This document summarizes a workshop session on responding to new cookie law requirements in the EU. The session will cover the legal requirements, clarifying guidance from regulatory agencies, best practices for compliance, what one university did to comply, and ideas for next steps for universities and the sector. Presenters will discuss the legal issues, what their university did, exemptions under the new laws, useful resources, and take questions from the audience. The goal is to help participants understand how to properly handle cookies on their websites in accordance with changing regulations.
(iBeacons) for Recruitment Events (University of Bradford)Claire Gibbons
A session from the 2015 Institutional Web Managers Workshop at Edge Hill University (IWMW15) showcasing the work done at the University of Bradford using Beacons technology to enhance recruitment events.
Beyond Digital: Transforming the institutionClaire Gibbons
A session by the Web Team at the University of Bradford at the Institution Web Managers Workshop 2015 (IWMW) at Edge Hill University. A joint session with Liverpool John Moores University exploring pertinent topics for web and digital teams in 2015.
Cookies: best practice September 2012 by Fedelma Good, Barclaystheidm_quals
The document provides information on cookies best practices and ensuring compliance with EU cookie laws. It discusses the key requirements of the law including informing users about cookies and obtaining consent. It outlines the steps Barclays took to audit cookies on their websites and apps, develop solutions to display cookie information and obtain consent, and implement ongoing processes to maintain compliance. While some challenges remained around cookies in emails, overall Barclays implemented a thorough cross-business approach to addressing the legal requirements.
This document provides information about an upcoming DMA North Legal Update event, including details about the agenda, speakers, and topics to be covered. The event will discuss legal issues surrounding cookies, data protection, postal affairs, and other hot industry topics. Speakers will cover the EU cookie law requirements, how to obtain user consent, and the potential impacts of stricter privacy regulations. The document also provides contact information for the DMA.
This document provides information about an upcoming DMA North Legal Update event, including the agenda, speakers, and contact details. The event will cover topics like the new EU cookie law, data protection regulation, postal affairs, and industry issues. Speakers will discuss how to comply with the cookie law by the May 26th deadline, the proposed EU data protection regulation, and its potential impacts. The agenda also includes sessions on hot legal topics, a coffee break, and a panel debate.
The presentation provided guidance on obtaining consent for cookies and similar technologies on mobile devices and across various mobile marketing channels. It emphasized being open and transparent about data collection practices, seeking opt-in consent from users given the personal nature of mobile devices, and considering future activities. While the regulations apply to mobile in the same way as desktop, the Information Commissioner's Office will take a sympathetic approach to compliance as long as organizations are working to resolve any issues.
Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...Browne Jacobson LLP
This sessions provides 10 steps schools can take in the 10 weeks leading up to the enforcement of the General Data Protection Regulation on 25 May 2018.
The document summarizes a data protection conference that took place on March 1st, 2012 in London. It includes an overview of several presentations given at the conference on topics related to upcoming changes to European data protection laws and their implications. Key points from some of the presentations include clarifying what types of technologies the new laws will cover, guidance provided from legal and regulatory perspectives, how prepared UK companies are for the changes, and potential impacts, such as many free internet services may no longer be free or possible without the use of behavioral advertising. The conference aimed to help organizations understand and prepare for the new requirements around data protection and user consent that would take effect in May 2012.
(iBeacons) for Recruitment Events (University of Bradford)Claire Gibbons
A session from the 2015 Institutional Web Managers Workshop at Edge Hill University (IWMW15) showcasing the work done at the University of Bradford using Beacons technology to enhance recruitment events.
Beyond Digital: Transforming the institutionClaire Gibbons
A session by the Web Team at the University of Bradford at the Institution Web Managers Workshop 2015 (IWMW) at Edge Hill University. A joint session with Liverpool John Moores University exploring pertinent topics for web and digital teams in 2015.
Cookies: best practice September 2012 by Fedelma Good, Barclaystheidm_quals
The document provides information on cookies best practices and ensuring compliance with EU cookie laws. It discusses the key requirements of the law including informing users about cookies and obtaining consent. It outlines the steps Barclays took to audit cookies on their websites and apps, develop solutions to display cookie information and obtain consent, and implement ongoing processes to maintain compliance. While some challenges remained around cookies in emails, overall Barclays implemented a thorough cross-business approach to addressing the legal requirements.
