Presentación de Chema Alonso sobre el uso de los datos en la generación de servicios en Internet y la privacidad. Más información en el http://www.elladodelmal.com
Charla sobre seguridad y privacidad en aplicaciones web hecha por Chema Alonso en la DotNet Conference Madrid 2018. Puedes ver la charla en vídeo en: http://www.elladodelmal.com
This document provides an overview of Adam Broetje and his company Odd Dog Media. It discusses Adam's background, including his education at University of Colorado and 8 years of experience in digital marketing. It then outlines Odd Dog Media, which Adam founded in 2008 to provide holistic digital marketing services locally and internationally. The bulk of the document discusses modern marketing methods, focusing on tying together a website, search engine optimization, reviews, and social media to provide information to customers and drive them to convert on a company's website. It provides specific tips in these areas that businesses can implement today.
This document discusses how location data can reveal extensive personal information about individuals, including where they live, work, go for holidays or shopping, how they travel between locations, what types of events and activities they engage in, their social circles and status, and even potentially sensitive or illegal activities. It notes that location is obtained through services that require sharing location, opportunistically as part of services, or hidden through techniques like battery cookies and wardriving. The document questions who owns individuals' data, whether people truly understand what they are agreeing to when consenting to services, and whether the current model of exchanging privacy for services is sustainable.
Ethics and IA - seven deadly sins that prevent us from building a better worldEric Reiss
My keynote from World IA Day, 2018
I started working with information architecture long before the term was even known. Over the past 35 years, I’ve encountered many issues that have disturbed me – from creating purposely addictive programs, sites, and apps, to the current zeitgeist for responsive design at the expense of basic usability. I have seen research that is forged, ignored, or twisted by internal company politics and by the cognitive bias of the design team. And I have seen countless dark patterns that serve to suppress accessibility and diversity, and encourage false beliefs and false security.
Companies collect vast amounts of personal data from various sources such as social media logins, online quizzes, purchases, internet activity, and IoT devices. This data is used for targeted ads, product customization, insurance rates, and credit reports. However, data can also be abused, such as for political targeting, identity theft if breached, or changing credit scores based on behaviors. Individuals can take steps to secure their data by controlling profiles and opting out of data collection, but the US third party doctrine allows government collection of data shared with companies without warrants.
Social media can impact the economy of an entire country. Costa Rica aims to use platforms like Facebook and Instagram to promote and sell its coffee internationally. However, accurately measuring social media's effects remains challenging. Building an online audience requires careful planning, creative content, and engagement with followers through comments and replies. It is also important to verify information from social media accounts to avoid spreading misinformation from fake or automated accounts. While attention on social platforms can drive economic gains, it also enables the spread of propaganda and false narratives that influence public opinion.
Charla sobre seguridad y privacidad en aplicaciones web hecha por Chema Alonso en la DotNet Conference Madrid 2018. Puedes ver la charla en vídeo en: http://www.elladodelmal.com
This document provides an overview of Adam Broetje and his company Odd Dog Media. It discusses Adam's background, including his education at University of Colorado and 8 years of experience in digital marketing. It then outlines Odd Dog Media, which Adam founded in 2008 to provide holistic digital marketing services locally and internationally. The bulk of the document discusses modern marketing methods, focusing on tying together a website, search engine optimization, reviews, and social media to provide information to customers and drive them to convert on a company's website. It provides specific tips in these areas that businesses can implement today.
This document discusses how location data can reveal extensive personal information about individuals, including where they live, work, go for holidays or shopping, how they travel between locations, what types of events and activities they engage in, their social circles and status, and even potentially sensitive or illegal activities. It notes that location is obtained through services that require sharing location, opportunistically as part of services, or hidden through techniques like battery cookies and wardriving. The document questions who owns individuals' data, whether people truly understand what they are agreeing to when consenting to services, and whether the current model of exchanging privacy for services is sustainable.
Ethics and IA - seven deadly sins that prevent us from building a better worldEric Reiss
My keynote from World IA Day, 2018
I started working with information architecture long before the term was even known. Over the past 35 years, I’ve encountered many issues that have disturbed me – from creating purposely addictive programs, sites, and apps, to the current zeitgeist for responsive design at the expense of basic usability. I have seen research that is forged, ignored, or twisted by internal company politics and by the cognitive bias of the design team. And I have seen countless dark patterns that serve to suppress accessibility and diversity, and encourage false beliefs and false security.
