The document discusses the importance of protecting personal privacy in the development of smart grid technologies through an approach called "Privacy by Design". It advocates embedding privacy protections from the start of new projects rather than as an afterthought. Specifically, it argues that energy consumers should control information about their own energy usage even if not legally required to build confidence in smart grid systems.
Mobile Solutions and Privacy – Not One at the Expense of the Otherbradley_g
A presentation by Commissioner Cavoukian to Telus Security Solutions on privacy risks inherent in mobile communications and how the positive-sum solution of Privacy by Design can mitigate those risks.
The Internet Services, Web and Mobile Applications, Pervasive Communication widely available today that are meeting many of our needs have stimulated production of tremendous amounts of data (call metadata, texts, emails, social media updates, photos, videos, location, etc.). The computing power available today in conjunction with trending technologies like Data Mining and Analytics, Machine Learning and Computational Linguistics provide an opportunity business and government organizations to manage, search, analyze, and visualize vast amount of data as information.
Companies named data brokers collect consumer data including behavioral and private and then sell to companies those use this data for personalized marketing and selling. There is no doubt that this is good for businesses, but is this same good for consumers? Is this just positively affects buying experience of customers? How much does reliable this kind data event for companies? How to keep a balance between new opportunities derived by Big Data to companies and privacy concern it brings to consumers?
In proposed speech we will try to find out some of the answers to these and other questions.
Big Data Ecosystem for Data-Driven Decision MakingAbzetdin Adamov
The extremely fast grow of Internet Services, Web and Mobile Applications and advance of the related Pervasive, Ubiquity and Cloud Computing concepts have stumulated production of tremendous amounts of data partially available online (call metadata, texts, emails, social media updates, photos, videos, location, etc.). Even with the power of today’s modern computers it still big challenge for business and government organizations to manage, search, analyze, and visualize this vast amount of data as information. Data-Intensive computing which is intended to address this problems become quite intense during the last few years yielding strong results. Data intensive computing framework is a complex system which includes hardware, software, communications, and Distributed File System (DFS) architecture.
Just small part of this huge amount is structured (Databases, XML, logs) or semistructured (web pages, email), over 90% of this information is unstructured, what means data does not have predefined structure and model. Generally, unstructured data is useless unless applying data mining and analysis techniques. At the same time, just in case if you can process and understand your data, this data worth anything, otherwise it becomes useless.
Mobile Solutions and Privacy – Not One at the Expense of the Otherbradley_g
A presentation by Commissioner Cavoukian to Telus Security Solutions on privacy risks inherent in mobile communications and how the positive-sum solution of Privacy by Design can mitigate those risks.
The Internet Services, Web and Mobile Applications, Pervasive Communication widely available today that are meeting many of our needs have stimulated production of tremendous amounts of data (call metadata, texts, emails, social media updates, photos, videos, location, etc.). The computing power available today in conjunction with trending technologies like Data Mining and Analytics, Machine Learning and Computational Linguistics provide an opportunity business and government organizations to manage, search, analyze, and visualize vast amount of data as information.
Companies named data brokers collect consumer data including behavioral and private and then sell to companies those use this data for personalized marketing and selling. There is no doubt that this is good for businesses, but is this same good for consumers? Is this just positively affects buying experience of customers? How much does reliable this kind data event for companies? How to keep a balance between new opportunities derived by Big Data to companies and privacy concern it brings to consumers?
In proposed speech we will try to find out some of the answers to these and other questions.
Big Data Ecosystem for Data-Driven Decision MakingAbzetdin Adamov
The extremely fast grow of Internet Services, Web and Mobile Applications and advance of the related Pervasive, Ubiquity and Cloud Computing concepts have stumulated production of tremendous amounts of data partially available online (call metadata, texts, emails, social media updates, photos, videos, location, etc.). Even with the power of today’s modern computers it still big challenge for business and government organizations to manage, search, analyze, and visualize this vast amount of data as information. Data-Intensive computing which is intended to address this problems become quite intense during the last few years yielding strong results. Data intensive computing framework is a complex system which includes hardware, software, communications, and Distributed File System (DFS) architecture.
