Luke Razzell and I ran this as a guided discussion at the British Computer Society on 5th March 2009. Then I tried to run through it in 6 minutes at Mashup* Events Being Location Aware on 19th March 2009
Second Life Next: Dusan Writer's 2010 SLCC Keynote PresentaionDoug Thompson
My Keynote Presentation from the Second Life Community Convention 2010.
To view the video of the presentation fast forward to the latter half of this video:
http://www.ustream.tv/recorded/8922472
And this:
http://www.ustream.tv/recorded/8925416
What is the Dark Web & How to Access itWe explain the Dark Web, .docxhelzerpatrina
What is the Dark Web & How to Access it
We explain the Dark Web, how it differs from the Deep Web, and how to get on the Dark Web using the Tor browser.
By Matt Egan | 30 Jan 2019
The internet is a much, much bigger place than you probably realise. You know about Facebook, Google, BBC iPlayer and Amazon, but do you really know what's lurking beyond those user-friendly and respectable websites?
This is but a tiny corner of the internet, and the Dark Web and the Deep Web loom in much shadier corners. Using Tor you can access them, but should you even want to visit the Dark Web or the Deep Web?
Let's take a tour to help you make up your mind.What is the Dark Web?
The Dark Web is a term that refers specifically to a collection of websites that exist on an encrypted network and cannot be found by using traditional search engines or visited by using traditional browsers.
Almost all sites on the so-called Dark Web hide their identity using the Tor encryption tool. You may know Tor for its ability to hide your identity and activity. You can use Tor to spoof your location so it appears you're in a different country to where you're really located, making it much like using a VPN service.
When a website is run through Tor it has much the same effect.
Indeed, it multiplies the effect. To visit a site on the Dark Web that is using Tor encryption, the web user needs to be using Tor. Just as the end user's IP address is bounced through several layers of encryption to appear to be at another IP address on the Tor network, so is that of the website.
There are several layers of magnitude more secrecy than the already secret act of using Tor to visit a website on the open internet - for both parties.
Thus, sites on the Dark Web can be visited by anyone, but it is very difficult to work out who is behind the sites. And it can be dangerous if you slip up and your identity is discovered.
You can also read our in-depth guide to using Tor if you want to know more about using the web anonymously and sending messages securely.
Why would I want to use the Dark Web?
Not all Dark Web sites use Tor. Some use similar services such as I2P, for example the Silk Road Reloaded. But the principle remains the same. The visitor has to use the same encryption tool as the site and - crucially - know where to find the site, in order to type in the URL and visit.
Infamous examples of Dark Web sites include the Silk Road and its offspring. The Silk Road was (and maybe still is) a website for the buying and selling of recreational drugs, and a lot more scary things besides. But there are also legitimate uses for the Dark Web. (Also see: Is it legal to buy drugs online?)
People operating within closed, totalitarian societies can use the Dark Web to communicate with the outside world. And given recent revelations about US- and UK government snooping on web use, you may feel it is sensible to take your communication on to the Dark Web.
The Dark Web hit the headlines in August 2015 ( ...
Second Life Next: Dusan Writer's 2010 SLCC Keynote PresentaionDoug Thompson
My Keynote Presentation from the Second Life Community Convention 2010.
To view the video of the presentation fast forward to the latter half of this video:
http://www.ustream.tv/recorded/8922472
And this:
http://www.ustream.tv/recorded/8925416
What is the Dark Web & How to Access itWe explain the Dark Web, .docxhelzerpatrina
What is the Dark Web & How to Access it
We explain the Dark Web, how it differs from the Deep Web, and how to get on the Dark Web using the Tor browser.
By Matt Egan | 30 Jan 2019
The internet is a much, much bigger place than you probably realise. You know about Facebook, Google, BBC iPlayer and Amazon, but do you really know what's lurking beyond those user-friendly and respectable websites?