Companies collect vast amounts of personal data from various sources such as social media logins, online quizzes, purchases, internet activity, and IoT devices. This data is used for targeted ads, product customization, insurance rates, and credit reports. However, data can also be abused, such as for political targeting, identity theft if breached, or changing credit scores based on behaviors. Individuals can take steps to secure their data by controlling profiles and opting out of data collection, but the US third party doctrine allows government collection of data shared with companies without warrants.
Social media can impact the economy of an entire country. Costa Rica aims to use platforms like Facebook and Instagram to promote and sell its coffee internationally. However, accurately measuring social media's effects remains challenging. Building an online audience requires careful planning, creative content, and engagement with followers through comments and replies. It is also important to verify information from social media accounts to avoid spreading misinformation from fake or automated accounts. While attention on social platforms can drive economic gains, it also enables the spread of propaganda and false narratives that influence public opinion.
My closing keynote from Product Camp Poland 2018.
As technologists, we all wield great power. I think we have an ethical responsibility to use this wisely. Alas, most people are confused by terms such as "morals" and "ethics." What is the difference? How can I apply this to my own work?
There are a lot of bullet points. I know this isn't fashionable, but I wanted you to be able to print this out and use it as a reference in your work.
Webinar how do I Research my Market - 2022Neil Infield
The document provides guidance on how to research a market before starting a new business. It discusses the importance of conducting both desk research and field research to understand customer needs and gather market intelligence on competitors, trends, and opportunities. Specific sources of information are recommended, such as industry reports, company databases, news articles, social media, questionnaires, trade shows, and crowdfunding campaigns. Rules for effective questionnaire design are also outlined.
Cybercrime and the Developer: How to Start Defending Against the Darker SideSteve Poole
In the world of DevOps and the cloud, most developers have to learn new technologies and methodologies. The focus tends to be on adding capabilities such as resilience and scaling to an application. One critical aspect consistently overlooked is security. In this session, learn about a few of the simple actions you can take (and some behaviours you must change) to create a more secure Java application for the cloud. The world of the cybercriminal is closer than you realize. Hear how at risk your application may be, see practical examples of how you can inadvertently leave the doors open, and understand what you can do to make your Java solution more secure.
This document discusses privacy issues related to libraries. It begins by distinguishing between security problems that inadvertently violate privacy and legal uses of information that can still violate privacy. It explores definitions of privacy, why privacy matters for intellectual freedom and concerns over vulnerable individuals. The document examines how freedom to read relates to privacy historically and today. It reviews potential privacy laws and policies, why privacy problems occur, and known privacy issues regarding public records, reidentification, email, commercial privacy violations on the web and examples related to Facebook, ebooks, Amazon and social media buttons.
The document discusses developing a creative mindset and focusing on ideas rather than how to execute them. It emphasizes that people buy why you do something, not what or how you do it. Several examples are given of focusing on ideas and why an organization exists over details and features. Developing passion and grit is highlighted over experience alone when hiring. The importance of thinking differently and pushing boundaries is stressed.
This document discusses cyber security issues related to social media and personal information online. It notes that the amount of data created annually has grown exponentially and this data can remain online for years. Both personal profiles created by individuals and those created about people by others shape their online reputation. The document warns that employers, insurers, and other parties increasingly check social media and that anonymity online allows false posts that can damage credibility. Various risks of oversharing personal information are outlined, as are strategies to monitor and control one's online profile and reputation.
A HillyBilly's Guide to Staying Anonymous Online - SecureWVAdam Compton
Online Privacy… I would imagine that most everyone has something they would not like to have shared with the entire Internet. For some, this may be because of their job; for others it is so they can hide from their previous life. Still others may do it as a way to limit their exposure to attack. During this talk we will discuss techniques of how to hide your personal data from the Internet by the creation of alternate online identities (a.k.a. Sock puppets).
A "career-so-far" recap summary that I used in presentations to University of Georgia Terry College of Business classes, in mentoring their student body to think more socially. Presented with Adam Naide, to Candice Hollenbeck's classes.
LifestyleFrisco.com Story - Frisco Chamber of Commerce presentationWendi McGowan-Ellis
Telling the story and the purpose of LifestyleFrisco.com, our website delivers hyper-local information and content about Frisco, Texas. Life, entertainment, fashion, arts, dining, nightlife, sports, travel, and real estate close to home and even closer to our hearts. On a cutting-edge web and mobile publishing platform, LifestyleFrisco.com writers and editors are citizens and denizens of Frisco contributing stories, photos, videos, and events.
You Can Run, But You Can't Hide! - How far should the government regulate the Internet? -Has data mining gone too far? (Great secondary research project.) Digital footprint makeover handouts available at: digitalmakeover.wikispaces.com Find ideas for classroom instruction, also, on this wikispace.
