David Black, Associate Professor in the School of Communication and Culture at Royal Roads University, presented these slides as part of the Cybera Summit 2010 session "Techno-skeptics: A Critique of the Role of Technology in Western Society". For more information, visit http://www.cybera.ca/techno-skeptics-critique-role-technology-western-society
Overview of technological determinism and technological inevitablism. Analysis of implications in four key areas; environment, nuclear weapons, artificial intelligence, poverty.
This lecture looks at Determinism and Technological Determinism. This lecture is part of the Media and Cultural Theories module on the MSc and MA in Creative Technology and Creative Games at The University of Salford.
Lecture slides on McLuhan lecture for ARIN2600 Technocultures at the University of Sydney. This explores McLuhan's probing approach to media, which positions technology as an extension of human faculties. By implication, changes in media / technology change what it is to be human. McLuhan remains a controversial, but influential figure in media and new media studies.
Overview of technological determinism and technological inevitablism. Analysis of implications in four key areas; environment, nuclear weapons, artificial intelligence, poverty.
This lecture looks at Determinism and Technological Determinism. This lecture is part of the Media and Cultural Theories module on the MSc and MA in Creative Technology and Creative Games at The University of Salford.
Lecture slides on McLuhan lecture for ARIN2600 Technocultures at the University of Sydney. This explores McLuhan's probing approach to media, which positions technology as an extension of human faculties. By implication, changes in media / technology change what it is to be human. McLuhan remains a controversial, but influential figure in media and new media studies.
Understanding Culture
Culture & Communication, Classical Dominant Approaches of Communication & Culture
Imperialism, Which Motives Caused Imperialism, Cultural Imperialism, Media & Cultural Imperialism, Two Models of Cultural Imperialism, Contributions to Cultural Imperialism, Defense of Cultural Imperialism by Response Theorists, Post Structuralism Approach of Cultural Imperialism, Theory of Globalization, Critics of U.S Cultural Imperialism Revised Their Earlier Reproaches (World System Theory), New Face of Imperialism, The Media Monopoly by Ben Bagdikian , Cultural Imperialism in Pakistan by Abid Zafar
In an age of high tech, our experience of technology has changed tremendously, yet the definition of technology has remained largely unquestioned. High Technē redresses this gap in thinking about technology, examining the shifting relations of technology, art, and culture from the beginnings of modernity to contemporary technocultures.
Drawing on the Greek root of technology, (techne, generally translated as “art, skill, or craft”), R. L. Rutsky challenges both the modernist notion of technology as an instrument or tool and the conventional idea of a noninstrumental aesthetics. Today, technology and aesthetics have again begun to come together: even basketball shoes are said to exhibit a “high-tech style” and the most advanced technology is called “state of the art.” Rutsky charts the history and vicissitudes of this new high-tech techne up to our day—from Fritz Lang to Octavia Butler, Thomas Edison to Japanese Anime, constructivism to cyberspace.
Progressing from the major art movements of modernism to contemporary science fiction and cultural theory, Rutsky provides clear and compelling evidence of a shift in the cultural conceptions of technology and art and demonstrates the centrality of technology to modernism and postmodernism.
Cyber Summit 2016: Technology, Education, and DemocracyCybera Inc.
What are the opportunities and the challenges offered by emerging modes of technologically-inflected communication and decision-making? What is our role and responsibility as educators and as developers of research and teaching digital infrastructures? What do students need in the 21st century? As education institutions and providers struggle to respond to the first two questions, are we abrogating our responsibility to the last?
In this talk, Matt Ratto will describe some of the opportunities and the challenges we currently face, laying out a model of action for how to potentially address the questions raised above. Core to his thinking are two related points; first that we must help students develop a greater sense of how the informational world and its attendant infrastructures helps shape how and what we think, and second, that a good way to do this is to give students the space to engage in reflexive acts of technological production – what Matt has termed ‘critical making.’ He will provide concrete examples from both his research and his teaching that demonstrate the value and importance of reflexive, hands-on work with digital technologies in helping students develop the critical digital literacy skills they need to function in today’s society.
