Describes what the Semantic Web is in non-technical terms, and how/why it has come about.
Shows some ways in which Google & Facebook are using Semantic Web technologies & techniques, and provides some initial pointers as to how they could be used in a nonprofit context.
Social Media is becoming commonplace in our society, both at work and at home. It's responsible for a major paradigm shift in how we communicate with each other. This presentation addresses that shift and discusses how our privacy is being eroded as a result and what you can do about it.
The web life is a great life, until you get hacked! Do yourself a favor and sit in on this presentation for a web security health check, just for higher education web professionals. See for yourself, the risks associated with the hottest web tools that we all love to use.
Prof. Hendrik Speck - IMEA 3 Heidelberg - Social MediaHendrik Speck
Prof. Hendrik Speck -
IMEA 3 Heidelberg - Social Media
prof. hendrik speck, imea 3, imea3, heidelberg, social media, risks, opportunities, insurance, trust, media, audience, reach, value, user, reputation, trust, loyalty, mediademogaphics, web 2.0, facebook, flickr, twitter, wikipedia
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.Hendrik Speck
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks, re:publica’09. Shift happens. Netiquette for Social Networks, April 2nd, 2009, Berlin, Germany
October 9th, 2008 Berlin, Germany, privacy, private sphere, public sphere, risk, law, security, anonymity, surveillance, panopticon, sousveillance, social network analysis, social media, web 2.0, hype, history, features, examples, audience, user, markets, revenues, google, youtube, myspace, wikipedia, captcha, security, cracking, data portability, decentralization, helloworld, hello world network, open id, openid, opensocial, open social, rsa, foaf, xml, java
Social Media is becoming commonplace in our society, both at work and at home. It's responsible for a major paradigm shift in how we communicate with each other. This presentation addresses that shift and discusses how our privacy is being eroded as a result and what you can do about it.
The web life is a great life, until you get hacked! Do yourself a favor and sit in on this presentation for a web security health check, just for higher education web professionals. See for yourself, the risks associated with the hottest web tools that we all love to use.
Prof. Hendrik Speck - IMEA 3 Heidelberg - Social MediaHendrik Speck
Prof. Hendrik Speck -
IMEA 3 Heidelberg - Social Media
prof. hendrik speck, imea 3, imea3, heidelberg, social media, risks, opportunities, insurance, trust, media, audience, reach, value, user, reputation, trust, loyalty, mediademogaphics, web 2.0, facebook, flickr, twitter, wikipedia
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.Hendrik Speck
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks, re:publica’09. Shift happens. Netiquette for Social Networks, April 2nd, 2009, Berlin, Germany
October 9th, 2008 Berlin, Germany, privacy, private sphere, public sphere, risk, law, security, anonymity, surveillance, panopticon, sousveillance, social network analysis, social media, web 2.0, hype, history, features, examples, audience, user, markets, revenues, google, youtube, myspace, wikipedia, captcha, security, cracking, data portability, decentralization, helloworld, hello world network, open id, openid, opensocial, open social, rsa, foaf, xml, java
This talk describes the benefits of social media as well as its security challenges. It also outlines sample defenses that companies can adopt. It was given at CSO breakfast club in NYC.
Social Media Is Nothing To Be Afraid Of - PRSA Colorado Member Retreat 11-08 ...Michael Pranikoff
Social Media - This Is Nothing to Fear - Presentation by Michael Pranikoff, PR Newswire Director of Emerging Media at the PRSA Colorado Member Retreat 11-14-08
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Execu...Hendrik Speck
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Executive Forum, June 8th 9th 2009 Berlin Germany. social networks, social media, web 2.0, social network analysis, usage, audience, user, markets, revenues, google, youtube, myspace, wikipedia, attributes, search engines, marketing, lobbying, information mining, information retrieval, risk, law, security, branding, marketing, privacy, private sphere, public sphere, anonymity, surveillance, panopticon, sousveillance, hype, history, features, examples, captcha, security, cracking, data portability, decentralization
Talk given at the Semantic Web SIKS course 2011: why we need semantics on the Social Web. Three examples: social tagging, user profiling based on Twitter streams and cross-system user profiling (linking user profiles).
