This presentation was provided by William Marden of the New York Public Library during the NISO Virtual Conference, Information Freedom, Ethics and Integrity, held on Wednesday, April 18, 2018
The UConn Global House Learning Community invited me to participate in a timely panel discussion on how ideas of free speech and freedom of expression vary across the world and how the 21st century modes of communication are changing standards. My presentation focused on the most prominent deterrents to free expression on the Internet. Should access to the Internet be considered a basic human right?...Should freedom of expression be guaranteed on the Internet?
This presentation was provided by William Marden of the New York Public Library during the NISO Virtual Conference, Information Freedom, Ethics and Integrity, held on Wednesday, April 18, 2018
The UConn Global House Learning Community invited me to participate in a timely panel discussion on how ideas of free speech and freedom of expression vary across the world and how the 21st century modes of communication are changing standards. My presentation focused on the most prominent deterrents to free expression on the Internet. Should access to the Internet be considered a basic human right?...Should freedom of expression be guaranteed on the Internet?
June 19, 2015
NISO Consensus Framework to Support
Patron Privacy in Digital Library and Information Systems
http://www.niso.org/topics/tl/patron_privacy/
Checklist of legal literacies to consider / work through when conducting and preparing to publish text data mining research. Accompanies Text Data Mining & Publishing workshop.
Communication surveillance and database surveillance.
Their collateral damages and other unintended consequences.
Cases from Thailand, US, and South Korea.
Presented at Digital Citizen Summit 2016
11 Nov 2016, Bangalore
----
@bact Arthit Suriyawongkul
@thainetizen Thai Netizen Network
Vint Cerf speaking at the Freedom to Connect 2012 conference. The video of this presentation is here:
https://www.youtube.com/watch?v=dwtTUMXpxLk
and other presentations are at:
http://freedom-to-connect.net/videos/
HBS seminar 3/26/14: Dark Markets, Bad Patents, No DataBrian Kahin
This presentation for the Digital Initiative at Harvard Business School looks at how digitization interacts with the patent system and the systemic dysfunction that results. This version is annotated for the benefit of the reader.
This presentation covers basic knowledge and tips about privacy and security when it comes to protecting oneself online. In this presentation, yone won't be needing any high-technology background as this presentation is meant for people from all walks of life.
Cybersecurity: Increased Transparency and the Role of Civil SocietySarah Granger
We see a lot of hype about security in today's networks. This presentation outlines where cybersecurity is going, the global paradigm, the role of government and civil society in building transparency as security evolves.
Protection mechanism and collaborations among public and private sectors to enhanced cybersecurity of the information network and to protect privacy and civil liberties of citizens in the digital age.
Panel discussion on “Learn from the Giants, How They Lift Cybersecurity and Privacy Obstacles”
Digital Thailand 2016 conference, Bangkok, 27 May 2016
Discussed by @bact Arthit Suriyawongkul
More than Communication Surveillance: Data Protection in the Age of Big Data.
Discussing about re-identification issues, with focus on database for development/aid/public services.
Presented at "Next Generation Technologies for Empowering People" workshop (Frontiers Learning Series) — 14 November 2016, Asia Regional Training Center (ARTC) Bangkok, USAID Regional Development Mission for Asia (RDMA)
https://sites.google.com/site/frontierslearningseries2016/
June 19, 2015
NISO Consensus Framework to Support
Patron Privacy in Digital Library and Information Systems
http://www.niso.org/topics/tl/patron_privacy/
Checklist of legal literacies to consider / work through when conducting and preparing to publish text data mining research. Accompanies Text Data Mining & Publishing workshop.
Communication surveillance and database surveillance.
Their collateral damages and other unintended consequences.
Cases from Thailand, US, and South Korea.
Presented at Digital Citizen Summit 2016
11 Nov 2016, Bangalore
----
@bact Arthit Suriyawongkul
@thainetizen Thai Netizen Network
Vint Cerf speaking at the Freedom to Connect 2012 conference. The video of this presentation is here:
https://www.youtube.com/watch?v=dwtTUMXpxLk
and other presentations are at:
http://freedom-to-connect.net/videos/
HBS seminar 3/26/14: Dark Markets, Bad Patents, No DataBrian Kahin
This presentation for the Digital Initiative at Harvard Business School looks at how digitization interacts with the patent system and the systemic dysfunction that results. This version is annotated for the benefit of the reader.
