Plan d'action gvt Australien pour le gov2.0Alban Martin
This document outlines a Government 2.0 Action Plan for the Victorian Public Service with the goal of increasing citizen engagement, transparency, and capability through the use of new technologies. The plan focuses on 4 key areas: 1) Driving adoption in government agencies, 2) Engaging citizens, 3) Opening up government data and information, and 4) Building workforce capabilities. It includes 14 initiatives such as developing leadership projects in each agency, establishing an inter-agency task force, providing guidance on privacy and records management, and creating opportunities for citizens to participate in policy development and access to public records. The overall aim is to transform how government works by becoming more collaborative, open and centered around citizens' needs.
The document is an open letter from UK internet law academic experts to Members of Parliament regarding the draft Data Retention and Investigatory Powers Bill (DRIP). The letter argues that the bill goes far beyond simply authorizing data retention and extends the UK's ability to mandate interception of communications content globally. Specifically, the bill would authorize the UK government to compel assistance with interception warrants and obtaining communications data from entities outside the UK, including for conduct occurring outside the UK. The academics urge Parliament not to fast track the legislation without full scrutiny, as it represents a serious expansion of surveillance powers beyond what the government claims.
Gerard Russell, Oxfam GB
Content strategy seminar
www.charitycomms.org.uk
A renewed focus on audience needs and organisational goals helped Oxfam develop strong principles to justify and organise its web content. Gerard explained how the charity applied these principles to rationalise a site which had grown to over 20,000 pages down to a manageable and focused web property with clear objectives.
Upcoming CharityComms events can be found here: http://www.charitycomms.org.uk/events
I Social Network e il dizionario di Babelefabioturel
The document discusses the importance of linguistic diversity in Europe and knowledge of foreign languages. It notes that while English is seen as the main international language, knowing English alone is not sufficient if Europe wants to compete economically and preserve cultural diversity. Data is presented showing the percentage of people in different European countries that can speak two foreign languages, ranging from 92% in Luxembourg to 59% in Italy. The document questions whether differences are due to fewer people learning lesser spoken languages or less need for translation.
Website attacks continue to prevail despite the best efforts of enterprises to fight them. Websites are an ongoing business concern and security must be assured all the time, not just at a point in time. And yet, most websites were exposed to at least one serious vulnerability every day of 2010, leaving valuable corporate and customer date at risk. Why?
In this report, Jeremiah will explore a new way to measure website security, Windows of Exposure, that tracks an organization’s current and historical website security posture. Window of Exposure is a useful combination of vulnerability prevalence, how long vulnerabilities take to get fixed, and the percentage of them that are remediated. By carefully tracking these metrics, an organization can determine where resources would be best invested.
Using data from WhiteHat’s 11th Website Security Statistics Report, based on assessments of over 3,000 websites, Grossman will reveal the most secure (and insecure) vertical markets and the Windows of Exposure of each. Find out how your industry ranks, and the top ten vulnerabilities plaguing your peers. Learn how to determine which metrics are critical to increasing their remediation rates, thereby limiting their Window of Exposure. The good news is that companies that take this approach are increasing remediation rates by 5 percent per year.
Plan d'action gvt Australien pour le gov2.0Alban Martin
This document outlines a Government 2.0 Action Plan for the Victorian Public Service with the goal of increasing citizen engagement, transparency, and capability through the use of new technologies. The plan focuses on 4 key areas: 1) Driving adoption in government agencies, 2) Engaging citizens, 3) Opening up government data and information, and 4) Building workforce capabilities. It includes 14 initiatives such as developing leadership projects in each agency, establishing an inter-agency task force, providing guidance on privacy and records management, and creating opportunities for citizens to participate in policy development and access to public records. The overall aim is to transform how government works by becoming more collaborative, open and centered around citizens' needs.
The document is an open letter from UK internet law academic experts to Members of Parliament regarding the draft Data Retention and Investigatory Powers Bill (DRIP). The letter argues that the bill goes far beyond simply authorizing data retention and extends the UK's ability to mandate interception of communications content globally. Specifically, the bill would authorize the UK government to compel assistance with interception warrants and obtaining communications data from entities outside the UK, including for conduct occurring outside the UK. The academics urge Parliament not to fast track the legislation without full scrutiny, as it represents a serious expansion of surveillance powers beyond what the government claims.
