How do you get your legislature to pass a bill supporting plain language? This paper will explore the efforts of plain language supporters to get the United States Congress to pass a bill requiring federal agencies to write certain documents in plain language. I’ll report on where we are, how we got there, and what happens next.
Introduce wavelength and amplitude for longitudinal and transverse waves, Show that wavespeed depends on the medium and frequency depends on the source, Introduce the wave equation
Shorter version of complex forms at Clarity2010Clarity2010
Design tips for complex forms.
This is the shorter presentation for the main conference; there is a longer one available at http://slideshare.net/cjforms
How do you get your legislature to pass a bill supporting plain language? This paper will explore the efforts of plain language supporters to get the United States Congress to pass a bill requiring federal agencies to write certain documents in plain language. I’ll report on where we are, how we got there, and what happens next.
Introduce wavelength and amplitude for longitudinal and transverse waves, Show that wavespeed depends on the medium and frequency depends on the source, Introduce the wave equation
Shorter version of complex forms at Clarity2010Clarity2010
Design tips for complex forms.
This is the shorter presentation for the main conference; there is a longer one available at http://slideshare.net/cjforms
The 5 Biggest Tech Trends In Policing And Law EnforcementBernard Marr
Police and law enforcement organizations are being transformed by new technologies, such as AI, big data analytics, robots, and extended reality. Here we look at the five biggest trends and how they are changing policing.
Beyond Surveillance Data Control and BodyCameras Joh, .docxtangyechloe
Beyond Surveillance: Data Control and Body
Cameras
Joh, Elizabeth E . Surveillance & Society ; Kingston Vol. 14, Iss. 1, (2016): 133-137.
ProQuest document link
ABSTRACT (ENGLISH)
At a critical moment in American policing, we have embraced body-worn cameras as a tool of police reform and
accountability. After the 2014 fatal shooting of Michael Brown in Ferguson, Missouri, as well as other controversial
deaths of African-Americans at the hands of officers, American police have drawn intense public scrutiny (Lauter
and Pearce 2015). While some proposed police reforms in response to these deaths have been controversial,
lawmakers, police chiefs, and activists alike have supported police adoption of body-worn cameras (Elinson 2015).
Yet a February 2016 study found that only nine states had any explicit guidelines on how body-worn cameras
should be used (Urban Institute 2016). Body-worn cameras collect video data -- lots of it -- and as a result, civil
liberties groups and scholars have raised questions about increased government surveillance. But the potential
use of these cameras as surveillance tools, while an important concern, ignores an equally pressing problem.
FULL TEXT
Introduction
At a critical moment in American policing, we have embraced body-worn cameras as a tool of police reform and
accountability. After the 2014 fatal shooting of Michael Brown in Ferguson, Missouri, as well as other controversial
deaths of African-Americans at the hands of officers, American police have drawn intense public scrutiny (Lauter
and Pearce 2015). While some proposed police reforms in response to these deaths have been controversial,
lawmakers, police chiefs, and activists alike have supported police adoption of body-worn cameras (Elinson 2015).
Of seventy large U.S. police departments recently surveyed, ninety-five per cent responded that they had or were in
the process of adopting body-worn cameras (Maciag 2016). In May 2015, the U.S. Department of Justice
announced the availability of $20 million for local police departments to adopt these cameras (Berman 2015).
Without a doubt, police body cameras "are here to stay" (Hermann and Weiner 2014).
But this rapid adoption has come with a cost. Before 2015, only four states had passed any laws regarding police
body-worn cameras; by 2015, a majority of them had done so (NCSL 2015). Yet a February 2016 study found that
only nine states had any explicit guidelines on how body-worn cameras should be used (Urban Institute 2016).
Body-worn cameras collect video data-lots of it-and as a result, civil liberties groups and scholars have raised
questions about increased government surveillance. But the potential use of these cameras as surveillance tools,
while an important concern, ignores an equally pressing problem.
In our big data age, "seeing, monitoring, and recording the digital footprints is quite different from sharing,
releasing, revealing or publicizi.
Dear Reader,
We are a leading system integrator and IT solutions provider in Mumbai for automating your enterprise needs with reliable solutions since 30 years.