This presentation covers basic knowledge and tips about privacy and security when it comes to protecting oneself online. In this presentation, yone won't be needing any high-technology background as this presentation is meant for people from all walks of life.
Cybersecurity: Increased Transparency and the Role of Civil SocietySarah Granger
We see a lot of hype about security in today's networks. This presentation outlines where cybersecurity is going, the global paradigm, the role of government and civil society in building transparency as security evolves.
Protection mechanism and collaborations among public and private sectors to enhanced cybersecurity of the information network and to protect privacy and civil liberties of citizens in the digital age.
Panel discussion on “Learn from the Giants, How They Lift Cybersecurity and Privacy Obstacles”
Digital Thailand 2016 conference, Bangkok, 27 May 2016
Discussed by @bact Arthit Suriyawongkul
More than Communication Surveillance: Data Protection in the Age of Big Data.
Discussing about re-identification issues, with focus on database for development/aid/public services.
Presented at "Next Generation Technologies for Empowering People" workshop (Frontiers Learning Series) — 14 November 2016, Asia Regional Training Center (ARTC) Bangkok, USAID Regional Development Mission for Asia (RDMA)
https://sites.google.com/site/frontierslearningseries2016/
Der Siegeszug der Künstlichen Intelligenz und disruptiver Technologien scheint unaufhaltsam. Aber was heißt das für unsere Gesellschaft, den Arbeitsmarkt sowie ethische Grundkonstanten? Muss der Gesetzgeber tätig werden? Diesen Fragen ging unser Seminar an der TU Berlin auf den Grund.
Making Decisions in a World Awash in Data: We’re going to need a different bo...Micah Altman
In his abstract, Scriffignano summarizes as follows:
l explore some of the ways in which the massive availability of data is changing and the types of questions we must ask in the context of making business decisions. Truth be told, nearly all organizations struggle to make sense out of the mounting data already within the enterprise. At the same time, businesses, individuals, and governments continue to try to outpace one another, often in ways that are informed by newly-available data and technology, but just as often using that data and technology in alarmingly inappropriate or incomplete ways. Multiple “solutions” exist to take data that is poorly understood, promising to derive meaning that is often transient at best. A tremendous amount of “dark” innovation continues in the space of fraud and other bad behavior (e.g. cyber crime, cyber terrorism), highlighting that there are very real risks to taking a fast-follower strategy in making sense out of the ever-increasing amount of data available. Tools and technologies can be very helpful or, as Scriffignano puts it, “they can accelerate the speed with which we hit the wall.” Drawing on unstructured, highly dynamic sources of data, fascinating inference can be derived if we ask the right questions (and maybe use a bit of different math!). This session will cover three main themes: The new normal (how the data around us continues to change), how are we reacting (bringing data science into the room), and the path ahead (creating a mindset in the organization that evolves). Ultimately, what we learn is governed as much by the data available as by the questions we ask. This talk, both relevant and occasionally irreverent, will explore some of the new ways data is being used to expose risk and opportunity and the skills we need to take advantage of a world awash in data.
Note:
Interactivity and animation are lost when the slides are converted to PDF.
Abstract:
In a technological society such as Canada, it is suggested that a specialized kind of expert citizenship is needed (Andrew Feenberg). In the era of big data, others suggest that there is a need to learn how to read algorithms and to study its high priests and alchemists (Genevieve Bell). While, doing citizenship requires a political ethics of technology to thwart technological and quantitative fundamentalism (Darin Barney). Finally, in the midst of a data revolution we need to critically re-conceptualize data (Rob Kitchin). Quite simply, in today's Canada doing citizenship requires data literacy, technical, philosophical and political. Access to print media - books, government documents, academic journals - in libraries and archives enabled a literate society, the prerequisite of a democratic system. I argue that good governance in knowledge producing institutions, is to have technological experts, both data creators and preservers, working to store, manage, disseminate and preserve data so that we have the requisite artifacts to increase our literacy and build upon collected knowledge. Data literacy I suggest, is indispensable in the current democratic system, and that requires having access to data, data infrastructures - knowledge and technology - and dedicated skilled people and resources to sustainably care for them. I consider research data management to be our duty.
Presentation given at a seminar on "the impact of algorithms on fundamental rights", 22 March 2018, organized by the Dutch Ministry of the Interior and Kingdom Relations, Department of Constitutional Affairs. Jeroen van den Hoven is professor of ethics and technology at Delft University of Technology and scientific director of the Delft Design for Values Institute.
