The IoT Era Begins
Components of IoT-Enabled Things
IoT Reference model
IoT Security
IoT Security & Privacy Req. defined by ITU-T
An IoT Security Framework
IoT Security Challenges
Internet of Things - Liability
IoT security tools
The growth of embedded systems connecting to the Internet or "Internet of Things" (IoT) increases year by year. Thus, the IoT ecosystems become new targets of the attackers. This presentation will talk about the basic principle of information security, why we need to secure IoT ecosystems, and also the vulnerabilities and solutions from OWASP.
Internet of Things means every household or handy device which is used to make our world easy and better and connected with IP which transmit some data.
This slide covers IOT description, OWASP Top 10 2014 & its recommendations.
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
The IoT Era Begins
Components of IoT-Enabled Things
IoT Reference model
IoT Security
IoT Security & Privacy Req. defined by ITU-T
An IoT Security Framework
IoT Security Challenges
Internet of Things - Liability
IoT security tools
The growth of embedded systems connecting to the Internet or "Internet of Things" (IoT) increases year by year. Thus, the IoT ecosystems become new targets of the attackers. This presentation will talk about the basic principle of information security, why we need to secure IoT ecosystems, and also the vulnerabilities and solutions from OWASP.
Internet of Things means every household or handy device which is used to make our world easy and better and connected with IP which transmit some data.
This slide covers IOT description, OWASP Top 10 2014 & its recommendations.
The slides defines IoT and show the differnce between M2M and IoT vision. It then describes the different layers that depicts the functional architecture of IoT, standard organizations and bodies and other IoT technology alliances, low power IoT protocols, IoT Platform components, and finally gives a short description to one of IoT low power application protocols (MQTT).
Understanding what is IoT security
What is the scope of IoT security
Uses of IoT and where do we see it in our daily life
Possible attack surface and likelihood of IoT-related attacks
IoT specific security assessment (understanding approach, IoT protocols, how it is a combination of different type assessments)
The myths of IoT security and the way it has progressed in past few years and how far fetched it can be.
Available Resources and Tools
This presentation discusses about IoT, challenges associated with it, common threats to IoT. It also briefs about how OWASP introduces Vulnerabilities in IoT.
Internet of Things (IoT) is growing rapidly in decades, various applications came out from academia and industry. IoT is an amazing future to the Internet, but there remain some challenges to IoT for human have never dealt with so many devices and so much amount of data. Machine Learning (ML) is the technique that allows computers to learn from data without being explicitly programmed. Generally, the aim is to make predictions after learning and the process operates by building a model from the given (training) data and then makes predictions based on that model. Machine learning is closely related to artificial intelligence, pattern recognition and computational statistics and has strong relationship with mathematical optimization. In this talk, we focus on ML applications to IoT. Specially, we focus on the existing ML techniques that are suitable for IoT. We also consider the issues and challenges for solving the IoT problems using ML techniques.
The session with highlight Intel’s vision for IoT Security and the fundamental building blocks and capabilities Intel and the ecosystem are providing to organizations to build security in from design through deployment and maintenance.
The Future of the Internet - The Next 30 YearsRahul Singh
What will the future look like? What role does the Internet play in your life today, and how will it affect you in the future. This paper expands on current trends and extrapolates what our world will look like in the next thirty years.
Understanding what is IoT security
What is the scope of IoT security
Uses of IoT and where do we see it in our daily life
Possible attack surface and likelihood of IoT-related attacks
IoT specific security assessment (understanding approach, IoT protocols, how it is a combination of different type assessments)
The myths of IoT security and the way it has progressed in past few years and how far fetched it can be.
Available Resources and Tools
This presentation discusses about IoT, challenges associated with it, common threats to IoT. It also briefs about how OWASP introduces Vulnerabilities in IoT.
Internet of Things (IoT) is growing rapidly in decades, various applications came out from academia and industry. IoT is an amazing future to the Internet, but there remain some challenges to IoT for human have never dealt with so many devices and so much amount of data. Machine Learning (ML) is the technique that allows computers to learn from data without being explicitly programmed. Generally, the aim is to make predictions after learning and the process operates by building a model from the given (training) data and then makes predictions based on that model. Machine learning is closely related to artificial intelligence, pattern recognition and computational statistics and has strong relationship with mathematical optimization. In this talk, we focus on ML applications to IoT. Specially, we focus on the existing ML techniques that are suitable for IoT. We also consider the issues and challenges for solving the IoT problems using ML techniques.