We are happy to publish 68th issue of our monthly newsletter "TechTalk". The earlier issues, can be found in the Newsletter section at www.goapl.com
We have helped 100+ companies in last 30 years for various IT Solutions. We’ll be happy to know if you have any requirement for IT or IT Related services, you could share the same on https://goapl.com/connect-with-us/
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
Have you ever stopped to consider the trail of breadcrumbs you leave behind every time you browse the internet? From social media posts to online purchases, your digital footprint is expanding with each click. But what if I told you that this seemingly harmless virtual path holds immense significance in solving online crime cases? In an era where cybercriminals are growing more sophisticated by the day, understanding the importance of digital footprints has become crucial for law enforcement agencies and individuals alike. Get ready to dive into a world where every keystroke could be a potential clue in unraveling complex web-based crimes.
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
(300-400 words)
1- Watch anyone of the following documentary/movie:
· The Corporation (2005)
· Food Inc. (2009)
· An Inconvenient Truth (2006)
Share your understanding around
Who
THE PEOPLE INVOLVED
What
THE PROBLEMS, THINGS, IDEAS
When
PAST, PRESENT, FUTURE OF THE TOPIC
Where
THE PLACE INVOLVED
Why
THE CAUSES, REASONS, RESULTS, CONDITIONS.
How
HISTORY OR FUNCTION (HOW IT BEGAN OR OPERATES).
………………………………………………………………………………………………………………………………………….
2-
(a) Find a news article about an economic topic that you find interesting.
(b) Make a short bullet-list summary of the article.
(c) Write and illustrate with appropriate graphs an economic analysis of the key points in the article.
Hint: Use 5Ws and 1H in your explanation.
1. Who was involved?
1. What happened?
1. When did it happen?
1. Where did it happen?
1. Why did it happen?
1. How did it happen?
Smartphones Have Privacy Risks.docx
Smartphones Have Privacy Risks
Smartphones, 2013
Top of Form
Bottom of Form
Around the turn of the century, the FBI [Federal Bureau of Investigation] was pursuing a case against a suspect—rumored to be Las Vegas strip-club tycoon Michael Galardi, though documents in the case are still sealed—when it hit upon a novel surveillance strategy.
The suspect owned a luxury car equipped with an OnStar-like system that allowed customers to "phone home" to the manufacturer for roadside assistance. The system included an eavesdropping mode designed to help the police recover the vehicle if it was stolen, but the FBI realized this same antitheft capability could also be used to spy on the vehicle's owner.
When the bureau asked the manufacturer for help, however, the firm (whose identity is still secret) objected. They said switching on the device's microphone would render its other functions—such as the ability to contact emergency personnel in case of an accident—inoperable. A federal appeals court sided with the company; ruling the company could not be compelled to transform its product into a surveillance device if doing so would interfere with a product's primary functionality.
The specifics of that 2003 ruling seem quaint today [in 2012]. The smartphones most of us now carry in our pockets can easily be turned into surveillance and tracking devices without impairing their primary functions. And that's not the only privacy risk created as we shift to a mobile, cloud-based computing world. The cloud services we use to synchronize data between our devices increase the risk of our private data falling prey to snooping by the government, by private hackers, or by the cloud service provider itself. And we're packing ever more private data onto our mobile devices, which can create big headaches if we leave a cell phone in a taxicab.
What to do about it? In this [viewpoint], we'll explore the new privacy threats being created as the world shifts to an increasingly mobile, multi-device computing paradigm. Luckily, there are steps both device makers and lawmakers can take to ...
