The Digital Revolution Keeps on Giving (and Takig)Robin Raskin
Delivered at Dartmouth for their iLead program, this presentation looks at social networking, quantified self, internet of things and human input as the most important disruptors today.
Data is the fuel of the connected world, and aspects like value, trust, transparency and ultimately ownership have been a continuous source for debate. As our technical capabilities and our comfort with and within the connected world evolves, so does the conversation about our habits and practices around customer data. As a product strategy and design company that has been leading the industry for more than four decades, I believe that frog is in a good position to reflect forward.
The Next Web Keynote by Adam Richardson, frog designfrog
Presentation at The Next Web conference in Amsterdam, April 28, by Adam Richardson, Creative Director at frog design. Looks at the collision of the web and the physical objects, and what the future may hold for "webjects".
Like every year, BETC Digital travelled to Austin to bring you fresh inspiration and new ideas from SXSW, the famous digital festival.
Where is digital heading in the following years? We attended conferences by people such as Eric Schmidt, Julian Assange or Edward Snowden to gather their views of the topic.
Over a billion and a half people signed up for Facebook. This site the most used site for people when using the Internet. People are not watching TV so much anymore - they using Facebook, Youtube and Netflix and number of popular web sites.
Some people denote their time working for others online. What drives people to write an article on Wikipedia? They don´t get paid. Companies are enlisting people to help with innovations and sites such as Galaxy Zoo ask people to help identifying images. And why do people have to film themselves singing when they cannot sing and post the video on Youtube?
In this lecture we talk about how people are using the web to interact in new ways, and doing stuff.
The Digital Revolution Keeps on Giving (and Takig)Robin Raskin
Delivered at Dartmouth for their iLead program, this presentation looks at social networking, quantified self, internet of things and human input as the most important disruptors today.
Data is the fuel of the connected world, and aspects like value, trust, transparency and ultimately ownership have been a continuous source for debate. As our technical capabilities and our comfort with and within the connected world evolves, so does the conversation about our habits and practices around customer data. As a product strategy and design company that has been leading the industry for more than four decades, I believe that frog is in a good position to reflect forward.
The Next Web Keynote by Adam Richardson, frog designfrog
Presentation at The Next Web conference in Amsterdam, April 28, by Adam Richardson, Creative Director at frog design. Looks at the collision of the web and the physical objects, and what the future may hold for "webjects".
Like every year, BETC Digital travelled to Austin to bring you fresh inspiration and new ideas from SXSW, the famous digital festival.
Where is digital heading in the following years? We attended conferences by people such as Eric Schmidt, Julian Assange or Edward Snowden to gather their views of the topic.
Over a billion and a half people signed up for Facebook. This site the most used site for people when using the Internet. People are not watching TV so much anymore - they using Facebook, Youtube and Netflix and number of popular web sites.
Some people denote their time working for others online. What drives people to write an article on Wikipedia? They don´t get paid. Companies are enlisting people to help with innovations and sites such as Galaxy Zoo ask people to help identifying images. And why do people have to film themselves singing when they cannot sing and post the video on Youtube?
In this lecture we talk about how people are using the web to interact in new ways, and doing stuff.
Keynote presentation for NoSQL Now! 2014 conference.
* Why there will be Internet of Things as commonly conceived
* The IoT as a Big Data problem
* The rise of Big Metadata
* Imagining the Internet of Light Bulbs
* Systems Thinking and Light Bulb Architecture
* The 'WItnesses' Principle
* Security and Privacy with the IoT
* A Species and its Data
Ethics in development of Information TechnologyAnKit Mhatre
When people are asked to give their opinion about technology as a whole, they seem to think in a more of a black-and-white way, a binary approach. Many people express that technology is more of a ‘job-destroyer’, ‘something which enslaves humans by making them dependent on itself’, some also say that it ‘makes us lazy and equips us with God-ly powers’, etc. However, in contrast to these points, other people claim that it’s ‘something which induces progress into the society’, ‘something that saves human lives and feeds the starving and the poor’, ‘which increases the standard of living’, and ‘which creates interesting and rewarding jobs’.
