Presentation of UNESCO report for UNESCO's Conference on Freedom of Expression on the Internet in Marrakesh, Morocco, with support from the Morocco Internet Society, 15 February 2013.
This is a collation of some pretty facts about the Indian Digital Scenario in the year 2012. This will help you to have a snap shot of the market for the year 2012 along with some amazing prediction for next 3 years.
This is a collation of some pretty facts about the Indian Digital Scenario in the year 2012. This will help you to have a snap shot of the market for the year 2012 along with some amazing prediction for next 3 years.
Quarterly report of share of mobile browser traffic connecting via Mobile Operators vs Wifi connections.
Rapid growth in Wifi share has resumed - now up to 20%+
The Role of Technology For Patient Outcomes in East Africa — Slides from East...IHS
These slides were presented by Farah Ramadan at the East Africa Healthcare Investment Summit 2012 in Kampala, Uganda on 19th April 2012.
The presentation was part of a panel discussion with government and industry representatives, examining strategies for sustained growth and profitability in the healthcare arena in East Africa.
This presentation focused specifically on the role of technology as an enabling force for better patient outcomes in East Africa.
Strategies for mobiles and smartphones - James CridlandRolf Brandrud
The use of smart phones has exploded. But is anyone really listening to radio on them? How do people use their mobiles for radio - and what can we learn from broadcasters who pioneer in this area?
Can the European radio industry influence the mobile phones manufacturers to include a generic receiver for digital radio in all phones – the “Eurochip”?
And how will devices and mobile services develop over the coming years?
Learn how to take your online business global the right way in this presentation. Draw conclusions from supporting data and know what benefits and challenges to consider when it comes to going international.
Digital and social media across Asia-Pacific marketsBob Pickard
This presentation delivered at the Lee Kong Chian School of Business in Singapore Management University provides an overview of digital dynamics in Asia-Pacific and outlines communications approaches designed to resonate with social media communities.
Quarterly report of share of mobile browser traffic connecting via Mobile Operators vs Wifi connections.
Rapid growth in Wifi share has resumed - now up to 20%+
The Role of Technology For Patient Outcomes in East Africa — Slides from East...IHS
These slides were presented by Farah Ramadan at the East Africa Healthcare Investment Summit 2012 in Kampala, Uganda on 19th April 2012.
The presentation was part of a panel discussion with government and industry representatives, examining strategies for sustained growth and profitability in the healthcare arena in East Africa.
This presentation focused specifically on the role of technology as an enabling force for better patient outcomes in East Africa.
Strategies for mobiles and smartphones - James CridlandRolf Brandrud
The use of smart phones has exploded. But is anyone really listening to radio on them? How do people use their mobiles for radio - and what can we learn from broadcasters who pioneer in this area?
Can the European radio industry influence the mobile phones manufacturers to include a generic receiver for digital radio in all phones – the “Eurochip”?
And how will devices and mobile services develop over the coming years?
Learn how to take your online business global the right way in this presentation. Draw conclusions from supporting data and know what benefits and challenges to consider when it comes to going international.
Digital and social media across Asia-Pacific marketsBob Pickard
This presentation delivered at the Lee Kong Chian School of Business in Singapore Management University provides an overview of digital dynamics in Asia-Pacific and outlines communications approaches designed to resonate with social media communities.
Presentation to ISOC INET Qatar Conference, 27 November 2012, focusing on the Middle East and North African in a Global Perspective. Based on the Global Values Project at the OII, University of Oxford.
The Webinar organized by Endeavour - The Mobility Company, held on July 28, 2010 explored the increasing use in healthcare and its future.
For more information on mHealth, visit: www.techendeavour.com
Wisdom of crowds business intelligence market study findings overviewYellowfin
The latest edition – based on 859 responses from professionals with first-hand experience using vendor products and services – analyzes market place trends throughout 2011 and assess user perceptions towards BI for the coming year. The study also compares and ranks 17 of the world’s foremost BI vendors, their solution and associated services. Yellowfin achieved the equal highest overall ranking (4.57 out of five), as well as best outright score in the study’s “Emerging Business Intelligence Vendors” sub-group.
Yellowfin outscored traditional big name players, including Microsoft, IBM, SAP Business Objects, MicroStrategy, SAS Institute and Oracle. Yellowfin also outperformed other high profile vendors, including Information Builders, Actuate, Qliktech, Tibco Spotfire, Dimensional Insight, Arcplan, Pentaho and Jaspersoft.
Vendors are ranked on a five-point scale, across 33 different criteria, based on seven categories, including: Sales experience, value, quality and usefulness of product, quality of technical support, quality and value of consulting services, integrity and whether existing clients would recommend the vendor and its product to others.