Just small part of this huge amount is structured (Databases, XML, logs) or semistructured (web pages, email), over 90% of this information is unstructured, what means data does not have predefined structure and model. Generally, unstructured data is useless unless applying data mining and analysis techniques. At the same time, just in case if you can process and understand your data, this data worth anything, otherwise it becomes useless.
The COVID-19 coronavirus has impacted countries, communities and individuals in countless ways, from school closures to health-care insurance issues not to undermined loss of lives.
As governments scramble to address these problems, different solutions based on blockchain technologies have sprung up to help deal with the worldwide health crisis. Blockchain will surely not prevent the emergence of new viruses itself, but what it can do is create the first line of rapid protection through a network of connected devices whose primary goal is to remain alert about disease outbreaks.
Therefore, the use of blockchain-enabled platforms can help prevent these pandemics by enabling early detection of epidemics, fast-tracking drug trials, and impact management of outbreaks and treatment.
The REAL Impact of Big Data on PrivacyClaudiu Popa
The awesome promise of Big Data is tempered by the need to protect personal information. Data scientists must expertly navigate the legislative waters and acquire the skills to protect privacy and security. This talk provides enterprise leaders with answers and suggests questions to ask when the time comes to consider the vast opportunities offered by big data.
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
In Big Data we focus on the 4 V's: Volume, Velocity, Varity and Veracity. But another important topic is often not in the focus: Privacy and Security. Yet as important and if not considered from the beginning it might put your Big Data project at risk. Learn about most important Privacy and Security fundamentals in Big Data, you should take into account in your next Big Data project.
Big data contains valuable information— some of it sensitive customer data—that can be a honeypot for internal and external attackers. Given the risk involved, organizations must proactively enhance defenses and prevent data breaches. The four steps outlined in this deck, help organizations to develop a holistic approach to data security and privacy.
Originally presented at PRIMMA mobile privacy workshop, Imperial College London, 23 Sep 2010. Updated version given at Security and Privacy in Implantable Medical Devices workshop, EPFL, 1 April 2011, and a German Academy of Engineering conference in Berlin on 26 March 2012. Compact version given at Urban Prototyping conference, Imperial College London, 9 April 2013. Updated with ENISA privacy engineering report for 3rd Latin American Data Protection conference in Medellin, 28-29 May 2015.
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Darek Czuchaj
Presentation on legal issues of IoT (Internet of Things) seen from the Polish+ EU law perspective as of beginning of 2015. Covers data protection, cyber-security, intellectual property or commercial legal considerations.
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014kevintsmith
In our era of “Big Data”, organizations are collecting, analyzing, and making decisions based on analysis of massive amounts of data sets from various sources, and security in this process is becoming increasingly more important. With regulations like HIPAA and other privacy protection laws, securing access and determining releasability of data sets is critical. Organizations using Big Data Analytics solutions face challenges, as most of today’s solutions were not designed with security in mind. This presentation focuses on challenges, use cases, and practical real-world solutions related to securing and preserving privacy in Big Data Analytics solutions, addressing authorization, differential privacy, and more.
The presentation covers the main legal issues affecting technologies in the Internet of Things enviroment such as wearable technologies, ehealth devices, smarth home and smart city tools with reference to data protection, telecom, cybercrime, life sciences and regulatory matters.
The COVID-19 coronavirus has impacted countries, communities and individuals in countless ways, from school closures to health-care insurance issues not to undermined loss of lives.
As governments scramble to address these problems, different solutions based on blockchain technologies have sprung up to help deal with the worldwide health crisis. Blockchain will surely not prevent the emergence of new viruses itself, but what it can do is create the first line of rapid protection through a network of connected devices whose primary goal is to remain alert about disease outbreaks.
Therefore, the use of blockchain-enabled platforms can help prevent these pandemics by enabling early detection of epidemics, fast-tracking drug trials, and impact management of outbreaks and treatment.
The REAL Impact of Big Data on PrivacyClaudiu Popa
The awesome promise of Big Data is tempered by the need to protect personal information. Data scientists must expertly navigate the legislative waters and acquire the skills to protect privacy and security. This talk provides enterprise leaders with answers and suggests questions to ask when the time comes to consider the vast opportunities offered by big data.