This presentation was a breakout session at WLMA14 and has been updated to reflect recent revelations on medical information mining. We did not even get to discuss the EDUCATIONAL DATA MINING that is occurring on our students and children! Caveat!
The document discusses how reputation, both for individuals and companies, is increasingly important in today's hyper-connected world. It provides historical examples of how reputation has long impacted people's lives. In the modern era, with people spending many hours online daily and leaving extensive digital footprints, one's reputation is shaped by what shows up about them on search engines and social media. The document examines case studies of how companies like Tesco and BP have been negatively impacted by reputation issues online. It also discusses privacy concerns around sharing personal information publicly and how the concept of online reputation will continue evolving as technologies like the Internet of Things expand.
“Shadow Money: Unraveling Political Nonprofits’ Spending” was originally held on May 14, 2014.
Politics is a big business. Not only is big money publicly shelled out to get candidates elected, but hundreds of millions are spent on a secret political game – the shadow money world dominated by mysterious, politically active nonprofits. These groups take advantage of loopholes in the Internal Revenue Service’s rule book to build complex webs of entities – linked together by money – to win political races and keep the source of the money secret.
During this free, one-hour session from the Reynolds Center and the Center for Responsive Politics, you’ll learn where to find how this money is being spent on the issues important to your beat and how to begin unraveling the web of organizations behind it all. This training will touch on the basics of IRS and Federal Election Commission oversight and how these nonprofits stay under the radar.
YOU WILL LEARN:
How the Citizens United decision in 2010 by the U.S. Supreme Court allowed not only for-profit corporations and labor unions, but also politically active nonprofits, to flood unlimited amounts of money into the political system.
How politically active nonprofits, which spent $336 million on federal campaigns alone in 2012, operate under and outside the radar of the IRS and FEC, spending secret donor money from the federal to the local level.
What clues to look for when tracking a politically active nonprofit. This includes what key information on 990 forms, incorporation documents and disclosure forms will be most helpful in your reporting.
YOUR INSTRUCTOR
Russ Choma is the money-in-politics reporter at the Center for Responsive Politics’ OpenSecrets.org. His work has appeared in several publications including the Investigative Reporting Workshop, Nieman Watchdog, Politics Daily, Grist.org and MSNBC.com. His series, “Blown Away: Tracking stimulus grants for renewable energy,” found that more than 80 percent of the first $1 billion in grants to wind-energy companies went to foreign firms, and many renewable-energy projects that received stimulus cash were built well before President Obama was even inaugurated.
For more information about business journalism training, please visit http://businessjournalism.org.
Presented at Diana Initiative, Queercon 16, and DEFCON 27 Recon Village 8/9-10, 2019.
When we think of the process for attacking an organization, OSINT comes to the front and center of our minds. This presentation takes a presenter with experience in applying OSINT to effective penetration testing and social engineering and reverse engineers the process to determine what steps can be taken to further complicate their efforts. This is a presentation that talks about online deception, decoy accounts, canary data, encryption, maintaining one’s social media in a secure manner, and protecting one’s identity as much as possible. While nothing is absolute, this is a presentation that will leave attendees more aware of techniques to make it harder for attackers to collect accurate OSINT, either by removal or deception.
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?Stephen Rhind-Tutt
This document discusses whether it is ethical for for-profit publishers to profit from information. The presenter acknowledges criticisms from open access advocates but argues that publishers add value by improving accessibility of information and must profit to survive. The presenter notes that governments and technology shape information environments and customers ultimately get what they want. Publishers must continue innovating to provide more value through features like customization and integration to justify costs in an increasingly open digital landscape.
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
JavaOne 2016 Talk
In the world of DevOps and the cloud, most developers have to learn new technologies and methodologies. The focus tends to be on adding capabilities such as resilience and scaling to an application. One critical aspect consistently overlooked is security. In this session, learn about a few of the simple actions you can take (and some behaviors you must change) to create a more secure Java application for the cloud. The world of the cybercriminal is closer than you realize. Hear how at risk your application may be, see practical examples of how you can inadvertently leave the doors open, and understand what you can do to make your Java solution more secure.
Internet safety awareness presentation for teenagers. Includes embedded videos, speaker notes, and examples. Based largely on research out of the Crimes Against Children Research Center.
Fairfield univ lyons internet mktg 110315douglaslyon
This document provides guidance on marketing products on social media. It discusses how social media is becoming pervasive and important for businesses. Some key points made include:
- 80% of small businesses plan to increase their social media marketing. Being active can increase web traffic and search rankings.