Matt Ratto is an Associate Professor in the Faculty of Information at the University of Toronto and directs the Semaphore Research cluster on Inclusive Design, Mobile and Pervasive Computing and, as part of Semaphore, the Critical Making lab.
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCybera Inc.
There is a prevailing belief that users are the weakest link the security chain. In this presentation, Dr. Chiasson discusses how this perspective is inherently counterproductive to achieving increased cyber security and explore alternatives with a higher chance of improving security. Why do users behave insecurely even though most will readily state that security and privacy are important? This talk will cover some of our recent research exploring reasons why users' actions do not necessarily reflect their desire for security and how the configuration of security systems may actually weaken security in practice. She presents her work using eye-tracking to determine how users make phishing determinations, and how we can persuade users to behave more securely through improving their mental models of passwords and by making adjustments to the system configurations.
More Related Content
Similar to Making Peace with the Machine: The Case for Technological Realism - David Black, Royal Roads University
Understanding Culture
Culture & Communication, Classical Dominant Approaches of Communication & Culture
Imperialism, Which Motives Caused Imperialism, Cultural Imperialism, Media & Cultural Imperialism, Two Models of Cultural Imperialism, Contributions to Cultural Imperialism, Defense of Cultural Imperialism by Response Theorists, Post Structuralism Approach of Cultural Imperialism, Theory of Globalization, Critics of U.S Cultural Imperialism Revised Their Earlier Reproaches (World System Theory), New Face of Imperialism, The Media Monopoly by Ben Bagdikian , Cultural Imperialism in Pakistan by Abid Zafar
In an age of high tech, our experience of technology has changed tremendously, yet the definition of technology has remained largely unquestioned. High Technē redresses this gap in thinking about technology, examining the shifting relations of technology, art, and culture from the beginnings of modernity to contemporary technocultures.
Drawing on the Greek root of technology, (techne, generally translated as “art, skill, or craft”), R. L. Rutsky challenges both the modernist notion of technology as an instrument or tool and the conventional idea of a noninstrumental aesthetics. Today, technology and aesthetics have again begun to come together: even basketball shoes are said to exhibit a “high-tech style” and the most advanced technology is called “state of the art.” Rutsky charts the history and vicissitudes of this new high-tech techne up to our day—from Fritz Lang to Octavia Butler, Thomas Edison to Japanese Anime, constructivism to cyberspace.
Progressing from the major art movements of modernism to contemporary science fiction and cultural theory, Rutsky provides clear and compelling evidence of a shift in the cultural conceptions of technology and art and demonstrates the centrality of technology to modernism and postmodernism.
Cyber Summit 2016: Technology, Education, and DemocracyCybera Inc.
What are the opportunities and the challenges offered by emerging modes of technologically-inflected communication and decision-making? What is our role and responsibility as educators and as developers of research and teaching digital infrastructures? What do students need in the 21st century? As education institutions and providers struggle to respond to the first two questions, are we abrogating our responsibility to the last?
In this talk, Matt Ratto will describe some of the opportunities and the challenges we currently face, laying out a model of action for how to potentially address the questions raised above. Core to his thinking are two related points; first that we must help students develop a greater sense of how the informational world and its attendant infrastructures helps shape how and what we think, and second, that a good way to do this is to give students the space to engage in reflexive acts of technological production – what Matt has termed ‘critical making.’ He will provide concrete examples from both his research and his teaching that demonstrate the value and importance of reflexive, hands-on work with digital technologies in helping students develop the critical digital literacy skills they need to function in today’s society.
Matt Ratto is an Associate Professor in the Faculty of Information at the University of Toronto and directs the Semaphore Research cluster on Inclusive Design, Mobile and Pervasive Computing and, as part of Semaphore, the Critical Making lab.
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCybera Inc.
There is a prevailing belief that users are the weakest link the security chain. In this presentation, Dr. Chiasson discusses how this perspective is inherently counterproductive to achieving increased cyber security and explore alternatives with a higher chance of improving security. Why do users behave insecurely even though most will readily state that security and privacy are important? This talk will cover some of our recent research exploring reasons why users' actions do not necessarily reflect their desire for security and how the configuration of security systems may actually weaken security in practice. She presents her work using eye-tracking to determine how users make phishing determinations, and how we can persuade users to behave more securely through improving their mental models of passwords and by making adjustments to the system configurations.