The session with highlight Intel’s vision for IoT Security and the fundamental building blocks and capabilities Intel and the ecosystem are providing to organizations to build security in from design through deployment and maintenance.
The Future of the Internet - The Next 30 YearsRahul Singh
What will the future look like? What role does the Internet play in your life today, and how will it affect you in the future. This paper expands on current trends and extrapolates what our world will look like in the next thirty years.
Even though GDPR is a European Union regulation, it impacts any company with customers in that region. One of the first key tasks of the data management team should be to create awareness regarding the impact of GDPR on the business with all key stakeholders across the organization. In order to generate awareness, organizations need to have clearly defined documentation defining the policies, rules, requirements and the impact of non-compliance. Kim Brushaber will look at what is involved with GDPR, what you should be concerned with, and how to get the conversation started between the business and technical teams within your organization using ER/Studio.
Green Button in Ontario - A presentation to the Young Professionals in EnergyMaRS Discovery District
In September 2013, Sasha Sud presented an overview of the Green Button to the Young Professionals in Energy association, highlighting the power of energy data to change the industry in Ontario and around the world. More: http://datacatalyst.marsdd.com/energy
Mind-Blown. "If you burned all data created into just one day onto dvd's, you could stack them on top of each other and reach the moon twice." Bigdata 25ntkfacts
Contents
Blockchain Components
Blockchain Reference Architecture
Blockchain Platforms: Ethereum
Blockchain Platforms: Hyperledger
Blockchain Use Cases
Blockchain 3.0
Emerging Blockchain Technology
Big Data Introduction
Big Data Analysis Flow
Big Data Use Cases
IoT Introduction
IoT Use Cases
IoT Analytics
Challenges of IoT Big Data Analytics Applications
Artificial Intelligence Overview
Artificial Intelligence Revolution
Deep Learning Introduction
Deep Learning Use Cases
Automated Skin Cancer Classification
Automated Diabetic Retinopathy Classification
Portable Ultrasound Devices
Big Data in IoT & Deep Learning
The Fourth Industrial Revolution?
AI Investment
Blockchain ICO
IoT Startups by Industry & Patents
AI Startups by Industry & Patents
Blockchain Startups by Industry & Patents
Blockchain + IoT Integration
Blockchain + IoT Use Cases: IIoT & SCM
Blockchain + AI Integration
Blockchain + AI Integration Demo
Blockchain + Big Data Integration
Blockchain + Big Data + AI+ IoT Integration
Xanadu based Blockchain + Big Data + AI+ IoT Integration
Xanadu Functionality
Xanadu based Big Data Archive
Xanadu Performance BMT
Xanadu Commodity Storage System Use Case
Xanadu Cloud Computing Use Case
Xanadu + Hadoop + Deep Learning Integration Demo
Xanadu based Medical CBIR System
Xanadu based Medical CBIR System Demo for Diabetic Retinopathy Diagnosis
Advantage of Xanadu + Blockchain Integration
Xanadu + Blockchain Integration Demo
The Evolving Realities of Digital Marketing: Personalization vs. Privacy!
The way items are advertised has changed as a result of digital. Customers create vast digital footprints that may be evaluated and used for precision marketing as they migrate their lives to the digital world, whether to consume media, engage with friends and family, or shop.
Great Bigdata eBook giving a perspective of Bigdata Analytics Predictions for 2016. Learn about the milestones, landmarks and futures of this fast growing arena.
GDPR, Data Privacy and Cybersecurity - MIT SymposiumEric Vanderburg
GDPR, Data Privacy, and Cybersecurity presented by Eric Vanderburg and Stephanie Gruber at the MIT Chief Data Officer Information Quality Symposium on July 20, 2018.
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Centerp...Geoffrey Fox
Motivating Introduction to MOOC on Big Data from an applications point of view https://bigdatacoursespring2014.appspot.com/course
Course says:
Geoffrey motivates the study of X-informatics by describing data science and clouds. He starts with striking examples of the data deluge with examples from research, business and the consumer. The growing number of jobs in data science is highlighted. He describes industry trend in both clouds and big data.
He introduces the cloud computing model developed at amazing speed by industry. The 4 paradigms of scientific research are described with growing importance of data oriented version. He covers 3 major X-informatics areas: Physics, e-Commerce and Web Search followed by a broad discussion of cloud applications. Parallel computing in general and particular features of MapReduce are described. He comments on a data science education and the benefits of using MOOC's.