Speaking about the development, we, as people who are studying Information Technology, have learnt that the enormous field of Internet of Things (IoT) focusses on developing internet-connected applications which will make our lives easier and comfortable. In addition to the principles and practices which are expected to be followed during the development of the applications, there are some lesser emphasized facts too. These facts include an important factor of ETHICS.
Humans are accustomed to follow some ethics right from our birth, rather we are induced these ethics by our elders. The reason is quite simple – for the betterment of the society and to avoid any evil exploitation of the lesser intelligent people. However, modern capitalism tends to bend the traditional ethics. People resort to ease and comfort over what is right.
A lot of subtopics fall under the wide section of Ethics. They include:
1. Characterizing the Internet of Things
2. Privacy (Of the users as well as their valuable data)
3. Control (Who actually controls the collected data)
4. Environment (Concerns about the environment and practices)
5. Solutions (for the preservation of the principle of Ethics)
In this slide show, we are going to emphasize on the initial couple of topics.
This presentation was provided by Lauren Di Monte of the North Carolina State University during a NISO webinar on the Internet of Things, held on October 19, 2016.
SXSW PANELPICKER - INTRODUCTION TO SUBJECT, NOT FINAL DECKCynan Clucas
Background to a proposed talk on whether smartphone usage, and the behavioural change that is being created by increasing dependency and addiction amongst users, demonstrates a need for greater government regulation of the tech industry.
Pervasive Computing : You're Already Knee Deep In ItRob Manson
Presentation for Web Directions South 2009 on Pervasive Computing that outlines 5 key metrics that can be used to measure how pervasive computing is collapsing your sense of space.
These measurements can be used to define and refine specific elements of a business model to make your operating and distribution platforms more pervasive.
Connected World 2019 - chair's opening commentsDavid Terrar
My slides setting the scene for the Connected World Summit 2019 an event covering Emerging Technology for Smart Cities, Connected Places & Tomorrow's Digital World. I covered how we live in exponential times. There has never been a time of greater promise of greater peril. We are dealing with a digital enterprise wave that, with AI, 5G, IoT and Blockchain is turning in top a Digital Tsunami. We are creating data faster than ever, but watch the numbers game and make sure you get your facts and ideas straight. Just like the parable of the 6 blind men and the elephant, everyone sees the connected world topic differently.
CIO Transformation Live - opening keynote - reframing the digital transformat...David Terrar
My opening session for Trafford Associates CIO Transformation Live event on 20 March 2019. I introduce the digital disruption and VUCA oriented business landscape that we are dealing with and argue that we are talking too much about technology, and not enough about business outcomes and real value. I propose reframing the Digital Transformation conversation in 5 steps - Encourage good behaviour, Think holistically, Be agile, Build a social network, Create your transformation story. Check out the slides for more detail.
This is the original keynote file for my talk at the Smart Disclosure Summit in Washington DC on March 30, 2012. I will upload a PDF with notes separately.
Exponentials and Networks - The Existential Challenge Of Radical Innovation For The Enterprise
Exponential technologies tend to take even the experts by surprise. The centralized and hierarchical organizations are under threat by nimbler and more resilient decentralized networks.
How can modern enterprises survive the combined challenges of technological and organizational innovation, internalizing the processes that make companies great and thrive?
THE DECADE BEHIND AND THE DECADE AHEAD - Saumil ShahNSConclave
Where we do depends a lot on where we came from. My talk takes us through a journey from 2001 to 2019 and looking at the decade that lies ahead.
https://nsconclave.net-square.com/the-decade-behind-and-the-decade-ahead.html
Keynote presentation for NoSQL Now! 2014 conference.
* Why there will be Internet of Things as commonly conceived
* The IoT as a Big Data problem
* The rise of Big Metadata
* Imagining the Internet of Light Bulbs
* Systems Thinking and Light Bulb Architecture
* The 'WItnesses' Principle
* Security and Privacy with the IoT
* A Species and its Data
Ethics in development of Information TechnologyAnKit Mhatre
When people are asked to give their opinion about technology as a whole, they seem to think in a more of a black-and-white way, a binary approach. Many people express that technology is more of a ‘job-destroyer’, ‘something which enslaves humans by making them dependent on itself’, some also say that it ‘makes us lazy and equips us with God-ly powers’, etc. However, in contrast to these points, other people claim that it’s ‘something which induces progress into the society’, ‘something that saves human lives and feeds the starving and the poor’, ‘which increases the standard of living’, and ‘which creates interesting and rewarding jobs’.