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCybera Inc.
Serious threats to private and governmental organizations do not only come from the outside world, but also come from within. Some employees and contractors with legitimate access to buildings, networks, assets and information deliberately misuse their priviledged access to cause harm to their organization. What are the reasons behind their actions? Is it debts, greed, ideology, disgruntlement, or divided loyalty?
Regardless of their motivations or vulnerabilities, traitors have very similar types of personality and display a certain pattern of behaviours before committing an insider incident. As a prevention measure, it is vital that organizations and employees understand, recognize and detect the common indicators of insider threat. Would you recognize the signs?
Mario Vachon is an Insider Threat Security Specialist with the RCMP Departmental Security Branch.
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCybera Inc.
Canada allocates a substantial amount of public funding to research, which is a critical factor in ensuring we remain innovative and competitive. Increasingly this funding is geared to the support and development of digital research infrastructure (DRI), including the underlying networks and the associated data acquisition, storage, analysis and visualization. In order to maximize the benefits of increasingly complex DRI and the research it facilitates, it is important to make sure data is properly stewarded, accessible and reusable. By adopting appropriate approaches to research data management we are better positioned to respond to challenges, such as effectively measuring research impacts, and ensuring the reproducibility, privacy, and security of research outputs.
Research Data Canada (RDC) is a member-driven organization committed to developing a sustainable approach to research data management, one based on interoperability and best practices. This session will provide an update on the efforts of RDC and partner organizations, including: CANARIE, Compute Canada, CARL Portage Network, CASRAI, the TriAgencies, and the Leadership Council for Digital Infrastructure. Intersections with international activities and projects will also be highlighted. These efforts are ultimately designed to faciliate a cohesive national approach to research data management, and one based on a clearly articulated vision for supporting innovation and discovery in Canada.
Mark Leggott is the Executive Director of Research Data Canada.
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCybera Inc.
The Internet has revolutionized how — and how much — each of us can know. Our digital tools put the knowledge of the world at our fingertips — and soon, maybe, right into our heads. But what kinds of of knowledge do our devices give us, and how are they reshaping and challenging the role that education and libraries should play in our lives?
This talk was delivered by Michael Patrick Lynch, professor of philosophy at the University of Connecticut, where he directs the university’s Humanities Institute.
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
Although there is no well-established definition of big data, its main characteristic is its sheer volume. Large volumes of data are generated by people (e.g., via social media) and by technology, including sensors (e.g., cameras, microphones), trackers (e.g., RFID tags, web surfing behavior) and other devices (e.g., mobile phones, wearables for self-surveillance/quantified self), whether or not they are connected to the Internet of Things. However, the large volumes of data needed to capitalize on the benefits of big data can to some extent also be established by the reuse of existing data, a source that is sometimes overlooked.
Data can be reused for purposes similar to that for which it was initially collected, but also beyond these purposes. Similarly, data can be reused in its original context, but also beyond this context. However, such repurposing and recontextualizing of data may lead to privacy issues. For instance, data reuse may lead to issues regarding informed consent and informational self-determination. When the data is used for profiling and other types of predictive analytics, also issues regarding stigmatization and discrimination may arise. This presentation by Bart Custers, Head of Research, eLaw – Center for Law and Digital Technologies at Leiden University, The Netherlands, focuses on the privacy issues of big data sharing and reuse and how these issues could be addressed.
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cybera Inc.
Stephen Childs was hired by the University of Calgary to develop an individual-level predictive model mapping students' decisions to attend the University. In his experience, the higher education sector was slow to use all the data it has available, but this is now changing.
As interest in making use of organizational data grows, staff must consider how these models will be used, and any problems that could arise. When individual predictions become the basis for decisions, how do we ensure our algorithms don't make existing problems worse? A framework for handling these issues now will let organizations handle these issues in a way that is consistent with their values.