Audience Behaviour: Bring Back that Lovin‘ Feelin‘AchillesMedia
Today‘s media surfing audiences are no longer the faithful and loving partners they once were! In order to engage citizens of the digital era it takes more than sweet talk. Bryan Segal, Vice President, Sales - comScore Inc. reveals where the Millennials, Generation X, Baby Boomers and Matures are spending their time and their money.
Web 2.0 Solutions For One High-end Hotel Brand in BeijingLara Young
This proposal is written for a high-end hotel brand in Beijing. How to take advantage of web 2.0 and to be ROI centric is becoming important for brand marketing in this era.
The hotel's name has been deleted because of the privacy protection purpose.
OMMA Display 2011 -- Transformation of the Measurement Industry: How Much Can...Linda Gridley
OMMA Display 2011
Presentation by Linda Gridley
Transformation of the Measurement Industry: How Much Can be Attriibuted to M&A? Learn more about Gridley & Company at http://www.gridleyco.com
Bill Dutton's presentation to the 2022, 7th international SEARCH conference, at Taylor's University, Malaysia, focusing on his concept of a Fifth Estate.
Bill Dutton's presentation on cybersecurity capacity building and work on cybersecurity in working from home (WFH). Is cybersecurity a problem or enabler for WFH?
Overview of the research project entitled 'Changing Workplaces: Implications for Cybersecurity', conducted by the GCSCC in collaboration with GrapeData.
A presentation underpinning a discussion with participants in the wide-area network (WAN) summit held on 26 September 2022 in London at the QEII. It is based on initial descriptive results of a 2022 global survey of over 7,000 internet users on their workplaces prior to the COVID-19 pandemic, during the pandemic, and currently. Questions also address the cybersecurity issues they faced during each stage of the pandemic. The rise of working from home and hybrid working are clear along with declines in office work and the use of decentralised offices. The survey was designed by our research team at the Global Centre for Cybersecurity Capacity Building at the University of Oxford in collaboration with Grape Data, a new and innovative survey research organisation, which fielded the survey.
Presentation for the Seminar on Contemporary Issues of Communication and Culture, Escola de Sociologia e Políticas Públicas, Lisbon University Institute, Lisbon, Portugal, 29 April 2021.
Slides for a talk for the School of Social and Political Sciences and Department of Communication, University of Indonesia, Jakarta, 21 April 2021. I was asked to discuss digital citizenship, and did so from the perspective of the Fifth Estate.
My presentation online entitled 'Power Corrupts', for a seminar on Freedom of Expression on the Net: Implications of Banning Trump from Social Media, 1 February 2012.
Michael Goldsmith and I presented an overview of cybersecurity capacity building and current research findings for delegates from across the Commonwealth nations. The first section of slides introduces the Global Cyber Security Capacity Centre (GCSCC), and the second part presents a comparative analysis of the status and impact of capacity building.
A presentation to the 2019 meeting of the Global Forum on Cyber Expertise (GFCE) in Addis Ababa, October 2019, entitled 'The Shaping and Impacts of Cyber Security Capacity'. The slides are updated since the conference to reflect revised multivariate path analyses.
Presentation on the analysis of cybersecurity capacity building, finding a clear impact of capacity building on a reduction in end user problems and enhanced use by individuals, governments, and business.
MSU is in a position to take a lead in research on the role of next generation broadcasting standards in the use and impact of public broadcasting. This presentation seeks to provide the context and prospects for research on the next generation of public broadcasting.
Presentation on fake news, filter bubbles, and echo chambers for representatives of media and regulatory agencies at Palace Foz (Lisbon), 9 April 2018, by Bill Dutton.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
Freedom of Expression - Freedom of Connection
1. Freedom of Connection – Freedom of Expression:
The Changing Legal and Regulatory Ecology Shaping the Internet
William H. Dutton
Oxford Internet Institute (OII)
University of Oxford
Presentation for UNESCO Conference with
Moroccan Internet Society on Freedom of Expression
over the Internet, Marrakech, Morocco, 15 February
2013.
2. UNESCO Request to Critically
Review Status of Research on
Freedom of Expression:
• Some Pioneering Studies
Report Launch
• More Advocacy v Research at UNESCO,
Paris, 30 May
2011; Arabic
• Political Minefield (e.g., the trans. 2013.
McBride Commission 1977)
•Too Single-Issue Focused
6. Balancing Digital Rights
• Access – Freedom of
Connection
• Freedom of Expression
• Censorship
• Equality (media literacy)
• Freedom of Information
• Privacy & Data Protection
7. Technical Innovations:
Worldwide Diffusion of
Technologies of Connection
• Internet
• World Wide Web
Percent of global Internet population
• Mobile and Mobile Number of Internet users (mio.)