This is but a tiny corner of the internet, and the Dark Web and the Deep Web loom in much shadier corners. Using Tor you can access them, but should you even want to visit the Dark Web or the Deep Web?
Let's take a tour to help you make up your mind.What is the Dark Web?
The Dark Web is a term that refers specifically to a collection of websites that exist on an encrypted network and cannot be found by using traditional search engines or visited by using traditional browsers.
Almost all sites on the so-called Dark Web hide their identity using the Tor encryption tool. You may know Tor for its ability to hide your identity and activity. You can use Tor to spoof your location so it appears you're in a different country to where you're really located, making it much like using a VPN service.
When a website is run through Tor it has much the same effect.
Indeed, it multiplies the effect. To visit a site on the Dark Web that is using Tor encryption, the web user needs to be using Tor. Just as the end user's IP address is bounced through several layers of encryption to appear to be at another IP address on the Tor network, so is that of the website.
There are several layers of magnitude more secrecy than the already secret act of using Tor to visit a website on the open internet - for both parties.
Thus, sites on the Dark Web can be visited by anyone, but it is very difficult to work out who is behind the sites. And it can be dangerous if you slip up and your identity is discovered.
You can also read our in-depth guide to using Tor if you want to know more about using the web anonymously and sending messages securely.
Why would I want to use the Dark Web?
Not all Dark Web sites use Tor. Some use similar services such as I2P, for example the Silk Road Reloaded. But the principle remains the same. The visitor has to use the same encryption tool as the site and - crucially - know where to find the site, in order to type in the URL and visit.
Infamous examples of Dark Web sites include the Silk Road and its offspring. The Silk Road was (and maybe still is) a website for the buying and selling of recreational drugs, and a lot more scary things besides. But there are also legitimate uses for the Dark Web. (Also see: Is it legal to buy drugs online?)
People operating within closed, totalitarian societies can use the Dark Web to communicate with the outside world. And given recent revelations about US- and UK government snooping on web use, you may feel it is sensible to take your communication on to the Dark Web.
The Dark Web hit the headlines in August 2015 ( ...
Rafael Siqueira, um dos fundadores do Apontador, fez uma rápida apresentação da sua palestra, cujo tema foi “Social Location: Transformando a localização em uma batalha de ego digital”.
Siqueira demonstro potenciais das ferramentas sociais de geolocalização.
Most Web 2.0 companies take months of hard planning and work. But what does it look like when you have to develop 6 new technology startups in just 48 hours? And what if those 48 hours were on-board a bus driving at 60mph from San Francisco to Austin with 26 strangers? That’s what happened to me and 25 other intrepid (foolish?) San Francisco-based technologists as we made our way to SXSW 2010. In my talk, I’ll discuss the exhausting and once-in-a-lifetime event that came to be known as The Startup Bus, how we did it, and what kinds of results we saw. The talk will include examples of how we used JIRA Studio, Atlassian’s collaborative, hosted development suite, to build the 6 new technology startups.
Libraries have been concerned with serving their burgeoning virtual communities. However, in many ways, the advent of the mobile web turns many of the virtual communities outward to the physical world once again. This presentation discusses how libraries serve virtual and burgeoning mobile communities.
Last presented to the Pendleton Public Library advisory board on January 28, 2012
The Future of HCI: Intelligent User Interfaces as Agents of ChangeChris Khalil
The predominant interaction paradigm for the last 30 years has been Direct Manipulation. This metaphor is starting to crack under the weight of information it has to deal with. The Indirect Management approach taken by systems such as Intelligent Agents aim to alleviate the cognitive load on users.
This presentation shows the constraints we face in the user experience field and some future opportunities and threats.
Going beyond google 2 philadelphia loss conferencemikep007
Some attorneys have argued that scouring social networking sites in search of a reason not to hire someone, or evidence of insurance fraud, is an invasion of privacy. But insurance companies and their attorneys argue that internet searches for public social networking profiles are similar to the informal video surveillance investigations of property-casualty claimants that are common in the industry.
