The document discusses optimism towards a future with less privacy. It argues that privacy is doomed as information that is shared online can never be fully removed. However, it posits that in a world with less privacy and more transparency, there are potential benefits like increased freedom, trust, and diversity. Some ideas discussed include identity fluidity, participation in a collective "hive mind", and increasing normality through greater differences between people. Recommended reading on related topics is also provided.
Presentation at Facebook Developer Garage in Miami on Nov 10, 2007. These principles of Facebook app design help when rethinking social relationships as centered around objects.
Presentation at Facebook Developer Garage in Miami on Nov 10, 2007. These principles of Facebook app design help when rethinking social relationships as centered around objects.
This was originally presented as the closing keynote at the APPA National Conference in Chicago on July 27, 2011. For more information, please check out http://www.nickwestergaard.com
Faster horses & slow elevators: where does innovation come from?Franco Papeschi
Short - first - version of a larger talk about what design can bring to the technological innovation table. A longer - more recent - version has been prepared as part of my work at the Web Foundation, and is available here: http://public.webfoundation.org/2011/04/faster-horses-slow-elevators.pdf
A presentation about the fact that IT is not just a tool and that technology isn't neutral and how this relates to digital civil rights. This was a guest lecture at the university of Leiden on October 20th, 2011.
Final thesis presentation. Presented in May 2007 at Pratt Institute, Design Management Department by Michael Melnick, Nicole Casey and Melanie Cohen
How can Design Management help identify creative assets and strategically allocate them to make improvements for the global leather Industry?
presenting a concept for privacy in a world with the Internet of Things. While we already have serious privacy issues, many of them will become even worse with computers that are always on, everywhere and not even perceivable as computers anymore. This presentation holds a proposal to solve some of these issues
"If you love your content, set it free" ?Mike Ellis
Traditional business models have scarcity at their core: when something is scarce, it becomes valuable. Online, this notion is challenged: in a world where every one of us can copy and distribute content at the click of a mouse, notions of ‘scarcity’ become more and more distant from reality. Several commentators have suggested that scale – i.e. providing more access to ‘valuable’ content rather than less – is actually a more scalable business model for the online economy. This session will look at ways in which content can be freed, and will also examine some of the issues which follow around control and authority.
This was originally presented as the closing keynote at the APPA National Conference in Chicago on July 27, 2011. For more information, please check out http://www.nickwestergaard.com
Faster horses & slow elevators: where does innovation come from?Franco Papeschi
Short - first - version of a larger talk about what design can bring to the technological innovation table. A longer - more recent - version has been prepared as part of my work at the Web Foundation, and is available here: http://public.webfoundation.org/2011/04/faster-horses-slow-elevators.pdf
A presentation about the fact that IT is not just a tool and that technology isn't neutral and how this relates to digital civil rights. This was a guest lecture at the university of Leiden on October 20th, 2011.
Final thesis presentation. Presented in May 2007 at Pratt Institute, Design Management Department by Michael Melnick, Nicole Casey and Melanie Cohen
How can Design Management help identify creative assets and strategically allocate them to make improvements for the global leather Industry?
presenting a concept for privacy in a world with the Internet of Things. While we already have serious privacy issues, many of them will become even worse with computers that are always on, everywhere and not even perceivable as computers anymore. This presentation holds a proposal to solve some of these issues
"If you love your content, set it free" ?Mike Ellis
Traditional business models have scarcity at their core: when something is scarce, it becomes valuable. Online, this notion is challenged: in a world where every one of us can copy and distribute content at the click of a mouse, notions of ‘scarcity’ become more and more distant from reality. Several commentators have suggested that scale – i.e. providing more access to ‘valuable’ content rather than less – is actually a more scalable business model for the online economy. This session will look at ways in which content can be freed, and will also examine some of the issues which follow around control and authority.
Future of Android ... And How To Stop It!Terence Eden
First outing of this talk.
How to keep Android open.
All views expressed are mine and mine alone.
