The document discusses how social interactions have changed with the rise of digital communication technologies. It argues that while these technologies allow for instantaneous long-distance communication, they have also lessened intimacy in relationships and led people to hide from one another even when constantly connected. There is a concern that primarily digital friendships can reduce empathy in society and undermine trust between people. The effects of these changes on social norms and new generations remains to be seen over time.
How Social Networking Is Making Us AntisocialKelsey Elchuk
Our excessive use of social media is negatively impacting many aspects of our social lives, including friendships, relationships and overall life experiences. Here's how.
I got my inspiration for this presentation from a mixture articles and situations that have occurred in my life. The topic I chose was how social media does not promote social behaviour. I see the pattern of disengagement from society in many people around me as they all focus the majority of their attention on social media. I hope to educate other people on the dangers of social media, and why it is important to maintain in-person connections.
How Social Networking Is Making Us AntisocialKelsey Elchuk
Our excessive use of social media is negatively impacting many aspects of our social lives, including friendships, relationships and overall life experiences. Here's how.
I got my inspiration for this presentation from a mixture articles and situations that have occurred in my life. The topic I chose was how social media does not promote social behaviour. I see the pattern of disengagement from society in many people around me as they all focus the majority of their attention on social media. I hope to educate other people on the dangers of social media, and why it is important to maintain in-person connections.
We present findings in addition to the work in the following analyses.Worm Backdoors and Secures QNAP Network Storage Devices. https://isc.sans.edu/forums/diary/Worm+Backdoors+and+Secures+QNAP+Network+Storage+Devices/19061
Shellshock Worm Exploiting Unpatched QNAP NAS Devices https://threatpost.com/shellshock-worm-exploiting-unpatched-qnap-nas-devices/109870
A little ShellShock fun http://jrnerqbbzrq.blogspot.com/2014/12/a-little-shellshock-fun.html
This is what we found, missing pieces from previous researches.
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
CryptoLocker was a ransomware trojan which targeted computers running Microsoft Windows and was first observed by Dell SecureWorks in September 2013. CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message, which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin
Explore the new 2014 TorrentLocker and get inside his C&C server
K. Alexis, C. Papachristos, G. Nikolakopoulos, A. Tzes, “Model Predictive Quadrotor Indoor Position Control”, 19th Mediterranean Conference on Control and Automation, p.1247-1252, June 20-23 2011, Aquis Corfu Holiday Palace, Corfu, Greece
Presentation given during ICRA 2013 to accompany the following paper: C. Papachristos, K. Alexis, A. Tzes “Model Predictive Hovering-Translation Control of an Unmanned Tri-TiltRotor”, IEEE International Conference on Robotics and Automation, ICRA 2013, Karlsruhe, Germany
This is a submission for Film260's FlipBook Assignment. The content aims to depict that fact that as technology in the communication industry continues to advance, the ease of communicating becomes increasingly complicated. Users become frustrated with the various methods of communications and the compatibility of multiple preferences are constantly tested. People ultimately need to converse with the counterpart, explain their relative hardships and find a mutual solution. As Sydney Eve Matrix puts it, "we need to look for The Ideal Goldilocks Effect"- or the happy medium (just right). The inspiration for this topic came from an article in the Wall Street Journal Online entitled, "He Tweets, She Texts- Are They E-Compatible?" by Elizabeth Bernstein.
What will our relationship with technology look likeMonique Ling
How will technology affect or imitate our relationships with people in the future? Will it become our new best friend or will it help us stay connected with our real friends?
A brief insight from a Queen's University FILM260 student about how human interaction is affected every day by technologies such as texting and facebook.
The iHigh: Recognizing the Emerging Addiction Our World Has to TechnologyMFroebelius
A look at how our society has evolved to the point where we don't just use technology and social media- we need it. (Film 260 Flipbook Assignment, May 2013)
An examination of three traits encouraged by social networks--narcissism, insecurity, and isolation--that lead to negative behaviours among users and, ultimately, unhappiness.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
FILM260 Flipbook
1. FILM260:
Flipbook
The
Regression
of
Social
Contact
By:
Duncan
O’Donnell
Image
Via
Flickr:
Jesse
W.