Trivadis TechEvent 2016 Big Data Privacy and Security Fundamentals by Florian...Trivadis
In Big Data we focus on the 4 V's: Volume, Velocity, Varity and Veracity. But another important topic is often not in the focus: Privacy and Security. Yet as important and if not considered from the beginning it might put your Big Data project at risk. Learn about most important Privacy and Security fundamentals in Big Data, you should take into account in your next Big Data project.
Big data contains valuable information— some of it sensitive customer data—that can be a honeypot for internal and external attackers. Given the risk involved, organizations must proactively enhance defenses and prevent data breaches. The four steps outlined in this deck, help organizations to develop a holistic approach to data security and privacy.
Originally presented at PRIMMA mobile privacy workshop, Imperial College London, 23 Sep 2010. Updated version given at Security and Privacy in Implantable Medical Devices workshop, EPFL, 1 April 2011, and a German Academy of Engineering conference in Berlin on 26 March 2012. Compact version given at Urban Prototyping conference, Imperial College London, 9 April 2013. Updated with ENISA privacy engineering report for 3rd Latin American Data Protection conference in Medellin, 28-29 May 2015.
Internet of Things (IotT) Legal Issues Privacy and Cybersecurity Darek Czuchaj
Presentation on legal issues of IoT (Internet of Things) seen from the Polish+ EU law perspective as of beginning of 2015. Covers data protection, cyber-security, intellectual property or commercial legal considerations.
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014kevintsmith
In our era of “Big Data”, organizations are collecting, analyzing, and making decisions based on analysis of massive amounts of data sets from various sources, and security in this process is becoming increasingly more important. With regulations like HIPAA and other privacy protection laws, securing access and determining releasability of data sets is critical. Organizations using Big Data Analytics solutions face challenges, as most of today’s solutions were not designed with security in mind. This presentation focuses on challenges, use cases, and practical real-world solutions related to securing and preserving privacy in Big Data Analytics solutions, addressing authorization, differential privacy, and more.
The presentation covers the main legal issues affecting technologies in the Internet of Things enviroment such as wearable technologies, ehealth devices, smarth home and smart city tools with reference to data protection, telecom, cybercrime, life sciences and regulatory matters.
Don Tapscott's New Solutions for a Connected Planet - MaRS Global LeadershipMaRS Discovery District
In this new age of networked intelligence, collaborative communities are enhancing and even bypassing crumbling institutions. We are innovating the way our financial institutions and governments operate; how we educate our children; how the healthcare, newspaper, and energy industries serve their customers; how we care for our neighbourhoods; and even how we solve global problems.
From his latest book, (co-author Anthony D. Williams) Macrowikinomics: New Solutions for a Connected Planet, Don Tapscott presents groundbreaking innovations from every corner of the globe: how businesses, organizations and individuals alike are using mass collaboration to revolutionize not only the way we work, but how we live, learn, create and care for each other.
Get practical tips for making sales calls, including how to successfully close a sale and follow-up with potential customers.
This lecture focuses on both business-to-consumer (B2C) and business-to-business (B2B) sales.
The Social Consumer: Cashing in on the social graph - MaRS Market InsightsMaRS Discovery District
The shopping experience, both online and offline, has been transformed by social media. The voice of the customer heard through online networks influences their purchase decisions, and new technologies are redesigning in-store shopping. But will social commerce really be a $30 billion global opportunity by 2015?
With less than half of Canadian small- and medium-sized businesses online, and more than 90% of purchases still taking place in bricks-and-mortar stores, is it really necessary to leverage the social graph at this time? Are social networks like Facebook and Pinterest the next wave for e-commerce? Where should marketers and retailers focus their efforts? What role do startups play in the social commerce ecosystem?
This session highlights what entrepreneurs should consider at the start of their venture, what they need to do as the company grows and what needs be done as the business matures and the owner contemplates an exit or retirement.
Canadian Innovation Commercialization Program (CICP) - Innovation Information...MaRS Discovery District
Find out how the latest in federal government innovation and commercialization initiatives can help your business.