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
10 Criminology in the Future
Criminology in the Future
Kristopher Freitag, Javielle Watson, Michael Westphal, Starcia Zeigler
CJA/314
April 7, 2014
Judy Mazzucca
Technology is advancing in every aspect of the criminal justice system, from the investigation to the prosecution of the crimes. Crime fighting methodologies have the potential to greatly assist law enforcement in the war on crime. Some experts even think that some software and tools will be able to help prevent crime. (Yeung, n.d.). Methodologies, such as mandating DNA collection programs, biometrics, and implementing cybercrime spyware programs are on the list of the next big things of the future, when it comes to fighting crime. DNA testing helps law enforcement investigate and prosecute crimes, as well as clear the names of those who have been wrongfully convicted. There are currently about twenty states with laws requiring DNA collection at the time of the person’s arrest. The federal government also has this requirement. As, with any controversial subject, DNA testing has its critics. Some are saying that DNA testing is in violation of the Fourth Amendment, especially for those who have not been convicted of a crime. Others are concerned that DNA testing may open the doors for abuse of the genetic information being stored in the databases. (Berson, n.d.). Biometrics are automated methods of recognizing a person based on physiological or behavioral characteristics. Some of the features measured using biometrics are handwriting, voice, iris, hand geometry, vein, retinal, and fingerprints. Biometric based solutions provide personal data privacy, and confidential financial transactions, and are starting to become the foundation of an extensive array of highly secure identification and personal verification solutions. The need for highly secure identification and personal verification technologies is great, due to the increased number of transaction fraud and security breaches. This need is especially great in the areas of local, state, and federal governments. Infrastructures such as electronic banking, health and social services, law enforcement, and retail sales are already taking advantage of, and seeing the benefits of biometric technology. ("The Biometrics Consortium", n.d.).
As we become more and more dependent on technology, the increase of cybercrimes are skyrocketing, which has forced law enforcement to figure out ways of combatting cybercrimes. We have become extremely vulnerable to many cybercrimes, including social media fraud, which consists of cyber criminals using social media to steal the identities of unsuspecting people; and luring people to download malicious materials, or reveal their passwords; corporate security breaches, which consists of cyber criminals exploiting company employees via scams; and phishing, which involves cyber criminals targeting company employees by sending emails that appear to be from someone within the company. ("Homeland .
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The 5 Biggest Tech Trends In Policing And Law EnforcementBernard Marr
Police and law enforcement organizations are being transformed by new technologies, such as AI, big data analytics, robots, and extended reality. Here we look at the five biggest trends and how they are changing policing.
Beyond Surveillance Data Control and BodyCameras Joh, .docxtangyechloe
Beyond Surveillance: Data Control and Body
Cameras
Joh, Elizabeth E . Surveillance & Society ; Kingston Vol. 14, Iss. 1, (2016): 133-137.
ProQuest document link
ABSTRACT (ENGLISH)
At a critical moment in American policing, we have embraced body-worn cameras as a tool of police reform and
accountability. After the 2014 fatal shooting of Michael Brown in Ferguson, Missouri, as well as other controversial
deaths of African-Americans at the hands of officers, American police have drawn intense public scrutiny (Lauter
and Pearce 2015). While some proposed police reforms in response to these deaths have been controversial,
lawmakers, police chiefs, and activists alike have supported police adoption of body-worn cameras (Elinson 2015).
Yet a February 2016 study found that only nine states had any explicit guidelines on how body-worn cameras
should be used (Urban Institute 2016). Body-worn cameras collect video data -- lots of it -- and as a result, civil
liberties groups and scholars have raised questions about increased government surveillance. But the potential
use of these cameras as surveillance tools, while an important concern, ignores an equally pressing problem.
FULL TEXT
Introduction
At a critical moment in American policing, we have embraced body-worn cameras as a tool of police reform and
accountability. After the 2014 fatal shooting of Michael Brown in Ferguson, Missouri, as well as other controversial
deaths of African-Americans at the hands of officers, American police have drawn intense public scrutiny (Lauter
and Pearce 2015). While some proposed police reforms in response to these deaths have been controversial,
lawmakers, police chiefs, and activists alike have supported police adoption of body-worn cameras (Elinson 2015).
Of seventy large U.S. police departments recently surveyed, ninety-five per cent responded that they had or were in
the process of adopting body-worn cameras (Maciag 2016). In May 2015, the U.S. Department of Justice
announced the availability of $20 million for local police departments to adopt these cameras (Berman 2015).
Without a doubt, police body cameras "are here to stay" (Hermann and Weiner 2014).