This document provides information about an upcoming DMA North Legal Update event, including details about the agenda, speakers, and topics to be covered. The event will discuss legal issues surrounding cookies, data protection, postal affairs, and other hot industry topics. Speakers will cover the EU cookie law requirements, how to obtain user consent, and the potential impacts of stricter privacy regulations. The document also provides contact information for the DMA.
This document provides information about an upcoming DMA North Legal Update event, including the agenda, speakers, and contact details. The event will cover topics like the new EU cookie law, data protection regulation, postal affairs, and industry issues. Speakers will discuss how to comply with the cookie law by the May 26th deadline, the proposed EU data protection regulation, and its potential impacts. The agenda also includes sessions on hot legal topics, a coffee break, and a panel debate.
The presentation provided guidance on obtaining consent for cookies and similar technologies on mobile devices and across various mobile marketing channels. It emphasized being open and transparent about data collection practices, seeking opt-in consent from users given the personal nature of mobile devices, and considering future activities. While the regulations apply to mobile in the same way as desktop, the Information Commissioner's Office will take a sympathetic approach to compliance as long as organizations are working to resolve any issues.
Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...Browne Jacobson LLP
This sessions provides 10 steps schools can take in the 10 weeks leading up to the enforcement of the General Data Protection Regulation on 25 May 2018.
The document summarizes a data protection conference that took place on March 1st, 2012 in London. It includes an overview of several presentations given at the conference on topics related to upcoming changes to European data protection laws and their implications. Key points from some of the presentations include clarifying what types of technologies the new laws will cover, guidance provided from legal and regulatory perspectives, how prepared UK companies are for the changes, and potential impacts, such as many free internet services may no longer be free or possible without the use of behavioral advertising. The conference aimed to help organizations understand and prepare for the new requirements around data protection and user consent that would take effect in May 2012.
Access Not Denied: Accessible Websites for AllDesignHammer
Website Accessibility refers to the idea that people of all abilities and disabilities should be able to access online content. These disabilities can impair vision, hearing, and movement. Since the early days of the web, accessibility focus in the US has been on government run, and government funded websites. This can often include Nonprofits, but even if it is not required, making your website accessible better serves your audience. We will provide a high-level overview of website accessibility, how to think about website accessibility from an organizational perspective, and how to start a website accessibility initiative in your own organization.
eBusiness Club "Demystifying the EU Cookie Law presentation, GeldardsJon Egley
The eBusiness Club eBiz byte seminar delivered by Julian Turner, Senior Associate Solicitor with one of the country’s leading regional law firms Geldards demystifying both the legal issues whilst offering practical advice on how to implement effective solutions.
APNIC is implementing a product management framework to better understand users' needs and build products that benefit the community. They are currently developing several products, including DASH to detect network security issues, routing information tools, and improvements to MyAPNIC and the Internet Directory. The product manager seeks feedback on existing ideas and new product opportunities. Community involvement through interviews, testing, and suggestions will be important for continuous development. The goal is to create useful tools while maintaining APNIC's non-profit status and community focus.
Harnessing Blackbaud NetCommunity to Engage Alumni, Donors and the CommunityMichael Fenton
In this presentation, I was demonstrating our platforms for Alumni, Community and Donor Engagement and well as demonstrating tips, tricks and hacks to help you get the most of your NetCommunity Installation.
We discussed some of the tricks used to build a NetCommunity User Community as well as demonstrated how to get NetCommunity working with other systems and discussed and demonstrated some other tricks, tips and hacks to get NetCommunity to help power some of your Alumni, Community and Donor Engagement strategies.
This was presented at Blackbaud Conference 2014 - Sydney, Australia in the Higher Education Stream - Visit http://www.blackbaud.com.au/bbcon for more details
Marketing Meets Privacy_ What You Need to Know in 2023.pdfJohn Doyle
DrupalCon 2023 Pittsburgh Presentation: Marketing Meets Privacy, what you need to know in 2023.
Privacy legislation is rapidly evolving throughout the United States and keeping up with the new laws, regulations, and policies can be a challenge for web and marketing teams. To make it more confusing, these laws are being passed at the state level, with rules and regulations that vary by state.
In this session, we will focus on the privacy consent aspect of these laws and how this works with your web and marketing technology stacks.