Public Works and Government Services Canada: Canadian Innovation Commercialization Program (CICP)
Marketing for Tech Start-Ups – Getting the fundamentals right - Entrepreneurs...MaRS Discovery District
Learn some of the fundamental concepts and principles of marketing for early-stage start-ups. We address the unique challenges of marketing technology products including:
Knowing when to begin marketing
Recognizing which marketing activities to do first
Identifying the goals of your early marketing activities
Syncing marketing with product development
Using marketing to fine-tune your business model
This lecture covers all the essentials of building and delivering an effective pitch to help you find financing for your entrepreneurial venture or sell your product to customers. Learn the elements of a good pitch deck and identify the key elements of good communication that successful start-ups use.
Lecture video: http://www.marsdd.com/entrepreneurs-toolkit/sessions/the-pitch
Have you mastered the fundamentals of sales strategy for a growing B2B organization? Want to refresh your skills?
This presentation covers the ins and outs of these best practices:
* Creating the right value proposition
* Choosing the best target
* Understanding how to reach your partners and customers
* Navigating the steps of the sales process
* Using tools to help with the close
* Leading the sales team
Social innovation – innovative, practical, sustainable, market-based approaches that benefit society, with special focus on the vulnerable — is gaining traction by companies and governments alike.
• What distinguishes social innovation from more traditional approaches to solving social problems?
• What measurement methods are used to evaluate the economic and social impact?
Presentation made by Schwab Foundation for Social Entrepreneurship and World Economic Forum
Beyond the Solar Module: Optimizing system performance and maximizing returns...MaRS Discovery District
Optimizing system performance and maximizing returns requires a holistic approach that combines the study and application of components, materials and processes.
Learn more about these three areas:
* the state of the market for solar PV balance of systems (BOS)
* best practices for system monitoring, operations and maintenance
* challenges and potential solutions for Ontario’s connection and grid constraints, as seen by utilities and developers
It is said that business partnerships are like marriage: easy to get into, messy to get out of. Typically, entrepreneurs require something only a partner can bring to the table, such as money, contacts or a skill set. Sometimes an entrepreneur needs the confidence that can only be provided by working with someone else. Often entrepreneurs spend more time interviewing and assessing the fit of an employee than a prospective partner and end up regretting getting into business with their partner.
Watch event video for more: http://www.marsdd.com/videos/?sort=&se=bestpractices
Moving from drug discovery to drug development requires a particular skillset usually not yet honed by start-ups. This phase of the development process is highly regulated and, critically, inexperienced start-ups often underestimate the duration and cost of delivering the dosage form into the clinic while meeting regulations.
This presentation will address the following:
* aspects of the Chemistry, Manufacturing and Control (CMC) portion of the drug development process
* bioavailability and the Biopharmaceutics Classification System (BCS)
* objectives of formulation
* cost-effective strategies to reach key milestones
These slides are from a New England Restructuring Roundtable discussion of Smart Grid, with an emphasis on dynamic pricing.
I try to frame the big picture from a policy perspective arguing that mindset must come before technology.
Speaking at John Carrol University on the Internet of ThingsJustin Grammens
I was honored to have been invited to speak at John Carroll University on “The Internet of Things - Making the Physical World Smarter.” It was an extremely fun and engaging audience and I enjoyed every minute of the presentation. I hope you enjoy it as well and please don't hesitate to reach out with any questions.
Framework to Manage Big Data in Smart Home Servicesijtsrd
In order to improve the effect of smart home control and management, a new smart home control and management method based on big data analysis is designed. The basic hardware of smart home control and management is designed, including smoke sensor hardware, temperature and humidity sensor hardware, and infrared sensor hardware, so as to collect smart home data and realize data visualization and buzzer alarm. The collected data are transmitted through the indoor wireless network of smart home gateway equipment, and the data distributed cache architecture based on big data analysis is used to store smart home data. Based on the relevant data, the hybrid particle swarm optimization algorithm is used to schedule the control and management tasks of smart home to complete the control and management of smart home. Dr. Rajendra Kumar Bharti "Framework to Manage Big Data in Smart Home Services" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-6 , October 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52102.pdf Paper URL: https://www.ijtsrd.com/computer-science/other/52102/framework-to-manage-big-data-in-smart-home-services/dr-rajendra-kumar-bharti
Transforming Connected Services into Industry Beating Experiences | Insurance...Dion Hinchcliffe
As the world becomes infused with sensors and everything becomes quantified, industries like insurance are literally being revolutionizing by a combination of Internet of Things and analytics. Here's how to think about the opportunity strategically. From my opening keynote at Insurance IoT in Chicago.