Speaking about the development, we, as people who are studying Information Technology, have learnt that the enormous field of Internet of Things (IoT) focusses on developing internet-connected applications which will make our lives easier and comfortable. In addition to the principles and practices which are expected to be followed during the development of the applications, there are some lesser emphasized facts too. These facts include an important factor of ETHICS.
Humans are accustomed to follow some ethics right from our birth, rather we are induced these ethics by our elders. The reason is quite simple – for the betterment of the society and to avoid any evil exploitation of the lesser intelligent people. However, modern capitalism tends to bend the traditional ethics. People resort to ease and comfort over what is right.
A lot of subtopics fall under the wide section of Ethics. They include:
1. Characterizing the Internet of Things
2. Privacy (Of the users as well as their valuable data)
3. Control (Who actually controls the collected data)
4. Environment (Concerns about the environment and practices)
5. Solutions (for the preservation of the principle of Ethics)
In this slide show, we are going to emphasize on the initial couple of topics.
This presentation was provided by Lauren Di Monte of the North Carolina State University during a NISO webinar on the Internet of Things, held on October 19, 2016.
SXSW PANELPICKER - INTRODUCTION TO SUBJECT, NOT FINAL DECKCynan Clucas
Background to a proposed talk on whether smartphone usage, and the behavioural change that is being created by increasing dependency and addiction amongst users, demonstrates a need for greater government regulation of the tech industry.
Pervasive Computing : You're Already Knee Deep In ItRob Manson
Presentation for Web Directions South 2009 on Pervasive Computing that outlines 5 key metrics that can be used to measure how pervasive computing is collapsing your sense of space.
These measurements can be used to define and refine specific elements of a business model to make your operating and distribution platforms more pervasive.
Connected World 2019 - chair's opening commentsDavid Terrar
My slides setting the scene for the Connected World Summit 2019 an event covering Emerging Technology for Smart Cities, Connected Places & Tomorrow's Digital World. I covered how we live in exponential times. There has never been a time of greater promise of greater peril. We are dealing with a digital enterprise wave that, with AI, 5G, IoT and Blockchain is turning in top a Digital Tsunami. We are creating data faster than ever, but watch the numbers game and make sure you get your facts and ideas straight. Just like the parable of the 6 blind men and the elephant, everyone sees the connected world topic differently.
CIO Transformation Live - opening keynote - reframing the digital transformat...David Terrar
My opening session for Trafford Associates CIO Transformation Live event on 20 March 2019. I introduce the digital disruption and VUCA oriented business landscape that we are dealing with and argue that we are talking too much about technology, and not enough about business outcomes and real value. I propose reframing the Digital Transformation conversation in 5 steps - Encourage good behaviour, Think holistically, Be agile, Build a social network, Create your transformation story. Check out the slides for more detail.
This is the original keynote file for my talk at the Smart Disclosure Summit in Washington DC on March 30, 2012. I will upload a PDF with notes separately.
Exponentials and Networks - The Existential Challenge Of Radical Innovation For The Enterprise
Exponential technologies tend to take even the experts by surprise. The centralized and hierarchical organizations are under threat by nimbler and more resilient decentralized networks.
How can modern enterprises survive the combined challenges of technological and organizational innovation, internalizing the processes that make companies great and thrive?
THE DECADE BEHIND AND THE DECADE AHEAD - Saumil ShahNSConclave
Where we do depends a lot on where we came from. My talk takes us through a journey from 2001 to 2019 and looking at the decade that lies ahead.
https://nsconclave.net-square.com/the-decade-behind-and-the-decade-ahead.html
The Next Moore's Law: Netness - describes the growing and changing power of connectivity - and why connectivity is replacing Moore's Law as the most important source of opportunity. It suggests that "everything wants to be connected" because the more things are connected (can communicate) the better things work. It describes connectivity as evolving to become fields rather than networks. Original date of presentation: June, 2009.
