Developing applications with Hyperledger Fabric SDKHorea Porutiu
Intro to Hyperledger Fabric concepts. Will cover peers, orderer, state database, and certificate authority. Go over code examples of how to submit transactions on the network. Demo IBM Blockchain Starter Plan, Composer, and IBM Food Trust use-cases.
This talk will introduce Zero-Knowledge Proofs (ZKPs) and explain why they are a key element in a growing number of privacy-preserving, digital-identity platforms. Clare will provide basic illustrations of ZKPs and leave the necessary mathematics foundations to the readers.
After this talk you will understand that there is a variety of ZKPs, it’s still early days, and why ZKP is such a perfect tool for digital identity platforms. This talk includes significant updates from the newly-organized ZKProof Standardization organization plus a signal of maturity: one of the first known ZKP vulnerabilities.
Clare will explain why ZKPs are so powerful, and why they are building blocks for a range of applications including privacy-preserving cryptocurrency such as Zcash, Ethereum, Artificial Intelligence, and older versions of Trusted Platform Modules (TPMs). The presentation includes many backup slides for future learning and researching, including four slides of references.
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
On our March 12, 2020 webinar, Evernym Chief Architect Daniel Hardman provided a great introduction to verifiable credentials and compared them to the physical credentials (passports, driver's licenses, loyalty cards) we use every day. He then identified six lessons we can learn from today's physical credentials and how we're applying each to the world of self-sovereign identity.
Blockchain technology and its impact on the supply chain Artur Gowin
Disruptive technologies such as Artificial Intelligence (AI), Blockchain, Virtual/Augmented Reality, or the Internet of Things (IoT), have already revolutionized almost every industry in the world. The four main trends in the automotive sector are diverse mobility, electrification, autonomous driving, and connectivity.
I invite you to read the material on how Blockchain can revolutionize the Finished Vehicle Logistics market!
- Analyze the strength and weakness of public blockchain and the goal of private blockchain.
- Explains the core architectural features, mechanisms and provisioning process of Hyperledger Fabric.
Hyperledger Fabric Application Development 20190618Arnaud Le Hors
Slides presented at the Hyperledger Fabric Workshop in Barcelona on July 10th, 2019.
This covers the development of a Fabric application and smart contract (i.e. chaincode), with some tips on good practices and the IBM Blockchain Platform extension for VS Code.
Developing applications with Hyperledger Fabric SDKHorea Porutiu
Intro to Hyperledger Fabric concepts. Will cover peers, orderer, state database, and certificate authority. Go over code examples of how to submit transactions on the network. Demo IBM Blockchain Starter Plan, Composer, and IBM Food Trust use-cases.
This talk will introduce Zero-Knowledge Proofs (ZKPs) and explain why they are a key element in a growing number of privacy-preserving, digital-identity platforms. Clare will provide basic illustrations of ZKPs and leave the necessary mathematics foundations to the readers.
After this talk you will understand that there is a variety of ZKPs, it’s still early days, and why ZKP is such a perfect tool for digital identity platforms. This talk includes significant updates from the newly-organized ZKProof Standardization organization plus a signal of maturity: one of the first known ZKP vulnerabilities.
Clare will explain why ZKPs are so powerful, and why they are building blocks for a range of applications including privacy-preserving cryptocurrency such as Zcash, Ethereum, Artificial Intelligence, and older versions of Trusted Platform Modules (TPMs). The presentation includes many backup slides for future learning and researching, including four slides of references.
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
On our March 12, 2020 webinar, Evernym Chief Architect Daniel Hardman provided a great introduction to verifiable credentials and compared them to the physical credentials (passports, driver's licenses, loyalty cards) we use every day. He then identified six lessons we can learn from today's physical credentials and how we're applying each to the world of self-sovereign identity.
Blockchain technology and its impact on the supply chain Artur Gowin
Disruptive technologies such as Artificial Intelligence (AI), Blockchain, Virtual/Augmented Reality, or the Internet of Things (IoT), have already revolutionized almost every industry in the world. The four main trends in the automotive sector are diverse mobility, electrification, autonomous driving, and connectivity.
I invite you to read the material on how Blockchain can revolutionize the Finished Vehicle Logistics market!
- Analyze the strength and weakness of public blockchain and the goal of private blockchain.
- Explains the core architectural features, mechanisms and provisioning process of Hyperledger Fabric.
