Лекция от OpenFest 2015 в София.
Jitsi Meet е платформа за видеоконференции, основана изцяло на свободен софтуер и отворени стандарти. Всеки участник има нужда само от браузър, а сървърът поддържа много конференции и участници. Инсталира се на ваш сървър и всичко е шифрирано. Подходящо за всякакви срещи – от разговори между двама, през интервюта и бизнес срещи до конференции с по няколко десетки участника. Lindeas предлага инсталиране, поддръжка и доработки на платформата за различни специфични нужди.
Лекция от TuxCon 2016 в Пловдив.
Jitsi Meet е платформа за видеоконференции, основана изцяло на свободен софтуер и отворени стандарти. Всеки участник има нужда само от браузър, а сървърът поддържа много конференции и участници. Инсталира се на ваш сървър и всичко е шифрирано. Подходящо за всякакви срещи – от разговори между двама, през интервюта и бизнес срещи до конференции с по няколко десетки участника. Lindeas предлага инсталиране, поддръжка и доработки на платформата за различни специфични нужди.
Look Up: Teen Safety, Social Media & PartiesJessica Green
In response to the recent Rosedale Jam, which was promoted by an anonymous gossip site about Midtown teenagers, we were invited to present to an audience of parents and youth on social media and teen safety. We were thrilled to be among a crowd that was as passionate about social media and teen safety as we are.
Social media can be the least social part of our daily lives, so as parents, caregivers and community leaders, we have to teach our children to LOOK UP!
It was a privilege to join Toronto Police Service's Constable Alex Li and S/Sgt. James Hogan; Generator Project's Pete Bombaci; and MJL Consulting's Dr. Michael Leatch for last night's spirited discussion.
A special thanks to the Residents' Associations of North Rosedale, South Rosedale, Moore Park, Governor’s Bridge and Summerhill for inviting me to present and join in on this timely conversation. #lookup #internetsafety #socialmediasafety
Digital journalism tamale media trainingCecil Dadzie
"Technology is disrupting every industry and the media isn't left out.
Ideally, social media is for connecting with viewers, readers and listeners. For journalists it is an avenue to engage, listen, monitor and locate sources and tell stories in a unique way. Digital journalism is growing and every day, content is distributed to thousands and millions of people, presenting us with an opportunity to tap into. The era comes with its own challenges too. Knowing and understanding how some platforms work will put you in a better position to educate, inform and impact lives through our work as journalists
Лекция от OpenFest 2015 в София.
Jitsi Meet е платформа за видеоконференции, основана изцяло на свободен софтуер и отворени стандарти. Всеки участник има нужда само от браузър, а сървърът поддържа много конференции и участници. Инсталира се на ваш сървър и всичко е шифрирано. Подходящо за всякакви срещи – от разговори между двама, през интервюта и бизнес срещи до конференции с по няколко десетки участника. Lindeas предлага инсталиране, поддръжка и доработки на платформата за различни специфични нужди.
Лекция от TuxCon 2016 в Пловдив.
Jitsi Meet е платформа за видеоконференции, основана изцяло на свободен софтуер и отворени стандарти. Всеки участник има нужда само от браузър, а сървърът поддържа много конференции и участници. Инсталира се на ваш сървър и всичко е шифрирано. Подходящо за всякакви срещи – от разговори между двама, през интервюта и бизнес срещи до конференции с по няколко десетки участника. Lindeas предлага инсталиране, поддръжка и доработки на платформата за различни специфични нужди.
Look Up: Teen Safety, Social Media & PartiesJessica Green
In response to the recent Rosedale Jam, which was promoted by an anonymous gossip site about Midtown teenagers, we were invited to present to an audience of parents and youth on social media and teen safety. We were thrilled to be among a crowd that was as passionate about social media and teen safety as we are.
Social media can be the least social part of our daily lives, so as parents, caregivers and community leaders, we have to teach our children to LOOK UP!
It was a privilege to join Toronto Police Service's Constable Alex Li and S/Sgt. James Hogan; Generator Project's Pete Bombaci; and MJL Consulting's Dr. Michael Leatch for last night's spirited discussion.
A special thanks to the Residents' Associations of North Rosedale, South Rosedale, Moore Park, Governor’s Bridge and Summerhill for inviting me to present and join in on this timely conversation. #lookup #internetsafety #socialmediasafety
Digital journalism tamale media trainingCecil Dadzie
"Technology is disrupting every industry and the media isn't left out.