Big Data Applications & Analytics Motivation: Big Data and the Cloud; Center...Geoffrey Fox
Motivating Introduction to MOOC on Big Data from an applications point of view https://bigdatacoursespring2014.appspot.com/course
Course says:
Geoffrey motivates the study of X-informatics by describing data science and clouds. He starts with striking examples of the data deluge with examples from research, business and the consumer. The growing number of jobs in data science is highlighted. He describes industry trend in both clouds and big data.
He introduces the cloud computing model developed at amazing speed by industry. The 4 paradigms of scientific research are described with growing importance of data oriented version. He covers 3 major X-informatics areas: Physics, e-Commerce and Web Search followed by a broad discussion of cloud applications. Parallel computing in general and particular features of MapReduce are described. He comments on a data science education and the benefits of using MOOC's.
A Survey of the Investor Landscape for 2023.pdfMatt Brown
Whether you are an existing investor or planning to become one, a survey of the investor landscape for 2023 is an indispensable tool. In this section, we look at the major developments and trends that will have an impact on business, society, and the world in the next five years. We will specifically investigate how Connected Car applications will develop, how consumers will respond to climate change and new technologies, and how 4G+ will power global mobile devices and connections by 2023.
Jun 29 new privacy technologies for unicode and international data standards ...Ulf Mattsson
Protecting the increasing use International Unicode characters is required by a growing number of Privacy Laws in many countries and general Privacy Concerns with private data. Current approaches to protect International Unicode characters will increase the size and change the data formats. This will break many applications and slow down business operations. The current approach is also randomly returning data in new and unexpected languages. New approach with significantly higher performance and a memory footprint can be customizable and fit on small IoT devices.
We will discuss new approaches to achieve portability, security, performance, small memory footprint and language preservation for privacy protecting of Unicode data. These new approaches provide granular protection for all Unicode languages and customizable alphabets and byte length preserving protection of privacy protected characters.
Old Approaches
Major Issues
Protecting the increasing use International Unicode characters is required by a growing number of Privacy Laws in many countries and general Privacy Concerns with private data.
Old approaches to protect International Unicode characters will typically increase the size and change the data formats.
This will break many applications and slow down business operations. This is an example of an old approach that is also randomly returning data in new and unexpected languages
Book about
Quantum Computing Blockchain Reversable Protection Privacy by Design, Applications and APIs Privacy, Risks, and Threats Machine Learning and Analytics Non-Reversable Protection International Unicode Secure Multi-party Computing Computing on Encrypted Data Internet of Things II. Data Confidentiality and Integrity Standards and Regulations IV. Applications VI. Summary Best Practices, Roadmap, and Vision Trends, Innovation, and Evolution Hybrid Cloud , CASB and SASE Appendix A B C D E I. Introduction and Vision Section Access Control Zero Trust Architecture Trusted Execution Environments III. Users and Authorization Governance, Guidance, and Frameworks V. Platforms Data User App Innovation 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Chapter Discovery and Search Glossary
qubit-conference-new-york-2021: https://nyc.qubitconference.com/
Cybersecurity: Get ready for the unpredictable
Create a sound cybersecurity strategy based on the right technology & budgetary insights, proven practices, and processes for SMEs.
This virtual event will equip CxOs and cybersecurity teams with the right intel to create a sound cybersecurity strategy based on the right technology & budgetary insights, proven practices, and processes specially tailored for SMEs.
Find out how to bring the smart design of cybersecurity architecture and processes, what to automate & how to properly set up internal and external ownership.
The proven cybersecurity strategy fit for your environment can go a long way. Know what to do in-house, what to outsource, set up your budgets right, and get help from the right cybersecurity specialists.
