This document outlines the agenda and content for a presentation on breaking into the cybersecurity/IT industry. The presenter discusses the history of computing and how the industry has evolved over time. They emphasize the importance of understanding core technical concepts and gaining hands-on experience through certifications, side projects, volunteering, and bug bounty programs. The presentation encourages networking on platforms like LinkedIn and developing personal brands to become more competitive in a challenging job market. Diversity and soft skills are also highlighted as important factors for success in this field.
1) The document discusses artificial intelligence and machine learning in the context of information security. It provides definitions of artificial intelligence, machine learning, and how they relate to the infosec industry.
2) It argues that the infosec industry needs to apply artificial intelligence and machine learning to address challenges like protecting against human errors and dealing with the growing volume of data and new technologies. However, AI relies on access to large amounts of data which raises privacy concerns.
3) It envisions how technology may continue to evolve in areas like fintech, IoT, smart systems and more, and argues that the infosec industry needs to start solving these challenges with AI now rather than continuing to discuss the same issues for the next 25
Given at the BugCrowd conference in January 2019, this was the first time for doing this deck.:
For 25 years or more we have fought the battle of passwords and patches while all around us, the world has developed, data has exponentially increased, attack surfaces are everywhere and technology had quite simply forced the human race to consider the evolution cycle in single lifespans as opposed to millennia. During the last 25 years we have done little to protect the charges we are responsible for, we have failed to secure systems, allowed financial attacks, infrastructure attacks, and now attacks directly against humans. At what point will we be able to stem the bleeding and actually take charge of our realm? Have we left it too late, or are we still able to claw back out of the abyss and face our adversary in a more asymmetrical defensive manner? Can we actually provide safety and security to our charges or will we continue to fail? And, critically, how do we communicate this, and educate a population that is content to watch from the sidelines, while they are being digitally eviscerated.
Voting Systems - ISSA Chicago Presentation 2020Chris Roberts
Ā
This document discusses issues with voting machine security and election integrity in the United States. It notes that major voting machine companies like ES&S, Dominion, and Hart still rely on outdated and insecure technology, with vulnerabilities like easy-to-guess default passwords and hundreds of thousands of lines of insecure source code. The document also outlines other security problems like a lack of paper audits trails and patching, as well as corruption within the voting machine industry. Overall, it argues that the current electronic voting systems in the US are insecure and cannot guarantee fair and accurate elections.
This presentation was after a showing of Robot & Frank and Livermore, CA public library. The point of the session was to explore AI basics and discuss the potential of the movie coming true.
1) The document discusses the importance of trust in building a secure digital ecosystem over the next 10 years, with technologies, norms and policies aligning to produce a resilient system.
2) It emphasizes that computing is about and for people, and outlines some key points about trust including that it is subjective, involves risk, and control is not always possible.
3) The discussion then focuses on technical solutions for cybersecurity that leverage and enable trust, including computational trust models, trust enablement, device comfort, and intelligent information sharing that considers trust relationships and privacy.
AI and automation is all the rage nowadays - but whatās the history of these technologies, innovations and ideas?
AI and automation is all the rage nowadays - but whatās the history of these technologies, innovations and ideas? This slides will discuss the brief history of the current interesting technologies and their development to society and mankind.
1) The document discusses artificial intelligence and machine learning in the context of information security. It provides definitions of artificial intelligence, machine learning, and how they relate to the infosec industry.
2) It argues that the infosec industry needs to apply artificial intelligence and machine learning to address challenges like protecting against human errors and dealing with the growing volume of data and new technologies. However, AI relies on access to large amounts of data which raises privacy concerns.
3) It envisions how technology may continue to evolve in areas like fintech, IoT, smart systems and more, and argues that the infosec industry needs to start solving these challenges with AI now rather than continuing to discuss the same issues for the next 25
Given at the BugCrowd conference in January 2019, this was the first time for doing this deck.:
For 25 years or more we have fought the battle of passwords and patches while all around us, the world has developed, data has exponentially increased, attack surfaces are everywhere and technology had quite simply forced the human race to consider the evolution cycle in single lifespans as opposed to millennia. During the last 25 years we have done little to protect the charges we are responsible for, we have failed to secure systems, allowed financial attacks, infrastructure attacks, and now attacks directly against humans. At what point will we be able to stem the bleeding and actually take charge of our realm? Have we left it too late, or are we still able to claw back out of the abyss and face our adversary in a more asymmetrical defensive manner? Can we actually provide safety and security to our charges or will we continue to fail? And, critically, how do we communicate this, and educate a population that is content to watch from the sidelines, while they are being digitally eviscerated.
Voting Systems - ISSA Chicago Presentation 2020Chris Roberts
Ā
This document discusses issues with voting machine security and election integrity in the United States. It notes that major voting machine companies like ES&S, Dominion, and Hart still rely on outdated and insecure technology, with vulnerabilities like easy-to-guess default passwords and hundreds of thousands of lines of insecure source code. The document also outlines other security problems like a lack of paper audits trails and patching, as well as corruption within the voting machine industry. Overall, it argues that the current electronic voting systems in the US are insecure and cannot guarantee fair and accurate elections.
This presentation was after a showing of Robot & Frank and Livermore, CA public library. The point of the session was to explore AI basics and discuss the potential of the movie coming true.
1) The document discusses the importance of trust in building a secure digital ecosystem over the next 10 years, with technologies, norms and policies aligning to produce a resilient system.