Ideally, social media is for connecting with viewers, readers and listeners. For journalists it is an avenue to engage, listen, monitor and locate sources and tell stories in a unique way. Digital journalism is growing and every day, content is distributed to thousands and millions of people, presenting us with an opportunity to tap into. The era comes with its own challenges too. Knowing and understanding how some platforms work will put you in a better position to educate, inform and impact lives through our work as journalists
A common problem for information security professionals is that security is perceived as a business blocker; hindering the operational efficiency and adding controls that make everybody's life more difficult. But we don't have to accept that as a norm. The presentation focuses on avoiding activities that create that feeling, and alternative ways to approach information security board buy-in
Speaker at the IDC IT Security Roadshow 2017 in Doha. It was a one day event bringing together some Security Vendors and End User folks to present and discuss security related topics. The event midway was split into two tracks A - Threat Intelligence and B - Securing the Endpoint to the cloud. My End User Presentation (Track A) covered Threat Intelligence. There were some some interesting speakers and audience Q & A discussions followed by a networking lunch to boot. The venue at the Shangri La Hotel in Doha provided a great space and good networking opportunity.
A brief run-through of the economics of controls, threats and how attackers and defenders think. Following an introduction to the current and next generation security analytics.
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
On October 16, Daniel Cherrin spoke at the Wall Street Journal PRO Cybersecurity Small Business Academy at the Monarch Beach Resort in Dana Park, California. You can find an excerpt from his remarks on Incident Response on a Budget at http://www.northcoaststrategies.com/blog/steps-you-can-take-now-to-prepare-for-the-next-data-breach-that-wont-cost-a-lot-of-money.
2011 SLA Annual Conference & INFO-EXPO: Novel Applications for TD Bank\'s...jmkurtz
After attending the SLA 2011 Annual Conference in Philadelphia, I developed this presentation to share the innovative ideas and technologies I learned about with my department at the Information Research Center.
Computational Social Science: Programming Skills for Social ScientistsJames Allen-Robertson
Presentation given at the National Centre for Research Methods Festival 2018. A broad overview of how Social Scientists might get into computational methods, the incentives, the pitfalls and some examples of computational social science research.
In collaboration with Denny Luan from Experiment, we explore the principles and dynamics of successful science crowdfunding campaigns.
This presentation is part of the Digital Scholar Training Series at USC and CHLA.
Learn more about the initiative: http://sc-ctsi.org/digital-scholar/
News story: http://sc-ctsi.org/index.php/news/new-digital-scholar-training-initiative-helps-researchers-better-utilize-we#.VDhIWWK9mKU
This presentation was given at the 2010 IASA Annual Conference by Jennifer Overhulse-King of St. Nick Media Services and Craig Lowenthal of Glatfelter Insurance. It details the basics of social media, how insurance companies are using it, how technology and service providers can use it, the dangers of social media, privacy and regulatory concerns, and how to put a policy in place to regulate use by your company's employees.
A common problem for information security professionals is that security is perceived as a business blocker; hindering the operational efficiency and adding controls that make everybody's life more difficult. But we don't have to accept that as a norm. The presentation focuses on avoiding activities that create that feeling, and alternative ways to approach information security board buy-in
Speaker at the IDC IT Security Roadshow 2017 in Doha. It was a one day event bringing together some Security Vendors and End User folks to present and discuss security related topics. The event midway was split into two tracks A - Threat Intelligence and B - Securing the Endpoint to the cloud. My End User Presentation (Track A) covered Threat Intelligence. There were some some interesting speakers and audience Q & A discussions followed by a networking lunch to boot. The venue at the Shangri La Hotel in Doha provided a great space and good networking opportunity.
A brief run-through of the economics of controls, threats and how attackers and defenders think. Following an introduction to the current and next generation security analytics.
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
On October 16, Daniel Cherrin spoke at the Wall Street Journal PRO Cybersecurity Small Business Academy at the Monarch Beach Resort in Dana Park, California. You can find an excerpt from his remarks on Incident Response on a Budget at http://www.northcoaststrategies.com/blog/steps-you-can-take-now-to-prepare-for-the-next-data-breach-that-wont-cost-a-lot-of-money.
2011 SLA Annual Conference & INFO-EXPO: Novel Applications for TD Bank\'s...jmkurtz
After attending the SLA 2011 Annual Conference in Philadelphia, I developed this presentation to share the innovative ideas and technologies I learned about with my department at the Information Research Center.