But this rapid adoption has come with a cost. Before 2015, only four states had passed any laws regarding police
body-worn cameras; by 2015, a majority of them had done so (NCSL 2015). Yet a February 2016 study found that
only nine states had any explicit guidelines on how body-worn cameras should be used (Urban Institute 2016).
Body-worn cameras collect video data-lots of it-and as a result, civil liberties groups and scholars have raised
questions about increased government surveillance. But the potential use of these cameras as surveillance tools,
while an important concern, ignores an equally pressing problem.
In our big data age, "seeing, monitoring, and recording the digital footprints is quite different from sharing,
releasing, revealing or publicizi.
Dear Reader,
We are a leading system integrator and IT solutions provider in Mumbai for automating your enterprise needs with reliable solutions since 30 years.
We are happy to publish 68th issue of our monthly newsletter "TechTalk". The earlier issues, can be found in the Newsletter section at www.goapl.com
We have helped 100+ companies in last 30 years for various IT Solutions. We’ll be happy to know if you have any requirement for IT or IT Related services, you could share the same on https://goapl.com/connect-with-us/
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxwebb00704
Have you ever stopped to consider the trail of breadcrumbs you leave behind every time you browse the internet? From social media posts to online purchases, your digital footprint is expanding with each click. But what if I told you that this seemingly harmless virtual path holds immense significance in solving online crime cases? In an era where cybercriminals are growing more sophisticated by the day, understanding the importance of digital footprints has become crucial for law enforcement agencies and individuals alike. Get ready to dive into a world where every keystroke could be a potential clue in unraveling complex web-based crimes.
(300-400 words)1- Watch anyone of the following documentarymovi.docxmayank272369
(300-400 words)
1- Watch anyone of the following documentary/movie:
· The Corporation (2005)
· Food Inc. (2009)
· An Inconvenient Truth (2006)
Share your understanding around
Who
THE PEOPLE INVOLVED
What
THE PROBLEMS, THINGS, IDEAS
When
PAST, PRESENT, FUTURE OF THE TOPIC
Where
THE PLACE INVOLVED
Why
THE CAUSES, REASONS, RESULTS, CONDITIONS.
How
HISTORY OR FUNCTION (HOW IT BEGAN OR OPERATES).
………………………………………………………………………………………………………………………………………….
2-
(a) Find a news article about an economic topic that you find interesting.
(b) Make a short bullet-list summary of the article.
(c) Write and illustrate with appropriate graphs an economic analysis of the key points in the article.
Hint: Use 5Ws and 1H in your explanation.
1. Who was involved?
1. What happened?
1. When did it happen?
1. Where did it happen?
1. Why did it happen?
1. How did it happen?
Smartphones Have Privacy Risks.docx
Smartphones Have Privacy Risks
Smartphones, 2013
Top of Form
Bottom of Form
Around the turn of the century, the FBI [Federal Bureau of Investigation] was pursuing a case against a suspect—rumored to be Las Vegas strip-club tycoon Michael Galardi, though documents in the case are still sealed—when it hit upon a novel surveillance strategy.
The suspect owned a luxury car equipped with an OnStar-like system that allowed customers to "phone home" to the manufacturer for roadside assistance. The system included an eavesdropping mode designed to help the police recover the vehicle if it was stolen, but the FBI realized this same antitheft capability could also be used to spy on the vehicle's owner.
When the bureau asked the manufacturer for help, however, the firm (whose identity is still secret) objected. They said switching on the device's microphone would render its other functions—such as the ability to contact emergency personnel in case of an accident—inoperable. A federal appeals court sided with the company; ruling the company could not be compelled to transform its product into a surveillance device if doing so would interfere with a product's primary functionality.
The specifics of that 2003 ruling seem quaint today [in 2012]. The smartphones most of us now carry in our pockets can easily be turned into surveillance and tracking devices without impairing their primary functions. And that's not the only privacy risk created as we shift to a mobile, cloud-based computing world. The cloud services we use to synchronize data between our devices increase the risk of our private data falling prey to snooping by the government, by private hackers, or by the cloud service provider itself. And we're packing ever more private data onto our mobile devices, which can create big headaches if we leave a cell phone in a taxicab.