Computing, cognition and the future of knowing,. by IBMVirginia Fernandez
How humans and machines are forging a new age of understanding.
-The history of computing and the rise of cognitive
-The world’s first cognitive system.
-The technical path forward and the science of what’s possible
-Implications and obligations for the advance of cognitive science.
-Paving the way for the next generation of human cognition.
Learning to trust artificial intelligence systems accountability, compliance ...Diego Alberto Tamayo
It’s not surprising that the
public’s imagination has
been ignited by Artificial
Intelligence since the term
was first coined in 1955.
In the ensuing 60 years,
we have been alternately
captivated by its promise,
wary of its potential for
abuse and frustrated by
its slow development.
A brief introduction to the key trend impacting design and innovation.
FutureCraft macro trend is at the intersection between digital manufacturing, open source and re-crafting nature.
Natural materials are moving into atypical realms such as consumer electronics, apparel and retail domains. We can anticipate overlooked, synthetic and even improbable materials such as hair or sand receiving fresh attention as new forms of sustainable luxury arise.
Discover Blockchain - “what it is” and how Everything could be different
Opening Keynote for the Washington State Department of Commerce and Perkins Coie Blockchain event, (Seattle, August 2016)
Connecting innovation leaders: At a time when companies face new challenges in data management and security, Blockchain is emerging as a way to let companies make and verify transactions on a network instantaneously without a central authority. Today, more than 40 top financial institutions and a growing number of government institutions and firms across industries are experimenting with distributed ledger technology as a secure and transparent way to digitally track the ownership of assets and manage records, a move that could speed up transactions and cut costs while lowering the risk of fraud.
For over two decades, working as an cybersecurity entrepreneur, researcher and instructor, I have heard over and over again that attacks and defense are two sides of the same coin. But what does it really mean in application? What happens when sophisticated attacks collide with sophisticated defenses? Who wins?
This is talk is aimed at a wide audience in cybersecurity – from the strategists to the practitioners. We will discuss Evolution, Attacks, Defense and PEBKAC. What factors shall affect the posture of trustworthiness and safety in the digital world in the next two years to come depend largely on the road we have followed over the past two decades. This talk looks above and beyond, albeit optimistically, about realigning some of the conventional approaches, slowly but strategically shifting mindsets of stakeholders and consumers alike, to bring about a more proactive approach to security.
Debugging with EMUX - RIngzer0 BACK2WORKSHOPSSaumil Shah
The EMUX IoT Firmware Emulation Framework currently provides near native userland emulation for ARM and MIPS IoT devices. EMUX is actively used Saumil's popular ARM IoT Exploit Laboratory training for over 5 years.
The Debugging with EMUX workshop shall be in two parts:
Part 1 (30 minutes) - Setting up EMUX in 7 minutes - A tour of EMUX internals - EMUX utilities - Tracing userland processes within EMUX
Part 2 (90 minutes) - Debugging an ARM IoT target in EMUX - Debugging a MIPS IoT Target in EMUX - Crash dump analysis
Unveiling EMUX - ARM and MIPS IoT Emulation FrameworkSaumil Shah
After 4 years, ARMX is changing its call sign. EMUX now features both ARM and MIPS device emulation, in a unified framework! Join us as we unveil EMUX and take you into the inner workings of emulating both ARM and MIPS IoT devices. We will be releasing a new Docker image featuring a MIPS CTF challenge to test your MIPS exploit development skills.
Slides from my workshop at Ringzer0's December 2021 Workshop Advent Calendar.
Effective Webinars: Presentation Skills for a Virtual AudienceSaumil Shah
A webinar on what it takes to conduct an effective webinar! Understand how to prepare your story for an invisible audience, keep them engaged and anticipate "in-flight turbulence". Enjoy!
The closest you will get to a VM for testing IoT devices. The ARM-X IoT Firmware Emulation Framework is a tried-and-tested framework which has led to four 0-days discovered on SoHo routers, IP cameras and VoIP exchanges. In this talk, I shall cover the evolution of ARM-X, demonstrate a few use cases and discuss future directions of IoT firmware emulation.