Secure analytics and machine learning in cloud use casesUlf Mattsson
Table of Contents:
Secure Analytics and Machine Learning in Cloud ......................................................................................... 2
Use case #1 in Financial Industry .............................................................................................................. 2
Data Flow .............................................................................................................................................. 2
The approach can be used for other Use-cases .................................................................................... 2
Homomorphic Encryption for Secure Machine Learning in Cloud ............................................................... 3
Evolving Homomorphic Encryption .......................................................................................................... 3
Performance Examples – HE, RSA and AES ........................................................................................... 3
Performance Examples – FHE, NTRU, ECC, RSA and AES ...................................................................... 3
Some popular HE schemes .................................................................................................................... 4
Examples of HE Libraries used by IBM, Duality, and Microsoft ............................................................ 4
Fast Homomorphic Encryption for Secure Analytics in Cloud ...................................................................... 4
Use case #2 in Health Care ........................................................................................................................ 5
Provable security for untrusted environments ..................................................................................... 5
Comparison to multiparty computation and trusted execution environments ................................... 5
Time and memory requirements of HE ................................................................................................ 5
Managing Data Security in Hybrid Cloud ...................................................................................................... 8
Data Security Policy and Zero Trust Architecture ..................................................................................... 8
The future of encryption will change in the Post-Quantum Era: .............................................................. 8
Managing Data Security in a Hybrid World ................................................................................................... 9
Evolving Privacy Regulations ....................................................................................................................... 10
New Ruling in GDPR under "Schrems II" ................................................................................................. 10
The new California Privacy Rights Act (CPRA)
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
We will discuss the Evolving International Privacy Regulations. Cross Border Data Transfer for GDPR under Schrems II is now ruled by an EU court that defined what is required. This ruling can be far reaching for many businesses.
Data encryption and tokenization for international unicodeUlf Mattsson
Unicode is an information technology standard for the consistent encoding, representation, and handling of text expressed in most of the world's writing systems. The standard is maintained by the Unicode Consortium, and as of March 2020, it has a total of 143,859 characters, with Unicode 13.0 (these characters consist of 143,696 graphic characters and 163 format characters) covering 154 modern and historic scripts, as well as multiple symbol sets and emoji. The character repertoire of the Unicode Standard is synchronized with ISO/IEC 10646, each being code-for-code identical with the other.
The Unicode Standard consists of a set of code charts for visual reference, an encoding method and set of standard character encodings, a set of reference data files, and a number of related items, such as character properties, rules for normalization, decomposition, collation, rendering, and bidirectional text display order (for the correct display of text containing both right-to-left scripts, such as Arabic and Hebrew, and left-to-right scripts). Unicode's success at unifying character sets has led to its widespread and predominant use in the internationalization and localization of computer software. The standard has been implemented in many recent technologies, including modern operating systems, XML, Java (and other programming languages), and the .NET Framework.
Unicode can be implemented by different character encodings. The Unicode standard defines Unicode Transformation Formats (UTF) UTF-8, UTF-16, and UTF-32, and several other encodings. The most commonly used encodings are UTF-8, UTF-16, and UCS-2 (a precursor of UTF-16 without full support for Unicode)
The future of data security and blockchainUlf Mattsson
Discussion of Post-Quantum Cryptography and other technologies:
Data Security Techniques
Secure Multi-Party Computation (SMPC)
Homomorphic encryption (HE)
Differential Privacy (DP) and K-Anonymity
Pseudonymization and Anonymization
Synthetic Data
Zero trust architecture (ZTA)
Zero-knowledge proofs (ZKP)
Private Set Intersection (PSI)
Trusted execution environments (TEE)
Post-Quantum Cryptography
Blockchain
Regulations and Standards in Data Privacy
GDPR and evolving international privacy regulationsUlf Mattsson
Convergence of data privacy principles, standards and regulations
General Data Protection Regulation (GDPR)
GDPR and California Consumer Privacy Act (CCPA)
What role does technologies play in compliance
Use Cases
Privacy preserving computing and secure multi-party computation ISACA AtlantaUlf Mattsson
A major challenge that many organizations faces, is how to address data privacy regulations such as CCPA, GDPR and other emerging regulations around the world, including data residency controls as well as enable data sharing in a secure and private fashion. We will present solutions that can reduce and remove the legal, risk and compliance processes normally associated with data sharing projects by allowing organizations to collaborate across divisions, with other organizations and across jurisdictions where data cannot be relocated or shared.
We will discuss secure multi-party computation where organizations want to securely share sensitive data without revealing their private inputs. We will review solutions that are driving faster time to insight by the use of different techniques for privacy-preserving computing including homomorphic encryption, k-anonymity and differential privacy. We will present best practices and how to control privacy and security throughout the data life cycle. We will also review industry standards, implementations, policy management and case studies for hybrid cloud and on-premises.