This talk describes the benefits of social media as well as its security challenges. It also outlines sample defenses that companies can adopt. It was given at CSO breakfast club in NYC.
Social Media Is Nothing To Be Afraid Of - PRSA Colorado Member Retreat 11-08 ...Michael Pranikoff
Social Media - This Is Nothing to Fear - Presentation by Michael Pranikoff, PR Newswire Director of Emerging Media at the PRSA Colorado Member Retreat 11-14-08
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Execu...Hendrik Speck
Professor Hendrik Speck - Information Mining in the Social Web. Empolis Executive Forum, June 8th 9th 2009 Berlin Germany. social networks, social media, web 2.0, social network analysis, usage, audience, user, markets, revenues, google, youtube, myspace, wikipedia, attributes, search engines, marketing, lobbying, information mining, information retrieval, risk, law, security, branding, marketing, privacy, private sphere, public sphere, anonymity, surveillance, panopticon, sousveillance, hype, history, features, examples, captcha, security, cracking, data portability, decentralization
Talk given at the Semantic Web SIKS course 2011: why we need semantics on the Social Web. Three examples: social tagging, user profiling based on Twitter streams and cross-system user profiling (linking user profiles).
Presented by Stephanie Rieger at Breaking Development in Dallas, April 11 2011 and Mobilism in Amsterdam, May 12, 2011.
Context is often cited as the single most important factor in design for the mobile medium. Mobile devices are of course 'mobile', but they are also small, always on, always with us, and can instantly connect us to the people we love. Mobile services must therefore be simple, social, and well-focussed--enabling us to quickly get things done on even the smallest screens.
This is all well and good, but mobile devices have changed. They may be mobile, but many have already stopped being 'phones'—nor do they resemble what we traditionally think of as computers. This presentation will explore how our use, and perception of mobile devices is changing, and how these changes may impact how we should design for them going forward.
Semantic web approach towards interoperability and privacy issues in social n...ijwscjournal
The Social Web is a set of social relations that link people through World Wide Web. This Social Web
encompasses how the websites and software are designed and developed to support social relations. The
new paradigms, tools and web services introduced by Social Web are widely accepted by internet users.
The main drawbacks of these tools are it acts as independent data silos; hence interoperability among
applications is a complex issue. This paper focuses on this issue and how best we can use semantic web
technologies to achieve interoperability among applications.
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...ijwscjournal
The Social Web is a set of social relations that link people through World Wide Web. This Social Web encompasses how the websites and software are designed and developed to support social relations. The new paradigms, tools and web services introduced by Social Web are widely accepted by internet users. The main drawbacks of these tools are it acts as independent data silos; hence interoperability among applications is a complex issue. This paper focuses on this issue and how best we can use semantic web technologies to achieve interoperability among applications.
This is an edited version of a talk that I gave on the 11th of February to some PhD students from the University of Utrecht at a seminar on science and communication.
Facebook Open Graph - The Semantic WalletJonathan Laba
This deck covers how Facebook is becoming a hub for consumer devices, apps and services to connect to each other in a secure manner to share data.
Facebook's allowance for the input and retrieval of structured data based on semantic web principles is positioning them to be the gold standard in the management of a unified digital identity.
This deck covers:
- What Social Means to Developers
- What is the Semantic Web
- Facebook's Evolution into Structured Data
- The Semantic Wallet
- Some Questions
A little presentation/discussion about current and emerging technologies in libraries, as well as library/web 2.0., user generated content, and social media by robin fay, georgiawebgurl@gmail.com (Keynote address to GPLS Annual 2009)
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
4. 2001 /
2013?