- Many customers use social media to research purchases and are more likely to buy from businesses they connect with online.
- While you can sell on social media, it's better to drive traffic to your own website where you control sales and policies.
- Tips for social media marketing include sharing compelling content tailored to each platform's peak times, asking open-ended questions to generate discussion, and using it for customer support.
Índice del libro "Big Data: Tecnologías para arquitecturas Data-Centric" de 0...Telefónica
Índice del libro "Big Data: Tecnologías para arquitecturas Data-Centric" de 0xWord escrito por Ibón Reinoso ( https://mypublicinbox.com/IBhone ) con Prólogo de Chema Alonso ( https://mypublicinbox.com/ChemaAlonso ). Puedes comprarlo aquí: https://0xword.com/es/libros/233-big-data-tecnologias-para-arquitecturas-data-centric.html
Índice de libro "Historias Cortas sobre Fondo Azul" de Willy en 0xWordTelefónica
Índice de libro "Historias Cortas sobre Fondo Azul" de Willy (Guillermo Obispo https://mypublicinbox.com/Willy_ ) en 0xWord. Puedes comprar el libro aquí: https://0xword.com/es/libros/232-historias-cortas-sobre-fondo-azul.html
More Related Content
Similar to Datos en tiempos de Cambridge Analytica
My closing keynote from Product Camp Poland 2018.
As technologists, we all wield great power. I think we have an ethical responsibility to use this wisely. Alas, most people are confused by terms such as "morals" and "ethics." What is the difference? How can I apply this to my own work?
There are a lot of bullet points. I know this isn't fashionable, but I wanted you to be able to print this out and use it as a reference in your work.
Webinar how do I Research my Market - 2022Neil Infield
The document provides guidance on how to research a market before starting a new business. It discusses the importance of conducting both desk research and field research to understand customer needs and gather market intelligence on competitors, trends, and opportunities. Specific sources of information are recommended, such as industry reports, company databases, news articles, social media, questionnaires, trade shows, and crowdfunding campaigns. Rules for effective questionnaire design are also outlined.
Cybercrime and the Developer: How to Start Defending Against the Darker SideSteve Poole
In the world of DevOps and the cloud, most developers have to learn new technologies and methodologies. The focus tends to be on adding capabilities such as resilience and scaling to an application. One critical aspect consistently overlooked is security. In this session, learn about a few of the simple actions you can take (and some behaviours you must change) to create a more secure Java application for the cloud. The world of the cybercriminal is closer than you realize. Hear how at risk your application may be, see practical examples of how you can inadvertently leave the doors open, and understand what you can do to make your Java solution more secure.
This document discusses privacy issues related to libraries. It begins by distinguishing between security problems that inadvertently violate privacy and legal uses of information that can still violate privacy. It explores definitions of privacy, why privacy matters for intellectual freedom and concerns over vulnerable individuals. The document examines how freedom to read relates to privacy historically and today. It reviews potential privacy laws and policies, why privacy problems occur, and known privacy issues regarding public records, reidentification, email, commercial privacy violations on the web and examples related to Facebook, ebooks, Amazon and social media buttons.
The document discusses developing a creative mindset and focusing on ideas rather than how to execute them. It emphasizes that people buy why you do something, not what or how you do it. Several examples are given of focusing on ideas and why an organization exists over details and features. Developing passion and grit is highlighted over experience alone when hiring. The importance of thinking differently and pushing boundaries is stressed.
This document discusses cyber security issues related to social media and personal information online. It notes that the amount of data created annually has grown exponentially and this data can remain online for years. Both personal profiles created by individuals and those created about people by others shape their online reputation. The document warns that employers, insurers, and other parties increasingly check social media and that anonymity online allows false posts that can damage credibility. Various risks of oversharing personal information are outlined, as are strategies to monitor and control one's online profile and reputation.
A HillyBilly's Guide to Staying Anonymous Online - SecureWVAdam Compton
Online Privacy… I would imagine that most everyone has something they would not like to have shared with the entire Internet. For some, this may be because of their job; for others it is so they can hide from their previous life. Still others may do it as a way to limit their exposure to attack. During this talk we will discuss techniques of how to hide your personal data from the Internet by the creation of alternate online identities (a.k.a. Sock puppets).
A "career-so-far" recap summary that I used in presentations to University of Georgia Terry College of Business classes, in mentoring their student body to think more socially. Presented with Adam Naide, to Candice Hollenbeck's classes.
