This was designed as a very brief overview for students in violation of Copyright Infringement to review before taking their online exam in order to have their internet reinstated on campus.
Students can check their understanding of copyright, fair use and public domain with these 20 case scenarios. based on the Copyright Issues reading by the WIT 2000 University of Chicago.
http://cuip.uchicago.edu/wit/2000/curriculum/homeroommodules/copyright/definitions.htm
This presentation is about the societal impacts. It is strictly based on CLASS 12 Informatics Practices Book aiming to help students and teachers to make learning easy .
CREDITS : pythonmykvs.in
Students can check their understanding of copyright, fair use and public domain with these 20 case scenarios. based on the Copyright Issues reading by the WIT 2000 University of Chicago.
http://cuip.uchicago.edu/wit/2000/curriculum/homeroommodules/copyright/definitions.htm
This presentation is about the societal impacts. It is strictly based on CLASS 12 Informatics Practices Book aiming to help students and teachers to make learning easy .
CREDITS : pythonmykvs.in
Professional Issues in IT - Intellectual Property Basics
Reference : Tavani, Herman T., “Ethics and technology: controversies, questions, and strategies for ethical computing” , 4th Edition.
Copyright Protection of a Software as a Work with Functional ElementsJan Lindberg
Â
Presentation held on 6th November 2015 in ITechLaw's European Conference in London where I led ITechLaw's IP Committee's workshop. We discussed the recent decisions affecting protection of functional elements of computer programs via copyright in light of SAS v. WPL and Oracle v. Google cases, as well as the related Finnish case law. In this interactive session we covered copyright protection for functionalities in computer programs, programming languages, interfaces, and several other interesting topics comparing EU and US regimes, also covering right to contractually limit information in public domain in IT sector and other fields. Statements were intentionally provocative to facilitate discussions so these do not necessarily represent my personal views.
An overview of the basics of US copyright fair use for entrepreneurs, business people, and creative professionals. "What Is Fair Use?" includes the following:
A brief review of copyright.
Copyright law vs. the First Amendment.
How do you "claim" Fair Use?
The Four Factors of Fair Use.
Important Fair Use Cases.
The future of Fair Use.
For more information, please go to LizerbramLaw.com
Professional Issues in IT - Intellectual Property Basics
Reference : Tavani, Herman T., “Ethics and technology: controversies, questions, and strategies for ethical computing” , 4th Edition.
Copyright Protection of a Software as a Work with Functional ElementsJan Lindberg
Â
Presentation held on 6th November 2015 in ITechLaw's European Conference in London where I led ITechLaw's IP Committee's workshop. We discussed the recent decisions affecting protection of functional elements of computer programs via copyright in light of SAS v. WPL and Oracle v. Google cases, as well as the related Finnish case law. In this interactive session we covered copyright protection for functionalities in computer programs, programming languages, interfaces, and several other interesting topics comparing EU and US regimes, also covering right to contractually limit information in public domain in IT sector and other fields. Statements were intentionally provocative to facilitate discussions so these do not necessarily represent my personal views.
An overview of the basics of US copyright fair use for entrepreneurs, business people, and creative professionals. "What Is Fair Use?" includes the following:
A brief review of copyright.
Copyright law vs. the First Amendment.
How do you "claim" Fair Use?
The Four Factors of Fair Use.
Important Fair Use Cases.
The future of Fair Use.
For more information, please go to LizerbramLaw.com
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
Â
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Â
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
Â
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Â
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
Â
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Â
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Â
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
Â
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
Â
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
2. History of Copyright The Statute of Anne The first modern copyright law Enacted in 1710 by English Parliament http://www.law.berkeley.edu/7729.htm http://avalon.law.yale.edu/18th_century/anne_1710.asp The Copyright Bill 1st federal copyright law Approved May 13, 1790 by President George Washington There have been many amendments and acts related to Copyright, but the more modern Copyright legislations are used by courts today.
3. Modern Copyright Legislation Copyright Act of 1976 Was a general revision of the previous Copyright laws. Digital Millennium Copyright Act (DMCA) Enacted October 28,1998 Addressed issues directly related towards digital copyright and digital content
4. What is Copyright Copyright is a form of protection for an author’s original piece of work. (a.k.a – Intellectual Property Rights) This protection gives the owner of the copyright the “exclusive right” to decide who can sell or reproduce their work, and much more. (Copyright Basics Circular 1). Intellectual property, according to the World Intellectual Property Organization, is creations from the mind. Thus a work can be copyrighted in published or unpublished form.
5. Copyright cont. Any form of intellectual property can have a copyright. SOME commonly copyrighted material: Music Art Literary Works (i.e. – books) Photographs/Images Printed Music Can you use copyrighted material at all? YES, to an extent. It’s called “Fair Use”
6. Copyright Law & the doctrine of Fair Use “It is illegal for anyone to violate any of the rights provided by the copyright law to the owner of the copyright.” (Copyright Basics Circular 1) The 1976 Copyright Act does give some limitations that are specific exemptions from any liability to copyright. Most common: Doctrine of “Fair Use” Allows a copyrighted work to be used for purposes such as teaching, news reporting, research, etc.
7. Myths There are many myths about copyright, copyright law, and even University Policies. This next section will cover some of the most common myths where Copyright is concerned.