In this session we will discuss:
1. Brief overview of privacy landscape in 2023
2. What do these privacy laws mean for web and marketing teams now and into the near future
3. Consent Management & Tag Managers
4. Q&A
YouTube Link: https://www.youtube.com/watch?v=22p14sCxWDQ&list=PLpeDXSh4nHjTZrlCUtl_xp87F3plT7czE&index=65
Agenda 21 eu cookie seminar - david naylor - field fisher waterhouseagenda21
The document discusses the new EU cookie regime and data protection laws. It provides three key points:
1. The new laws require express consent from users before storing or accessing any personal information like cookies on their devices. Consent needs to be informed with clear disclosures about data collection and use.
2. Websites and apps need to assess what data they collect and determine if consent is needed based on the purpose and sensitivity of that data. More intrusive practices like persistent third-party cookies require express consent.
3. To comply, companies should enhance their privacy disclosures, implement strategies for obtaining user consent, use less intrusive data practices where possible, and oversee third-party data collection on
This document discusses Section 508 and digital accessibility. Section 508 requires federal agencies to make their electronic and information technology accessible to people with disabilities. The Section 508 Refresh updated these standards in 2017 to align with global guidelines. Organizations receiving federal funding or contracts must make their websites accessible by January 2018. The document provides guidance on who is affected, what content must be accessible, and recommended next steps for organizations to audit and improve their digital accessibility.
How ECM Has Improved in SharePoint 2013 and What’s Still MissingMike Ferrara
Enterprise content management is constantly evolving and SharePoint 2013 has a few new tricks up its sleeve to satisfy the appetites of end users and IT professionals alike. In this session you’ll see these new features in action and how you can take advantage of them in your own environment. I’ll showcase the new drag and drop capabilities, Exchange site mailboxes, the new eDiscovery Center and a few other cool things. Finally, I’ll take a step back and review some of the missing ECM features that still haven’t made it into SharePoint, and how you might be able to work around these shortcomings.
4Ps Marketing thought it would be a good idea to inform our clients about the change in legislation with Cookies. Our CTO has put this presentation together which hopefully explains what and why the legislation is changing.
The document discusses the key concepts of Web 2.0. It began as a conference in 2004 to discuss an improved form of the World Wide Web that emphasizes tools and platforms allowing users to tag, blog, comment on and modify content. Examples provided include services like My Yahoo, Google, and Flickr that allow high levels of customization and focus on the long tail of the market. The document outlines several principles of Web 2.0 applications including allowing user added value, utilizing specialized databases, adopting a model of perpetual beta to encourage constant improvement, and designing applications that can work across devices rather than single devices.
This document provides an introduction to cloud storage and summarizes a presentation on the topic. It discusses the history of storage systems and how cloud storage works. Popular cloud storage services like Google Drive, Dropbox, and iCloud are examined. The document outlines some risks of cloud storage like security and privacy issues. It also provides a framework for selecting cloud services and questions to consider regarding purposes, benefits, costs and risks.
In this webinar, members learned how their libraries can get donated and discounted Microsoft solutions, how staff and volunteers can use TechSoup Courses to get fully up to speed to be able to train your patrons on all Microsoft apps. In addition to courses, members learned about the growing array of TechSoup Services to help your library with information technology and marketing.
Web Preservation, or Managing your Organisation’s Online Presence After the O...lisbk
Slides for talk on "Web Preservation, or Managing your Organisation’s Online Presence After the Organisation Ceases to Exist" given by Brian Kelly, UK Web Focus at the IRMS 2016 conference in Brighton on 17 May 2016.
See http://ukwebfocus.com/events/irms-2016-web-preservation
Solved the european e privacy directive and performance marketing - Kevin E...auexpo Conference
Kevin Edwards, Strategy Director at Affiliate Window, will run through what is currently perceived as successful compliant website implementations following the passing deadline of the EU's ePrivacy Directive. Imperative for any web property owner across Europe.
The FBI spent nearly $170 million on a project called the Virtual Case File (VCF) to modernize its IT systems and allow agents to better share information. However, the project was plagued by issues and ultimately abandoned. It suffered from poorly defined requirements, unrealistic deadlines, and frequent changes in management. As a result, the software developed was deemed unusable. The failure of VCF was a major setback for the FBI and cost taxpayers significant funds, leading to criticism of the bureau. It had to continue using its outdated previous systems and later embarked on a new project from scratch.