2) It emphasizes that computing is about and for people, and outlines some key points about trust including that it is subjective, involves risk, and control is not always possible.
3) The discussion then focuses on technical solutions for cybersecurity that leverage and enable trust, including computational trust models, trust enablement, device comfort, and intelligent information sharing that considers trust relationships and privacy.
AI and automation is all the rage nowadays - but whatās the history of these technologies, innovations and ideas?
AI and automation is all the rage nowadays - but whatās the history of these technologies, innovations and ideas? This slides will discuss the brief history of the current interesting technologies and their development to society and mankind.
Issues on Artificial Intelligence and Future (Standards Perspective)Seungyun Lee
Ā
This document provides an overview of artificial intelligence standards. It begins with a brief history of AI and discusses some of the major issues with AI, including bias, lack of oversight, and safety concerns. It then examines the need for AI standards in areas like interoperability, security, privacy, and ethics. The document reviews related standardization activities from organizations like IEEE, ISO, IEC, and ITU. It analyzes the results of a JTC 1 survey that identified interoperability, domains, and security as top priority areas for AI standards. Finally, it recommends that JTC 1 urgently develop standards for AI to help guide its development and application in a safe, fair, and beneficial manner.
This document provides an overview of artificial intelligence (AI) opportunities and dangers for business. It discusses how AI is dominating technology focus and ushering in an intelligent automation age. The dangers section addresses issues like existential risks, data monopolies, and potential solutions like decentralization and data taxation. The opportunities section outlines many business areas impacted by AI like marketing, customer service, and workflow automation. It provides recommendations for enterprises to create an AI strategy and sense-and-respond framework to generate revenue and optimize operations using AI.
15 Pros and 5 Cons of Artificial Intelligence in the ClassroomLiveTiles
Ā
Technology has provided us with many new ways to learn. In the classroom, there are both pros and cons of the artificial intelligence that technology offers.
The document discusses cognitive computing and the future of artificial intelligence. It describes how by 2018, half of all consumers will regularly interact with services based on cognitive technologies. It then provides an overview of IBM's research into cognitive computing, including the development of early AI systems, deep learning, natural language processing, machine vision, and brain-inspired systems like SyNAPSE. The document outlines IBM's vision of a future where cognitive systems can assist humans by interpreting medical images, recognizing speech, providing recommendations, and engaging in conversational interactions.
Driven by the rapid progress in Artificial Intelligence (AI) research, intelligent machines are gaining the ability to learn, improve and make calculated decisions in ways that will enable them to perform tasks previously thought to rely solely on human experience, creativity, and ingenuitāy. As a result, we will in the near future see large parts of our lives influenced by AI.
AI innovation will also be central to the achievement of the United Nations' Sustainable Development Goals (SDGs) and will help solving humanity's grand challenges by capitalizing on the unprecedented quantities of data now being generated on sentiment behavior, human health, commerce, communications, migration and more.
With large parts of our lives being influenced by AI, it is critical that government, industry, academia and civil society work together to evaluate the opportunities presented by AI, ensuring that AI benefits all of humanity. Responding to this critical issue, ITU and the XPRIZE Foundation organized AI for Good Global Summit in Geneva, 7-9 June, 2017 in partnership with a number of UN sister agencies. The Summit aimed to accelerate and advance the development and democratization of AI solutions that can address specific global challenges related to poverty, hunger, health, education, the environment, and others.
The Summit provided a neutral platform for government officials, UN agencies, NGO's, industry leaders, and AI experts to discuss the ethical, technical, societal and policy issues related to AI, offer reccommendations and guidance,ā and promote international dialogue and cooperation in support of AI innovation.
Please visit the AI for Good Global Summit page for more resources: https://www.itu.int/en/ITU-T/AI/Pages/201706-default.aspx
If you would like to speak, partner or sponsor the 2018 edition of the summit, please contact: ai@itu.int
Understanding Artificial Intelligence - Major concepts for enterprise applica...APPANION
Ā
Artificial Intelligence is a fundamental topic ā for us as humans, as a society but also for businesses. For business executives and decision-makers, it is sometimes hard to keep up with rapidly evolving technologies as part of the day-to-day business. By providing this curated compilation of information about the fundamental aspects of AI, we want to captivate and inspire you to become more involved with the technology by better understanding the underlying concepts and value drivers of this technology
Computers have had a significant impact on society in several ways. They have automated many repetitive jobs and made office work and communication more efficient. Computers have also transformed education by enabling simulated learning and online research. However, extensive computer use can negatively impact health by straining muscles and vision. Younger generations are also spending more time playing computer games instead of socializing offline. While computers connect people, they also threaten privacy and enable fraud if information is hacked.
Technology has become an essential part of daily life. It is used at home, school, and work in many ways such as computers, cell phones, calculators, and more. While technology provides benefits, it also presents risks like viruses and hackers that people must be aware of and use technology responsibly and ethically.
computer and society impact of Computer in society Sumama Shakir
Ā
This document discusses computer and society, the impact of computers, and computer ethics. It begins by noting how computers are now ubiquitous and impact daily life and communication. It then outlines several major applications of computers in fields like management, banking, industry, engineering, medicine, and transportation. Both positive impacts like efficiency and data storage, and negative impacts like costs and data loss are discussed. The document also covers computer ethics, including issues around intellectual property, privacy, and how technology shapes society. Specific ethical concerns are outlined, like plagiarism, hacking, and phishing scams. Finally, the document provides tips to avoid phishing scams and promote responsible computer use.