Computational Social Science: Programming Skills for Social ScientistsJames Allen-Robertson
Presentation given at the National Centre for Research Methods Festival 2018. A broad overview of how Social Scientists might get into computational methods, the incentives, the pitfalls and some examples of computational social science research.
In collaboration with Denny Luan from Experiment, we explore the principles and dynamics of successful science crowdfunding campaigns.
This presentation is part of the Digital Scholar Training Series at USC and CHLA.
Learn more about the initiative: http://sc-ctsi.org/digital-scholar/
News story: http://sc-ctsi.org/index.php/news/new-digital-scholar-training-initiative-helps-researchers-better-utilize-we#.VDhIWWK9mKU
This presentation was given at the 2010 IASA Annual Conference by Jennifer Overhulse-King of St. Nick Media Services and Craig Lowenthal of Glatfelter Insurance. It details the basics of social media, how insurance companies are using it, how technology and service providers can use it, the dangers of social media, privacy and regulatory concerns, and how to put a policy in place to regulate use by your company's employees.
Estas son las herramientas de seguridad digital básicas para que protejas la confidencialidad y la integridad de tu información durante la investigación periodística.
Policías y agresores de civil agreden a periodistas de VeracruzJorge Luis Sierra
Este es un análisis de un video sobre la agresión sufrida por el periodista Iván Sánchez durante la cobertura de las manifestaciones magisteriales del 22 de noviembre de 2015 en Boca del Río, Veracruz.
Hushmail es una opción para usar un servicio de correo electrónico encriptado para comunicarte con tus fuentes de información o tus editores y colegas de trabajo. Aquí te mostramos como abrir y usar una cuenta gratuita.
Pasos para proteger tu teléfono móvil. Un tutorial del proyecto Seguridad Digital yMóvil para Periodistas y Blogueros, del Centro Internacional para Periodistas y de Freedom House.
Future Of Fintech In India | Evolution Of Fintech In IndiaTheUnitedIndian
Navigating the Future of Fintech in India: Insights into how AI, blockchain, and digital payments are driving unprecedented growth in India's fintech industry, redefining financial services and accessibility.
03062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
27052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
role of women and girls in various terror groupssadiakorobi2
Women have three distinct types of involvement: direct involvement in terrorist acts; enabling of others to commit such acts; and facilitating the disengagement of others from violent or extremist groups.
31052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
हम आग्रह करते हैं कि जो भी सत्ता में आए, वह संविधान का पालन करे, उसकी रक्षा करे और उसे बनाए रखे।" प्रस्ताव में कुल तीन प्रमुख हस्तक्षेप और उनके तंत्र भी प्रस्तुत किए गए। पहला हस्तक्षेप स्वतंत्र मीडिया को प्रोत्साहित करके, वास्तविकता पर आधारित काउंटर नैरेटिव का निर्माण करके और सत्तारूढ़ सरकार द्वारा नियोजित मनोवैज्ञानिक हेरफेर की रणनीति का मुकाबला करके लोगों द्वारा निर्धारित कथा को बनाए रखना और उस पर कार्यकरना था।
In a May 9, 2024 paper, Juri Opitz from the University of Zurich, along with Shira Wein and Nathan Schneider form Georgetown University, discussed the importance of linguistic expertise in natural language processing (NLP) in an era dominated by large language models (LLMs).
The authors explained that while machine translation (MT) previously relied heavily on linguists, the landscape has shifted. “Linguistics is no longer front and center in the way we build NLP systems,” they said. With the emergence of LLMs, which can generate fluent text without the need for specialized modules to handle grammar or semantic coherence, the need for linguistic expertise in NLP is being questioned.
‘वोटर्स विल मस्ट प्रीवेल’ (मतदाताओं को जीतना होगा) अभियान द्वारा जारी हेल्पलाइन नंबर, 4 जून को सुबह 7 बजे से दोपहर 12 बजे तक मतगणना प्रक्रिया में कहीं भी किसी भी तरह के उल्लंघन की रिपोर्ट करने के लिए खुला रहेगा।
ys jagan mohan reddy political career, Biography.pdfVoterMood
Yeduguri Sandinti Jagan Mohan Reddy, often referred to as Y.S. Jagan Mohan Reddy, is an Indian politician who currently serves as the Chief Minister of the state of Andhra Pradesh. He was born on December 21, 1972, in Pulivendula, Andhra Pradesh, to Yeduguri Sandinti Rajasekhara Reddy (popularly known as YSR), a former Chief Minister of Andhra Pradesh, and Y.S. Vijayamma.