Given the culture of today's institutions, and the success of predictive analytics in other fields, there is no doubt that these tools will be used. These techniques can improve student success and the competitiveness of educational organizations, but the benefits should not be gained at the expense of individuals within the system. This talk will propose a set of best practices for using institutional data for predictive modelling to address equity, privacy and other concerns. We must start thinking of this now, before other practices become entrenched.
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cybera Inc.
Canada’s National Research and Education Network, like other ultra-speed research networks, has evolved to transfer massive amounts of data at 100Gbps and beyond. But with the volume of data traffic growing at more than 50% per year, the ability to move increasing volumes of data is challenging. What are the kinds of applications in research and education that are driving this growth? What are the implications of the coming data tsunami on our communication networks? And what happens to network economics to keep up with the demand? CANARIE’s Chief Technology Officer, Mark Wolff, explores these topics and offer insights into how the NREN will evolve to continue to meet the unique needs of Canada’s research and education community.
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing DataCybera Inc.
The City of Calgary is responsible for providing municipal services to 1.1 million people and 16,000 employees with more than 700 sites and critical infrastructure units. The municipal services represent a $60B asset base including water and wastewater treatment plants, light rapid transit, emergency services, roads and recreation facilities, and has revenue and procurement streams of $4.0B annually. During his tenure, Owen Key, Chief Security Officer and the Chief Information Officer for the City, has implemented enterprise systems for CCTV, access and ID control, physical security information management systems, and has responsibility for information security.
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cybera Inc.
The law has long struggled to keep pace with the rapid change that comes with the Internet and new technologies. From the cross-border challenges posed by a global network to the privacy implications of big data, law and policy simply cannot move at “Internet speed.” Yet despite the difficulties, politicians and policy makers increasingly find themselves at the heart of emerging policy issues, asked to address the balance between privacy and surveillance, the competing copyright interests of creators and users, and the market structure for network providers and disruptive competitors. This keynote talk will explore the emerging law and policy challenges, highlighting how all Internet users have the opportunity to help shape the digital policy landscape. Dr. Michael Geist is a law professor at the University of Ottawa where he holds the Canada Research Chair in Internet and E-commerce Law.
As institutions start to delve into the staff / student / consumer data they have been storing for years, new questions are emerging about the repercussions of using this data. How will it be analyzed? Who is doing the analysis? And what steps should be taken to protect user’s privacy?
Historically, the University of Alberta lacked a centrally managed repository for reporting data, resulting in inconsistency and disparity in access for units across campus. Meaningful and actionable reports were limited, and only focused on the interests and goals of the few units with data analysts who could synthesize the information.
Over the last couple of years, the University of Alberta has undertaken major changes in how information is managed and utilized. At the forefront of this change has been an increased interest in supporting the development of analytics and supporting tools. Beginning with the implementation of a centrally managed data warehouse with self-service capabilities, and the introduction of cloud services with business process analysis tools, the University is just starting down the road of big data.
This presentation explores opportunities and challenges for the University of Alberta in utilizing big data.
Predicting the Future With Microsoft BingCybera Inc.
The next generation of data scientists will be asked to build predictive models that can extract inferences from very large datasets which are unobservable at the surface, even to the best domain experts. Microsoft has access to some truly large data sets, web and search data from the Bing search engine and social data through collaborations with Twitter. In this talk, we show you how a small team of data scientists used this data to build the Bing Predicts engine — a collection of machine learnt predictive models that is beating industry experts at predicting the outcome of events like the Super Bowl, the Oscars, elections and referendums and even breakthroughs in health sciences. The talk will also give a preview of how organizations can adopt a big data mindset to generate and experiment with large data sets and to make amazing predictions using their own data.
Analytics 101: How to not fail at analyticsCybera Inc.
"Data Scientist" is perhaps the hottest job title of recent years. But what is a data scientist? What does a data scientist actually do? And where can they be found? In this talk, presenter Daniel Haight describes the benefits of analytics to decision-making, and explores the characteristics of successful organizations that have fostered their own team of data scientists.
The MOOC movement is only four years old, but has already had a tremendous impact on teaching and learning. While the some of the original hype surrounding MOOCs has not been realized, the reality is that they are here for good and are influencing institutional thinking. This talk will discuss the past, present and future of MOOCs.