Will artificial intelligence replace programmersMaciej Dziergwa
Ā
Artificial intelligence can compose songs, paint pictures, help in cancer therapy, drive cars and play games. Itās also starting to write code.
Does it mean that the days of human programmers are already numbered? Will software engineering be automated?
Rapid fire talk going through a number of topics that we'd pre-selected...one slide on the question, 1-2 slides on an answer....
Much goodness, for reference, here's the subjects:
Planes: Lets go from myth to reality in a couple of slides, including updates since 2015
Transportation in general, cars, trucks, trains and shipsā¦.
Why can we still do this?
Whatās not changed?
The technology, reactive, static vs. predictive
The humans, why do we ignore them?
Why this needs to changeā¦what does the future hold?
Why DO we stare into the abyss, why do we continue to deny it
Hacking humans, molecular
Hacking humans, consciousness
Why DO we need to fix and HOW do we fix it?
Fix the human
Fix the basics
Intelligent systems working collaboratively with us
Augmented intelligence, the science of giving us the edge.
Collaborate
The last 5 years have been transformative in the AI industry, how will the next 10 look like? We've seen an explosion in IoT devices and the data flowing through them ā ubiquitous computing is here to stay. How would this change the ecosystem with respect to hardware, solution development, testing, copyrights, privacy, etc.? And finally, a prediction of what all of this means for businesses, current and new, in light of advancements in deep learning.
IWMW 2004: Socrates Building an intranet for the UK Research CouncilsIWMW
Ā
Slides for plenary talk on "Socrates Building an intranet for the UK Research Councils" given at the IWMW 2004 event held at the University of Birmingham on 27-29 July 2004.
See http://www.ukoln.ac.uk/web-focus/events/workshops/webmaster-2004/talks/brown/
How connectedness changes everything including Knowledge ManagementSteve Song
Ā
The document discusses how connectivity and conversation are changing how information and knowledge are shared. As more people connect online through blogs, social media, and sharing content, it increases opportunities for conversation. Quantity and connectivity changes things qualitatively - more connections allow for new types of information sharing and the spread of ideas in complex, decentralized networks like small worlds. The key ideas are that conversation is becoming king as people share and discuss information online, and that intelligent sharing of our insights through online platforms will become increasingly common and expected.
How to crack Big Data and Data Science rolesUpXAcademy
Ā
How to crack Big Data and Data Science roles is the flagship event of UpX Academy. This slide was used for the event on 10th Sept that was attended by hundreds of participants globally.
Linked Data: The Real Web 2.0 (from 2008)Uche Ogbuji
Ā
"Linking Open Data (LOD) is a community initiative moving the Web from the idea of separated documents to a wide information space of data. The key principles of LOD are that it is simple, readily adaptable by Web developers, and complements many other popular Web trends. Linked, open data is the real substance of Web 2.0, and not flashy AJAX effects. Learn how to make your data more widely used by making its components easier to discover, more valuable, and easier for people to reuseāin ways you might not anticipate."
It was a cool experience, spending time with programmer and some computer engineers. In this codecamp, I talked about the science behind Complex networks, and how to program for complex network analysis. I also had a brief introduction towards graph databases.
KCL 2014 "Working in IT: (my) past, (the) present and (your) future"Daniel Bryant
Ā
This is a 'career advice' talk that was given at King's College London in February 2014, that was produced by request after an interesting 'cross-polination' meeting between the industry people from the London Java Community (LJC) and London academics.
This presentation includes details about my career, some of the motivation for my choices, and then looks at the current state of the programming landscape. It concludes with my predictions for the future of a successful IT career, and recommends potential skills to learn for a productive (and fun) future.
This document summarizes recent technology updates and projects at an art museum. It overviews outcomes of a network upgrade including faster speeds and increased bandwidth. It also lists upcoming projects like new digital displays, an updated website, and content management systems. Future goals are outlined like improving the digital experience and implementing systems for customer management, finance and more. An emphasis is placed on collaboration, prototyping, and an iterative process for technology innovation.
This document discusses starting an online startup in Indonesia. It begins by introducing the author and their background. It then provides context about the dotcom bubble of the late 1990s. The main sections discuss current online business models in Indonesia, developing an idea and plan, taking action and joining a startup community, sources of funding and support for startups, and proposes the creation of an ITB startup community. It concludes by thanking the reader and sharing the author's contact details.
A talk shared at University Technical Officers union 2017 to make them aware of latest technologies, knowledge hubs, free resources , ICT literacy, IOT, Smart gadgets, Science Communication issues and etc
F+ is a proposed next-generation social network that aims to address unmet user needs beyond simple socialization. It would act as a knowledge base and data storage system that facilitates information discovery, analysis, and retrieval based on relevance. The network would also provide tools for collaboration on work and public activities as well as opportunities for earning rewards. The architecture would combine social networking aspects with knowledge management, collaboration features, and a rewards system in a way that is different from existing social networks by focusing more on moving from ideas to results.
Issues on Artificial Intelligence and Future (Standards Perspective)Seungyun Lee
Ā
This document provides an overview of artificial intelligence standards. It begins with a brief history of AI and discusses some of the major issues with AI, including bias, lack of oversight, and safety concerns. It then examines the need for AI standards in areas like interoperability, security, privacy, and ethics. The document reviews related standardization activities from organizations like IEEE, ISO, IEC, and ITU. It analyzes the results of a JTC 1 survey that identified interoperability, domains, and security as top priority areas for AI standards. Finally, it recommends that JTC 1 urgently develop standards for AI to help guide its development and application in a safe, fair, and beneficial manner.
