Facebook's business model relies on collecting and sharing users' personal information with advertisers to target ads. However, this invades users' privacy. Facebook's privacy policies and features have been weak, allowing user data to be shared without clear consent. While privacy is crucial to its users, Facebook's success depends on data-driven advertising. However, Facebook may be able to balance these competing priorities through opt-in advertising programs and giving users more transparency and control over how their data is used.
Reasons why facebook news feed having updates for publishers - Webtraffic.agencyOnline Marketing Company
There was much more cash to be produced using sponsorships of publication recordings that distributers as of now had on their calendar and required no extra creation dollars — "basically free cash," as one executive at a best Facebook distributer said. Also, it helped that the normal, made-for-Facebook news-bolster recordings — short, quiet, content on-screen autoplay cuts — are shabby to produce.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
1. Facebook : It’s About The Money CASE 2.2
CASE STUDY 2.2
FACEBOOK: IT’S ABOUT THE MONEY
a) Perform an ethical analysis of Facebook. What is the ethical dilemma presented
by this case?
Facebook is the leading Social Networking Site of the World. Facebook mission is to
make the world more open and connected. Facebook helps Internet users stay
connected with their friends, families, and colleagues. It helps them discover and
learn more about what is going on in the world around them. It helps them express
themselves by sharing their opinions, ideas, photos, and activities. However, what the
company actually does is to share tons of information about users with large
multinational advertisers to bring the benefit for it. Advertisers can engage with users
based upon the information shared by users such as age, gender, location, education,
work history or specific interests. Facebook CEO Mark Zuckerberg often says that
people want to be more open and connected. It's unclear whether that is truly the
case, but it is certainly true that Facebook wants the world to be more open and
connected because it stands to make more money in that world.
b) What is the relationship of privacy to Facebook’s business model?
Talking privacy to Facebook is a bit ironic. Facebook’s entire business model is
based on aggregation and sharing user information. They give people a free social
media platform to use and in turn sell advertising and insights based on what they
learn about user. Facebook has massive capabilities to collect, store and analyze data.
This allows Facebook to sell very targeted advertising. Therefore, privacy is the
Facebook business model.
2. Facebook : It’s About The Money CASE 2.2
c) Describe the weaknesses of Facebook’s privacy policies and features. What
people, organization, and technology factors have contributed to those
weaknesses?
The weakness behind Facebook's privacy issues was a lack of communication
between Facebook and its users. Users were not aware that they were able to control
what information was being shared with external parties.
Facebook’s use of their Beacon advertising service caused the first problem for users.
This service served as a way to inform users of purchases and activities of their
friends outside of Facebook. There was two problems with this service, first it
function of the “news feed” was met with opposition from users because they felt it
was too invasive. Instead of only sharing status updates the news feed shared
additional information such as profile updates, adding new friends, and adding new
applications.
A organization which called the civic action group MoveOn.org created a face book
group to against the Beacon. So finally the Facebook.com change this service and
gave their users the able to disable it completely.
There were two problems with this service, first it was an opt-out service, meaning the
users themselves had to turn off the service to not have their information shared, and
second even when users turned off the service it continued to share their information.
The introduction of the “news feed” was met with opposition from users because they
felt it was too invasive. Instead of only sharing status updates the news feed shared
additional information such as profile updates, adding new friends, and adding new
applications.
Facebook handling incorrectly user information when deleting their accounts also
caused a backlash for Facebook. Facebook servers would keep user information
permanently, with the reasoning that it would be easier for the users to reactivate their
accounts if they chose to.
d) Will Facebook be able to have a successful business model without invading
privacy? Explain your answer, Are there any measures Facebook could take to
make possible?
Without invading privacy Facebook will be able to have successful business model.
Refer from the case study we can see that in 2012, Facebook agreed to allow users to
opt in to its sponsored Stories services, which serves advertisements that highlight
products and business that all of Facebook users are using.
Users can control and see which of their actions on facebook generate
advertisements that their friends will see.
Sponsored Stories are one of the most effective forms of advertising on Facebook
because they don’t seem like advertisements at all to most user.