LifestyleFrisco.com Story - Frisco Chamber of Commerce presentationWendi McGowan-Ellis
Telling the story and the purpose of LifestyleFrisco.com, our website delivers hyper-local information and content about Frisco, Texas. Life, entertainment, fashion, arts, dining, nightlife, sports, travel, and real estate close to home and even closer to our hearts. On a cutting-edge web and mobile publishing platform, LifestyleFrisco.com writers and editors are citizens and denizens of Frisco contributing stories, photos, videos, and events.
You Can Run, But You Can't Hide! - How far should the government regulate the Internet? -Has data mining gone too far? (Great secondary research project.) Digital footprint makeover handouts available at: digitalmakeover.wikispaces.com Find ideas for classroom instruction, also, on this wikispace.
This presentation was a breakout session at WLMA14 and has been updated to reflect recent revelations on medical information mining. We did not even get to discuss the EDUCATIONAL DATA MINING that is occurring on our students and children! Caveat!
The document discusses how reputation, both for individuals and companies, is increasingly important in today's hyper-connected world. It provides historical examples of how reputation has long impacted people's lives. In the modern era, with people spending many hours online daily and leaving extensive digital footprints, one's reputation is shaped by what shows up about them on search engines and social media. The document examines case studies of how companies like Tesco and BP have been negatively impacted by reputation issues online. It also discusses privacy concerns around sharing personal information publicly and how the concept of online reputation will continue evolving as technologies like the Internet of Things expand.
“Shadow Money: Unraveling Political Nonprofits’ Spending” was originally held on May 14, 2014.
Politics is a big business. Not only is big money publicly shelled out to get candidates elected, but hundreds of millions are spent on a secret political game – the shadow money world dominated by mysterious, politically active nonprofits. These groups take advantage of loopholes in the Internal Revenue Service’s rule book to build complex webs of entities – linked together by money – to win political races and keep the source of the money secret.
During this free, one-hour session from the Reynolds Center and the Center for Responsive Politics, you’ll learn where to find how this money is being spent on the issues important to your beat and how to begin unraveling the web of organizations behind it all. This training will touch on the basics of IRS and Federal Election Commission oversight and how these nonprofits stay under the radar.
YOU WILL LEARN:
How the Citizens United decision in 2010 by the U.S. Supreme Court allowed not only for-profit corporations and labor unions, but also politically active nonprofits, to flood unlimited amounts of money into the political system.
How politically active nonprofits, which spent $336 million on federal campaigns alone in 2012, operate under and outside the radar of the IRS and FEC, spending secret donor money from the federal to the local level.
What clues to look for when tracking a politically active nonprofit. This includes what key information on 990 forms, incorporation documents and disclosure forms will be most helpful in your reporting.
YOUR INSTRUCTOR
Russ Choma is the money-in-politics reporter at the Center for Responsive Politics’ OpenSecrets.org. His work has appeared in several publications including the Investigative Reporting Workshop, Nieman Watchdog, Politics Daily, Grist.org and MSNBC.com. His series, “Blown Away: Tracking stimulus grants for renewable energy,” found that more than 80 percent of the first $1 billion in grants to wind-energy companies went to foreign firms, and many renewable-energy projects that received stimulus cash were built well before President Obama was even inaugurated.
For more information about business journalism training, please visit http://businessjournalism.org.
Presented at Diana Initiative, Queercon 16, and DEFCON 27 Recon Village 8/9-10, 2019.
When we think of the process for attacking an organization, OSINT comes to the front and center of our minds. This presentation takes a presenter with experience in applying OSINT to effective penetration testing and social engineering and reverse engineers the process to determine what steps can be taken to further complicate their efforts. This is a presentation that talks about online deception, decoy accounts, canary data, encryption, maintaining one’s social media in a secure manner, and protecting one’s identity as much as possible. While nothing is absolute, this is a presentation that will leave attendees more aware of techniques to make it harder for attackers to collect accurate OSINT, either by removal or deception.
GWU Ethics in Publishing 2015 - Is is ethical for publishers to make a profit?Stephen Rhind-Tutt
This document discusses whether it is ethical for for-profit publishers to profit from information. The presenter acknowledges criticisms from open access advocates but argues that publishers add value by improving accessibility of information and must profit to survive. The presenter notes that governments and technology shape information environments and customers ultimately get what they want. Publishers must continue innovating to provide more value through features like customization and integration to justify costs in an increasingly open digital landscape.
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
JavaOne 2016 Talk
In the world of DevOps and the cloud, most developers have to learn new technologies and methodologies. The focus tends to be on adding capabilities such as resilience and scaling to an application. One critical aspect consistently overlooked is security. In this session, learn about a few of the simple actions you can take (and some behaviors you must change) to create a more secure Java application for the cloud. The world of the cybercriminal is closer than you realize. Hear how at risk your application may be, see practical examples of how you can inadvertently leave the doors open, and understand what you can do to make your Java solution more secure.