Hyperledger Fabric Application Development 20190618Arnaud Le Hors
Slides presented at the Hyperledger Fabric Workshop in Barcelona on July 10th, 2019.
This covers the development of a Fabric application and smart contract (i.e. chaincode), with some tips on good practices and the IBM Blockchain Platform extension for VS Code.
Hyperledger Fabric is a blockchain framework implementation initially developed by Digital Asset and IBM and now hosted by Linux Foundation under the hyperledger project. Fabric joined the hyperledger project for incubation in the early 2016 and after 1 year of incubation, it became the first project get into the ‘active’ state. On July 11, 2017, the hyperledger Technical Steering Committee announced their first production-ready distributed ledger codebase, Hyperledger Fabric V1.0
Blockchain overview, use cases, implementations and challengesSébastien Tandel
Most know about Bitcoin, the well-known crypto-currency. Less know the details about the underlying and enabling technology, Blockchain.
Hopefully, this presentation provides enough insights to understand blockchain concepts and why it's perceived to potentially disrupt many market segments, from retail to governments, from finance to health care. At last, I hope to brush fairly the many challenges of this rather new technology.
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
My talk from Crypto Valley Conference 2018 on emerging standards in Self-Sovereign Identity, Technology behind it, Overview of implementations and how to use it with blockchain and DLT systems.
OpenID for Verifiable Credentials is a family of protocols supporting implementation of applications with Verifiable Credentials, i.e. verifiable credential issuance, credential presentation, and pseudonyms authentication.
These slides cover the basics of Permissionless & Permissioned blockchain and also a guide on when to select a blockchain solution ( immutable ledger) over regular databases.
The Blockchain - The Technology behind Bitcoin Jérôme Kehrli
The blockchain and blockchain related topics are becoming increasingly discussed and studied nowadays. There is not one single day where I don't hear about it, that being on linkedin or elsewhere.
I interested myself deeply in the blockchain topic recently and this is the first article of a coming whole serie around the blockchain.
This presentation is an introduction to the blockchain, presents what it is in the light of its initial deployment in the Bitcoin project as well as all technical details and architecture concerns behind it.
We won't focus here on business applications aside from what is required to present the blockchain purpose, more concrete business applications and evolutions will be the topic of another presentation I'll post in a few weeks
Blockchain Overview, What is Blockchain, Why Blockchain, How Blockchain will change the world, concepts of Blockchain are explained like Consensus, Distributed Ledger, Blockchain use cases and more
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
Hyperledger Fabric Technical Deep Dive 20190618Arnaud Le Hors
Slides presented at the Hyperledger Fabric workshop in Barecelona on July 10th, 2019.
This introduces blockchain for business and describes in details the Hyperledger Fabric design principles, overall architecture, its components, and the transaction flow.
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.
The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value.
This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
• Learn New Application and Data Protection Strategies
• Learn Advancements in Machine Learning
• Learn how to develop a roadmap for EU GDPR compliance
• Learn Data-centric Security for Digital Business
• Learn Where Data Security and Value of Data Meet in the Cloud
• Learn Data Protection On-premises, and in Public and Private Clouds
• Learn about Emerging Application and Data Protection for Multi-cloud
• Learn about Emerging Data Privacy and Security for Cloud
• Learn about New Enterprise Application and Data Security Challenges
• Learn about Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation
Hyperledger Fabric is a blockchain framework implementation initially developed by Digital Asset and IBM and now hosted by Linux Foundation under the hyperledger project. Fabric joined the hyperledger project for incubation in the early 2016 and after 1 year of incubation, it became the first project get into the ‘active’ state. On July 11, 2017, the hyperledger Technical Steering Committee announced their first production-ready distributed ledger codebase, Hyperledger Fabric V1.0
Blockchain overview, use cases, implementations and challengesSébastien Tandel
Most know about Bitcoin, the well-known crypto-currency. Less know the details about the underlying and enabling technology, Blockchain.
Hopefully, this presentation provides enough insights to understand blockchain concepts and why it's perceived to potentially disrupt many market segments, from retail to governments, from finance to health care. At last, I hope to brush fairly the many challenges of this rather new technology.
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
My talk from Crypto Valley Conference 2018 on emerging standards in Self-Sovereign Identity, Technology behind it, Overview of implementations and how to use it with blockchain and DLT systems.