Gerard Russell, Oxfam GB
Content strategy seminar
www.charitycomms.org.uk
A renewed focus on audience needs and organisational goals helped Oxfam develop strong principles to justify and organise its web content. Gerard explained how the charity applied these principles to rationalise a site which had grown to over 20,000 pages down to a manageable and focused web property with clear objectives.
Upcoming CharityComms events can be found here: http://www.charitycomms.org.uk/events
I Social Network e il dizionario di Babelefabioturel
The document discusses the importance of linguistic diversity in Europe and knowledge of foreign languages. It notes that while English is seen as the main international language, knowing English alone is not sufficient if Europe wants to compete economically and preserve cultural diversity. Data is presented showing the percentage of people in different European countries that can speak two foreign languages, ranging from 92% in Luxembourg to 59% in Italy. The document questions whether differences are due to fewer people learning lesser spoken languages or less need for translation.
Website attacks continue to prevail despite the best efforts of enterprises to fight them. Websites are an ongoing business concern and security must be assured all the time, not just at a point in time. And yet, most websites were exposed to at least one serious vulnerability every day of 2010, leaving valuable corporate and customer date at risk. Why?
In this report, Jeremiah will explore a new way to measure website security, Windows of Exposure, that tracks an organization’s current and historical website security posture. Window of Exposure is a useful combination of vulnerability prevalence, how long vulnerabilities take to get fixed, and the percentage of them that are remediated. By carefully tracking these metrics, an organization can determine where resources would be best invested.
Using data from WhiteHat’s 11th Website Security Statistics Report, based on assessments of over 3,000 websites, Grossman will reveal the most secure (and insecure) vertical markets and the Windows of Exposure of each. Find out how your industry ranks, and the top ten vulnerabilities plaguing your peers. Learn how to determine which metrics are critical to increasing their remediation rates, thereby limiting their Window of Exposure. The good news is that companies that take this approach are increasing remediation rates by 5 percent per year.
The speaker discusses how Lookout has scaled its engineering organization and technical infrastructure over time. In 2011, Lookout had problems with unreliable deployments and a monolithic codebase. It introduced new tools like JIRA, Jenkins, and Git/Gerrit to improve its workflow. It also automated deployments and now has a much higher success rate. As Lookout has grown, it has moved to a more distributed architecture with over 100 microservices running on different technologies. Scaling organizational knowledge and coordinating many independent services will be ongoing challenges.
Noseevich, petukhov no locked doors no windows barred. hacking open am infr...DefconRussia
This document summarizes a presentation about hacking OpenAM infrastructure through XML external entity (XXE) vulnerabilities. The presentation discusses exploiting XXE to loot the file system, retrieve credentials, enable debugging to read authentication tokens, and use a debugging heap dump to decrypt passwords. It provides advice on properly fixing XXE in Java by disabling XML entity expansion and carefully configuring the XML entity resolver. The document concludes by emphasizing the importance of secure configuration, patching, and privilege separation to prevent such attacks.
Newcycling is a cycling campaign group in Newcastle that aims to promote cycling in the city. In 2016-2017, the group will focus on getting the city council to adopt a cycle network plan and sustainable safety principles for infrastructure. The group's vision is for Newcastle to become a bike-friendly city like Copenhagen and Amsterdam by creating safer cycling conditions and dedicated bike routes. They encourage residents to get involved by joining the group, donating, and contacting their local councillors about cycling issues.
Chastukhin, cherbov where is my car dudeDefconRussia
The document discusses security vulnerabilities in vehicle tracking devices, including:
1. Fake base transceiver stations could intercept GSM communications and spoof the device's location.
2. GPS jamming could interfere with location tracking.
3. Server-side vulnerabilities like those in the OWASP top 10 could allow unauthorized access.
4. Devices can be reconfigured or have their firmware updated remotely via SMS or GPRS without authentication, allowing man-in-the-middle attacks or denial of service.
CSCMP 2014: Dr. Robert C. Lieb 2014 3PL Provider CEO PerspectiveAlen Beljin
Dr. Bob Lieb, professor of supply chain management at Northeastern University, is author of the 21st Annual Survey of Third-Party Logistics Provider CEOs, sponsored by Penske Logistics The studies revealed that 3PL CEOs are confident about the current state and future revenue growth of their companies and the regional 3PL industries. The annual surveys, which this year included the CEOs of 27 of the world's largest 3PLs, found that approximately 75 percent of the companies involved in the surveys were profitable in 2013. North American and Asian-Pacific CEOs forecasted three-year company growth of 10.77 percent and 16.2 percent, respectively. European CEOs forecasted 8.33 percent growth over the same period.