8. Myth #1 Myth “Western has people that just sit around and watch what people do on the Internet.” Fact Western does not actively watch what students, faculty, or staff do on the Internet. The cost and staffing to do so is outrageous. A person’s internet is only disconnected when an official notice from the RIAA, MPAA, or another company is received.
9. Myth #2 Myth “Western can’t prove that I committed copyright infringement.” Fact With the information provided by the company that sends the notice, we can track the offense down to the computer that was used to commit the act, the port that it occurred on, etc.
10. Myth #3 Myth Western cannot locate infringements over the wireless network. Fact Due to current changes on the campus network, we are able to locate exactly who the infringement belongs to as well as the infringing machine. Each student’s credentials used for wireless connectivity are unique.
11. Myth #4 Myth “I own the material so it is okay.” Fact If you own the material (movie, music, game, book, etc) you can make a backup for YOUR use, but the act of sharing is against the law!
12. Myth #5 Myth “I pay for this service (LimeWire Pro) so it’s OK.” Fact There are many services out there that you can pay for, but you are paying for the application and the service itself, but that does NOT mean that you bought the right to share the works that you are downloading or uploading (sharing)! The act of sharing this material is still illegal! Visit http://www.cdt.org/copyright/warninglist for a list of these sites. (Just because an application you pay for isn’t on this list, does NOT mean that you’re legally sharing…research it!)
13. Myth #6 Myth “Everyone is doing it, so it’s OK.” Fact Even mom didn’t accept this accuse!! Remember her response when you tried that on her? “Would you jump off a bridge if they did it?” Many people speed, but those that get caught, will still get a speeding ticket! If the University is notified that someone is sharing copyrighted material and it is traced back to you, your Internet will be deactivated until the case is settled.
14. Myth #7 Myth “I pay for the Internet in my room so they can’t turn it off.” Fact There is no line item that states a specific cost for Internet access in your room. Same for Wireless access. In room Internet access is a privilege for our students. There are labs located in various locations on campus, should you lose the privilege and need access.
15. Myth #8 Myth “Western can’t stop me from doing it, it’s MY computer.” Fact That is correct, it is YOUR computer, but when you plug into the network, or connect to the Wireless, you are on OUR network. Western cannot tell you what apps you can and can’t have on YOUR computer, but we can control how OUR network is used.
16. Myth #9 Myth “I’ll just use the other port in the room.” Fact When your Internet has been disconnected, it is the computer that has been disabled on the campus network. Plugging into another port on campus will have the same result, NO INTERNET!!
17. Myth #10 Myth “It’s not a big deal, no one will really do anything about it.” Fact Infringement of copyrighted material can be punishable of up to 5 years in prison and up to $250,000 in fine. Any subsequent offenses can lead up to 10 years in prison and up to $1,000,000 in fines. Civil liability, regardless if the infringement was for profit, can be upwards of $150,000 and as little as $750 per infringed work for statutory damages by the copyright holder. (http://www.riaa.com/physicalpiracy.php?content_selector=piracy_online_the_law)
18. Myth #11 Myth “Western can’t do anything about it.” Fact Copyright infringement is punishable by an Educational Outreach Assessment of $50/song and $100/everything else. First offense: monetary assessment and loss of Internet until the Responsible Computing Course is passed and any other sanctions by the Department of Student Community Ethics (DSCE). Second offense: monetary assessment and loss of Internet for 3 months from the time the case is settled with the DSCE and any other sanctions by the DSCE. Third offense: monetary assessment and loss of Internet for an entire semester from the time the case is settled with the DSCE and any other sanctions from the DSCE. Fourth offense: monetary assessment and loss of Internet for an entire year from the time the case is settled with the DSCE and any other sanctions from the DSCE.
19. Myth #12 Myth “I have anti-virus on my machine, so therefore I can’t get a virus or spyware from file-sharing.” Fact Just because you have an anti-virus app on your machine does not mean that the file you are downloading or attempting to acquire is virus or spy-ware free. By connecting to the Internet via a Peer-to-Peer (P2P) application, you have opened yourself to a world of risks. By sharing your files, you may have unknowingly just allowed hundreds or thousands of people to access your files on your computer. “You may download a virus or facilitate a security breach. Or you may unwittingly download pornography labeled as something else.” (FTC Consumer Alert 128) (i.e. - You leave yourself open to identity theft, viruses, spyware and other malware, etc.)
20. What can I legally DO? There are many sites and applications available to legally obtain music. iTunes (you can listen to a clip of a song before you purchase). Pandora (you can listen to a wide range of music and if you wish to purchase a song you like, it will take to you a legal option to obtain that LEGALLY). radio.com (you can listen to some of your favorite and well known radio stations across the nation and if you want to purchase a song, you will be directed to a legal option). Check the RIAA’s website for a list of legal options.
21. Where can I get Movies or TV Shows Legally? Just like music, there are many legal ways to obtain movies and TV Shows. Hulu iTunes (watch it from your iPhone, iPod, or laptop) Netflix (makes watching movies just about anywhere easy) Crackle (even has a nifty mobile app to access it from your phone) For a list of available LEGAL options to obtain movies or TV shows, visit MPAA.org (http://www.mpaa.org/contentprotection/get-movies-tv-shows.)
22. Good Luck!!! There are many options out there to keep your machine safe and keep you legal. It is up to you to decide which way you want to obtain your entertainment. Over 100 students a year think that they can keep downloading/sharing and they won’t get caught. What chance are you willing to take?