OpenID for Verifiable Credentials is a family of protocols supporting implementation of applications with Verifiable Credentials, i.e. verifiable credential issuance, credential presentation, and pseudonyms authentication.
These slides cover the basics of Permissionless & Permissioned blockchain and also a guide on when to select a blockchain solution ( immutable ledger) over regular databases.
The Blockchain - The Technology behind Bitcoin Jérôme Kehrli
The blockchain and blockchain related topics are becoming increasingly discussed and studied nowadays. There is not one single day where I don't hear about it, that being on linkedin or elsewhere.
I interested myself deeply in the blockchain topic recently and this is the first article of a coming whole serie around the blockchain.
This presentation is an introduction to the blockchain, presents what it is in the light of its initial deployment in the Bitcoin project as well as all technical details and architecture concerns behind it.
We won't focus here on business applications aside from what is required to present the blockchain purpose, more concrete business applications and evolutions will be the topic of another presentation I'll post in a few weeks
Blockchain Overview, What is Blockchain, Why Blockchain, How Blockchain will change the world, concepts of Blockchain are explained like Consensus, Distributed Ledger, Blockchain use cases and more
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
https://ssimeetup.org/decentralized-identifiers-dids-fundamentals-identitybook-info-drummond-reed-markus-sabadello-webinar-46/
Decentralized identifiers (abbreviated as “DIDs”), are the cryptographic counterpart to verifiable credentials (VCs) that together are the “twin pillars” of SSI architecture. In this special IdentityBook.info webinar Markus Sabadello, Founder and CEO of Danube Tech, and Drummond Reed, Chief Trust Officer at Evernym, co-authors of the DID chapter of the “Self-Sovereign Identity:
Decentralized Digital Identity and Verifiable Credentials” book published by Manning will explain all the fundamentals of DIDs. Based on the did chapter of the book, you will learn how DIDs evolved from the work started with VCs, how they are related to URLs and URNs, why a new type of cryptographically-verifiable identifier is needed for SSI, and how DIDs are being standardized at World Wide Web Consortium (W3C). Your guides will be two of the editors of the W3C Decentralized Identifier 1.0 specification: Markus Sabadello and Drummond Reed.
Hyperledger Fabric Technical Deep Dive 20190618Arnaud Le Hors
Slides presented at the Hyperledger Fabric workshop in Barecelona on July 10th, 2019.
This introduces blockchain for business and describes in details the Hyperledger Fabric design principles, overall architecture, its components, and the transaction flow.
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.
The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value.
This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
• Learn New Application and Data Protection Strategies
• Learn Advancements in Machine Learning
• Learn how to develop a roadmap for EU GDPR compliance
• Learn Data-centric Security for Digital Business
• Learn Where Data Security and Value of Data Meet in the Cloud
• Learn Data Protection On-premises, and in Public and Private Clouds
• Learn about Emerging Application and Data Protection for Multi-cloud
• Learn about Emerging Data Privacy and Security for Cloud
• Learn about New Enterprise Application and Data Security Challenges
• Learn about Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
The evolution of the Internet of Things is significantly a
ected by legal restrictions imposed for personal data handling, such as the European General Data Protection Regulation (GDPR).
The main purpose of this regulation is to provide people in the digital age greater control over their personal data, with their freely given, specific, informed and unambiguous consent to collect and process the data concerning them. ADVOCATE is an advanced framework that fully complies with the requirements of GDPR, which, with the extensive use of blockchain and artificial intelligence technologies, aims to provide an environment that will support users in maintaining control of their personal data in the IoT ecosystem. This paper proposes and presents the Intelligent Policies Analysis Mechanism (IPAM) of the ADVOCATE framework, which, in an intelligent and fully automated manner, can identify conflicting rules or consents of the user, which may lead to the collection of personal data that can be used for profiling. In order to clearly identify and implement IPAM, the problem of recording user data from smart entertainment devices using Fuzzy Cognitive Maps (FCMs) was simulated. FCMs are an intelligent decision-making system that simulates the processes of a complex system, modeling the correlation base, knowing the behavioral and balance specialists of the system. Respectively, identifying conflicting rules that can lead to a profile, training is done using Extreme Learning Machines (ELMs), which are highly ecient neural systems of small and flexible architecture that can work optimally in complex environments.
Blockchain and the Future of Digital Learning Credential Assessment and Manag...eraser Juan José Calderón
Blockchain and the Future of Digital Learning
Credential Assessment and Management
Merija Jirgensons and Janis Kapenieks
Riga Technical University, Riga, Latvia.
