enhance mutual legal assistance and on empowering international criminal justice system on cyber-crimes.
Reply to post 1 & 2 with 250 words each.Post 11. What vafelipaser7p
Reply to post 1 & 2 with 250 words each.
Post 1
1. What value does Open Source information have for law enforcement intelligence?
In today’s information age, open source information is extremely valuable to law enforcement today. The modernization of technology is accelerating at a fast pace. In the very near future, almost everything that someone says or does will be recorded in some way or another. The way open source information is used today has already shown a great potential in solving past crimes, addressing current crimes, and predicting crimes of the future. According to Friedman (1998), there are several categories of open source information, and some of the major sources are the media, databases, and everyone’s favorite, the internet. The reason why it is extremely valuable in law enforcement is because open source information is a repository of information. Some examples of open source information are DNA repositories, social media posts, photos with geotags, and statistical information. Just from the four examples mentioned, one can see the relevance to law enforcement. DNA databases can be used to link DNA evidence; statistical information can be used to develop crime maps, and help in predictive policing (Joh, 2014). Not so smart felons can leave geotags on photos or have Instagram photos that show their whereabouts.
2. Provide two examples of Open Sources that can be beneficial to law enforcement and explain what those benefits are.
Something that comes quickly to mind is that open source information can be used to develop a pattern of life of an area. Using information gained from public databases, law enforcement officials can identify where the next crime might occur. Another way to use open source information is to monitor social media. Social media posts can indicate where protests will occur, or even where a crime is occurring. Recently, a mass shooting in New Zealand was live-streamed on social media. There are some things that law enforcement can learn from that video in terms of the attacker’s timeline and tactics he employed. Joh (2014) posits that open source information from the internet can be used in mass surveillance, and in predictive policing.
3. What concerns must be factored in if utilizing Open Source information?
The top concern with open source information is the validity of it. Additionally, is the information from a reputable source? How old is the information? The validity of the information critical especially with the internet; there is a lot of junk information on the web that must be disregarded by intelligence experts. Something else to also consider is that open source information can also be used by criminals. For example, criminals can observe the actions of a police force if the media is doing a live-broadcast of a crime in progress.
4. Can police lawfully use insincere or fraudulent means to access social media information? (LinkedIn, Facebook, Twitter, Pinterest...)
As state ...
Running Head The us of social media by criminal justice agencies.docxtoltonkendal
Running Head: The us of social media by criminal justice agencies 1
The us of social media by criminal justice agencies
Social Media In Everyday Lives
student
university
Literature Review
The use of social media by criminal justice agencies
Introduction
Social media today is a very major part of life. From Facebook to Twitter to Instagram to snap chat to youtube among many other channels, social media has revolutionized the manner in which most things are done in the society today because of the ease of communication that has been provided by the social media platforms. Social media today is a big part of individual's everyday lives and its use in the society today has also revolutionized from being used only as a platform for entertainment to being used by business and very many agencies of the government including the criminal justice agencies(George, 2014). Social media platforms have developed to form one of the most influential channels of communication that ever existed in the history of human beings.
The impact that the social media has to the society is not all good, but there is no doubt that there is a lot of positive that has been brought by the use of social media in most institutions such as the criminal justice agencies. The issue of public safety today has become more sophisticated thanks to social media as communication has been made easier and also faster. The tools of law enforcement have evolved over time from making use of wanted posters to the broad use of the social media platforms. In this paper, we are going to look at the use of social media in criminal justice and the effects that this has had both the good and the bad. The law enforcement agencies today are finding social media a very valuable tool in their quest to protect individuals and to serve the public as we are going to discuss in this paper.
Use of Social Media in Criminal Justice
The Good
Use of the social media in law enforcement agencies has tremendously grown over the past few years, and this trend is as a result of more and more law enforcement agencies embracing and learning how to use the social media and to take advantage of the eased communication to carry out their operations and enhance safety. Below are the ways in which social media has been useful in criminal justice.