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
Digital Transformation and the opportunities to use data in Analytics and Machine Learning are growing exponentially, but so too are the business and financial risks in Data Privacy. The increasing number of privacy incidents and data breaches are destroying brands and customer trust, and we will discuss how business prioritization can be benefit from a finance-based data risk assessment (FinDRA).
More than 60 countries have introduced privacy laws and by 2023, 65% of the world’s population will have its personal information covered under modern privacy regulations. We will discuss use cases in financial services that are finding a balance between new technology impact, regulatory compliance, and commercial business opportunity. Several privacy-preserving and privacy-enhanced techniques can provide practical security for data in use and data sharing, but none universally cover all use cases. We will discuss what tools can we use mitigate business risks caused by security threats, data residency and privacy issues. We will discuss how technologies like pseudonymization, anonymization, tokenization, encryption, masking and privacy preservation in analytics and business intelligence are used in Analytics and Machine Learning.
Organizations are increasingly concerned about data security in processing personal information in external environments, such as the cloud; and information sharing. Data is spreading across hybrid IT infrastructure on-premises and multi-cloud services and we will discuss how to enforce consistent and holistic data security and privacy policies. Increasing numbers of data security, privacy and identity access management products are in use, but they do not integrate, do not share common policies, and we will discuss use cases in financial services of different techniques to protect and manage data security and privacy.
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
ISACA London Chapter webinar, Feb 16th 2021
Topic: “Protecting Data Privacy in Analytics and Machine Learning”
Abstract:
In this session, we will discuss a range of new emerging technologies for privacy and confidentiality in machine learning and data analytics. We will discuss how to put these technologies to work for databases and other data sources.
When we think about developing AI responsibly, there’s many different activities that we need to think about.
This session also discusses international standards and emerging privacy-enhanced computation techniques, secure multiparty computation, zero trust, cloud and trusted execution environments. We will discuss the “why, what, and how” of techniques for privacy preserving computing.
We will review how different industries are taking opportunity of these privacy preserving techniques. A retail company used secure multi-party computation to be able to respect user privacy and specific regulations and allow the retailer to gain insights while protecting the organization’s IP. Secure data-sharing is used by a healthcare organization to protect the privacy of individuals and they also store and search on encrypted medical data in cloud.
We will also review the benefits of secure data-sharing for financial institutions including a large bank that wanted to broaden access to its data lake without compromising data privacy but preserving the data’s analytical quality for machine learning purposes.
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
In the shadow of the global pandemic and the associated economic downturn, organizations are focused on cost optimization, which often leads to impulsive decisions to deprioritize compliance with all nonrevenue programs.
Regulators have evolved to adapt with the notable increase in data subject complaints and are getting more serious about organizations that don’t properly protect consumer data. Marriott was hit with a $124 million fine while Equifax agreed to pay a minimum of $575 million for its breach. The US Federal Trade Commission, the US Consumer Financial Protection Bureau (CFPB), and all 50 U.S. states and territories sued over the company’s failure to take “reasonable steps” to secure its sensitive personal data.
Privacy and data protection are enforced by a growing number of regulations around the world and people are actively demanding privacy protection — and legislators are reacting. More than 60 countries have introduced privacy laws in response to citizens’ cry for transparency and control. By 2023, 65% of the world’s population will have its personal information covered under modern privacy regulations, up from 10% today, according to Gartner. There is a convergence of data privacy principles, standards and regulations on a common set of fundamental principles.
The opportunities to use data are growing exponentially, but so too are the business and financial risks as the number of data protection and privacy regulations grows internationally.
Join this webinar to learn more about:
- Trends in modern privacy regulations
- The impact on organizations to protect and use sensitive data
- Data privacy principles
- The impact of General Data Protection Regulation (GDPR) and data transfer between US and EU
- The evolving CCPA, the new PCI DSS version 4 and new international data privacy laws or regulations
- Data privacy best practices, use cases and how to control sensitive personal data throughout the data life cycle
What is tokenization in blockchain - BCS LondonUlf Mattsson
BCS North London Branch in association with Central London Branch webinar (by GoToWebinar) Date: 2nd December 2020 Time: 18.00 to 19.30 Event title: Blockchain tokenization “What is tokenization in Blockchain?”
Agenda
Blockchain
What is Blockchain?