Internet safety awareness presentation for teenagers. Includes embedded videos, speaker notes, and examples. Based largely on research out of the Crimes Against Children Research Center.
Fairfield univ lyons internet mktg 110315douglaslyon
This document provides guidance on marketing products on social media. It discusses how social media is becoming pervasive and important for businesses. Some key points made include:
- 80% of small businesses plan to increase their social media marketing. Being active can increase web traffic and search rankings.
- Many customers use social media to research purchases and are more likely to buy from businesses they connect with online.
- While you can sell on social media, it's better to drive traffic to your own website where you control sales and policies.
- Tips for social media marketing include sharing compelling content tailored to each platform's peak times, asking open-ended questions to generate discussion, and using it for customer support.
Similar to Datos en tiempos de Cambridge Analytica (20)
Índice del libro "Big Data: Tecnologías para arquitecturas Data-Centric" de 0...Telefónica
Índice del libro "Big Data: Tecnologías para arquitecturas Data-Centric" de 0xWord escrito por Ibón Reinoso ( https://mypublicinbox.com/IBhone ) con Prólogo de Chema Alonso ( https://mypublicinbox.com/ChemaAlonso ). Puedes comprarlo aquí: https://0xword.com/es/libros/233-big-data-tecnologias-para-arquitecturas-data-centric.html
Índice de libro "Historias Cortas sobre Fondo Azul" de Willy en 0xWordTelefónica
Índice de libro "Historias Cortas sobre Fondo Azul" de Willy (Guillermo Obispo https://mypublicinbox.com/Willy_ ) en 0xWord. Puedes comprar el libro aquí: https://0xword.com/es/libros/232-historias-cortas-sobre-fondo-azul.html
Índice del libro: Máxima Seguridad en Windows: Secretos Técnicos. 6ª Edición ...Telefónica
Índice del libro: "Máxima Seguridad en Windows: Secretos Técnicos. 6ª Edición Actualizada con nuevos contenidos" escrito por Sergio de Los Santos ( https://MyPublicInbox.com/SSantos ) en 0xWord. Puedes comprarlo aquí: https://0xword.com/es/libros/22-libro-maxima-seguridad-windows.html
Índice del libro "Amazon Web Services: Hardening de Infraestructuras Cloud Co...Telefónica
Índice del libro "Amazon Web Services: Hardening de Infraestructuras Cloud Computing" de Abraham Romero https://mypublicinbox.com/martrudix publicado por 0xWord. Puedes comprarlo online aquí: https://0xword.com/es/libros/229-amazon-web-services-hardening-de-infraestructuras-cloud-computing.html
Índice del Libro "Ciberestafas: La historia de nunca acabar" (2ª Edición) de ...Telefónica
Índice del Libro "Ciberestafas: La historia de nunca acabar" (2ª Edición) de 0xWord de Juan Carlos Galindo ( https://mypublicinbox.com/galindolegal ) con prólogo y epílogo del Sr. Juez Eloy Velasco ( https://mypublicinbox.com/eloyvelasco ) y Chema Alonso ( https://mypublicinbox.com/ChemaAlonso )
Índice del Libro "Storytelling para Emprendedores"Telefónica
´Índice del Libro "Storytelling para Emprendedores" escrito por Roda Padadero ( https://MyPublicInbox.com/RosaPanadero ) de 0xWord.Puedes comprarlo online aquí: https://0xword.com/es/libros/224-storytelling-para-emprendedores.html
This document discusses various ways to secure digital assets and web applications using Latch, an open source tool for pairing and enforcing access controls. It provides overviews of Latch plugins for Windows, WordPress, Docker, IoT devices, and other platforms. Examples are given for configuring Latch on servers, WordPress sites, and Joomla in "paranoid mode." Later sections discuss using Latch smart contracts on blockchains to control access to decentralized applications and manage pairing/status changes directly on the blockchain. The conclusion emphasizes the need to harden and pentest Web3 applications to protect users from emerging hacking threats.