FORWARD TO REALITY - PHYSICAL COMPUTING – THE NEXT LEVEL OF WEB INTERACTION MediaFront
For the past few decades we have been so focused on the virtual – on products that are not tangible, products that reside online, that we interact with through our computers, mobile devices and so on. But now it’s time to take a step in a different direction – actually an old familiar direction, it’s time to reach out of our digital boxes, into the real world and make real things but still retain that connection with the virtual world.
It’s time to merge the digital and the physical and create an internet of things.
We believe this to be the next step in web interaction – well it's already happening – we are merely the messengers!
Rafael Siqueira, um dos fundadores do Apontador, fez uma rápida apresentação da sua palestra, cujo tema foi “Social Location: Transformando a localização em uma batalha de ego digital”.
Siqueira demonstro potenciais das ferramentas sociais de geolocalização.
Most Web 2.0 companies take months of hard planning and work. But what does it look like when you have to develop 6 new technology startups in just 48 hours? And what if those 48 hours were on-board a bus driving at 60mph from San Francisco to Austin with 26 strangers? That’s what happened to me and 25 other intrepid (foolish?) San Francisco-based technologists as we made our way to SXSW 2010. In my talk, I’ll discuss the exhausting and once-in-a-lifetime event that came to be known as The Startup Bus, how we did it, and what kinds of results we saw. The talk will include examples of how we used JIRA Studio, Atlassian’s collaborative, hosted development suite, to build the 6 new technology startups.
Libraries have been concerned with serving their burgeoning virtual communities. However, in many ways, the advent of the mobile web turns many of the virtual communities outward to the physical world once again. This presentation discusses how libraries serve virtual and burgeoning mobile communities.
Last presented to the Pendleton Public Library advisory board on January 28, 2012
The Future of HCI: Intelligent User Interfaces as Agents of ChangeChris Khalil
The predominant interaction paradigm for the last 30 years has been Direct Manipulation. This metaphor is starting to crack under the weight of information it has to deal with. The Indirect Management approach taken by systems such as Intelligent Agents aim to alleviate the cognitive load on users.
This presentation shows the constraints we face in the user experience field and some future opportunities and threats.
Going beyond google 2 philadelphia loss conferencemikep007
Some attorneys have argued that scouring social networking sites in search of a reason not to hire someone, or evidence of insurance fraud, is an invasion of privacy. But insurance companies and their attorneys argue that internet searches for public social networking profiles are similar to the informal video surveillance investigations of property-casualty claimants that are common in the industry.
FORWARD TO REALITY - PHYSICAL COMPUTING – THE NEXT LEVEL OF WEB INTERACTION MediaFront
For the past few decades we have been so focused on the virtual – on products that are not tangible, products that reside online, that we interact with through our computers, mobile devices and so on. But now it’s time to take a step in a different direction – actually an old familiar direction, it’s time to reach out of our digital boxes, into the real world and make real things but still retain that connection with the virtual world.
It’s time to merge the digital and the physical and create an internet of things.
We believe this to be the next step in web interaction – well it's already happening – we are merely the messengers!
Short presentation to Arup on how consumer mobile applications might influence the design and uptake of mobile workflows within the enterprise.
The secret sauce is context (location, direction, time and schedule)
Short presentation on quality assurance and improvement of OpenStreetMap for @Geomob London on 24-11-2012
Can a quality assured product increase user confidence within the "professional" community and encourage increased contribution to fill in the gaps.
Can a crowdsourced geospatial database be considered authoritative? Indeed can any dataset that describes the real world be considered authoritative, whether crowd sourced or “professionally compiled”? Who determines authority? What constitutes authority in geodata? Does authority matter and if it does, why? What actions or processes might contribute to promoting crowdsourced geodata to a position of authority?
I want to consider the nature of authority in geospatial data and whether it might be possible for a crowdsourced dataset such as OpenStreetMap (although these observations could apply to any crowdsourced geodata) to become authoritative or a primary reference source.
