Stanford Engineering Professor Monica Lam discusses her lab's work in developing an open social network aimed at giving users better control of their data and greater privacy.
Net Neutrality Capacity Building SeminarExcel Asama
Promoting Net Neutrality through multi stakeholder capacity building and dialogue is project aimed at contributing to the construction of neutral networks and freedom of expression in Cameroon through training, awareness creation and multi stakeholder discussions.
Project funded by the Web We Want Campaign.
Website: www.netnogcm.net
With the rise of Web 2.0, Twitter has become a tool of choice for universities looking to increase their digital footprint. However there is not much guidance given into the protections of these tweets or the secure integration of Twitter into other Web 2.0 applications. As the debate for cyber threat continue to increase, these tweets must be protected and delivered in a manner that protects the sender. Explored in this report are the methods in which Twitter and its data can be exploited for nefarious use.
This presentation provides an inside view of how the Social media presence could harm any individual if no proper vigilance is kept while being active on various social platforms.
Dark Web Investigation: Performing Online Criminal Investigations over the Dark Web
Law enforcement agencies face various threats which continue to increase with the increasing use and accessibility of the deep and dark web. The ability to mitigate the risk by criminal elements and terrorists by extracting crucial data by criminal investigations, especially dark web investigations, is paramount.
For further information please watch this slide
Net Neutrality Capacity Building SeminarExcel Asama
Promoting Net Neutrality through multi stakeholder capacity building and dialogue is project aimed at contributing to the construction of neutral networks and freedom of expression in Cameroon through training, awareness creation and multi stakeholder discussions.
Project funded by the Web We Want Campaign.
Website: www.netnogcm.net
With the rise of Web 2.0, Twitter has become a tool of choice for universities looking to increase their digital footprint. However there is not much guidance given into the protections of these tweets or the secure integration of Twitter into other Web 2.0 applications. As the debate for cyber threat continue to increase, these tweets must be protected and delivered in a manner that protects the sender. Explored in this report are the methods in which Twitter and its data can be exploited for nefarious use.
This presentation provides an inside view of how the Social media presence could harm any individual if no proper vigilance is kept while being active on various social platforms.
Dark Web Investigation: Performing Online Criminal Investigations over the Dark Web
Law enforcement agencies face various threats which continue to increase with the increasing use and accessibility of the deep and dark web. The ability to mitigate the risk by criminal elements and terrorists by extracting crucial data by criminal investigations, especially dark web investigations, is paramount.
For further information please watch this slide
What will Mobile Marketing 2.0 look like? Certainly nothing like the Web but mixing Mobile Apps and the most personal Marketing channel, there is a clear opportunity to engage in a deep conversation with the fans of your brand & products. So, do not wait tomorrow, start doing it today!
Overview of LocalSocial, the new Social Proximity Framework from Rococo Software. LocalSocial is designed to make it easy for software developers to add rich proximity functionality to their mobile applications. It consists of client side libraries (for Android and J2ME today) plus a web service that is called by the library.
SUG - Singapore - Use of Social communication in the next generation of businessMark Stokes
These are the slides for my presentation to the Singapore SharePoint User Group in September 2014.
I have added some extra points, based on the discussion topics around different cultures and End User Adoption.
Today most people on Earth are connected through wired or wireless networks, or both. The next leap in connectivity will give people the ability to control objects and machines. The Internet of Everything (IoE) will tag objects with tiny wireless devices for communication, computation and sensing. Some projections show demand for such IoE smart sensors will grow from billions to trillions within a decade. The essential enabling technology is an ultra-low power smart radio to provide a unique IP address and location. In this talk, Amin Arbabian discusses how he developed an ant-sized wireless-powered radio chip that costs pennies to fabricate– making it cheap enough to become the missing link to enable the Internet of Everything.
Embedded computing is everywhere. It is in our car engines, refrigerators, and even in the singing greeting cards we send. With improvements in wireless technology, these systems are starting to talk with each other, and they are appearing in places like our shoes and wrists to monitor our athletic activity or health. This emerging Internet of Everything (IoE) has tremendous potential to improve our lives. But like any powerful technology, it also has a dark side: it will observe and implement many of our actions. Security in the IoE is likely to be even more critical than general Internet security. After reviewing some of the challenges in creating a secure IoE, Horowitz will describe a new research program at Stanford to address this issue.
Wireless has evolved from Marconi's station-to-station telegraphy, to audio and video broadcasting, to today’s person-to-person mobile digital communications. Each transition has surprised even the revolutionaries who brought it about, and each transformed civilization. We expect similar disruptions from the next phase of interconnectivity, in which a trillion objects join the conversation. Tech pundits have long talked about an Internet of Things, a vision most often dominated by machine-to-machine communications in industrial settings. Lee will make the case for the Internet of Everything in which humans will be involved in the most compelling applications yet to emerge. He will describe some possible futures, and how Stanford engineers are working to overcome significant challenges to realize those futures.