Índice del libro "Hardening de servidores GNU / Linux 5ª Edición (Gold Edition)"Telefónica
Índice del libro "Hardening de servidores GNU / Linux 5ª Edición (Gold Editon)" de 0xWord. Puedes comprarlo aquí: https://0xword.com/es/libros/38-libro-hardening-servidores-linux.html
Escrito por Pablo González: https://MyPublicInbox.com/PabloGonzalez y Carlos Álvarez Martín
Este documento trata sobre el uso de WhatsApp para realizar investigaciones de inteligencia abierta (OSINT). Explica cómo seleccionar objetivos, recopilar información sobre ellos a través de redes sociales y otras fuentes, acceder a datos almacenados en WhatsApp como mensajes y contactos, y espiar cuentas de terceros. También cubre técnicas de phishing, secuestro de cuentas y modos de ocultar el estado en línea.
Índice del libro "De la Caverna al Metaverso" de 0xWord.comTelefónica
Índice del libro "De la Caverna al Metaverso" de 0xWord, escrito por Felipe Colorado Lobo [Contacto: https://mypublicinbox.com/FColorado ] Puedes comprarlo online en: https://0xword.com/es/libros/217-de-la-caverna-al-metaverso-un-relato-disruptivo-de-la-tecnologia.html
20º Máster Universitario de Ciberseguridad UNIRTelefónica
Este documento proporciona información sobre un Máster Universitario en Ciberseguridad de 1 año de duración impartido en línea. El máster cubre temas técnicos y legales de ciberseguridad a través de asignaturas como análisis de vulnerabilidades, hacking ético y auditoría. Los estudiantes reciben clases en directo, tutoría personalizada y evalúan mediante trabajos y exámenes finales. El máster prepara a los graduados para carreras en ciberseguridad en empresas e instituciones públicas.
BootCamp Online en DevOps (and SecDevOps) de GeeksHubs AcademyTelefónica
Este documento describe un Bootcamp Online de Especialización en DevOps de 12 semanas. El bootcamp enseña habilidades como el rol de DevOps, arquitectura como código, infraestructuras híbridas, contenedores, balanceo de carga, automatización, clustering de contenedores, continuous delivery y continuous testing. El programa incluye 10 módulos y un proyecto final para automatizar una aplicación web. El bootcamp es impartido por 10 profesionales expertos y es 100% online con clases en directo.
Índice del libro "Ciberseguridad de tú a tú" de 0xWordTelefónica
Índice del libro "Ciberseguridad de tú a tú" de 0xWord que puedes comprar online: https://0xword.com/es/libros/216-ciberseguridad-de-tu-a-tu-lo-que-tienes-que-conocer-para-sentirte-mas-seguro.html
Está escrito por Yolanda Corral ( https://mypublicinbox.com/yocomu ) que dirige el Canal de Youtube y Podcast "Palabra de Hacker" ( https://www.mypublicinbox.com/palabradehacker ).
Epílogo de Angelucho : https://www.mypublicinbox.com/Angelucho
Índice del libro "Open Source INTelligence (OSINT): Investigar personas e Ide...Telefónica
Este documento proporciona una guía sobre OSINT (Inteligencia de fuentes abiertas) y cubre temas como la evaluación de información, la preparación del entorno de investigación, la investigación en redes sociales como Twitter, LinkedIn y Facebook, el análisis de información obtenida y la presentación de los resultados en un informe. Explica conceptos clave como el ciclo de inteligencia, indicadores para evaluar información, herramientas para anonimizarse y extraer datos de redes sociales de manera ética. También incluye capítu
Índice del libro "Social Hunters" de 0xWordTelefónica
Índice del libro "Social Hunters" de 0xWord, escrito por Marta Barrio ( https://mypublicinbox.com/martrudix ) y Carolina Gómez ( https://mypublicinbox.com/Carol12Gory ) sobre el mundo de los hackers que utilizan técnicas de Ingeniería Social. Puedes comprarlo en: https://0xword.com/es/libros/215-social-hunters-hacking-con-ingenieria-social-en-el-red-team.html
Índice del libro "Kubernetes para profesionales: Desde cero al despliegue de ...Telefónica
Este documento presenta una introducción a Kubernetes, incluyendo su historia, arquitectura, conceptos básicos como espacios de nombres, objetos y etiquetas. Explica los componentes clave como Pods, servicios, workloads, configuraciones, secretos, volúmenes persistentes, autorización y políticas de red y seguridad. El documento proporciona una guía completa para administrar aplicaciones en Kubernetes.
Los retos sociales y éticos del MetaversoTelefónica
Las empresas están comenzando a explorar las muchas oportunidades comerciales nuevas que ofrece. Sin embargo, de inteligencia artificial hemos aprendido que también existen posibles consecuencias éticas y sociales negativas asociado al uso masivo de estas tecnologías.