This document provides an overview of artificial intelligence (AI) opportunities and dangers for business. It discusses how AI is dominating technology focus and ushering in an intelligent automation age. The dangers section addresses issues like existential risks, data monopolies, and potential solutions like decentralization and data taxation. The opportunities section outlines many business areas impacted by AI like marketing, customer service, and workflow automation. It provides recommendations for enterprises to create an AI strategy and sense-and-respond framework to generate revenue and optimize operations using AI.
15 Pros and 5 Cons of Artificial Intelligence in the ClassroomLiveTiles
Ā
Technology has provided us with many new ways to learn. In the classroom, there are both pros and cons of the artificial intelligence that technology offers.
The document discusses cognitive computing and the future of artificial intelligence. It describes how by 2018, half of all consumers will regularly interact with services based on cognitive technologies. It then provides an overview of IBM's research into cognitive computing, including the development of early AI systems, deep learning, natural language processing, machine vision, and brain-inspired systems like SyNAPSE. The document outlines IBM's vision of a future where cognitive systems can assist humans by interpreting medical images, recognizing speech, providing recommendations, and engaging in conversational interactions.
Driven by the rapid progress in Artificial Intelligence (AI) research, intelligent machines are gaining the ability to learn, improve and make calculated decisions in ways that will enable them to perform tasks previously thought to rely solely on human experience, creativity, and ingenuitāy. As a result, we will in the near future see large parts of our lives influenced by AI.
AI innovation will also be central to the achievement of the United Nations' Sustainable Development Goals (SDGs) and will help solving humanity's grand challenges by capitalizing on the unprecedented quantities of data now being generated on sentiment behavior, human health, commerce, communications, migration and more.
With large parts of our lives being influenced by AI, it is critical that government, industry, academia and civil society work together to evaluate the opportunities presented by AI, ensuring that AI benefits all of humanity. Responding to this critical issue, ITU and the XPRIZE Foundation organized AI for Good Global Summit in Geneva, 7-9 June, 2017 in partnership with a number of UN sister agencies. The Summit aimed to accelerate and advance the development and democratization of AI solutions that can address specific global challenges related to poverty, hunger, health, education, the environment, and others.
The Summit provided a neutral platform for government officials, UN agencies, NGO's, industry leaders, and AI experts to discuss the ethical, technical, societal and policy issues related to AI, offer reccommendations and guidance,ā and promote international dialogue and cooperation in support of AI innovation.
Please visit the AI for Good Global Summit page for more resources: https://www.itu.int/en/ITU-T/AI/Pages/201706-default.aspx
If you would like to speak, partner or sponsor the 2018 edition of the summit, please contact: ai@itu.int
Understanding Artificial Intelligence - Major concepts for enterprise applica...APPANION
Ā
Artificial Intelligence is a fundamental topic ā for us as humans, as a society but also for businesses. For business executives and decision-makers, it is sometimes hard to keep up with rapidly evolving technologies as part of the day-to-day business. By providing this curated compilation of information about the fundamental aspects of AI, we want to captivate and inspire you to become more involved with the technology by better understanding the underlying concepts and value drivers of this technology
Computers have had a significant impact on society in several ways. They have automated many repetitive jobs and made office work and communication more efficient. Computers have also transformed education by enabling simulated learning and online research. However, extensive computer use can negatively impact health by straining muscles and vision. Younger generations are also spending more time playing computer games instead of socializing offline. While computers connect people, they also threaten privacy and enable fraud if information is hacked.
Technology has become an essential part of daily life. It is used at home, school, and work in many ways such as computers, cell phones, calculators, and more. While technology provides benefits, it also presents risks like viruses and hackers that people must be aware of and use technology responsibly and ethically.
computer and society impact of Computer in society Sumama Shakir
Ā
This document discusses computer and society, the impact of computers, and computer ethics. It begins by noting how computers are now ubiquitous and impact daily life and communication. It then outlines several major applications of computers in fields like management, banking, industry, engineering, medicine, and transportation. Both positive impacts like efficiency and data storage, and negative impacts like costs and data loss are discussed. The document also covers computer ethics, including issues around intellectual property, privacy, and how technology shapes society. Specific ethical concerns are outlined, like plagiarism, hacking, and phishing scams. Finally, the document provides tips to avoid phishing scams and promote responsible computer use.
Will artificial intelligence replace programmersMaciej Dziergwa
Ā
Artificial intelligence can compose songs, paint pictures, help in cancer therapy, drive cars and play games. Itās also starting to write code.
Does it mean that the days of human programmers are already numbered? Will software engineering be automated?
Rapid fire talk going through a number of topics that we'd pre-selected...one slide on the question, 1-2 slides on an answer....
Much goodness, for reference, here's the subjects:
Planes: Lets go from myth to reality in a couple of slides, including updates since 2015
Transportation in general, cars, trucks, trains and shipsā¦.
Why can we still do this?
Whatās not changed?
The technology, reactive, static vs. predictive
The humans, why do we ignore them?
Why this needs to changeā¦what does the future hold?
Why DO we stare into the abyss, why do we continue to deny it
Hacking humans, molecular
Hacking humans, consciousness
Why DO we need to fix and HOW do we fix it?