Use cases, trends and risks
Vendors and platforms
Data protection techniques and scalability
Tokenization
Digital business
Convert a digital value into a digital token
Local and central models
Cloud
Tokenization in Hybrid cloud
Protecting data privacy in analytics and machine learning - ISACAUlf Mattsson
In this session, we will discuss a range of new emerging technologies for privacy and confidentiality in machine learning and data analytics. We will discuss how to put these technologies to work for databases and other data sources.
When we think about developing AI responsibly, there’s many different activities that we need to think about.
This session also discusses international standards and emerging privacy-enhanced computation techniques, secure multiparty computation, zero trust, cloud and trusted execution environments. We will discuss the “why, what, and how” of techniques for privacy preserving computing.
We will review how different industries are taking opportunity of these privacy preserving techniques. A retail company used secure multi-party computation to be able to respect user privacy and specific regulations and allow the retailer to gain insights while protecting the organization’s IP. Secure data-sharing is used by a healthcare organization to protect the privacy of individuals and they also store and search on encrypted medical data in cloud.
We will also review the benefits of secure data-sharing for financial institutions including a large bank that wanted to broaden access to its data lake without compromising data privacy but preserving the data’s analytical quality for machine learning purposes.
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2bUlf Mattsson
Blockchain
- What is Blockchain?
- Blockchain trends
Emerging data protection techniques
- Secure multiparty computation
- Trusted execution environments
- Use cases for analytics
- Industry Standards
Tokenization
- Convert a digital value into a digital token
- Tokenization local or in a centralized model
- Tokenization and scalability
Cloud
- Analytics in Hybrid cloud
Unlock the potential of data security 2020Ulf Mattsson
Explore challenges of managing and protecting data. We'll share best practices on establishing the right balance between privacy, security, and compliance
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
2. Are You Ready for a Big Change Revolution?
2
Source: www.firstpost.com
3. • By 2018, digital business will require 50% fewer
business process workers and 500% more key
digital business jobs, compared with traditional
models
• By 2018, the total cost of ownership for business
operations will be reduced by 30% through smart
machines and industrialized services
• By 2020, developed world life expectancy will
increase by a half-year due to the widespread
adoption of wireless health monitoring technology
3
Source: Gartner – Top 10 Strategic Predictions for 2015 and Beyond: Digital Business Is Driving 'Big Change‘, Oct 2014
A Changing Landscape 2018 - 2020
6. They’re Tracking When You Turn Off the Lights
6 Source: Wall Street Journal
Sensors to capture data on environmental conditions including sound volume, wind
and carbon-dioxide levels, as well as behavioral data such as pedestrian traffic flow
8. Samsung engineers are working on
wearable for early stroke detection
8
Source: Early Detection Sensor and Algorithm Package (EDSAP)
9. FTC Wants a Trusted, Secure Internet of Things
9
The Federal
Trade
Commission
(FTC)
Looking
At Apple
HealthKit
Source: www.cio-today.com
10. • The Department of Homeland Security
• Investigating 2 dozen cases of suspected cyber security
flaws in medical devices that could be exploited
• Can be detrimental to the patient, creating problems
such as instructing an infusion pump to overdose a
patient with drugs or forcing a heart implant to deliver a
deadly jolt of electricity
• Encrypt medical data that’s stored
• PricewaterhouseCoopers study
• $30billion annual cost hit to the U.S. healthcare system
due to inadequate medical-device interoperability
Security Threats of Connected Medical
Devices
10
www.computing.co.uk/ctg/opinion/2390029/security-threats-of-connected-
medical-devices#
11. IoT is a Paradise for Hackers
11
Source: HP Security Research
• Almost 90 percent of the devices collect personal information such as name,
address, date of birth, email, credit card number, etc.
• Un-encrypted format on to the cloud and big data, thus endangering the
privacy of users
12. • 26 billion devices on the Internet of Things by 2020
(Gartner)
• 15 Billion existing devices connected
to the internet (Intel)
• Not adequately protected at the device level
• Cannot wait for a new generation of secure devices to be
developed
• Require robust and layered security controls
90% of world's data generated over last two
years
12
Business: Are you ready for a big change revolution?
The consumer need to get faster, less expensive and better products and services in a mode that supports any time, any place, any channel is fueling the digital business revolution. Digitalization and the digital business are catalysts of change that are affecting the human-machine relationship and driving better customer outcomes.
New business models fueled by Big Data, Cloud & the Internet of Things
· Machines Are Taking a More-Active Role in Enhancing Human Endeavors.