The Top Privacy Resolutions to make 2022 Your Most Successful YearTrustArc
This webinar discusses privacy resolutions and priorities for 2022. Upcoming regulations like the Colorado Privacy Act and amendments to laws in California and Virginia will take effect. Key global privacy laws passed in countries like South Africa, China, and Saudi Arabia. Expectations for 2022 include potential laws in states like Florida and privacy law developments in India, Israel, and at the EU and federal levels in the US. The webinar focuses on setting privacy priorities and building an action plan for the year. It concludes with inviting participants to access past recordings and contact TrustArc for more information.
Keeping Your House In Order Getting It Right When Selling OnlineRob Blamires
This document provides guidance on legal requirements for selling products online and using social media for promotion. It discusses the need to (1) comply with distance selling, e-commerce, and consumer protection laws regarding order processing and cancellation rights, (2) obtain necessary rights to content and ensure marketing is not misleading, and (3) understand data privacy laws and rights granted to social media platforms. Failure to follow these laws could result in enforcement action, loss of business, and damage to brand reputation.
Benefit and Budgeting Calculator Steering Group 23 January 2020Policy in Practice
in Practice clients including housing associations, local authorities, utility and third sector organisations.
For more information contact hello@policyinpractice.co.uk, call 0330 008 9242 or visit www.policyinpractice.co.uk
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
More Related Content
Similar to How Bradford made friends with the Cookie Monster v0.1
Access Not Denied: Accessible Websites for AllDesignHammer
Website Accessibility refers to the idea that people of all abilities and disabilities should be able to access online content. These disabilities can impair vision, hearing, and movement. Since the early days of the web, accessibility focus in the US has been on government run, and government funded websites. This can often include Nonprofits, but even if it is not required, making your website accessible better serves your audience. We will provide a high-level overview of website accessibility, how to think about website accessibility from an organizational perspective, and how to start a website accessibility initiative in your own organization.
eBusiness Club "Demystifying the EU Cookie Law presentation, GeldardsJon Egley
The eBusiness Club eBiz byte seminar delivered by Julian Turner, Senior Associate Solicitor with one of the country’s leading regional law firms Geldards demystifying both the legal issues whilst offering practical advice on how to implement effective solutions.
APNIC is implementing a product management framework to better understand users' needs and build products that benefit the community. They are currently developing several products, including DASH to detect network security issues, routing information tools, and improvements to MyAPNIC and the Internet Directory. The product manager seeks feedback on existing ideas and new product opportunities. Community involvement through interviews, testing, and suggestions will be important for continuous development. The goal is to create useful tools while maintaining APNIC's non-profit status and community focus.
Harnessing Blackbaud NetCommunity to Engage Alumni, Donors and the CommunityMichael Fenton
In this presentation, I was demonstrating our platforms for Alumni, Community and Donor Engagement and well as demonstrating tips, tricks and hacks to help you get the most of your NetCommunity Installation.
We discussed some of the tricks used to build a NetCommunity User Community as well as demonstrated how to get NetCommunity working with other systems and discussed and demonstrated some other tricks, tips and hacks to get NetCommunity to help power some of your Alumni, Community and Donor Engagement strategies.
This was presented at Blackbaud Conference 2014 - Sydney, Australia in the Higher Education Stream - Visit http://www.blackbaud.com.au/bbcon for more details
Marketing Meets Privacy_ What You Need to Know in 2023.pdfJohn Doyle
DrupalCon 2023 Pittsburgh Presentation: Marketing Meets Privacy, what you need to know in 2023.
Privacy legislation is rapidly evolving throughout the United States and keeping up with the new laws, regulations, and policies can be a challenge for web and marketing teams. To make it more confusing, these laws are being passed at the state level, with rules and regulations that vary by state.
In this session, we will focus on the privacy consent aspect of these laws and how this works with your web and marketing technology stacks.