IT law : the middle kingdom between east and WestLilian Edwards
Privacy as a value is often as conflicting with and less important than other major societal goals such as nation state secureity and business profits. China as a socialist state emerging a a major digital economuic force may fall prey to both these assumptions. However the recent history in the West shows that over zealous national secueity infringing citizen privacy, as revealed in the recent Snowden PRISM/TEMPORA etc scandals, may backlash against business profits as well as reducing citizen trust in security.China can learn from these lessons as it expands its own privacy law especially in the IT/telecoms area.
The IoT of Energy | From Smart Products to Intelligent SolutionsAdvisian
Rapid changes in consumer, business and industrial products and technologies, the proliferation of sensors and digital footprints and sophisticated data analytics are driving transformational shifts in many sectors. The energy sector has responded to this change with more energy efficient appliances, digital retail innovations and progressive smart grid investments, but this is modest relative to many others.
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
This Cybersecurity webinar addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids. Cyber threats and vulnerabilities, including cyber attacks, will be addressed; as well as Smart Grid trends, and privacy and data integrity issues. United States, European, and International organizations and initiatives to address cybersecurity for utilities will be discussed. The webinar will conclude with strategies to improve cybersecurity. A second cybersecurity webinar (programmed in September 2017) will address best practices, case studies, and legal and regulatory constraints for architecting smart grids in a secure way.
Billions of Internet of Things (IoT) devices collect sensitive data about people, creating data
privacy risks and breach vulnerabilities. Privacy-preserving IoT refers to any IoT service, i.e., any network of objects
embedded with sensors and connection links, that functions while
maintaining the privacy rights of users.
These slides presented
- common myths about data privacy and IoT services;
- trade-off between privacy preservation by users and accuracy maximization and collection of true data by service providers; and
- optimal pricing of standalone and bundled services
SR&ED: What you need to know about the changing landscape - MaRS Best PracticesMaRS Discovery District
The Scientific Research and Experimental Development (SR&ED) tax incentive program provides support in the form of tax credits to groups or individuals conducting scientific research or experimental development in Canada.
Some significant changes are on the way as a result of the last federal budget. See how these new rules could affect you!
Geoff Mulgan, CEO of Nesta UK's presentation on The Paradoxes of Ageing and How to Overcome Them at the Business of Aging Summit 2012 held on April 30, 2012 at the MaRS Discovery District.
Barbara Jaworski, of Workplace Institute's presentation on Older Workforce Strategy presented at Business of Aging Summit, April 30, 2012 at MaRS Discovery District.
Geoff Mulgan is recognized internationally as a leading speaker on social innovation and its successful realization. Very familiar with the pinch of austere budgets in the UK, Geoff will discuss the opportunities society has to overcome the barriers that fiscal challenges present to innovation.
Following the 2008 global financial crisis Geoff laid out the challenges ahead during his 2009 TED Talk: “I think what connects the challenge for business, the challenge for government and the challenge for communities now, is both simple and difficult. We know our societies have to radically change. We know we can’t go back to where we were before. We know it’s only through experiment that we’ll discover exactly how to run a low carbon city, how to care for a much older population, how to deal with drug addiction – and so on.”
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Introduction by ann cavoukian
1. Using the Power of
Non-Identifying Energy Data
Ann Cavoukian, Ph.D.
Information and Privacy Commissioner
Ontario
Future of Energy Summit
June 8, 2012
2. Using the Power of Data
Big Data ………Yes
Energy Data …...Yes
Personal Data – No!