Fix the human
Fix the basics
Intelligent systems working collaboratively with us
Augmented intelligence, the science of giving us the edge.
Collaborate
The last 5 years have been transformative in the AI industry, how will the next 10 look like? We've seen an explosion in IoT devices and the data flowing through them ā ubiquitous computing is here to stay. How would this change the ecosystem with respect to hardware, solution development, testing, copyrights, privacy, etc.? And finally, a prediction of what all of this means for businesses, current and new, in light of advancements in deep learning.
IWMW 2004: Socrates Building an intranet for the UK Research CouncilsIWMW
Ā
Slides for plenary talk on "Socrates Building an intranet for the UK Research Councils" given at the IWMW 2004 event held at the University of Birmingham on 27-29 July 2004.
See http://www.ukoln.ac.uk/web-focus/events/workshops/webmaster-2004/talks/brown/
How connectedness changes everything including Knowledge ManagementSteve Song
Ā
The document discusses how connectivity and conversation are changing how information and knowledge are shared. As more people connect online through blogs, social media, and sharing content, it increases opportunities for conversation. Quantity and connectivity changes things qualitatively - more connections allow for new types of information sharing and the spread of ideas in complex, decentralized networks like small worlds. The key ideas are that conversation is becoming king as people share and discuss information online, and that intelligent sharing of our insights through online platforms will become increasingly common and expected.
How to crack Big Data and Data Science rolesUpXAcademy
Ā
How to crack Big Data and Data Science roles is the flagship event of UpX Academy. This slide was used for the event on 10th Sept that was attended by hundreds of participants globally.
Linked Data: The Real Web 2.0 (from 2008)Uche Ogbuji
Ā
"Linking Open Data (LOD) is a community initiative moving the Web from the idea of separated documents to a wide information space of data. The key principles of LOD are that it is simple, readily adaptable by Web developers, and complements many other popular Web trends. Linked, open data is the real substance of Web 2.0, and not flashy AJAX effects. Learn how to make your data more widely used by making its components easier to discover, more valuable, and easier for people to reuseāin ways you might not anticipate."
It was a cool experience, spending time with programmer and some computer engineers. In this codecamp, I talked about the science behind Complex networks, and how to program for complex network analysis. I also had a brief introduction towards graph databases.
KCL 2014 "Working in IT: (my) past, (the) present and (your) future"Daniel Bryant
Ā
This is a 'career advice' talk that was given at King's College London in February 2014, that was produced by request after an interesting 'cross-polination' meeting between the industry people from the London Java Community (LJC) and London academics.
This presentation includes details about my career, some of the motivation for my choices, and then looks at the current state of the programming landscape. It concludes with my predictions for the future of a successful IT career, and recommends potential skills to learn for a productive (and fun) future.
This document summarizes recent technology updates and projects at an art museum. It overviews outcomes of a network upgrade including faster speeds and increased bandwidth. It also lists upcoming projects like new digital displays, an updated website, and content management systems. Future goals are outlined like improving the digital experience and implementing systems for customer management, finance and more. An emphasis is placed on collaboration, prototyping, and an iterative process for technology innovation.
This document discusses starting an online startup in Indonesia. It begins by introducing the author and their background. It then provides context about the dotcom bubble of the late 1990s. The main sections discuss current online business models in Indonesia, developing an idea and plan, taking action and joining a startup community, sources of funding and support for startups, and proposes the creation of an ITB startup community. It concludes by thanking the reader and sharing the author's contact details.
A talk shared at University Technical Officers union 2017 to make them aware of latest technologies, knowledge hubs, free resources , ICT literacy, IOT, Smart gadgets, Science Communication issues and etc
F+ is a proposed next-generation social network that aims to address unmet user needs beyond simple socialization. It would act as a knowledge base and data storage system that facilitates information discovery, analysis, and retrieval based on relevance. The network would also provide tools for collaboration on work and public activities as well as opportunities for earning rewards. The architecture would combine social networking aspects with knowledge management, collaboration features, and a rewards system in a way that is different from existing social networks by focusing more on moving from ideas to results.
Privacy, Ethics, and Future Uses of the Social WebMatthew Russell
Ā
A presentation to the Owen Graduate School of Management (Vanderbilt University) about social media and some of the technology behind the future uses of social media that are likely to shape the future of the Web as we know it.
Structured data: Where did that come from & why are Google asking for itRichard Wallis
Ā
Structured data and Schema.org have become increasingly important for websites and search engines. Schema.org was created in 2011 as a joint effort by Google, Microsoft, Yahoo, and others to create a common set of schemas for structured data markup on web pages. Google and others now use structured data to better understand websites and display richer information in search features like Knowledge Panels. At a recent conference, a Google employee emphasized that implementing structured data using Schema.org can help websites appear in more search features and be better understood during crawling.
1) BIBFRAME is a new bibliographic framework developed by the Library of Congress to replace MARC standards and better integrate library data with the semantic web.
2) BIBFRAME uses linked data principles and RDF to make library data more extensible and interconnected on the web.
3) The main benefits of BIBFRAME are that it allows library data to be more discoverable online, integrates better with web standards, and is more flexible and reusable than MARC records. However, transforming existing data and training catalogers will be challenges in adopting BIBFRAME.
1) BIBFRAME is a new bibliographic framework developed by the Library of Congress to replace MARC standards and better integrate library data with the semantic web.
2) BIBFRAME uses linked data principles and RDF to make library data more extensible and interconnected on the web.