· Digitalized Things Are Making Assisted Economic Decisions.
http://www.firstpost.com/business/digital-business-ready-big-change-revolution-2059461.htm
Gartner: A Changing Landscape 2018 – 2020
By 2017, U.S. customers' mobile engagement behavior will drive mobile commerce revenue in the
U.S. to 50% of U.S. digital commerce revenue.
By 2017, 50% of consumer product investments will be redirected to customer experience
innovations.
By 2017, nearly 20% of durable goods "e-tailers" will use 3D printing to create personalized product
offerings.
By 2018, digital business will require 50% fewer business process workers and 500% more key
digital business jobs, compared with traditional models.
By 2018, the total cost of ownership for business operations will be reduced by 30% through smart
machines and industrialized services.
By 2020, developed world life expectancy will increase by a half-year, due to the widespread
adoption of wireless health monitoring technology.
Around 2020 According to Morgan Stanley, completely autonomous vehicles, will start rolling out to the masses.
Even though they’re hardly seen on the road, self-driving cars have been the talk of the town for so long that they already seem like a technology of the past. Google has been working on one for years. Apple is supposedly working on one too. And then there is speculation that everyone from Uber to Tesla could join this prodigal race.
Piloting now: Volvo’s Cloud Connected Cars Help Remedy Road Conditions
Volvo’s exhibit at the Mobile World Congress shows us the power of the cloud connected car. Volvo is an innovator in vehicle safety and the Swedish automaker is piloting a new cloud connected system that is designed to report weather conditions on dangerous roads.
Let’s say you’re driving down a road that contains a patch of ice. Once your car detects the loss in traction, an alert is immediately beamed into the cloud. Other drivers who have this cloud system will receive real time alerts about the condition.
Local emergency services workers could theoretically get access the same on-demand information. This would enable localities to rapidly deploy salt trucks and snow plows on dangerous roads which could potentially save someone’s life. Using GPS and cloud, Volvo could even pinpoint the exact stretch of road that harbors the dangerous conditions.
http://www.iamwire.com/2015/03/driving-cars-cusp-revolutionary-change/111248
http://www.cloudwedge.com/volvos-cloud-connected-cars-help-remedy-road-conditions-4389/
By studying the movement and bodies of insects such as ants, Sarah Bergbreiter and her team build incredibly robust, super teeny, mechanical versions of creepy crawlies … and then they add rockets. See their jaw-dropping developments in micro-robotics, and hear about three ways we might use these little helpers in the future.
I will avoid to discuss TV, webcam, refrigerators, ovens, thermostats, and some other smart devices. Let’s look at some other examples.
University of Chicago installed dozens of sensor packs on street lamps in the city’s central business district and elsewhere. Each pack, roughly the size of a thick laptop, contains 65 sensors intended to capture data on environmental conditions including sound volume, wind and carbon-dioxide levels, as well as behavioral data such as pedestrian traffic flow as revealed by Wi-Fi-enabled smartphones.
Infrared camera peers at windows of thousands of buildings in NYC. The camera software determine what time households turn in, what kind of light bulbs they use, and even what pollutants their buildings emit. Four percent of NYC go to bed before 7:30 p.m. on weeknights. Only 6% turn off the lights after midnight.
your Smartphone will now start to collect your activity data passively in the background, enabling Jawbone to provide instant feedback automatically. "When I wake up, my first question is, How did I sleep? Now, right there on my [Smartphone] home screen is the summary of last night's sleep.
Imagine gradually waking from a long slumber to discover that, without even removing your blankets, the bedroom lights have begun turning on and the coffee maker in the kitchen has started brewing a fresh blend. It might sound futuristic but according to Jawbone product VP Travis Bogard the technology is already here.
Because UP24 tracks your sleep patterns and REM cycles, it knows the perfect time for you to wake up feeling the most refreshed. What if the lights dimmed on to help you rise from sleep? With the UP platform, and with apps like IFTTT (If This Then That), it's now possible. Once the UP24 triggers its sleep alarm, it can tell another app on your iPhone to turn on the lights.