What to do about it? In this [viewpoint], we'll explore the new privacy threats being created as the world shifts to an increasingly mobile, multi-device computing paradigm. Luckily, there are steps both device makers and lawmakers can take to ...
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
10 Criminology in the Future
Criminology in the Future
Kristopher Freitag, Javielle Watson, Michael Westphal, Starcia Zeigler
CJA/314
April 7, 2014
Judy Mazzucca
Technology is advancing in every aspect of the criminal justice system, from the investigation to the prosecution of the crimes. Crime fighting methodologies have the potential to greatly assist law enforcement in the war on crime. Some experts even think that some software and tools will be able to help prevent crime. (Yeung, n.d.). Methodologies, such as mandating DNA collection programs, biometrics, and implementing cybercrime spyware programs are on the list of the next big things of the future, when it comes to fighting crime. DNA testing helps law enforcement investigate and prosecute crimes, as well as clear the names of those who have been wrongfully convicted. There are currently about twenty states with laws requiring DNA collection at the time of the person’s arrest. The federal government also has this requirement. As, with any controversial subject, DNA testing has its critics. Some are saying that DNA testing is in violation of the Fourth Amendment, especially for those who have not been convicted of a crime. Others are concerned that DNA testing may open the doors for abuse of the genetic information being stored in the databases. (Berson, n.d.). Biometrics are automated methods of recognizing a person based on physiological or behavioral characteristics. Some of the features measured using biometrics are handwriting, voice, iris, hand geometry, vein, retinal, and fingerprints. Biometric based solutions provide personal data privacy, and confidential financial transactions, and are starting to become the foundation of an extensive array of highly secure identification and personal verification solutions. The need for highly secure identification and personal verification technologies is great, due to the increased number of transaction fraud and security breaches. This need is especially great in the areas of local, state, and federal governments. Infrastructures such as electronic banking, health and social services, law enforcement, and retail sales are already taking advantage of, and seeing the benefits of biometric technology. ("The Biometrics Consortium", n.d.).
As we become more and more dependent on technology, the increase of cybercrimes are skyrocketing, which has forced law enforcement to figure out ways of combatting cybercrimes. We have become extremely vulnerable to many cybercrimes, including social media fraud, which consists of cyber criminals using social media to steal the identities of unsuspecting people; and luring people to download malicious materials, or reveal their passwords; corporate security breaches, which consists of cyber criminals exploiting company employees via scams; and phishing, which involves cyber criminals targeting company employees by sending emails that appear to be from someone within the company. ("Homeland .
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Leading Change strategies and insights for effective change management pdf 1.pdf
City Wide Surveillance Using Search Based Video
1. City Wide Surveillance Using Search Based Video <br />Drinking from a Video Fire Hose Can be Tricky<br />London’s city-wide transit surveillance system, the ‘ring of steel,’ includes more than ten thousand cameras. And three thousand plus cameras have been deployed in Chicago, as well, with three thousand more soon coming to New York City. New Orleans, Baltimore, Philadelphia and more have all moved forward with new city-wide and transit authority surveillance projects too. Internationally, Taipei recently announced a thirteen thousand camera city-wide initiative, and largest of them all, Beijing deployed a staggering 300,000 cameras prior to Olympics. <br />Collectively more cities have deployed more cameras to more purposes in the past few years than in previous decades combined. And with fast networks and hi-resolution cameras, surveillance video spigots are on and running at full blast. <br />Now we just need to figure out how to take a drink. <br />Cities and transportation authorities are fast discovering that in addressing security and safety problem through video surveillance, they have created another: information overload. It’s the same problem folks at the NSA, CIA, and in signal intelligence realized they had many years ago after proliferating their countless satellites and listening posts. What were they going to do with all that information? How could they sift through countless hours of nothing looking for that rare something? Today this problem has led many to question the ultimate efficacy of video as a security tool in human and cargo transit systems.<br />In London the opponents of the so-called ‘Ring of Steel’ argue that despite their 10,000 plus cameras more than 80% of crimes remain unsolved. And after the London bombings in 2005, it literally took thousands of investigators more than six weeks to actually comb through the cities vast surveillance archives looking for clues to the bombing and its perpetrators. Clearly this isn’t the kind of effort that can be deployed in more routine circumstances, and so it’s no wonder that despite massive camera proliferation in London so most crimes go unsolved. <br />In some enterprising small cities such as Lancaster, Pennsylvania, citizens are given the ability to access and manipulate the cameras in an attempt to address these kinds of problems giving new meaning to “neighborhood watch.” Still many studies question whether enough has been done to really make video surveillance ‘effective.’ For instance, recent studies in San Francisco and Los Angeles claim zero impact on crime.<br />This will remain a problem so long as these deployments are hampered by an unmanaged and unmanageable deluge of video. You can’t find what you can’t see.<br />How many cameras do you need to have before you can’t see ANYTHING?<br />The critical question that no one is asking is how do you make the captured video relevant to safety and security? While many articles and studies focus on how to network cameras effectively, how to cover hard to reach spots with specialized cameras, whether to locate intelligence at the edge or on a server, and how video analytics will magically find a terrorist in the act of contemplating a catastrophic attack, no one has put forward a workable model for making video useful in a transportation safety related scenario. <br />How will video technology stop the assault of a citizen? How can we foil the plots of those bent on mass destruction, and how can we do it in such a way that salvages the millions of dollars spent to implement these extensive camera systems. <br />Making Good on Transportation Safety Claims<br />The problem with big video really comes down to its inherent lack of structure. Analog or IP, standard resolution or megapixel, surveillance video is all essentially unstructured stuff. In contains no notes, no tags or descriptions, and no keywords to help you separate what’s important from what is not. That is a problem. It means that for the most part video is useless without a person to make sense of it, and we just don’t have enough people to keep up with all the video we are generating. Estimates are that we’ve deployed about 30 million cameras in the world; that works out to be more than 250 BILLION new hours of recorded video every year.<br />But if we could teach computers to make sense out video, even a little, that means we could make it searchable. And a good search engine, we have learned, can change the world. Imagine the internet without a search engine. There are over ten billion web pages…more. Users would sift aimlessly through content rarely striking on something useful and necessary to their point of interest. If they did, they would not be able to indicate their interest in topics like this and find similar content. In short, search makes the internet usable. <br />And yet, somehow this information revolution that improved productivity in other knowledge management industries has not yet to transform our approaches to surveillance. Law enforcement and security staff are often left to sift through countless hours of video footage in order to pinpoint those vital few moments of video. Once found, the process of finding more video related to the same person or event is often just as arduous as the first inquiry. <br />Video search technology exists to make video relevant. Searching on an event by time and place, license plate, serial number, face, color, toll transaction, or other relevant data point can rapidly narrow the video data set down to a volume that can quickly be sifted and analyzed by the human eye. <br />Take for example a purse is stolen on the subway. The victim reports the time and location of the assault, but the actual assault did not happen in an area in the field of view of a camera. In most instances, the victim would have little recourse other than to complete a crime report. <br />With search based video surveillance, however, the investigating party could rapidly pull up video from motion events in the surrounding area and times, broadening the search to achieve more results presented in an easy to scan form. In less than a few seconds, they spot the perpetrator exiting the subway with the purse. Without search, the operator would only have been able to find this video if he had the time and willingness to manually review video from each possible camera feed. <br />Searching for Faces, License Plates, Objects, Colors and More<br />But search for what? Search engines like Google rely on things like keywords and page ranks and the fact that web page text can be analyzed and cross indexed to make meaningful searches possible. Video is completely different, but it too can be analyzed for things like faces, license plates, colors, object tracks, and more. And when this data is processed and cross indexed an incredible understanding of activity and identity can emerge from video.