3) The main benefits of BIBFRAME are that it allows library data to be more discoverable online, integrates better with web standards, and is more flexible and reusable than MARC records. However, transforming existing data and training catalogers will be challenges in adopting BIBFRAME.
This document discusses the semantic web and why websites should implement it. The semantic web aims to make data on the web more easily understood by machines by linking related information. This allows searches to return more relevant results and data to be more easily found, shared and combined across websites. The document provides examples of how semantic web technologies like HTML5 microdata can be used to tag website content so it is better understood by search engines and machines. It argues that implementing these standards will provide benefits to users by improving search and allowing richer integration of online information.
This document discusses the Public Domain Calculator project, which aims to determine the public domain status of creative works by country based on copyright laws. It notes that different institutions use different ontologies to represent metadata, making integration complicated. The project founders learned that knowledge representation depends on many contextual factors and is not static. They aim to grow the project by integrating with databases like Wikidata and developing new semantic technologies and "killer applications" to make the complex data more accessible and useful to end users.
NordicHouse 20240116 AI Quantum IFTF dfiscussionv7.pptxISSIP
Ā
Jim Spohrer presented on AI and quantum computing. He discussed the history of AI from the 1955 Dartmouth workshop to modern advances like AlphaGo, GPT-3, and DALL-E 2. Spohrer noted that computation costs have decreased exponentially over time, driving increases in knowledge worker productivity. He highlighted several experts and resources he follows to stay informed on AI capabilities and implications. Spohrer sees opportunities to improve learning and performance through advances in learning sciences, technology, lifelong learning, and early education. The talk addressed how generative AI works and challenges around verification.
This document describes how the author conducted an OSINT investigation and subsequent phishing campaign. It begins by explaining what OSINT is and some common tools used for open source intelligence gathering like Maltego, Shodan, and Google dorks. Next, it discusses how to use the information found through OSINT to craft a targeted phishing email. The document walks through setting up a phishing site using tools like Modlishka and GoPhish. It then tells a story of a actual phishing campaign the author conducted, changing details to protect privacy. The document concludes by emphasizing the importance of managing one's online presence and digital footprint.
Similar to GrrCon 2018 - Getting Into InfoSec (20)
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
Ā
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Ā
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Ā
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
Ā
An English š¬š§ translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech šØšæ version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Ā
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
Ā
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Fueling AI with Great Data with Airbyte WebinarZilliz
Ā
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
Ā
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power gridās behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Ā
Are you ready to revolutionize how you handle data? Join us for a webinar where weāll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, weāll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sourcesāfrom PDF floorplans to web pagesāusing FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether itās populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
Weāll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether youāre at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. Weāll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
Ā
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This yearās report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Ā
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Ā
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Ā
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. š This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. š»
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. š„ļø
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. š
3. Agenda:
ā¢āÆ Whoās the hairy thing in a kilt?
ā¢āÆ Industry history
ā¢āÆ How to break into ācyberā
ā¢āÆ How to break into the corporate worldā¦
ā¢āÆ Why we really need you to break in
ā¢āÆ Why we need ALL of you in, not just the geeksā¦
ā¢āÆ The family, who we are, why we are hereā¦
ā¢āÆ CommunicaQon, collaboraQon and understandingā¦
ā¢āÆ The bigger picture, WHY we need to do thisā¦
ā¢āÆ Final thoughts
4. The Goateeā¦
ā¢āÆ In the InfoSec/Cyber industry for too many years...
ā¢āÆ Broke Nigeria, ISS, Mars Rover, airplanes, trains, etc.
āāÆ Researched a whole lot moreā¦
ā¢āÆ Now working at Lares and consulQng to AWvo
āāÆ Why? Because we need to change this industry
āāÆ Why? Because we are going to lead from the FRONT
ā¢āÆ Currently researching humans, AI, ML and consciousness compuQngā¦
āāÆ Because thereās beEer ways than passwords!
āāÆ Because the futureās not already scary enough J
āāÆ Because weāre heading oļ¬ the cliļ¬ā¦and we need to wake up
ā¢āÆ Might also have a whisky collecQon that borders on the obsessiveā¦
āāÆ Occasionally travels with the whisky football (thanks Inbar!)
6. Agenda:
ā¢āÆ Whoās the hairy thing in a kilt?
ā¢āÆ Industry history
ā¢āÆ How to break into ācyberā
ā¢āÆ How to break into the corporate worldā¦
ā¢āÆ Why we really need you to break in
ā¢āÆ Why we need ALL of you in, not just the geeksā¦
ā¢āÆ The family, who we are, why we are hereā¦
ā¢āÆ CommunicaQon, collaboraQon and understandingā¦
ā¢āÆ The bigger picture, WHY we need to do thisā¦
ā¢āÆ Final thoughts
17. Agenda:
ā¢āÆ Whoās the hairy thing in a kilt?
ā¢āÆ Industry history
ā¢āÆ How to break into ācyberā
ā¢āÆ How to break into the corporate worldā¦
ā¢āÆ Why we really need you to break in
ā¢āÆ Why we need ALL of you in, not just the geeksā¦
ā¢āÆ The family, who we are, why we are hereā¦
ā¢āÆ CommunicaQon, collaboraQon and understandingā¦
ā¢āÆ The bigger picture, WHY we need to do thisā¦
ā¢āÆ Final thoughts
18. Know Your Basics
ā¢āÆ Computer science
āāÆ What IS a computer?