UK Government is consulting on Principles of Open Data, opportunities and challenges as well as charging and licensing for Public Data Corporation.
A brief summary of the key topics to facilitate discussion
2010 was a big year for the Open Data community, some Ordnance Survey data was made freely available, data.gov.uk launched with a raft of data from across government, government published an open data license and then a new government took over who seem to be equally committed to Open Data. So far we have seen Local Government brought into the Open Data initiative (albeit with a bit of a struggle) and most recently aggregated crime data has been published on police.uk.
- So is everything rosy in the Open Data garden or are there dark clouds looming on the horizon?
- In a geo-context it seems that if we can pin a pair of coordinates to something someone will put it on a map, perhaps we need to pause before we map?
- Is Open Data the same as openness and transparency in a government context?
- What kind of accountability will access to Open Data deliver?
A lecture that I gave on 17th March 2010 at the University of Nottingham on the History of Web Mapping.
Starts with some early history and then tracks the interplay of technology, business and usage in the development of web mapping over the last 2 decades.
Based on a series of interviews with key players in the UK and US, this is a work in progress. There is still quite a lot more needed to complete this.
Some useful resources are linked to in the penultimate slide. The mind map that I used to build this talk is at http://bit.ly/HistoryWebMap
Cocktails on the Titanic - AGI GeoCommunity '10Steven Feldman
Presentation at GeoCommunity in Stratford on Avon 29/09/2010
Mindmap with some notes is at http://www.mindmeister.com/61496552/cocktails-on-the-titanic
Just because you can put something on a map ...Steven Feldman
Presentation at W3G conference in Stratford on Avon 28/09/2010
The notes to this deck are at http://www.mindmeister.com/61955413/just-because-you-can-put-something-on-a-map
A short presentation to the Society for Location Analysis in London, 15/7/2010
The mindmap which contains the key points and storyline for the presentation (which you can edit) is at http://www.mindmeister.com/maps/public_map_shell/56029374/the-cloud-the-crowd-the-iphone
A presentation and intro to a panel session on day 1 of State of the Map in Girona. Leads into an elevator pitch from 5 startups (winner was GeoFabrik)
Just pretty pictures really, you had to be there to get the drift of the session
Presentation at Exor Knowledge Days, 2010
Realising the benefits of mobile working in highways maintenance requires process changes more than technology. This presentation explores some of the challenges and opportunities.
More on Exor at http://www.exorcorp.com
Without a business model we are all FCUK'dSteven Feldman
A few things you might want to ask yourself before you pack in the day job to build your startup.
* Who are my customers?
* What are they buying from me?
* How much will they pay? How much will it cost me to supply them and how many might buy?
* Why will they buy from me and not someone else?
If you can't answer WWHW in 1 minute perhaps you should re-evaluate your business model.
Is Volunteered Geographic Information sustainable?
What is a sustainable map?
Why do people contribute to open projects and in particular OpenStreetMap?
How can OSM build and sustain its community?
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
8. “… Brightkite is a location-based social network. In real time you can see where your friends are and what they’re up to. Depending on your privacy settings you can also meet others nearby.…” weaverluke .com
9. “… Rummble is a location based social search and discovery tool, enabling users find recommended content for a location more easily, without a traditional keyword search. Instead, Rummble’s algorithm provides personalized results based upon a trust profile it builds for you and the content in your social network …” weaverluke .com
10. “… Dopplr is an online service for frequent travelers. It lets you share your future travel plans with a group of trusted fellow travelers that you have chosen. It also reminds you of friends and colleagues who live in the cities you’re planning to visit. You can use the service with your personal computer and mobile phone…” weaverluke .com
The thinking behind this talk started when I read a report by ABI Research predicting LBMSN would be a $3.2m market by 2013. Notwithstanding my doubts about the accuracy of the prediction, I was stunned at the potential that they saw and I wanted to find a bit of that opportunity. Credit Luke Razzell for the images and a share of the ideas