Abstract
Blockchain educational technology has created assessment and management tools for
learner credentials that are permanent, transparent and sustainable while giving users
direct access. Personal encrypted credentials enable users to shape lifelong learning pathways
and personalizes education according to individual values and needs. They allow
for the permanent documentation of both formal and informal learning based on transversal
competencies, adjustable across the economic sector and responsive to situational
needs. Badging was the initial response to online credentialing. Mozillaís open digital
badges have become the unofficial global standard and the specifications remain free.
They may be viewed in e-portfolios and social networks. Yet, if issuers cease hosting
badges, they become invalid even when authentic. Some experiments with blockchain
technology remedy this situation by creating a permanent, secure and sustainable infrastructure
for learning records. The MIT Media Lab has produced the bitcoin based Blockcerts;
whereas the Knowledge Institute, Open University, UK has developed Ethereumís Smart
Contracts to document Microcredentials (Badges). Both are Open Source products. Most
EU nations are experimenting with educational blockchain. The technology creates an
infrastructure to document, store and manage credentials and provides learners with a
sustainable record of achievements they can control. It also benefits universities by
reducing administrative costs and bureaucracy.
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
Digital Transformation and the opportunities to use data in Analytics and Machine Learning are growing exponentially, but so too are the business and financial risks in Data Privacy. The increasing number of privacy incidents and data breaches are destroying brands and customer trust, and we will discuss how business prioritization can be benefit from a finance-based data risk assessment (FinDRA).
More than 60 countries have introduced privacy laws and by 2023, 65% of the world’s population will have its personal information covered under modern privacy regulations. We will discuss use cases in financial services that are finding a balance between new technology impact, regulatory compliance, and commercial business opportunity. Several privacy-preserving and privacy-enhanced techniques can provide practical security for data in use and data sharing, but none universally cover all use cases. We will discuss what tools can we use mitigate business risks caused by security threats, data residency and privacy issues. We will discuss how technologies like pseudonymization, anonymization, tokenization, encryption, masking and privacy preservation in analytics and business intelligence are used in Analytics and Machine Learning.
Organizations are increasingly concerned about data security in processing personal information in external environments, such as the cloud; and information sharing. Data is spreading across hybrid IT infrastructure on-premises and multi-cloud services and we will discuss how to enforce consistent and holistic data security and privacy policies. Increasing numbers of data security, privacy and identity access management products are in use, but they do not integrate, do not share common policies, and we will discuss use cases in financial services of different techniques to protect and manage data security and privacy.
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
Discover the latest in RegTech and stay up-to-date on compliance tools and best practices.
The move to digital has meant that many organizations have had to rethink legacy systems.
They need to put the customer first, focus on the Customer Experience and Digital Experience Platforms.
They also need to understand the latest in RegTech and solutions for hybrid cloud.
We will discuss Regtech for the financial industry and related technologies for compliance.
We will discuss new International Standards, tools and best practices for financial institutions including PCI v4, FFIEC, NACHA, NIST, GDPR and CCPA.
We will discuss related technologies for Data Security and Privacy, including data de-identification, encryption, tokenization and the new API Economy.
In this work we highlighted some of the concepts of data privacy, techniques used in data privacy, and some techniques used in data privacy in the cloud plus some new research trends.
Date: 15th November 2017
Location: AI Lab Theatre
Time: 16:30 - 17:00
Speaker: Elisabeth Olafsdottir / Santiago Castro
Organisation: Microsoft / Keyrus
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced data privacy and security solutions has become even more critical. French regulators cited GDPR in fining Google $57 million and the U.K.'s Information Commissioner's Office is seeking a $230 million fine against British Airways and seeking $124 million from Marriott. Facebook is setting aside $3 billion to cover the costs of a privacy investigation launched by US regulators.
This session will take a practical approach to address guidance and standards from the Federal Financial Institutions Examination Council (FFIEC), EU GDPR, California CCPA, NIST Risk Management Framework, COBIT and the ISO 31000 Risk management Principles and Guidelines.
Learn how new data privacy and security techniques can help with compliance and data breaches, on-premises, and in public and private clouds.