Professor Iaccarino provides a window into intriguing physical phenomena, the challenges of extreme-scale computations and simulations illustrating the fascinating beauty of fluid turbulence.
Professor Dionne explores the unique and enabling properties of nano-sized materials, with applications ranging from highly efficient solar-renewable technologies to optical computers and cloaks of invisibility.
Stanford Engineering Professor Olav Solgaard describes how optical fibers can be used to provide a crisp, three-dimensional window into human anatomy at a cellular level.
Engineers are leading the push to create greener products that will help us meet current and future sustainability challenges. Stanford Engineering Professor Mike Lepech discusses the impact of green engineering on our planet and on our daily lives.
Online communities are powerful but often out of reach to the poor and geographically isolated for technical and literacy reasons. Mobile phones can address both of these gaps. Stanford Engineering Professor Scott Klemmer and colleagues have pioneered voice-based social media tools to help rural communities connect online.
Stanford Engineering Professor Ingmar Riedel-Kruse describes how he's creating biotic games in which humans play with real biological processes at microscopic scale. The goal is to enable crowd-sourcing of the scientific method to yield real-world advances in biotechnology.
Stanford Engineering Professor Christina Smolke explains how advances in synthetic biology are revolutionizing medical treatment, prevention and diagnosis of disease. She made this presentation at the school's annual eDay (Engineering Day) event.
Judy Estrin, CEO of JLabs LLC and a serial entrepreneur discusses why innovation is so important and what it takes to be an entrepreneur. Estrin was involved in the development of TCP/IP and is a former Cisco CTO. A Stanford Engineering alum, she spoke at the school's annual eDay event.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
A Wide Open World of Social Networking: Monica Lam, Stanford Engineering
1. A Wide-Open World of
Social Networking
Monica Lam
MobiSocial Computing Laboratory
Stanford University
MobiSocial is supported by AVG, Google, ING Direct, Nokia, Sony Ericsson.
Part of the NSF Programmable Open Mobile Internet (POMI) 2020 project.
2. Goals of This Class
ž Early results in research
in social networking architectures
ž University computer science research
ž Demos of ongoing research
ž Android market: DungBeetle
ž Stanford Wifi
ž ID = eday
ž Password = stanford
3. Motivation
ž Who owns the data on Facebook?
ž How many Facebooks do we need?
4. Who Owns the Data on Facebook?
ž You
ž Facebook
“You grant us a non-exclusive, transferable,
sub-licensable, royalty-free, worldwide
license to use any IP content that you post
on or in connection with Facebook”.
8. How Many Facebooks?
A monopoly exists
when a specific enterprise
has sufficient control over a particular service
to determine the terms
on which other individuals shall have access to it.
10. Monopolies
When not legally coerced to do otherwise,
monopolies typically
produce fewer goods & sell them at higher prices
than under perfect competition
to maximize their profit
at the expense of consumer satisfaction.
18. Mr. Privacy Applications
ž Users do not need to sign up
ž Interact with anybody with an email address
(university and corporate)
ž As private as email
ž Looks nothing like Email
ž Social apps: glorified mail clients
ž Leverage email’s identity, protocol, database
ž Instantly usable by > 1 billion people
19. Idea 2: DungBeetle
Your heart-to-heart conversations are yours.
Phone-to-phone communication.
20. Demo: DungBeetle
ž Please download from Android Market
DungBeetle
ž Create a new group on the fly
using NFC or GPS locations
ž Real-time feed
ž Social applications
ž wePaint
ž weTube
26. Trusted Sharing of Public Key (NFC)
Ian’s
Secret Key (s) 1024 bits
Ian’s
Public Key (p)
27. Send Secret Message
Ian’s Ian’s
Public Key (p) Secret Key (s)
Encrypt “I Am “I Am Decrypt
p Bored!”
Bored!”
with s
p
p, 00101011010…
00101011010…
Messaging Service
30. Application Platform
ž Access to friends
ž Group management
ž Multi-party applications
ž App communicates to friends
ž App keeps info about users
-- while protecting users from spam, etc.
-- without a central server!
33. Summary
Issues
ž Data ownership and Monopoly
Social Internet
ž No need to join a proprietary network
Mr. Privacy: email based platform
ž SocialBar: social browsing
DungBeetle: P2P mobile social platform
ž wePaint
ž weTube
Technology exposure: NFC, cryptography
34. Getting Involved
ž Tell your friends
ž Join the beta user community
ž Help develop apps
ž Help develop the infrastructure
Applications on http://mobisocial.stanford.edu
ž SocialBar
ž DungBeetle (Android Market)