The closest you will get to a VM for testing IoT devices. The ARM-X IoT Firmware Emulation Framework is a tried-and-tested framework which has led to four 0-days discovered on SoHo routers, IP cameras and VoIP exchanges. In this talk, I shall cover the evolution of ARM-X, demonstrate a few use cases and discuss future directions of IoT firmware emulation.
The Road To Defendable Systems - Emirates NBDSaumil Shah
"Attack is a technical problem, defense is a political problem". For several years, cyber security has been misjudged as risk reduction. On one hand, business applications and architectures are growing rapidly. On the other hand, the cyber security organisation is struggling to be able to defend them in today's rapidly evolving threat landscape.
This talk explores the gap in thought between the owner and the defender of today's business applications and what needs to be done to bridge it. We shall present proactive steps and measures to overcome the last hurdle in building defendable systems.
Defending an enterprise is a balancing act. I have worked as an offensive testing vendor to several global organisations over 18 years. This talk explores the challenges that today’s CISOs face - the threat landscape, overall shortage of infosec expertise, the ever evaporating shelf life of infosec products and an increased burden of compliance requirements. I will share my experiences from working with highly effective CISOs and internal infosec teams and what it takes to function on the razor’s edge
Defending an enterprise is a balancing act. I have worked as an offensive testing vendor to several global organisations over 18 years. This talk explores the challenges that today’s CISOs face - the threat landscape, overall shortage of infosec expertise, the ever evaporating shelf life of infosec products and an increased burden of compliance requirements. I will share my experiences from working with highly effective CISOs and internal infosec teams and what it takes to function on the razor’s edge
My talk on creating ARM/Thumb Polyglot shellcode for obfuscation, signature evasion and downright novelty of approach! Presented at Hack in the Box Amsterdam 2019
Slides from my lectures on Photography As An Art Form. Follow me on facebook at https://www.facebook.com/my.spectral.lines and on Instagram at @therealsaumil.
Make ARM Shellcode Great Again - HITB2018PEKSaumil Shah
Compared to x86, ARM shellcode has made little progress. The x86 hardware is largely homogenous. ARM, however, has several versions and variants across devices today. There are several constraints and subtleties involved in writing production quality ARM shellcode which works on modern ARM hardware, not just on QEMU emulators.
In this talk, we shall explore issues such as overcoming cache coherency, reliable polymorphic shellcode, ARM egghunting and last but not the least, polyglot ARM shellcode. A bonus side effect of this talk will be creating headaches for those who like to defend agaisnt attacks using age old signature based techniques
HackLU 2018 Make ARM Shellcode Great AgainSaumil Shah
Compared to x86, ARM shellcode has made little progress. The x86 hardware is largely homogenous. ARM, however, has several versions and variants across devices today. There are several constraints and subtleties involved in writing production quality ARM shellcode which works on modern ARM hardware, not just on QEMU emulators.
In this talk, we shall explore issues such as overcoming cache coherency, reliable polymorphic shellcode, ARM egghunting and last but not the least, polyglot ARM shellcode. A bonus side effect of this talk will be creating headaches for those who like to defend agaisnt attacks using age old signature based techniques.
Hack.LU 2018 ARM IoT Firmware Emulation WorkshopSaumil Shah
Learn how to build your own testing and debugging environment for analysing IoT firmware images. Bug hunting in IoT firmware requires access to debugging, instrumentation and reverse engineering tools.
In this workshop, we shall learn how to extract firmware from a few ARM IoT devices, deploy the extracted filesystems on an ARM QEMU environment, and emulate the firmware as close to the original hardware environment as possible. We shall also learn how to intercept and emulate NVRAM access to faithfully reproduce the exact configuration available on the actual device. Participants are required to bring a laptop capable of running VMware Workstation/Fusion/Player. We shall distribute a virtual machine with ARM QEMU along with firmware images extracted on the spot from a few SoHo routers and IP Cameras.
The methodology discussed in this workshop is put together from the author’s own beats. While we use ARM as the base platform, the same methodology can also work for MIPS or other embedded architectures.
Slides from my presentation on ARM Shellcode at #44CON 2018, London.