The document discusses using Drupal to map and work with geospatial data, describing how Drupal integrates with geospatial libraries and services like GeoPHP, PostGIS, OpenLayers, and TileStache to store, query, style, and display geospatial data on maps. It provides an overview of common geospatial data formats that can be imported into Drupal like shapefiles, KML, GeoJSON and how locations can be geocoded from addresses, and explains how to set up map views in Drupal to display layered geospatial data.
White Paper: The 2015 State of Consumer Privacy & PersonalizationGigya
This year’s survey results illustrate increased growth and intensity in consumer desire for data privacy and personalized user experiences. While social login usage continues to skyrocket, consumers are also showing a marked interest in next-generation authentication methods, including payment providers and biometrics, indicating a clear evolution of the concept of digital identity: Identity 3.0.
The speaker discusses how Lookout has scaled its engineering organization and technical infrastructure over time. In 2011, Lookout had problems with unreliable deployments and a monolithic codebase. It introduced new tools like JIRA, Jenkins, and Git/Gerrit to improve its workflow. It also automated deployments and now has a much higher success rate. As Lookout has grown, it has moved to a more distributed architecture with over 100 microservices running on different technologies. Scaling organizational knowledge and coordinating many independent services will be ongoing challenges.
Noseevich, petukhov no locked doors no windows barred. hacking open am infr...DefconRussia
This document summarizes a presentation about hacking OpenAM infrastructure through XML external entity (XXE) vulnerabilities. The presentation discusses exploiting XXE to loot the file system, retrieve credentials, enable debugging to read authentication tokens, and use a debugging heap dump to decrypt passwords. It provides advice on properly fixing XXE in Java by disabling XML entity expansion and carefully configuring the XML entity resolver. The document concludes by emphasizing the importance of secure configuration, patching, and privilege separation to prevent such attacks.
Newcycling is a cycling campaign group in Newcastle that aims to promote cycling in the city. In 2016-2017, the group will focus on getting the city council to adopt a cycle network plan and sustainable safety principles for infrastructure. The group's vision is for Newcastle to become a bike-friendly city like Copenhagen and Amsterdam by creating safer cycling conditions and dedicated bike routes. They encourage residents to get involved by joining the group, donating, and contacting their local councillors about cycling issues.
Chastukhin, cherbov where is my car dudeDefconRussia
The document discusses security vulnerabilities in vehicle tracking devices, including:
1. Fake base transceiver stations could intercept GSM communications and spoof the device's location.
2. GPS jamming could interfere with location tracking.
3. Server-side vulnerabilities like those in the OWASP top 10 could allow unauthorized access.
4. Devices can be reconfigured or have their firmware updated remotely via SMS or GPRS without authentication, allowing man-in-the-middle attacks or denial of service.
CSCMP 2014: Dr. Robert C. Lieb 2014 3PL Provider CEO PerspectiveAlen Beljin
Dr. Bob Lieb, professor of supply chain management at Northeastern University, is author of the 21st Annual Survey of Third-Party Logistics Provider CEOs, sponsored by Penske Logistics The studies revealed that 3PL CEOs are confident about the current state and future revenue growth of their companies and the regional 3PL industries. The annual surveys, which this year included the CEOs of 27 of the world's largest 3PLs, found that approximately 75 percent of the companies involved in the surveys were profitable in 2013. North American and Asian-Pacific CEOs forecasted three-year company growth of 10.77 percent and 16.2 percent, respectively. European CEOs forecasted 8.33 percent growth over the same period.
The document discusses using Drupal to map and work with geospatial data, describing how Drupal integrates with geospatial libraries and services like GeoPHP, PostGIS, OpenLayers, and TileStache to store, query, style, and display geospatial data on maps. It provides an overview of common geospatial data formats that can be imported into Drupal like shapefiles, KML, GeoJSON and how locations can be geocoded from addresses, and explains how to set up map views in Drupal to display layered geospatial data.
White Paper: The 2015 State of Consumer Privacy & PersonalizationGigya
This year’s survey results illustrate increased growth and intensity in consumer desire for data privacy and personalized user experiences. While social login usage continues to skyrocket, consumers are also showing a marked interest in next-generation authentication methods, including payment providers and biometrics, indicating a clear evolution of the concept of digital identity: Identity 3.0.