3. Personal Privacy
Must Remain Paramount
“The smart grid is certainly a good
idea, which I strongly support. But the
focus has been so singularly on
controlling energy use that I think the
privacy issue is a sleeper – it is not
top-of-mind.”
— Commissioner Cavoukian
“We’ve taken the advice of the privacy
commissioner upfront before the smart
grid is even put in place.”
— Brad Duguid,
Ontario Minister of Energy and Infrastructure
Toronto Star, May 12, 2010
http://tinyurl.com/24dzn9j
4. “Assets Beyond the Meter –
Who Should Own Them?”
“There are sound reasons why energy consumers should
remain in control of the energy consumption information
they produce, even if there isn’t a law that requires this.
The underlying rationale is that consumer confidence and
trust in the Smart Grid, and in one’s local electricity
distributors, is vital in achieving the vision of a more
energy efficient electrical grid.”
— Commissioner Cavoukian,
Electric Light & Power Magazine
www.elp.com
5. Why Utilities Should Be Concerned
• Little consumer confidence and trust, one example:
• Residents of Marin County, California, created a road
blockade to prevent PG&E trucks from going into their
town to install smart meters;
• Residents were worried about their privacy, saying:
“I don't want to be watched all the time;”
• 79% knew little or nothing about the smart grid;
• 76% didn’t know anything about smart meters;
(Market Strategies International Study, 2010);
• As a result, consumers are wary, and at times, hostile.
7. Adoption of “Privacy by Design”
as an International Standard
Landmark Resolution Passed to Preserve
the Future of Privacy
By Anna Ohlden – October 29th 2010 - http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy
JERUSALEM, October 29, 2010 – A landmark Resolution by
Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian,
was unanimously passed by International Data Protection and Privacy
Commissioners in Jerusalem today at their annual conference.
The resolution ensures that privacy is embedded into new technologies
and business practices, right from the outset – as an essential
component of fundamental privacy protection.
Full Article:
http://www.science20.com/newswire/landmark_resolution_passed_preserve_future_privacy
8. Privacy by Design:
The 7 Foundational Principles
1. Proactive not Reactive:
Preventative, not Remedial;
3. Privacy as the Default setting;
5. Privacy Embedded into Design;
7. Full Functionality:
Positive-Sum, not Zero-Sum;
9. End-to-End Security:
Full Lifecycle Protection;
11. Visibility and Transparency:
Keep it Open;
13. Respect for User Privacy:
Keep it User-Centric.
www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf
10. Consumer Energy Usage Data = PII
• U.S. Department of Energy identified the issue of third party
access to consumer-specific energy-usage data (CEUD) as…
“perhaps the most critical question in the context of Smart Grid
technologies” … “consumers should have rights to protect the
privacy of their own CEUD and control access to it;”
• California Public Utility Commission issued a decision
adopting rules to protect the privacy and security of customer
electricity usage data, commending Privacy by Design:
“The Privacy by Design methodology offers a promising
approach to ensuring that data practices promote privacy,
not just in the FIP of data minimization, but in all aspects of
privacy planning.”
11. Consumer Energy Usage Data (Cont’d)
• North American Energy Standards Board
(NAESB) issued Business Practices for Third Party
Access to Smart Meter-based Information. This
guidance adopts Fair Information Practices, requiring
informed consent, transparency, and accountability;
• My office is collaborating with NIST, the National
Institute of Standards and Technology as part of its
Cyber Security Working Group where Privacy by
Design was cited in their Guidelines for Smart Grid
Cyber Security: V. 2, Privacy and the Smart Grid.
12. “Big Data”
• Each day we create 2.5 quintillion bytes of data
– 90% of the data today has been created in the
past 2 years;
• Big data analysis and data analytics promises new
opportunities to gain valuable insights and benefits,
(e.g., improving pandemic response, advances in
cancer research, etc.);
• However, it can also enable expanded surveillance,
on a scale previously unimaginable;
• This situation cries out for a positive-sum solution,
win-win strategy.