In this session we will discuss:
1. Brief overview of privacy landscape in 2023
2. What do these privacy laws mean for web and marketing teams now and into the near future
3. Consent Management & Tag Managers
4. Q&A
YouTube Link: https://www.youtube.com/watch?v=22p14sCxWDQ&list=PLpeDXSh4nHjTZrlCUtl_xp87F3plT7czE&index=65
Agenda 21 eu cookie seminar - david naylor - field fisher waterhouseagenda21
The document discusses the new EU cookie regime and data protection laws. It provides three key points:
1. The new laws require express consent from users before storing or accessing any personal information like cookies on their devices. Consent needs to be informed with clear disclosures about data collection and use.
2. Websites and apps need to assess what data they collect and determine if consent is needed based on the purpose and sensitivity of that data. More intrusive practices like persistent third-party cookies require express consent.
3. To comply, companies should enhance their privacy disclosures, implement strategies for obtaining user consent, use less intrusive data practices where possible, and oversee third-party data collection on
This document discusses Section 508 and digital accessibility. Section 508 requires federal agencies to make their electronic and information technology accessible to people with disabilities. The Section 508 Refresh updated these standards in 2017 to align with global guidelines. Organizations receiving federal funding or contracts must make their websites accessible by January 2018. The document provides guidance on who is affected, what content must be accessible, and recommended next steps for organizations to audit and improve their digital accessibility.
How ECM Has Improved in SharePoint 2013 and What’s Still MissingMike Ferrara
Enterprise content management is constantly evolving and SharePoint 2013 has a few new tricks up its sleeve to satisfy the appetites of end users and IT professionals alike. In this session you’ll see these new features in action and how you can take advantage of them in your own environment. I’ll showcase the new drag and drop capabilities, Exchange site mailboxes, the new eDiscovery Center and a few other cool things. Finally, I’ll take a step back and review some of the missing ECM features that still haven’t made it into SharePoint, and how you might be able to work around these shortcomings.
4Ps Marketing thought it would be a good idea to inform our clients about the change in legislation with Cookies. Our CTO has put this presentation together which hopefully explains what and why the legislation is changing.
The document discusses the key concepts of Web 2.0. It began as a conference in 2004 to discuss an improved form of the World Wide Web that emphasizes tools and platforms allowing users to tag, blog, comment on and modify content. Examples provided include services like My Yahoo, Google, and Flickr that allow high levels of customization and focus on the long tail of the market. The document outlines several principles of Web 2.0 applications including allowing user added value, utilizing specialized databases, adopting a model of perpetual beta to encourage constant improvement, and designing applications that can work across devices rather than single devices.
This document provides an introduction to cloud storage and summarizes a presentation on the topic. It discusses the history of storage systems and how cloud storage works. Popular cloud storage services like Google Drive, Dropbox, and iCloud are examined. The document outlines some risks of cloud storage like security and privacy issues. It also provides a framework for selecting cloud services and questions to consider regarding purposes, benefits, costs and risks.
In this webinar, members learned how their libraries can get donated and discounted Microsoft solutions, how staff and volunteers can use TechSoup Courses to get fully up to speed to be able to train your patrons on all Microsoft apps. In addition to courses, members learned about the growing array of TechSoup Services to help your library with information technology and marketing.
Web Preservation, or Managing your Organisation’s Online Presence After the O...lisbk
Slides for talk on "Web Preservation, or Managing your Organisation’s Online Presence After the Organisation Ceases to Exist" given by Brian Kelly, UK Web Focus at the IRMS 2016 conference in Brighton on 17 May 2016.
See http://ukwebfocus.com/events/irms-2016-web-preservation
Solved the european e privacy directive and performance marketing - Kevin E...auexpo Conference
Kevin Edwards, Strategy Director at Affiliate Window, will run through what is currently perceived as successful compliant website implementations following the passing deadline of the EU's ePrivacy Directive. Imperative for any web property owner across Europe.
The FBI spent nearly $170 million on a project called the Virtual Case File (VCF) to modernize its IT systems and allow agents to better share information. However, the project was plagued by issues and ultimately abandoned. It suffered from poorly defined requirements, unrealistic deadlines, and frequent changes in management. As a result, the software developed was deemed unusable. The failure of VCF was a major setback for the FBI and cost taxpayers significant funds, leading to criticism of the bureau. It had to continue using its outdated previous systems and later embarked on a new project from scratch.