Internet penetration within region
Internet 100% 825 900
Total number of Internet users in region (mio.)
800
80% 77% 700
%Internet users
61% 600
60% 58%
475
500
400
40% 35%
266 30% 42% 300
205 22%
20% 200
24% 111
21 63 11% 100
14% 6%
1% 10% 3%
0% 0
North Oceania / Europe Latin Middle Asia Africa
America Australia America / East
Caribbean
Source: Internet World Stats - www.internetworldstats.com/stats.htm. Penetration rates are
based on a world population of 6,845,609,960 and 1,966,514,816 estimated Internet users
for June 30, 2010.
10. Number and Proportion of Internet Users by Region
90% 1200
79%
80% 1017
1000
70% 68%
Total number of Internet users (Mil.)
61%
60% 800
% of Internet users
50%
600
40% 45%
40% 501 36%
30% 26% 400
273
20% 236
22%
14%
200
139
10% 12% 77
10%
24
1% 3% 6%
0% 0
Percentage of global Internet population Number of Internet Users (mio.)
Internet penetration within region
Source: Internet World Stats- www.internetworldstats.com/stats.htm. Penetration rates are based on a world population of
6,930,055,154 and 2,267,233,742 estimated Internet users for December 31, 2011.
11. Technical Innovations:
Technologies of Disconnection
Meta-analysis of Internet filtering surveys:
• Global growth of filtering (and increasing worldwide)
• No single country
• Variety of Objectives:
• Political
• Moral
• Commercial
BUT: Potential to Decentralize, e.g.,
Home Hubs
12. Industrial Policy and Regulation
• Technology-led Industrial Strategies, support economic growth
• ICT for Development (ICT4D)
• Competition Policy
• IPR: Copyright
• IPR: Patents
13. Industrial Policy and Regulation
Copyright enforcement:
• ‘Three Strikes’ policy in France
• Digital Economy Act (UK)
• Stop Online Piracy Act (SOPA)
Countered by:
• The Pirate Party
• Brazilian Copyright Reform Bill
Copyright Mot
14. User-Centric Policy
• Child Protection Policy
• Decency: Pornography
• Libel: Defamation
• Prevention of Hate Speech
• Consumer Protection: Fraud
• Section 127 of the UK Com
Act 2003 – electronic com that
is ‘grossly offensive or of an
indecent, obscene or Copyright Mugley
menacing character; …’
15. Internet Policy
• Internet Governance and Regulation (Multi-stakeholder Approach)
• Domain Names and Numbers
• Net Neutrality
• Licensing, Regulation of Service Providers: Intermediaries
• Internationalised Top-level Domain Names
17. Security
• Secrecy, Confidentiality
• Security against Malware
• Counter-Radicalisation
• National Security
– Blackberry Use
– WikiLeaks: Confidentiality-Security
– UK Data Communications Act
19. Encouraging Themes for Freedom of Expression
• Internet Empowering Networked
Individuals – Enhancing Freedom of
Connection and Expression (5th Estate)
• Major Issues of Human Rights are
Increasingly Being Centered on the
Internet and Web
• The Internet Space is not the ‘Wild
West’ – much regulation exists
20. Countervailing Themes
•Freedom of Expression is not an Inevitable Outcome of
Technological Innovation
• Continuing Global and Local Digital Divides in Access
and the Production of Content
• Global Increase in Content Filtering and Censorship
• Freedom Shaped by Choices in the Wider Ecology of
Actors, Objectives and Policies
• Use of Inappropriate Models for Internet Governance
and Regulation threatens to Foster ‘Over-Regulation’,
e.g., fear or complacency of the ‘Old Internet World’
21. Directions for Policy
• Reduce Digital Divides
• Broaden Perspectives on Freedom of Expression
– the Larger Legal and Regulatory Ecology
− ways to democratize content control
• Renew and Inform Debates over:
– Appropriate Regulatory Models for the Internet
– Global and Local Approaches to Internet Governance
– Ways to Inform the Public and Elected Officials about
the Internet and Legal-Regulatory Issues
22. Renew Research on
Freedom of Expression
• More Systematic and Sustained Monitoring of
Innovations in, and Use of, Internet Filtering
• Need to Track an Expanded Range of Policies
and Regulatory Issues in this Ecology
• Critically Explore Relationships between Freedom
of Expression and other Core Values and Rights
• Study Impacts on the Ground, including Public
Beliefs, Attitudes, and Behavior
• Understand Assaults on Freedom of Expression
as efforts to protect other Values and Interests