Richard Benjamins [ https://mypublicinbox.com/rbenjamins ] (Chief AI & Data Strategist), Yaiza Rubio [ https://MyPublicInbox.com/YrubioSec ] (Chief Metaverse Officer) y Chema Alonso [ https://MyPublicInbox.com/ChemaAlonso ] (Chief Digital Officer) de Telefónica abordan esta temática en un informe llamado “Social and ethical challenges of the metaverse” donde describen qué es el Metaverso, qué tecnologías forman parte de su ecosistema y de dónde proviene. Después se enfocan en los posibles riesgos sociales y éticos del metaverso y cómo mitigarlos. Finalmente, concluyen que las empresas que actualmente están implementando el uso responsable de la IA, están bien preparadas para prevenir o mitigar los riesgos sociales y éticos del metaverso. No porque conozcan el futuro, sino porque cuentan con la gobernanza y la cultura adecuadas para hacer frente a tales riesgos. Más info: https://www.telefonica.com/es/sala-comunicacion/los-retos-sociales-y-eticos-del-metaverso/
Índice del Libro "Ciberestafas: La historia de nunca acabar" de 0xWordTelefónica
Este documento trata sobre las estafas y fraudes en el ciberespacio. Explica los tipos de estafas clásicas y las nuevas modalidades que han surgido en Internet, como los ataques de ingeniería social y phishing. También analiza las amenazas relacionadas con las criptomonedas, como su uso para cometer fraudes iniciales de monedas y lavado de dinero. El documento concluye que es necesaria una mayor regulación y cooperación internacional para luchar contra estas amenazas emergentes.
Índice del libro "Docker: SecDevOps" 2ª Edición de 0xWordTelefónica
Este documento proporciona una introducción a Docker, incluyendo su historia y evolución, diferencias con las máquinas virtuales, competidores, estandarización de la tecnología de contenedores, componentes de Docker e instalación. También describe conceptos clave como imágenes, contenedores, Dockerfile, redes y Swarm. Finalmente, ofrece buenas prácticas de seguridad y una introducción a SecDevOps y al proyecto Moby.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 6
Datos en tiempos de Cambridge Analytica
1. APIs, Leakages, Owned y
otros Web Scrappings
Los datos en tiempos de Cambridge Analytica
@chemaalonso
2. Disclaimer
Esta charla es una reflexión sobre
el mundo de los datos hoy en día y
la privacidad. No trata de
transmitir ningún juicio de valor.
Son solo ideas generales del autor.
4. Data can Enrich you life:
From Data to Insights
• Data:
• My name is John (27) go to London on Mondays at 7 A.M.
• Anonymous Data
• I am (27) and go to London on Mondays at 7 A.M
• Aggregated Data
• We are 100 people under 30 and go to London on Mondays at 7 AM
• Insights
• 27 % of people under 30 go to London on Mondays at 7 A.M.
24. Location Speaks
Where you stay:
• Where you live
• Where you go on holidays
• Where you work
• Where you go shopping
How it changes?
• Walk?
• Car?
• Bike?
• Combination?
• Skate?
• Where you parked the car
At what time?
• Where you sleep
• Where you have lunch
• Where you have dinner
• What is your daily activity
• Shops -> all kind of
External sources: point of
interest
• Rent or bought house
• Rich or poor
• Target for cibercrime?
• What company you work
• Target for cyberattacks?
• Visits you make
•
Temporary Events
• What kind sports you like
• Stadiums
• Concerts
• Events you attend
• Conferences
• Cinema
Being Crappy
• Political party you vote
• Meetings, people you
meet,
• How many lovers you have
• “Secret” interest
• Weird shops or places??
• Business/pleasure travel
• Doing something ilegal
All together
• PROFILE people
• Circle of friends
• Social status
• Strange behaviors?
http://www.elladodelmal.com/2016/11/conferencia-you-are-where-you-are.html
25. You are who you chat
http://www.elladodelmal.com/2016/06/como-facebook-te-espia-tus.html
40. Data Leakege & WebScrapping
(weapponizing leaks)
1.- Reset Password para este e-mail 2.- Error: el usuario no existe 3.- Error: el usuario sí existe
42. Arqueología del Siglo XXI
“A ver, vamos a hacer algo de Arqueología del siglo
XXI, para ver a quién encontramos hoy en ese lejano
y minúsculo Internet de, por ejemplo, 2014. Es
curioso que en aquel entonces se preocupasen tanto
de la privacidad. O al menos eso decían, porque no
parece que hubieran conseguido en alguna forma esa
"privacidad". ¿De verdad pensarían que la humanidad
tiraría todos los datos que ellos generasen?”
http://www.elladodelmal.com/2014/06/arqueologia-del-siglo-xxi.html