<br />Once relevant video analytics are implemented and tuned, the game changes entirely in favor of law enforcement. License plate recognition, commonly used to stop toll evaders, is often dismissed as a crime stopping tool because the technology requires highly tuned and expensive cameras to be implemented. Technology now exists that allows common cameras to track license plates anywhere from a car rental agency to a city intersection. <br />And while facial recognition is a dirty word in some video surveillance circles, the technology’s promise to deliver more criminals to justice is being realized in transit scenarios. Much of this can be attributed to the dramatic increase in accuracy of face finding technologies in recent years. Where tests of facial recognition in German subways in 2006-2007 yielded accuracy rates of around 60%, recent studies conducted in South Korea show that new technologies can achieve accuracy of closer to 85% with very low instance of false positives. <br />Moving from Reactive to Pro-active<br />We will all know that our efforts at developing transportation based video surveillance systems will be reached when we read the headline “Terrorist Plot Foiled, Suspects Captured using Video Surveillance, No Citizen Harmed.” <br />For this to happen, search is simply not sufficient as it is by its nature a forensic tool. But, if you turn search on its head, you have alerts. Just as Google can send you information pertaining to topics of interests, so can advanced video surveillance systems provide alerts related to events, people, cars, and other items of interest. <br />For transit security professionals this answers the question “what should I be looking at?” Rather than asking security staff to stare dumbly into monitors hoping to see something that may or may not be happening, why not provide that staff with a steady stream of events (face events, motion events, license plate events, etc) that point to activity that might be of interest. <br />Visiting the example of our ill intentioned thief again, let’s assume that he did indeed get away with stealing the woman’s purse, and we now have isolated three instances of him on video that provide evidence of three different thefts. Flagging this video we ask the system to alert us the next time he enters the transportation system. True to his pattern, he returns to the subway and attempts to position himself in the same “off camera” location where he committed his other crimes. This time, monitoring staff are alerted to his presence in the system before he has a chance to act, and they are able to apprehend him. <br />While video analytics can surface suspicious activities, objects, and people, the trick to making alerts work is managing false positives. If every alert turns out to be a false positive and actual criminal behavior is missed, then the system is no more useful than the proverbial sleeping security guard. In the Korea subway use case mentioned above, in each case that a “watchlist” suspect entered the subway, the system accurately alerted staff to the presence of the individual. While alerts did come through that turned out to be false, the volume was at a tolerable level that did not reduce the efficiency of the operation. <br />Key Considerations in Using Video Analytics in Transportation Use Cases<br />The Minority Report is just a movie. What you see on CSI, NCIS, Las Vegas and any other crime television drama is also fake. Though these images often form the basis of what users expect to be able to do with a system, they are not realistic use cases for video technology. However, never before have so many valuable use cases been within our grasp allowing safety and security professionals to gain the upper hand and narrow the chances of a criminal’s escape. <br />To successfully leverage intelligent video in a transportation setting, it is important to simplify and integrate. Find a system that provides a platform for the integration of a wide variety of cameras, data systems, and analytics. By starting with a platform that is easy to integrate to, they system will be able to flex to meet several use cases. <br />Uses cases are the crux of an effective implementation. Transportation surveillance by its nature focuses on the rapid motion of a large number of people and objects over a wide area. Too often, video systems are installed in such a way that they see too much of the very big picture and not nearly enough of the detail. While tracking a wide area is a catch all use case, it does nothing to solve the problem of too much video. To create effective use case, institutions should not to implement a wide reaching dragnet but rather should address individual use cases, develop, implement, and tune them until they work. <br />As New York found in the 1990’s, the key to overall crime reduction was to crack down on specific small crimes – graffiti, littering, public drunkeness. Define the use case, how you would solve it, and then determine the proper equipment, search tools, and analytics that will allow your organization to address the behavior effectively from a reactive and proactive stance. Toll jumpers, freight from a suspicious location, or unattended bags are good examples of use cases that can be addressed and managed with video analytics. Once you conquer one, move on to another. Soon enough you will see that you have solved several individual problems, but what you have really done is created fewer and fewer options for criminals to destabilize transit systems and endanger the people and cargo that move through them. <br />Surfing the Tidal Wave<br />We stand at a turning point in the development of video as a tool to stop crime in our nation’s transportation systems. Cameras have created a tidal wave of near indecipherable visual information. To surf it, we are going to have to combine the knowledge from our intelligence communities, the most innovative system design, and the best and brightest from the IT industry. It will require us embrace and hone new tools and technologies, teaching the right video to surface itself. But in the end, making sense out of video and making it searchable is the only way to begin to fulfill on the promise of video as a tool to keep travelers, trade, and our nation safe. <br />