In this talk, we explore ARM egghunting and "Quantum Leap" code - polyglot ARM shellcode. A bonus side effect of this talk will be creating headaches for those who like to defend agaisnt attacks using age old signature based techniques.
Learn how to build your own testing and debugging environment for analysing IoT firmware images. Bug hunting in IoT firmware requires access to debugging, instrumentation and reverse engineering tools.
In this workshop, we shall learn how to extract firmware from a few ARM IoT devices, deploy the extracted filesystems on an ARM QEMU environment, and emulate the firmware as close to the original hardware environment as possible. We shall also learn how to intercept and emulate NVRAM access to faithfully reproduce the exact configuration available on the actual device. Participants are required to bring a laptop capable of running VMware Workstation/Fusion/Player. We shall distribute a virtual machine with ARM QEMU along with firmware images extracted on the spot from a few SoHo routers and IP Cameras.
The methodology discussed in this workshop is put together from the author’s own beats. While we use ARM as the base platform, the same methodology can also work for MIPS or other embedded architectures.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...SkillCertProExams
• For a full set of 760+ questions. Go to
https://skillcertpro.com/product/databricks-certified-data-engineer-associate-exam-questions/
• SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
• It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
• SkillCertPro updates exam questions every 2 weeks.
• You will get life time access and life time free updates
• SkillCertPro assures 100% pass guarantee in first attempt.
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsRosie Wells
Insight: In a landscape where traditional narrative structures are giving way to fragmented and non-linear forms of storytelling, there lies immense potential for creativity and exploration.
'Collapsing Narratives: Exploring Non-Linearity' is a micro report from Rosie Wells.
Rosie Wells is an Arts & Cultural Strategist uniquely positioned at the intersection of grassroots and mainstream storytelling.
Their work is focused on developing meaningful and lasting connections that can drive social change.
Please download this presentation to enjoy the hyperlinks!
2. NETSQUARE
About Me
• CEO Net Square
• 21 years in Infosec.
• Hacker, Speaker, Trainer.
• M.S. Computer Science
Purdue University.
• LinkedIn: saumilshah
• Twitter: @therealsaumil
9. NETSQUARE
Virginia Tech System X: Nov 2003
1100 PowerMac G5's
12 TFLOPS
#3 Supercomputer in
the world, Nov 2003
> 10 TFLOPS, < $10M
Dr. Srinidhi Varadarajan
17. NETSQUAREOne Minute On The Internet
4,74,000 Tweets
70,000 Instagram posts
2,40,000 Google searches
4,500,000 Youtube videos viewed
100,000,000 Messages sent
28. NETSQUARE
Computerization, Discretion, Freedom
Sergey Bratus, Anna Shubina
December 31, 2015
Surveillance of social networking, pervasive user tracking in hopes of reaping
profits promised by “big data”, and ubiquitous failure to secure stockpiled
personal data went from being the concern of the few to making mainstream
media. We’ve learned that what hurts privacy is also likely to hurt freedom. But,
despite all these revelations, the worst and the most pervasive danger of
computerizing our everyday lives has so far avoided public attention: that
computers modify our behaviors related to discretion, professional autonomy, and,
ultimately, moral choice.
Computerization changes every area of human activity it touches, by bringing
new rules and new metrics. With enough of these at work, humans must act with an
eye to not just what they do (or should do) in the actual real-world situations, but also
to how it will look in the computer representation of it—and the latter are never
complete. And when they disagree, one must either spend the extra time and effort
“fighting the system”, bend the rules—or give up.
29. NETSQUARE
CELLS = PIXELS
• HUMAN FACULTIES FOR THREAT DETECTION
FAIL IN CYBERSPACE.
• WHAT IS COMMON SENSE IN REALITY IS
IGNORANCE IN VIRTUALITY.
45. NETSQUARE
CYBERSECURITY IN 2020
• DEEPFAKES, DECEPTION CAMPAIGNS
AND DIGITAL DESTABILISATION
• TRADITIONAL MEDIA'S DAYS ARE OVER
• UNMANNED ARMED FORCES
• UNMANNED CIVILIAN LAW ENFORCEMENT