Samsung engineers are working on wearable for early stroke detection
Samsung has quite the diverse family of products, and for the last two years, a team of engineers have been working on yet another. Folks from its smartphone and washing machine teams are building a wearable sensor that monitors brainwaves to detect the early stages of a stroke. The result is a prototype known as the Early Detection Sensor and Algorithm Package (EDSAP): a device that keeps tabs on the electric impulses of the brain with the help of a smartphone or tablet. In theory, the sensor-packed headset will alert folks who are at risk for a stroke early on, so they can get to a doctor to prevent potentially serious and permanent effects.
http://www.cio-today.com/article/index.php?story_id=131004IP17JU
The Federal Trade Commission (FTC) is in talks with Apple over their new Apple HealthKit which was launched with iOS 8, and the FTC is looking for assurances from Apple that the data from HealthKit will be protected.
According to a recent report by Reuters, Apple and the FTC have met on a number of occasions over the last few months to discuss how users data will be protected.
The FTC are obviously looking to ensure that data in Apple’s Health kit is secure, and Apple have said that they designed ‘HealthKit with privacy in mind‘.
Source Reuters
FTC Wants a Trusted, Secure Internet of Things
The Federal Trade Commission is voicing its concerns about the Internet of Things (IoT), suggesting several steps businesses should take to protect consumer privacy and security . The FTC acknowledged that IoT, which connects devices to the Internet so they can send and receive data , is already making an impact on millions of American consumers via health and fitness monitors, connected cars, home security devices and household appliances. The agency is concerned that privacy and security concerns could undermine consumer confidence in this booming industry.
http://www.technewsworld.com/story/81670.html
I think that we need the benefits of having large volumes of data to analyze and for a long time. The data is already out there and we urgently need to protect this data that we load into Big Data and Cloud.
Let’s talk about medical devices.
Remote monitoring patients opening up a whole new era of predictive and more effective healthcare.
PricewaterhouseCoopers study highlighted a $30bn annual cost hit to the US healthcare system due to inadequate medical-device interoperability.
The Department of Homeland Security is also investigating two dozen cases of suspected cyber security flaws in medical devices that officials fear could be exploited by hackers. The ability to control these medical devices can be detrimental to the patient, creating problems such as instructing an infusion pump to overdose a patient with drugs, or forcing a heart implant to deliver a deadly jolt of electricity.
Need to protect data and other vulnerabilities that hackers can use to expose confidential data. This begins with the data centre and keeping medical data stored there secure and encrypted.
HP New Report Says Internet of Things is a Paradise for Hackers
But at the same time, TV, webcam, refrigerators, ovens, thermostats, and a host of other smart devices will become an easy prey for hackers.
One study, conducted by the Division of HP Fortify unit has revealed the presence of a large number of vulnerabilities in 10 Internet of Things (IoT) devices. HP did not release the names of the producers, specifying only that the majority of them uses cloud services and all include a mobile app for remote control.
HP Security Research reviewed 10 of the most popular devices and found that most of the devices have high average number of vulnerabilities per device including Heartbleed, denial of service, weak password or cross site scripting. Specifically, it was confirmed that the presence of vulnerabilities included in the top 10 device is part of the Open Web Application Security Project (OWASP). The results are quite alarming, since a single bug may facilitate chain attacks, whereas in a smart home, there may be dozens of devices interconnected.
Almost 90 percent of the devices examined in the report collect personal information such as name, address, date of birth, email, credit card number, etc. that are transmitted in un-encrypted format over the local network and on the cloud, thus endangering the privacy of users.
Exponential growth of data generation and collection stemming from new business models
According to forecasts by Gartner, by 2020 there will be in circulation of more than 26 billion connected devices. EMC Corporation forecasts the digital universe of Internet of Things has doubled every two years and may be increased 10-fold between 2013 and 2020 from 4.4 trillion to 44 trillion gigabytes.
It’s unrealistic to believe that billions of existing devices connected to the internet can be adequately protected at the device level. Likewise, we cannot wait for a new generation of secure devices to be developed. Instead, it’s incumbent upon the companies that send and collect sensitive information about the users of these devices to be better custodians of that data. That will require implementing robust and layered risk management controls as well as encrypting or tokenizing that data while it’s stored on the company’s servers, being used for analytics in Big Data environments, or shared with other cloud-based services
http://medcitynews.com/2015/01/wearable-ecosystems-seek-transform-fragmented-wearables-market/
e widespread availability of fitness wearables coupled with marginal use has created a relatively new trend in the market — ecosystems. After all, no one can afford to depend on the business of just a few devices and it opens up access to a bigger share of wearables users. Its also a way to add more value and ensure the longer term survival of the sector. For those who use more than one wearable, these ecosystems are helping to organize their data into useful visualization tools.