Cybersecurity Strategies - time for the next generationHinne Hettema
In this talk, presented in June 2016 at KAIST, I argue that it is time for the next generation of cybersecurity strategies. These must have a governance focus, and be based on international laws, declarations and agreements, basic internet rights and public good provisions.
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
Cyberterrorism can be in the form of Information attacks which are attempts to access, destroy, or alter information retained, processed, and distributed by computers and their networks and infrastructure attacks which are attempts to damage or disable critical services such as transportation, the distribution of electricity, gas and water, air traffic control and other critical government services (excelsiour, 2020). Hacktivism would be to use a computer to progress an agenda either a social or politically motive stance on a subject matter. The fundamental difference between cyberterrorism and hacktivism is that one wants to destroy (cyberterrorism) while the other (hacktivism)wants to persuade people to their cause or create a change.
Technology has advanced these types of groups agenda farter and faster than ever before. There has always been dissenting views to what governments agendas or from what is the acceptable social norms for behavior. But now with the Internet (Technology) groups (mostly radical) can reach out to a greater audience perpetrate nefarious deeds with some form amenity. Groups can post fake news, statistics or false information to sway an audience to believe as they do. We only need to take our national security agencies word (or can we?) that state sponsored hackers infiltrated our last presidential election to sway our votes.
In my opinion our governments have perpetuated the lack of freedoms that we the people are supposed to enjoy and, in many cases, still think we have but don’t. Governments have used for themselves and suppled countries that are under totalitarian rule the software to hack SSL inscription. SSL inscription is what is supposed to protect people privacy of communication over the internet. Communication such as Gmail or your private online discussions. State sponsored Trojan’s are used by the governments now to monitor normal peoples and suspects communications to investigate its own citizens -internet connections – watch and listen to online discussions they can even collect your passwords. People have always assumed that they have some basic privacy from the government. People should now assume that what they do on a computer is going to be known by whomever wishes to view or listen.
When cybercrime expert Mikko Hypponen talked to an audience at TEDxBrussels, an independent event about how company based in Germany sold to the Egyptian government a set of tools for intercepting, at a very large scale, all the communication of the citizens of the country. This really started me to think about when this video was made -2011 a decade ago this was occurring. How far have we gone to invading privacy since then is the question?
I don’t believe that Hacktivism is a subset of cyberterrorism. I do believe they need to walk a fine line. I can understand their existence with all the government intrusion over the last 20 years (see TED video). How else are ordinary p.
Similar to Dissent as strategy - Cathleen Berger (20)
Culture seems to be a bucket for everything and nothing. Let's talk about one of the most intangible and funkiest buzzwords in business. I'll share hands on examples how we tackle culture at Mimi in order actively shape and consciously develop it day by day.
Klaus Jäger_Development and future of (solar) energy technologiesUNICORNS IN TECH
This presentation covers some astonishing aspects about solar energy, comparing with other sources of energy. The talks was given at the UNICORNS IN TECH Get-Together hosted by hub:raum
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Dissent as strategy - Cathleen Berger
1. Dissent As A Strategy.
Strengthening Human Rights in the Digital Age.
Cathleen Berger
@_cberger_
#unit Festival 2016, April 16 Berlin
2. Dissent // Disobedience
• Dissent: the holding or expression of opinions at
variance with those commonly or officially held
• (Civil) Disobedience: an intentionally unlawful and
principled collective act of protest that aims to
change (a set of) laws, policies, or
institutions (digital examples: website defacements,
DDoS, whistleblowing)
3. All things “digital”
• Infrastructure
• Standards and codes
• Information and communication technology
• Social media
• Data traces
4. Rhetoric and state
behaviour
• Traditional state functions: security, welfare and
sovereignty
• Securitisation as a dominant narrative
• Predictive/pre-emptive policing
• Surveillance
• Censorship
• Internet shutdowns
6. Ways forward
• TECH: build secure tools that are easy to use and visually
appealing (UX/UI challenge)
• POLICY: counter dominant narratives, use positive language,
challenge simplifying (and misleading) “offline” examples, focus on
the individual rather than the system
• ART: creativity and outside-the-box thinking is a powerful means to
reach a mainstream audience
• BUSINESS: raise the costs, incorporate human rights in your
business models, enforce transparency
• CIVIL SOCIETY: coordinate, exchange, cooperate -> amplify your
message to challenge cultural, political or religious paradigms