Similar to Digital Credentials Enabling Mobility and Verification of Educational Achievements (20)
Bridging the Gap: Mixing approaches, content and tools to help college studentsBrandon Muramatsu
The Next Generation Learning Challenge has provided a call to action for those involved in Open Educational Resources to meet the needs of the US education system. One of the challenges is to deploy open core courseware to address the retention and completion issues in community colleges. In the Open Learning: Bridge to Success (B2S) initiative The Open University working in partnership with MIT, Anne Arundel Community College (AACC) and University of Maryland University College (UMUC) will develop open bridging modules to help learners having problems in coping with credit bearing courses. Modules focussed on learning to learn and understanding mathematics will be released as complete open educational resource packages from The Open University's existing successful programme of entry-level (pre-degree) "Openings" modules. The Open University has an established open presence through its OpenLearn open content site which offers a wide range of units, and the courses will be developed in the open to benefit not only students in the partner institutions but any learners who wish to use them.
The project will run its first pilots with Community College students from September and this presentation focuses on the early phase of the project including: release of the initial materials, augmentation with other OER, design of the research methodology and early lessons from working together as partners. Already working in the open is changing how we think about the provision of content and the instruction of practical experiences alongside meeting curriculum needs. We anticipate presenting the design requirements and how they have been met through open provision, reflections from those involved in the projects, the first feedback from students at the pilot colleges, and the indications from the additional users in the open.
Presented by Dale Allen, Jeff Merriman, Brandon Muramatsu, Domy Raymond, and Mike Reilly, Grantmakers for Education, San Francisco, CA, October 22-23, 2015
We share a potential model for online recitation sessions for MIT residential courses based on our experiences running similar sessions for courses in the MITx MicroMasters Program in Statistics and Data Science.
The Best of Both Worlds: Transforming OpenCourseWare in an age of InteractivityBrandon Muramatsu
The Best of Both Worlds: Transforming OpenCourseWare in an age of Interactivity presented by Peter Pinch and Brandon Muramatsu in Arlington, VA on November 20, 2014.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
2. Today
● A brief intro to the Digital Credentials
Consortium
● Two case studies
○ GDPR and Digital Credentials, Delft University of
Technology
○ Open Source Learner Credential Wallet, MIT
3. Digital Credentials Consortium
Our mission is to create a trusted,
distributed, and shared infrastructure
that will become the standard for issuing,
storing, displaying, and verifying
academic credentials, digitally.
4. DCC Founding Members
Delft University of Technology (The
Netherlands)
Georgia Institute of Technology (USA)
Harvard University (USA)
Hasso Plattner Institute, University of
Potsdam (Germany)
Massachusetts Institute of Technology
(USA)
McMaster University (Canada)
Tecnológico De Monterrey (Mexico)
Technical University of Munich
(Germany)
University of California at Berkeley
(USA)
University of California, Irvine (USA)
University of Milano-Bicocca (Italy)
University of Toronto (Canada)
5. DCC Guiding Principles
Learners
● Learners retain primary control
over their credentials.
● Learners’ consent is required for
issuance of digital credentials.
● Learners decide to whom they grant
access.
● Barriers to receiving and managing
credentials are minimal to enable
broad participation.
Issuers
● Issuers control to whom they issue
credentials, the particular achievement
that the credential represents, and
which credential options are available
to the learner.
● Issuers can revoke credentials
according to their institution’s policies.
● Barriers to issuing credentials are
minimal to enable broad and diverse
participation.
Trust:
● Everyone is able to review how the infrastructure and processes work.
● Trust in the integrity of the credentials is established cryptographically.
● Credentials can be verified without consulting the original issuer.
6. How does DCC do its work?
● Consortium of members with alignment to guiding principles,
and each working in similar ways on digital credentials
● DCC does its work through open standards organizations
primarily the W3C Verifiable Credentials for Education
(W3C VC-EDU) Community Group
○ Coordinates with IMS Global on Comprehensive Learner Record
and Open Badges v3 specifications
● Shared technical work through a Technical Working Group
made up of DCC members
● Implementing Verifiable Credentials (VC) and
Decentralized Identifiers (DID) specifications
○ Meet key DCC guiding principles of learner control
9. General Data Protection Regulation
(GDPR)
The European Union's General Data Protection Regulation become binding in
May 2018.
Goal of GDPR:
1. to facilitate free movement of personal data between EU members states
2. to establish a framework of fundamental data rights protection.