1999 /
2004 Web 3.0
Semantic Web
Web 2.0 TBD
1994 / Social Web
1998 Facebook, Twitter,
Wikipedia, …
1991 / Web 1.5
1994 Search Web
Google
Web 1.0
Static Web
Yahoo
20. in conclusion…
• the Semantic Web helps people find you
• the Semantic Web helps people ask the right
questions
• the Semantic Web helps people remix data for
good
Background material (not to be read aloud):===========================4 web paradigms: oversimplificationEach paradigm has a period of incubation and a period of dominance. However first two coexist as strategies, as do second two. Web 3.0 still in its infancy – though proposed a long time ago now.Each paradigm is illustrated by a dominant company/organization, and has a distinctive strategy by which it helps manage the growth of the Web (complexity) while maintaining quality/relevance.Web 1.0:1991 – Tim Berners-Lee makes a Web page publicly available on CERN site (were precursors, but nothing accessible to general public)1994 – Yahoo is foundedStrategy: Directory of pagesFlaws: Requires humans to update directory, implies universal hierarchyWeb 1.5:1994 – Webcrawler: search engines begin, but co-exist as a discovery mechanism1998 – Google is foundedStrategy: Have search engine crawl WebInitial flaw: How to determine relevance off keywords aloneGoogle’s solution: PageRank – leverage people’s linking behaviors to determine relevanceFlaw: “Black hat” SEO – people game the systemWeb 2.0 – “read/write Web”:1999 – Web 2.0 term is coined by Tim O’Reilly2004 – Facebook is foundedStrategy: Make it easy for people to create and share Web content, so existing good content will rise to the top, and people can collaborate on new distributed projects that would’ve been impossible previouslyFlaws: Conversation can be captured within particular sites – “walled garden” effect as in pre-WWW online service era; problem of credit for individual people’s work – sometimes “hive mind” effect is createdWeb 3.02001 – Tim Berners-Lee writes original article proposing it in Scientific AmericanStill to be realized in full formStrategy: Structured description of Web documents, for machines to classify; machine learning & semantic classification – build a “question engine”, not just a search engineResponds to external threat from “walled garden” effect of apps, as well as internal threat seen by flaws in previous strategiesFlaws: Difficult to actually implement – manual intervention to apply semantic markup to documents; standards confusion & politics
Google is starting to use “rich site snippets” to enhance search results. See examples on this slide. There are different ways to create them, but Google provides a how-to section on their web site. You can use Google Webmaster Tools to confirm they are coming across correctly.Background notes:Google’s rich site snippets tool can generate its information via multiple means: microformats, RDFa, microdata (basically in that order of preference).Microformats – use class & relRDFa – based on XHTMLMicrodata – uses new properties added to HTML in the HTML5 standardSchema.org is a particular “ontology”: i.e., way of describing things in the world which is used with microdata. Can also be used with RDFa. Supersedes the microformat standards, since there were so many of them.Further reference:Google’s announcement: http://googlewebmastercentral.blogspot.com/2009/05/introducing-rich-snippets.htmlExplanation of three types - http://spyrestudios.com/real-world-microformats-rdfa-microformats-and-microdata-practical-examples/More on microformats - http://sixrevisions.com/web-development/ultimate-guide-to-microformats-reference-and-examples/More on RDFa - http://rdfa.info/More on microdata - http://www.webmonkey.com/2010/09/microdata-html5s-best-kept-secret/Schema.org types - http://schema.org/docs/schemas.html
Google has taken it a step further with Semantic Search. Remember Wolfram Alpha? This is Google’s attempt at that sort of approach.Link: http://dejanseo.com.au/google-semantic-search/
More info for non-techies: http://blog.programmableweb.com/2012/04/11/facebook-to-expand-social-graph-api-to-include-places/Examples: http://allthingsd.com/20120118/the-most-interesting-uses-of-facebooks-new-open-graph/Going beyond the “like”: http://www.yvoschaap.com/weblog/facebook_open_graph_going_beyond_the_likeHow to, for developers:https://developers.facebook.com/docs/opengraph/
Open Data is about governments, academic institutions, nonprofits, consortia, etc. making large datasets available to the public for free. Parallel to Open Source, Open Content & Open Education movements.The Semantic Web is about making interconnections between this open data to enable people to answer questions like how Google is doing.Data description standards like RDFa & RDF are used to make this possible.Source: selected sources from en.wikipedia.org/wiki/Open_Data
Apps can produce “walled garden” effect.Even if they have open APIs, there is a rapidly growing number of different incompatible APIs which developers would have to deal with.RDF, one of the core technologies of the Semantic Web, can provide a lingua franca for apps.This makes the process of developing mashups – resources that draw data from multiple websites, apps, or other data sources - much more manageable.