*OTHER THAN THE PURPOSE STATEMENT DONT LET THE PAPER REFER TO ITSELF
*NEEDS A SOURCE IN THIS SECTION
1. Criminal investigations
Social media has become a very major tool of investigation for the law enforcers. The truth about social media is for every time we use it we leave clues all over the internet like our fingerprints (Brunty, Miller & Helenek, 2014). Following the trend of many individuals putting up a lot of details on their activities on social media investigating crimes has been made easier for police. Investigate target often have various information about them and their activities uploaded to their various social media pages which could help t ...
GRBN Trust and Personal Data Survey report - Part 1 - Concern, familiarity, t...Andrew Cannon
A detailed report on the results from GRBN's 24 country global survey on the issue of Trust & Personal Data. The report dives into how the level of familiarity with the issue as well as the level of concern about the abuse of personal data varies across the globe. The report compares how trustworthy people consider different types of both public and private organisations to be, and looks at how sensitive people consider different types of personal data to be.
GRBN Trust and Personal Data Survey Report - Part 2 - Regions and countries -...Andrew Cannon
The report deep dives into the results from GRBN's 24 country survey on Trust & Personal Data, detailing the findings by region (Americas, APAC and Europe) and country
Businesses that engage in the collection, use, disclosure and management of personal information in Canada need to be cognizant of the regulatory framework governing the privacy landscape in order to stay compliant.
Presentation on Reimagining Extremism: Context, culture, community and countrySanjana Hattotuwa
ICT4Peace Foundation’s Special Advisor Sanjana Hattotuwa was invited by New Zealand’s Department of Prime Minister and Cabinet to speak at He Whenua Taurikura, New Zealand’s first annual hui (meaning a large gathering in Maori) on countering terrorism and violent extremism. The hui was held from 14-16 June 2021 in Christchurch. He Whenua Taurikura translates to ‘a country at peace’. This presentation was delivered as part of the fourth panel at the hui, on day two.
Sanjana followed presentations by Jordan Carter from InternetNZ, Kate Hannah from Te Pūnaha Matatini and University of Auckland, Dr Nawab Osman from Facebook, Nick Pickles from Twitter, and Anjum Rahman from Inclusive Aotearoa Collective Tāhono and Islamic Women’s Council of New Zealand. The panel was chaired by Paul Ash, head of the Christchurch Call.
Roles of media in peacebuilding & conflict generationSanjana Hattotuwa
Was invited by Associate Professor SungYong Lee at NCPACS to deliver a guest lecture to his 2021 MA class on media's role in peacebuilding violent conflict generation.
Are we collectively ruining democracy? Polarisation of thought and belief seems to be on the increase particularly in the online environment. Where people who think similarly move (or are pushed) towards more fixed or extreme views, it makes it harder for people to express opinions or suggest new ideas. How can we challenge it? This is an opportunity to talk about how groupthink is affecting our lives, and to discuss positive alternatives.
Peace processes after the pandemic: What role for technology?Sanjana Hattotuwa
Increasingly discussed today in the Global North, Information and Communications Technologies (ICTs) have featured in mediation processes in the Global South for close upon two decades. This bears mention in what are often discussions that appear to present or posit the use of ICTs in mediation as recent or somehow pegged to the advent and, today, ubiquity of social media. The challenges today are both similar and different to those that existed at the turn of the century. Transparency, agency and voice, central pillars of democracy, find expression, at ever increasing scale, scope, and speed, on social media. Conversely, new forms of spoiler dynamics, linked to in large part the manipulation of public discourse, also use social media as key vectors to incite violence, inflame hate and spread incendiary falsehoods. The dilemma facing mediation today is one of having to deal with vectors of information production that lie entirely beyond the remit of the Chatham House rule, rules of confidential engagement, and the sandboxing needed to incubate fragile processes and relationships. Mediators are bombarded with information they must make sense of, and this sense-making process is itself often under-valued in modern day mediation. The confusion leads to (understandable, yet misplaced) anxiety, which often finds expression in suspicion and scepticism around the role, reach and relevance of ICTs in mediation processes.