Dil
2. “ADer
tens
of
thousands
of
years
of
interacIng
with
each
other
preKy
much
the
same
way
–
face-‐to-‐face,
or
through
a
physical
device
(pictures,
words,
smoke
signals)
–
we’ve
suddenly
become
able
to
communicate
over
long
distances
instantaneously.”
Image
Via
Flickr:
cosmonauIruSource:
Erika
Anderson,
Forbes
3. Image
Via
Flickr:
johnthurm
FiDeen
years
ago,
the
majority
of
these
technologies
didn’t
exist.
now,
we
have
access
to
informaIon
conInuously
and
it
has
changed
how
we
COMMUNICATE
4. Image
Via
Flickr:
madame.furie
In
fact of
digital
na4ves
prefer
to
communicate
digitally
rather
than
face-‐to-‐face
Source:
How
Our
Digital
Devices
Are
AffecIng
Our
Personal
RelaIonships,
Iris
Adler
6. Image
Via
Flickr:
travit
“It
is
never
okay
to
be
unavailable.
Ever.
Not
for
a
minute.”
Though…
We
are
constantly
connected
and
never
disconnected
Source:
He
Texts,
She
Tweets
-‐
Are
they
E-‐CompaIble?
7. Image
Via:
BreK
Levin
-‐
Flickr
ource:
Sherry
Turkle,
The
Flight
From
CommunicaIon
8. Image
Via
Flickr:
adam.shamblin
Source:
Sherry
Turkle,
The
Flight
From
CommunicaIon
9. Image
Via
Flickr:
rkleine
to
our
Sherry
Turkle,
The
Flight
From
CommunicaIon
10. Image
Via
:
Wikimedia
Commons
This
change
has
leD
us
DIVIDED
11. Image
Via
Flickr:
Hollings
Many
now
argue
“we
expect
more
from
technology
and
less
from
one
another”
providing
“the
illusion of companionship
without
the
demands
of
relaIonship.”
Source:
Sherry
Turkle,
The
Flight
From
CommunicaIon
12. Image
Via
Flickr:
sunsur
“we
end
up
hiding
from
one
another
even
as
we
are
constantly
connected”
Source:
Sherry
Turkle,
The
Flight
From
CommunicaIon
13. Image
Via
Flickr:
paurian
Causing
us
too…
“Change
not
only
what
we
do
but
also
who
we
are”
Source:
Sherry
Turkle,
The
Flight
From
CommunicaIon
14. Image
Via
Flickr:
Alex
Akopyan
Now,
there
are
always
other
people
to
communicate
with
15. leaving
us
to
ask…
How
are
social
interacIons
changing?
and
What
factors
are
inside,
and
what
factors
are
outside
the
box?
16. Image
Via
Flickr:
Stuck
in
Customs
One
study
states
the
changes
have:
Lessened
in4macy
and
saIsfacIon
among
romanIc
couples
Source:
From
Bullying
To
RelaIonships
17. Image
Via:
Wikimedia
Commons
Because
of
this,
many
people
hope
to
“preserve
the
values
and
social
norms
of
offline
culture”
Source:
Alexandra
Samuels,
The
AtlanIc
18. Image
Via
Flickr:
mtsrs
The
truth
is
that
we
should
be
worried
about
having
primarily
digital
friendships,
because
they
can
cause
a
loss
of
empathy.
19. Image
Via
Flickr:
griangrafanna
“The
problem
is,
as
empathy
wanes,
so
does
trust.
And
without
trust,
you
can't
have
a
cohesive
society.”
Source:
Belinda
Luscombe,
Time
20. Now,
only
Ime
will
tell
how
our
digital
lives
and
virtual
friendships
will
shape
new
generaIons.
Image
Via
SXH.HU:
Stock
Photo
Website
21. Image
Via:
Duncan
O’Donnell
All
images
are
licensed
under
the
CreaIve
Commons
Non-‐Commercial
Share-‐Alike
3.0
Agreement
and
sourced
from
Flickr
unless
otherwise
stated.