Welcome to the new Mizzima Weekly !
Mizzima Media Group is pleased to announce the relaunch of Mizzima Weekly. Mizzima is dedicated to helping our readers and viewers keep up to date on the latest developments in Myanmar and related to Myanmar by offering analysis and insight into the subjects that matter. Our websites and our social media channels provide readers and viewers with up-to-the-minute and up-to-date news, which we don’t necessarily need to replicate in our Mizzima Weekly magazine. But where we see a gap is in providing more analysis, insight and in-depth coverage of Myanmar, that is of particular interest to a range of readers.
01062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
5. SECURITY STRATEGY = RISK ANALYSIS
KNOW THE TARGET – BE MORE EXPENSIVE
KNOW THE AREA – MAPPING RISK
KNOW YOURSELF – RISK ASSESSMENT – USE SALAMA.IO
BULLET-PROOF YOURSELF – SECURITY PROTOCOLS, NETWORKS
BULLET-PROOF YOUR STORY – STRONG VERIFICATION
BULLET-PROOF YOUR NEWSROOM – PHYSICAL -- DIGITAL
8. RISK ANALYSIS
BULLET-PROOF YOURSELF
▸ What is my risk score? Use Salama:
https://salama.io/
▸ What are my main vulnerabilities and capacities?
▸ Is there something in my personal life that can make me
vulnerable?
▸ Do I need additional training to do this story?
▸ What is the support of my media organization?
10. RISK ANALYSIS
BULLET-PROOFING THE DIGITAL NEWSROOM
▸ Protect your information: Confidentiality, Integrity,
Accessibility
▸ What are the vulnerabilities= pentesting, Salama.io
▸ What are the organizational capacities?
▸ Analyze adversaries (governments, spies, criminals?)
▸ Design a security strategy and support a budget
▸ Security policy, best practices and technologies
▸ OWASP and ISO 27001
12. RISK ANALYSIS
UNDERSTAND YOUR AREA
▸ Are there patterns of attack to journalists and media
organizations?
▸ Are violent actors holding territory? = http://www.osrx.org/
▸ Are there organized crime gangs operating in the area?
▸ Do terrorist organizations have operations there?
▸ What is the relationship of local governments with
journalists and media organizations?
14. HOLISTIC APPROACH
PROTECT YOUR STORY
▸ Use full verification methods
▸ Careful selection of sources
▸ Verify authenticity of your documents
▸ Verify every piece of data, name, date
▸ Investigate what denies your hypothesis
▸ Give your target the right to speak
16. HOLISTIC APPROACH
LEARN HOW TO WORK WITH OTHERS
▸ Set up a good communication with your editor
▸ Ask advice to other colleagues
▸ Plan well ahead your story with your editors, data analysts,
multimedia designers
▸ Keep your family and friends informed
▸ Connect to human rights organizations
18. HOLISTIC APPROACH
UNDERSTAND THE RELATION WITH THE TARGET
▸ The target will analyze what is more expensive: to attack
or not to attack you
▸ The more professional and prepared you are, the more
expensive you will be
▸ Enhance your capacities, get support from your
community, connect to your audiences
▸ Being more expensive is a good way to deter attacks
20. HOLISTIC APPROACH
SECURITY IS A COLLECTIVE ACTION
▸ Create networks of support or become
part of one
▸ Use social media to increase your
profile
▸ Participate in your own community
▸ Use the Reporta app
22. HOLISTIC APPROACH
ALWAYS OPERATE TO REDUCE RISK
▸ Check in often with your network of support
▸ Encrypt all your devices and sensitive information
▸ Use encryption to communicate with sources
▸ Organize all the community around you to act
quickly in case of an emergency
▸ Keep your distance with sources
24. HOLISTIC APPROACH
REDUCE HARM TO YOUR TARGET
▸ Always try to minimize the harm you will cause to the
target of your investigation
▸ Include the target's points of view, if possible
▸ Always publish only verified information
25. IF YOU HAVE QUESTIONS OR
NEED MORE ADVICE, DON'T
HESITATE TO CONTACT ME
Jorge Luis Sierra @latinointx
MY CONTACT INFORMATION