Additionally, the post-Coronavirus landscape brings with it added challenges. If physical meetings are no longer viable for the foreseeable future, a key question is how the rich, sensory experience, relational depth, non-verbal cues, physical contact and the security of verbal communication in a closed-door environment can be replicated, and to what degree, through virtually mediated environments. Aside from the obvious cyber-security concerns are also psycho-social, cognitive, socio-cultural, gendered challenges in mediation processes that will be predominantly anchored to online technologies, including social media apps, products, and platforms. Questions asked by Hattotuwa in 2018 are even more relevant in the long-shadow of Covid-19, in addition to others borne out of global and local circumstances that a few months ago seemed unimaginable. How can social media and ICTs help? What is important to focus on, and what are some dangers of today’s conflict landscape beyond the headlines? What questions should mediators ask in order to avoid the more uncommon pitfalls of incorporating ICTs in negotiations processes? Fundamentally, how will conflict transformation, anchored to mediation, change in a post-Coronavirus world where travel and meetings will be severely restricted, or no longer possible to do discreetly? More fundamentally, how can and should expectations from, models of and approaches to mediation change, post-pandemic, in a world increasingly mediated (no pun intended) through social media?
Beyond the global reset: Towards pandemic panopticons or something radically ...Sanjana Hattotuwa
On the invitation of Christina Goodness, Chief Information Management Officer at the Departments of Peacebuilding, Political and Peace Operations DPPA-DPO, United Nations, the ICT4Peace Foundation's Sanjana Hattotuwa gave a presentation titled 'Beyond the global reset: Towards pandemic panopticons or something radically new?' as part of the '(un)data Seminar Series on Outrageous Questions'.
Details and overview at https://ict4peace.org/activities/post-coronavirus-towards-pandemic-panopticons-or-something-radically-new/
«From the burning of the Notre Dame in Paris to heinous terrorism in Sri Lanka and Christchurch, social media inextricably is entwined with how billions see or engage with the world.»
More details at https://ict4peace.org/activities/full-video-slidedeck-of-lecture-from-christchurch-to-sri-lanka-the-curious-case-of-social-media/
Presentation delivered at the Zentrum für Internationale Friedenseinsätze gGmbH (Centre for International Peace Operations) based in Berlin, Germany, as part of an event to celebrate 15 years since its inception on 28 June 2017.
Gave a short presentation at the Sri Lanka Press Institute (SLPI) on 26th October on drone journalism, as part of the excellent OneSriLanka Journalism Fellowship programme, supported by Internews.
Digital transformation and the role of civil society in Sri LankaSanjana Hattotuwa
The Friedrich-Naumann-Stiftung für die Freiheit Regional office South Asia organized a regional seminar on "Promoting Liberty Digitally" in Sri Lanka from 15th to 17th October 2016. I was asked to speak on "Digital transformation and the role of Civil Society in Sri Lanka" and to be present at a group discussion on "Civil rights and the Internet".
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
2. –Time Berners-Lee, 12 March 2017
Political advertising online needs transparency and
understanding
It’s too easy for misinformation to spread on the web
We’ve lost control of our personal data
10. • ISPs and mobile phone providers will keep a record of every website
visit of anyone using a British network for up to a year. This includes
sites visited through mobile browsers and phone apps (like
Facebook) - but not individual web pages.
• The data will be stored by the network that collected it, but police
and many government departments will be able to use a central
search tool to find and access those records.
• Searches of that data will be conducted at the discretion of the
police and will be overseen by a specially trained supervising officer
only. Weak judicial oversight.
31. when does intelligence turn into surveillance?
how to maintain control over privacy within ecosystem of competing owners, location sensors, proxy indicators,
sentient nodes, ambient observation, pervasive automation