The Top Privacy Resolutions to make 2022 Your Most Successful YearTrustArc
This webinar discusses privacy resolutions and priorities for 2022. Upcoming regulations like the Colorado Privacy Act and amendments to laws in California and Virginia will take effect. Key global privacy laws passed in countries like South Africa, China, and Saudi Arabia. Expectations for 2022 include potential laws in states like Florida and privacy law developments in India, Israel, and at the EU and federal levels in the US. The webinar focuses on setting privacy priorities and building an action plan for the year. It concludes with inviting participants to access past recordings and contact TrustArc for more information.
Keeping Your House In Order Getting It Right When Selling OnlineRob Blamires
This document provides guidance on legal requirements for selling products online and using social media for promotion. It discusses the need to (1) comply with distance selling, e-commerce, and consumer protection laws regarding order processing and cancellation rights, (2) obtain necessary rights to content and ensure marketing is not misleading, and (3) understand data privacy laws and rights granted to social media platforms. Failure to follow these laws could result in enforcement action, loss of business, and damage to brand reputation.
Benefit and Budgeting Calculator Steering Group 23 January 2020Policy in Practice
in Practice clients including housing associations, local authorities, utility and third sector organisations.
For more information contact hello@policyinpractice.co.uk, call 0330 008 9242 or visit www.policyinpractice.co.uk
Similar to How Bradford made friends with the Cookie Monster v0.1 (20)
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
How Bradford made friends with the Cookie Monster v0.1
1. The most eagerly awaited
IWMW session EVER
Workshop session C1: Responding to
the Cookie Monster
2. We are . . .
• John Kelly, Principal Legal Information
Specialist with JISC Legal
• Claire Gibbons, Senior Web and Marketing
Manager, University of Bradford
3. We’ll cover . . .
• The Legal Stuff
– Legal requirements
– Clarifying the ICO guidance on how to comply with the
new cookie law requirements
– Appropriate Wording for Policies
– Tips for Compliance
• What Bradford and the sector did
• Good, bad and best practice and views on the
Cookie Law – discussion, sharing, venting!
• What next for institutions and the sector – ideas
and suggestions
25. • Post-26 May Guidance
– updated guidance from JISC Legal
26. • Article 29 Working
Party
– CRITERION A: the cookie is used
“for the sole purpose of carrying
out the transmission of a
communication over an
electronic communications
network”.
CRITERION B: the cookie is
“strictly necessary in order for
the provider of an information
society service explicitly
requested by the subscriber or
user to provide the service”
27. Exemptions?
• User-input cookies (e.g. shopping carts): probably exempt under Criterion
B (but note comments on cookie lifetime);
• Authentication cookies: probably exempt under Criterion B if used within
a single browser session; need to warn the user beforehand (i.e. get
implied consent) if the cookie will persist across browser sessions;
• User-centric security cookies (e.g. to detect repeated login failures): may
be exempt under Criterion B, but need to check specific details;
• Multi-media Player Session Cookies: probably exempt under Criterion
B, but make sure they aren’t used for other purposes;
• Load-balancing Session Cookies: probably exempt under Criterion A;
• UI Customisation Cookies: short-lifetime cookies probably exempt under
Criterion B, for longer lifetimes obtain implied consent as for
authentication cookies;
• Social Plug-in Sharing Cookies: may be exempt under Criterion B, but only
if they are restricted to logged-in users and limited to a session;
28. • Art.29WP on Cookies – specific and
pragmatic advice
33. Next steps
• Systems and cookies audit?
• Are we doing enough?
• Continuous review through Committee
structure
• Update the Privacy Policy Template?
• Sector article on our actions to national
magazines/blogs etc? Big up the sector!
I’m Claire Gibbons, the senior web and marketing manager at the University of Bradford and I’m just going to share with you what we did at Bradford over the last year or so, since the legislation was announced. I think we would all agree that there has been a lot of reading, writing, sharing, angst, confusion, frustration and so on over the last year but I think that we all got there in the end.Feel free to chip in as we go along if you have got any comments or question and we have put some time aside after my bit for others to share their experiences and generally vent a bit!
So we’ll look at the last year, any issues that we found along the way, both from what we did at Bradford and what we tried to do as a sector leading up to the law coming into effect. We do have some outstanding queries that you may all be able to help with based on your own experiences. There’s been some development and news articles since the law came into effect which you may or may not have seen, and then we have some plans for what to do next.