13. Announcing:
“Privacy by Design in the Age of Big Data”
• The Big Difference with
Big Data;
• “Sensemaking” Systems;
• Privacy by Design in the
Age of Big Data;
• The Creation of a Big Data
Sensemaking System
through PbD.
www.privacybydesign.ca
14. Conclusions
• Lead with Privacy by Design, featuring control over
customer energy usage data – maintaining consumer
confidence and trust will be essential;
• Make sure that privacy is strongly addressed – right
from the outset – make it a priority by embedding it into
technology and business practices;
• Enable both the Smart Grid and Privacy to grow in tandem
– not one at the expense of the other – prevent the data
breach … enable the service;
• If you don’t lead with Privacy, by Design, you may end up
with privacy by chance – or worse, Privacy by Disaster!
15. How to Contact Us
Ann Cavoukian, Ph.D.
Information & Privacy Commissioner of Ontario
2 Bloor Street East, Suite 1400
Toronto, Ontario, Canada
M4W 1A8
Phone: (416) 326-3948 / 1-800-387-0073
Web: www.ipc.on.ca
E-mail: info@ipc.on.ca
For more information on Privacy by Design, please
visit: www.privacybydesign.ca
Editor's Notes
Using the Power of Big Data
Toronto Star Smart Grid Article
Assets Beyond the Meter E. L. Quinn, “ Privacy and the New Energy Infrastructure ” (Working Paper Series, 2009) htto://ssrn.com/abstract=1370731 This lead to a series of meetings with utilities in our jurisdiction of Ontario – which (fortunately) fall under our FOI and Privacy laws. We worked closely with 2 of the largest utilities – Hydro One and Toronto Hydro – who felt it was in their best interest to do so – and the best interests of their customers Increase in the granular collection, use and disclosure of personal energy information; Data linkage of personally identifiable information with detailed energy use; The creation of an entirely new “ library ” of personal information. (Elias Quinn, 2009)
Why Utilities Should Be Concerned This article is forthcoming – estimated to be published in September/October.
Privacy by Design However, it was also found that after having the technologies explained to them : 75% of people felt that the smart grid, complete with smart meters, should be a priority over the next 1-5 years; and 67% support their utility company in installing the technologies. Distributech – monetization of their data flows
Jerusalem Landmark Resolution I first developed the concept of Privacy by Design in the ’ 90s, as a response to the growing threats to online privacy that were beginning to emerge; Privacy by Design seeks to build in privacy – up front, right into the design specifications; into the architecture; embedding privacy into the very technology used – bake it in ; Data minimization is key : minimize the routine collection and use of personally identifiable information – use encrypted or coded information, whenever possible; Use privacy-enhancing technologies (PETs) where possible, but make it PETs Plus , invoking a positive-sum paradigm, and giving people maximum control over their own data.
7 Foundational Principles Translated into 25 languages!
IPC Joint Smart Grid Papers Proactive not Reactive; Preventative not Remedial Privacy as the Default Privacy Embedded into Design Full Functionality: Positive-Sum, not Zero-Sum End-to-End Lifecycle Protection Visibility and Transparency Respect for User Privacy
CEUD
CEUD (Cont ’ d) The U.S. Department of Energy (DOE) has been involved in a number of Smart Grid activities, including among other things: Publishing reports on Data Access and Privacy Issues Related to Smart Grid Technologies and Communications Requirements of Smart Grid Technologies. Leading the Federal Smart Grid Task Force, which ensures awareness, coordination, and integration of the diverse activities of the federal government related to smarter grid technologies, practices, and services. Establishing the Smart Grid Information Clearinghouse (developed and maintained by Virginia Tech Advanced Research Institute) to provide information on Smart Grid pilot projects, use cases, standards, legislation, policy and regulation, lessons learned and best practices, and topics research and development topics. Supporting the development of the Smart Grid Maturity Model: a management tool that organizations can use to appraise, guide, and improve their Smart Grid transformation.
Big Data
IPC Paper – PbD and Big Data The Virtuous Cycle of Big Data The virtuous cycle that may emerge: Systems that are respectful of personal information, with privacy assured from the outset, will increase user confidence and trust; This will increase users' engagement, driving more “ voluntary ” and “ accurate ” data into the system; More data will yield greater benefits for all stakeholders including users, without trading away their privacy – a positive-sum outcome!