āāÆ How does it bloody work?
ā¢āÆ Networking
āāÆ What is it, how does it work ALL spectrums
āāÆ Breaking packets downā¦
ā¢āÆ Core programming
āāÆ Perl, Python, C++, Assembly, etc.
ā¢āÆ CompuQng in the REAL worldā¦
āāÆ From mainframes to embedded devices, learn the diļ¬erences
āāÆ What WILL you ļ¬nd in a corporaQon? (And the verQcal diļ¬erences)
26. PracQce Breathing!
ā¢āÆ PaMence, if you are new it takes Qme to build up the
personal brand, the Qme and eļ¬ort spend on it WILL pay
oļ¬.
ā¢āÆ Enthusiasm, donāt loose it, even when things seem like
theyāve hit the brick wallā¦
ā¢āÆ Perseverance, see above, that brick wall can take Qme to
clearā¦this industry is NOT easy!
ā¢āÆ Interest, show it, keep it, build it, focus it and conQnually
evolve it.
27. Agenda:
ā¢āÆ Whoās the hairy thing in a kilt?
ā¢āÆ Industry history
ā¢āÆ How to break into ācyberā
ā¢āÆ How to break into the corporate worldā¦
ā¢āÆ Why we really need you to break in
ā¢āÆ Why we need ALL of you in, not just the geeksā¦
ā¢āÆ The family, who we are, why we are hereā¦
ā¢āÆ CommunicaQon, collaboraQon and understandingā¦
ā¢āÆ The bigger picture, WHY we need to do thisā¦
ā¢āÆ Final thoughts
29. Job Rolesā¦
ā¢āÆ Security analyst, blue team SOC
ā¢āÆ Security engineer, tamer of all the blinky shit
ā¢āÆ Forensic analyst, digger of all things digital
ā¢āÆ Malware analyst, collector of bugs
ā¢āÆ Incident response, bringer of Advil and Qssues
ā¢āÆ Audit and compliance, ļ¬ller of formsā¦
ā¢āÆ Threat analyst, speaker in tonguesā¦
ā¢āÆ IdenQty and access management, keeper of the keys
ā¢āÆ PenetraQon tester, tamer of the bits and bytes
ā¢āÆ Vulnerability researcher, digger of code
30. LinkedIn
ā¢āÆ USE IT!
āāÆ Seriously, get a GOOD proļ¬le up and running
āāÆ Start to talk with people, reach out
āāÆ Start to interact on topics you care about
āāÆ Start to do your OSINT and HUMINT on companies, on
people and on areas you want to focus on!
āāÆ Engage with people, with groups, LISTEN lots, talk when
you have something to contribute.
āāÆ Keep it short, concise and to the pointā¦essays scare
people. (LinkedIn posts are 1300 characters for a reason!)
31. YOUR Brandā¦
ā¢āÆ Tell me about yourself?
āāÆ ARGHā¦Umā¦Ahā¦
ā¢āÆ Tell me about yourself?
āāÆ I blogā¦ (Peerlyst, LinkedIn, BrightTALK, Conference Forums)
āāÆ I work within the community (HFC, Hak4kidz, ILF, EFF, Etc.)
āāÆ I goto conferences (HERE!)
āāÆ I take part in CTFās or Hackathons or villages or (insert here)
āāÆ I research in my own lab environmentā¦
āāÆ I work with āxā whoās a mentorā¦
āāÆ Iām contribuQng to āxā where āxā is a book, paper, arQcle, etc.
33. Congrats! They Want To Talkā¦
ā¢āÆ OSINT the damm company, know WHO they are
ā¢āÆ Bring the damm resume and something to take notes withā¦
ā¢āÆ Be early, hide round the corner, steal a car, donāt be late!
ā¢āÆ LEAVE the electronics behind!
ā¢āÆ DONāT hack the damm company and explain how to help ļ¬x it!
ā¢āÆ Eye contact, pay aEenQon, be direct (but civilized)
ā¢āÆ Be honest, nobody knows everything, DONāT bullshit
ā¢āÆ If you are new, talk about your research, your hobbies, etc.
ā¢āÆ Talk about being here! Hell, Iāll back you up!
ā¢āÆ DONāT talk about hacking āxā and how you broke inā¦
ā¢āÆ DO talk about your work with BugCrowd, HackerOne, etc.
34. Sok Skills
ā¢āÆ CommunicaQon (lots of references here!)
ā¢āÆ WriQng (PLEASE!)
ā¢āÆ Listening (Seriously, we NEED to do this more!)
ā¢āÆ EmoQonal Intelligence (ourselves and in others!)
ā¢āÆ Public Speaking (Get up here!)
ā¢āÆ CriQcal Thinking (ObjecQve analysis)
ā¢āÆ Leadership (Step the F**k up!)
ā¢āÆ PosiQve AWtude (Yeaā¦we DO have to have this!)
ā¢āÆ Teamwork (We have to work with othersā¦someQmes)
37. Interviews: Keep It To Yourselfā¦
ā¢āÆ Yes, Chinaās hacking us
āāÆ And weāre hacking themā¦
ā¢āÆ Yes, North Koreaās got talent
āāÆ Weāve got a few good folks tooā¦
ā¢āÆ Yes, Russia is in our infrastructure
āāÆ You think weāre not in theirs?