The legal framework creates a number of obligations resting on data controllers
(entities determining the means and purpose of data processing)
The legal framework creates a number of rights to data subjects (the natural
persons to whom the personal data relates) to be enforced by data controllers.
E.g. Article 16 GDPR – right to rectification, Article 17 GDPR – right to erasure
(‘right to be forgotten’)
10. Leading principles of GDPR
Lawfulness, fairness
and transparency
organisations need to make sure their data collection practices don’t break the law and that they
aren’t hiding anything from data subjects.
Purpose limitation Organisations should only collect personal data for a specific purpose, clearly state what that
purpose is, and only collect data for as long as necessary to complete that purpose.
Data minimisation Organisations must only process the personal data that they need to achieve its processing
purposes.
Accuracy The accuracy of personal data is integral to data protection. The GDPR states that “every
reasonable step must be taken” to erase or rectify data that is inaccurate or incomplete.
Storage limitation Organisations need to delete personal data when it’s no longer necessary.
Integrity and
confidentiality
(security)
Personal data should be processed in a manner that ensures appropriate security of the
personal data, including protection against unauthorised or unlawful processing and against
accidental loss, destruction or damage, using appropriate technical or organisational measures.
Accountability The controller shall be responsible for, and be able to demonstrate compliance with the above
principles
12. GDPR and Blockchain
The GDPR is based on assumptions that creates tension with blockchain.
GDPR Blockchain
in relation to each personal data point there is at
least one natural or legal person – the data
controller – whom the subjects can address to
enforce their rights under EU Data protection law.
decentralizes to many actors and allocation of
responsibility and accountability is burdensome.
data can be modified or erased where necessary to
comply with the legal requirements of GDPR Article
16 (right to rectification) and 17 (right to erasure
(‘right to be forgotten’)
Modification and erasure of data is made onerous to
ensure data integrity and increase trust in the
network.
13.
14. Personal data on the Blockchain?
In the pilot we explored the following:
● Is data that is encrypted or hashed/ ‘anonymized’ still
quality as personal data as per the GDPR requirements of
anonymisation?
● How is the right to erasure/right to be forgotten dealt with in
the pilot?
15. The right to be forgotten is not an absolute
right
● if a learner requests to be forgotten, Accredify
deletes their personal data. The learner is the
one who should contact institutes where they
have personally shared their opencert file
which could be still verified.
● What happens now is that Accredify deletes
personal data from their system which is
GDPR complaint. This is because the right to
be forgotten does not extend to all the
institutes where the learner shared their file.
● If a certificate is revoked and cannot be
verified in the future that doesn’t say much –
so it is good to add an explanation.
16. Hashing, salt and peppering of personal
data
● As long as the hash relates to something it is not
anonymised.
● This is the current conflict within blockchain and GDPR
and the interpretation of what is considered as
anonymous.
17. Open Source Learner Wallet
MIT
MIT Team
Brandon Muramatsu
Philipp Schmidt
Gillian Walsh
Dmitri Zagidulin
18. About the Open Source Learner Wallet Project
● A key missing ingredient in a digital credential infrastructure
○ Prioritizes learner agency
○ Enables trust
○ Supports diverse institutions
● A learner credential wallet specification (May 2021)
● An open source learner wallet mobile app, eduWallet
● A pilot with U.S. institutions:
○ College Unbound, Georgia Tech and San Jose City College
○ MIT xPRO and University of North Texas / Concentric Sky
19. Details on eduWallet
An Open Source Learner Wallet
● Both Android and iOS versions
○ Going into pilot testing December 2021–January 2022
● Key features
○ Login to secure wallet
○ Add verifiable credentials via deep link (direct and QR Code) and
via QR code
○ Display credentials locally—Issuer, issuer logo, credential name,
issuance date
○ Select and share credentials as JSON-LD via operating system
sharing mechanisms (copy to clipboard, save as file)
○ Delete credentials, backup and restore from file
20. Demo
● Login to a LMS or student portal
● Prompted to install eduWallet from Apple or
Google Play app stores
● First time setup of eduWallet
● (Simulated) Access credential via LMS / QR Code
/ Deep Link
● (Not demonstrated) Authenticate before
receiving credential
● View credentials (and share them)
College Unbound
Small IHE serving low-income learners in degree completion programs
San Jose City College
Provides non-degree courses for high demand tech skills, has previously worked with MIT on their Technest program
Georgia Tech
Influential in DCC, piloting verifiable with training programs