So a lot has happened over the last year – both in terms of announcements, work within institutions and work across the sector.On the 24 May 2011 I sent an email to the INFO MGT mailing list asking what others were doing. We were planning on reviewing our privacy policy in terms of what cookies we use. It sounded so simple back then! The post created a lot of discussion with most people planning on doing the same.https://www.jiscmail.ac.uk/cgi-bin/webadmin?A2=WEBSITE-INFO-MGT;3423fc3e.1105
So on the 26 May the law changed and, like most others, we had our privacy policy online in draft form, as we knew we would have to do some more work in the following year. Is this pretty much what everyone did?BIT OF DISCUSSION HERE
And then on the 27 May Brian sent an email inviting everyone to contribute to a Google spreadsheet of their privacy policies which a lot of people did.Feel free to update your entry after today. I can send round the link.
Can send round the links later or add these slides to Slideshare.
Then last year at this very conference I attended a talk from Jason Miles-Campbell from JISC Legal about Your Top Ten Legal Issues to be Thinking about now – and cookies was very much the hot topic and we all left both informed and confused!
Following the conference it was decided that we should try and put our sector heads together and work collaboratively on this – as everyone would have to do more or less the same process within their institution and ultimately write a very similar updated privacy policy.So a Google doc was created and people from IWMW last year were invited to join in. The uptake wasn’t massive, understandably – it’s not the most thrilling topic, but we made a start.Note that we (i.e. Brian!) were clearly thinking ahead and that the aim of the doc was to create a report to be presented at IWMW 2012. Well, we’ve not quite done a report but we’re here to share good practice and keep that dialogue going. I’ll come onto what we could do next as a sector later.
By November our Updated Privacy Policy was on the agenda for our Information, Infrastructure, Access and Security Group which the University’s Legal Advisor also sits on and this committee would ultimately sign it off in time for the year’s grace period to be up.Then in December the information Commissioners Office published their half term report on cookie compliance, basically saying that everyone had to try harder! I would have thought that by this time most people had forgotten about it and was too busy counting down the days to Christmas.
But not me!!I did another blog and had a think about what we had done so far and reflected that we did, indeed, need to do more!!We needed to check exactly what cookies we were using, not just what they did, and needed to go back and check third party cookies also.And there was a reminder about the Google spreadsheet mentioned earlier.
Brian also blogged about the half term report and included an update on institutional activities and who had published privacy policies etc.The ICO had also published a new set of Guidelines on the Rules on use of Cookies and Similar Technologies and Brian kindly picked out the key points and again promoted the Google doc and the Google spreadsheet.
In February we created a Draft Privacy Policy Template based on the Bradford one to share with the sector and invited comments on the policy.It is hosted on the JISCPress service and people can leave comments.I used this to store my thoughts as we went through the process here at Bradford and a few people did comment – so thanks!
It all went quiet for a while but in the background John and myself were inputting into an article that Brian was writing for JISC Inform. This came out in the spring edition and gave some general background to the new law and some handy tips for what to do before May 2012. It also promoted the draft policy template mentioned previously.
And then it seemed to be a couple of months of fervoured activity. Our Privacy Policy was going back and to between the Committee and the Web Team and we were reading everything and anything to do with the subject even thought a lot of it made no sense or seemed to be conflicting. Which cookies were completely necessary and which weren’t.Then it was crunch time on 25 May (which was a Friday) so we fine-tooth combed the policy and we were just about to go for it when we read the ‘implied consent’ article from the ICO. So we made a few tweaks and went for it. Although I’m not totally convinced we got it right – but I’ll come onto that in a bit!DID ANYONE ELSE MAKE LAST MINUTE ADJUSTMENTS?-------------------------------------------------------First issued in May 2011, the guidance has been updated to clarify the following points around implied consent:Implied consent is a valid form of consent and can be used in the context of compliance with the revised rules on cookies.If you are relying on implied consent you need to be satisfied that your users understand that their actions will result in cookies being set. Without this understanding you do not have their informed consent.You should not rely on the fact that users might have read a privacy policy that is perhaps hard to find or difficult to understand.In some circumstances, for example where you are collecting sensitive personal data such as health information, you might feel that explicit consent is more appropriate.
Also on the 25th May I blogged about where we were up to, and later in the day added in a bit about ‘implied consent’. I think I win the prize for finding the best cookie monster pic on Flickr!!