ā¢āÆ Yes, the NSAās listening
āāÆ Two can play at that game ;-)
ā¢āÆ Yes, AnQ-Virus sucks
āāÆ But doing nothing is worse, build a beEer mousetrap in your spare Qme!
ā¢āÆ Yes, users can be exasperaQngā¦
āāÆ SO CAN WE!
40. Agenda:
ā¢āÆ Whoās the hairy thing in a kilt?
ā¢āÆ Industry history
ā¢āÆ How to break into ācyberā
ā¢āÆ How to break into the corporate worldā¦
ā¢āÆ Why we really need you to break in
ā¢āÆ Why we need ALL of you in, not just the geeksā¦
ā¢āÆ The family, who we are, why we are hereā¦
ā¢āÆ CommunicaQon, collaboraQon and understandingā¦
ā¢āÆ The bigger picture, WHY we need to do thisā¦
ā¢āÆ Final thoughts
46. Agenda:
ā¢āÆ Whoās the hairy thing in a kilt?
ā¢āÆ Industry history
ā¢āÆ How to break into ācyberā
ā¢āÆ How to break into the corporate worldā¦
ā¢āÆ Why we really need you to break in
ā¢āÆ Why we need ALL of you in, not just the geeksā¦
ā¢āÆ The family, who we are, why we are hereā¦
ā¢āÆ CommunicaQon, collaboraQon and understandingā¦
ā¢āÆ The bigger picture, WHY we need to do thisā¦
ā¢āÆ Final thoughts
50. Agenda:
ā¢āÆ Whoās the hairy thing in a kilt?
ā¢āÆ Industry history
ā¢āÆ How to break into ācyberā
ā¢āÆ How to break into the corporate worldā¦
ā¢āÆ Why we really need you to break in
ā¢āÆ Why we need ALL of you in, not just the geeksā¦
ā¢āÆ The family, who we are, why we are hereā¦
ā¢āÆ CommunicaQon, collaboraQon and understandingā¦
ā¢āÆ The bigger picture, WHY we need to do thisā¦
ā¢āÆ Final thoughts
54. Agenda:
ā¢āÆ Whoās the hairy thing in a kilt?
ā¢āÆ Industry history
ā¢āÆ How to break into ācyberā
ā¢āÆ How to break into the corporate worldā¦
ā¢āÆ Why we really need you to break in
ā¢āÆ Why we need ALL of you in, not just the geeksā¦
ā¢āÆ The family, who we are, why we are hereā¦
ā¢āÆ CommunicaQon, collaboraQon and understandingā¦
ā¢āÆ The bigger picture, WHY we need to do thisā¦
ā¢āÆ Final thoughts
59. Agenda:
ā¢āÆ Whoās the hairy thing in a kilt?
ā¢āÆ Industry history
ā¢āÆ How to break into ācyberā
ā¢āÆ How to break into the corporate worldā¦
ā¢āÆ Why we really need you to break in
ā¢āÆ Why we need ALL of you in, not just the geeksā¦
ā¢āÆ The family, who we are, why we are hereā¦
ā¢āÆ CommunicaQon, collaboraQon and understandingā¦
ā¢āÆ The bigger picture, WHY we need to do thisā¦
ā¢āÆ Final thoughts
62. The Future?
ā¢āÆ WHEN we can digiQze consciousness:
āāÆ How much is enough? For us, for a terminal paQent?
āāÆ Can we then determine our own future with technology?
āāÆ Do we go digital, do we remain ļ¬esh/blood, or both?
ā¢āÆ We donāt need travel:
āāÆ We ARE a series of electrical impulses.
āāÆ We are capturing sequences and predicQng them.
āāÆ We can transmit themā¦anywhere.
ā¢āÆ Societal changes?
āāÆ Who goes digital and why?
āāÆ Who stays? Who then has the power to determine the future?
64. An Abstractā¦
ā¢āÆ In 1949 George Orwell introduced us to the dystopian
future of 1984 in which independent thinking and
individualism were ground out of our society.
ā¢āÆ Ironically enough IN 1984 we were introduced to the
means by which such individualism would eventually be
our undoingā¦the machines.
ā¢āÆ In this instance, a 6ā2ā Austrian sent back from 2029 by a
machine that gained consciousness in 1997.
ā¢āÆ Weāve apparently been persecuted by machine for about
the last 30+ years and we are yet to realize it.
68. Agenda:
ā¢āÆ Whoās the hairy thing in a kilt?
ā¢āÆ Industry history
ā¢āÆ How to break into ācyberā
ā¢āÆ How to break into the corporate worldā¦
ā¢āÆ Why we really need you to break in
ā¢āÆ Why we need ALL of you in, not just the geeksā¦
ā¢āÆ The family, who we are, why we are hereā¦
ā¢āÆ CommunicaQon, collaboraQon and understandingā¦
ā¢āÆ The bigger picture, WHY we need to do thisā¦
ā¢āÆ Final thoughts
75. With Thanks!!
ā¢āÆ As always, HUGE HUGS to everyone @GrrCON
āāÆ Hug Chris and the family please
āāÆ Hug everyone in a yellow, red and other color shirt!
āāÆ Per Chris, say thanks TO the vendors for the beer etc.
ā¢āÆ Shout out to the following for their help on this deck:
āāÆ Chris Nickerson
āāÆ Leslie Carhart
āāÆ Christopher Grayson
āāÆ Michal Zalewski
āāÆ Parisa Tabriz
ā¢āÆ And, go give Eddie a hug (and some $) for artā¦it all goes to charity!