Video of presentation - http://vimeo.com/14271317
Inspired by http://futureoftheinternet.org/
This is an update to my presentation on legal issues arising out of new media. I will present this version at a series of breakfast talks hosted by Quirk.biz
The digital divide in the post-Snowden eraIan Clark
This presentation seeks to explore the digital divide in the light of the revelations by Edward Snowden in 2013. It looks at state and corporate surveillance, the impact of these upon individual citizens with respect to the democratic process, the tools with which individuals can protect themselves, the impact of the digital divide upon the ability of the individual to ensure their intellectual privacy and what libraries and librarians are doing to bridge this particular aspect of the digital divide.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Embracing Postprivacy: Optimism towards a future where there is "Nothing to hide"
1. Embracing Post-Privacy
Optimism towards a future
where there is “Nothing to hide”
Christian Heller / http://www.plomlompom.de
December 29, 2008
25. Chaos Communication Congress
bcc / Berlin, Germany
3. Overview
pessimism: the end of privacy
●
question: the meaning of privacy
●
optimism: ideas for post-privacy dys... utopias
●
reading recommendations
●
discussion
●
4. “Secure Beneath the Watchful Eyes” by Kenneth Lu (http://subjunctive.net/klog/)
http://flickr.com/photos/toasty/2171185463/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
5. Privacy is doomed
the privacy-eating monster
●
growingly well-fed, ubiquitous, attractive, intelligent
–
once information is in, it cannot be removed again
–
the privacy-defending army
●
laws ineffective; technology insecure
–
pre-MySpace generation getting old, disappearing
–
an uneven battle for the army
●
cannot be won ultimately
–
can only be lost; easily
–
6. “Privat” by Daniel Lobo (http://www.daquellamanera.org/)
http://flickr.com/photos/daquellamanera/311128375/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
7. What is the meaning of Privacy?
self-determination
●
make your own decisions about your life
–
freedom from interference by others
–
information control
●
control what information flows from you to others
–
control what information flows to you from others
–
intimacy
●
sharing of privacy
–
interpersonal trust, dependence
–
8. “Tanzliedchen” by Hugo Bürkner, 1854
http://commons.wikimedia.org/wiki/File:Bürkner_Tanzliedchen.jpg
9. private vs. public
house, backroom, forum, parliament,
● ●
home PC, head/brain newspaper, Slashdot
hidden visible
● ●
secure from scrutiny accountable to social
● ●
of social norms norms
free individual? controlled conformist?
● ●
woman man
● ●
isolated interconnected
● ●
closet homosexuality gay pride parade
● ●
11. Hiding vs. Sharing
new information economy
●
no zero-sum game
–
the more you give, the more you receive
–
more information better than less information
●
market runs better with more information
–
information more valuable (to the owner) if shared
–
the Hive Mind
●
growing with or without you
–
you gain more by participating than you lose
–
13. Redefining Normality
diversity instead of conformism
●
difference is good! difference is information!
–
personalization instead of “Gleichschaltung”
–
new normality: no normality
●
no escape from ever-increasing diversity
–
forces tolerance increase
–
the googling employer?
●
no untarnished candidates; emptiness suspicious
–
originality cannot yet be outsourced, automatized
–
14. “Identity Thief as Paris” by David Goehring (http://flickr.com/photos/carbonnyc/)
http://flickr.com/photos/carbonnyc/57280104/in/photostream/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
15. Identity fluidity & volatility
identity multiplicity
●
one human can constitute many identities
–
one identity can be constituted by many humans
–
no static core identity anymore
●
identity hyper-dynamism; 15 minutes of identity x
–
identity viruses may freely change their hosts
–
no more identity prison
●
be what's fun to be, not what you supposedly “are”
–
the end of guilt
–
16. “Restaurant Surveillance Sign” by Richard Smith (http://flickr.com/people/smith/)
http://flickr.com/photos/smith/55403952/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
17. Surveillance vs. Sousveillance
equiveillance
●
watching, documenting actions of police & co.
–
document yourself; Hasan Elahi alibi
–
transparency of force
●
no secret watching; open the camera feeds!
–
more powerful → more transparency
–
freedom through total transparency?
●
worst case scenario, “better than alternative”
–
still room for secrets of any kind?
–
18. “WHAT ARE YOU LOOKING AT?” by nolifebeforecoffee
(http://www.nolifebeforecoffee.blogspot.com/)
http://flickr.com/photos/nolifebeforecoffee/124659356/
License: Creative Commons 2.0 Attribution / http://creativecommons.org/licenses/by/2.0/deed.en
19. Control vs. Trust
lack of information: less freedom
●
fear, suspicion, mistrust
–
need for control, deterrence
–
many strict, general laws; strong punishments
–
–
abundance of information: more freedom
●
trust
–
less need for strict control or deterrence
–
few, precise laws; easy punishments
–
20. “Pyramid with the all-seeing eye on the back side of the US 1-Dollar bill”
http://commons.wikimedia.org/wiki/File:Dollarnote_siegel_hq.jpg
21. Reading recommendations
“Privacy” in: “Stanford Encyclopedia of
●
Philosophy”, 2006
http://plato.stanford.edu/entries/privacy/
–
“The Value of Privacy”, Beate Rössler, 1995
●
“The Fall of Public Man”, Richard Sennett, 1977
●
“Facebook and the Social Dynamics of
●
Privacy”, James Grimmelmann, 2008
http://works.bepress.com/james_grimmelmann/20/
–
“The Transparent Society”, David Brin, 1998
●