So 25th May our revised and revised again Privacy and Cookie Policy went live. I’d like to point out that we cover data protection as well as the new EU cookie law as it’s hard to separate out the two.
But in hindsight it is probably a bit hidden. It’s in the footer of our corporate pages and academic school sites and it’s being added to new templates as we make them.WHERE HAS EVERYONE ELSE PUT THEIR LINKS? IN THE TOP? A POP UP?What is the general consensus of getting people to click something to say that they have read and understood how each site uses cookies? Is this what implied consent means?
So following the 26 May there’s been some more useful advice from JISC including this podcast from 1 June which features Mike Nolan from Edge Hill and John!Well worth a listen.
And also JISC Legal have updated their guidance.
This is quite a new one on me and something I picked up off twitter the other day. John may know more about this!This working party is looking at potential exemptions from the legislation if:the cookie is used “for the sole purpose of carrying out the transmission of a communication over an electronic communications network”.the cookie is “strictly necessary in order for the provider of an information society service explicitly requested by the subscriber or user to provide the service”though if they relate to individual users, websites still need to inform users about them, under data protection law----------------------------------------The Article 29 Data Protection Working Party was set up under the Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.It has advisory status and acts independently.It’s now thought that these will cover . . .
These are the potential exemptions. But I think we need to keep an eye on this.Janet have written an article which helps explain it a bit more.http://webmedia.company.ja.net/edlabblogs/regulatory-developments/2012/06/12/art-29wp-on-cookies-specific-and-pragmatic-advice/
Useful article from JANET
So is the law a load of flannel that no one will pay any attention to? Well it appears not. 5 EU countries are being taken to court for cookie law failures but part of the problem might be inconsistencies in how the law is being applied.BelgiumNetherlandsPolandPortugalSlovenia
An article from earlier in May suggests that there isn’t yet a common approach to enforcement of the new laws across the EU and that there was no guarantee that website practices that are deemed compliant with new consent requirements to cookies in one EU country would also be found to comply with laws in the other EU member states.http://www.out-law.com/en/articles/2012/may/lack-of-single-eu-approach-to-cookies-enforcement-would-cause-problems-for-cross-border-businesses-expert-says/
However, the results are in and not surprisingly sites which inform users that cookies are running and then offer the option to disable them - implicit consent - are seeing exceptionally high acceptance rates of up to 99.7%, according to customer data platform QuBit’s analysis of 500,000 interactions since the EU Privacy Directive was enforced on 26 May.By comparison, sites that seek explicit consent from users before receiving cookies are seeing consent rates of just 57.2%.The report also found that using a notification-only method, which only informs users that cookies are running on the site, results in a 99.9% consent rate. Which I take to be implied consent?I think we are currently operating under implicit consent which is potentially not enough?
So what do we do now as individual institutions but also as a sector?At Bradford we are wondering whether we need to do a systems audit as most of the systems that we use are delivered online? Do we need a warning that basically says “You can’t use this system if you don’t accept cookies”? Examples would be our online shop, VLE etc Or do we not need to do this after the Article 29 possible exemptions? Should the notices or warning only be on the pages that use cookies, e.g. shopping baskets, or should there be something on the front page of each system?As an exception exists where the cookie is "strictly necessary" for the provision of a service "explicitly requested" by the user – so cookies can take a user from a product page to a checkout without the need for consent, for example – we may not need to do anything with our systems.Do we need to do anything with trackable emails? HAS ANYONE ELSE?Are we doing enough at Bradford? Our privacy and cookies policy isn’t immediately obvious – it’s in the footer of all our main web pages and is being added to new templates in the CMS as we do them. Should we add a pop-up on first page and give more prominence? THOUGHTS?Should we categorise our cookies to make them more understandable:Strictly necessary, settings-led, feature-led, functional and analytical, third partyWe’re keeping an eye on everything and the privacy and cookies policy will be monitored and reviewed by the Information, Infrastructure, Access and Security Committee.I think as a sector we’ve been at the forefront of getting on with it and taking action and taking the legislation seriously. It would be good to respond to some of the press around compliance in other countries and sectors and submit a press release on the work that we’ve been doing? A sector case study almost. Happy to lead on that if others would like to include their stories?