While the use of online instructional technologies allows the presentation of theoretical science materials, how do we deal with the fact that such courses often include hands-on labs? Laboratory simulations can only provide a solution for online students in a limited and often artificial way. Nearly 20 years ago, Athabasca University developed a solution to the problem of students having to travel to complete their lab work. Emerging technologies at the time allowed for quantitative physics labs to be sent to students as a small kit. The physics initiative was so successful, with over 5,000 students served, that it was picked up in other fields at Athabasca University.
Over the years, such material has become cheaper, easier to use, and more integrated with modern computers. Athabasca is now pioneering ways to put real labs directly onto the internet. In this session, the methods used to make real lab experiences available to online students will be discussed, and some of them demonstrated.
Canadian municipalities are making great strides when it comes to sharing their data in fun, interactive ways. In this session, presenters will look at cities that are using their data to create useful apps and services for citizens; and describe how all community leaders can get involved to make their municipality more open and accessible.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges. This session will offer insights into best practices for healthcare analytics programs, as well as use cases that demonstrate the potential benefits that can be realized through this work.
Checking in on Healthcare Data AnalyticsCybera Inc.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges.
Open access and open data: international trends and strategic contextCybera Inc.
Governments around the world fund billions of dollars in research every year. Ensuring that the results of research are available to the public, other researchers and industry has become an important underlying value in order to maximize the impact of our publicly funded research. This session will discuss what’s driving the trend towards greater openness and provide an overview of international developments that will help put Canada’s activities into context.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Making Peace with the Machine: The Case for Technological Realism - David Black, Royal Roads University
1. Cybera
2010
Making
Peace
with
the
Machine:
The
case
for
technological
realism
September
22,
2010
2. Technological
realism:
• Technological
realism
is
a
posi=on
that
recognizes
that
we
cannot
un-‐ the
middle
range
view
invent
technology
or
erase
the
values
in
Western
culture
that
have
made
it
so
technologically
innova=ve
• But
it
recognizes
that,
in
the
name
of
realism,
that
we
cannot
benefit
by
either
uncri=cally
embracing
or
rejec=ng
technology
• We
have
to
be
as
smart
as
the
technologies
we
create,
but
we
need
to
define
that
intelligence
in
poli=cal,
cultural
and
ethical
terms,
not
just
in
our
ingenuity
in
crea=ng
and
marke=ng
new
technologies
Richard
Feynman
• Technological
realism
is
a
body
of
wri=ng
about
technology
highly
sensi=ve
to
the
poli=cal,
cultural
and
ethical
nature
of
technology
3. Technological
realism:
the
middle-‐range
view
“As
technorealists,
we
seek
to
expand
the
fer=le
middle
ground
between
techno-‐utopianism
and
neo-‐Luddism.
We
are
technology
‘cri=cs’
in
the
same
way,
and
for
the
same
reasons,
that
others
are
food
cri=cs,
art
cri=cs,
or
literary
cri=cs.
We
can
be
passionately
op=mis=c
about
some
technologies,
skep=cal
and
disdainful
of
others.
S=ll,
our
goal
is
neither
to
champion
nor
dismiss
technology,
but
rather
to
understand
it
and
apply
it
in
a
manner
more
consistent
with
basic
human
values.”
From
Technological
Realism
website
4. Technological
realism:
major
principles
Technologies
are
not
neutral.
The
Internet
is
revolu=onary,
but
not
Utopian.
Informa=on
is
not
knowledge.
Understanding
technology
should
be
an
essen=al
component
of
ci=zenship.
Governments
and
markets
both
have
a
role
in
the
development
and
management
of
technology.
5. Exhibit
#1:
• Mumford
was
an
American
historian
of
Lewis
Mumford
science,
architecture,
and
technology,
and
wrote
on
literature
and
current
affairs
• Mumford
had
a
remarkable
intellectual
range,
and
is
regarded
as
one
of
the
best
minds
in
the
20th
century
• His
major
scholarly
books
rela=ng
to
technology
are:
Technics
and
Civiliza/on
(1934)
The
Myth
of
the
Machine
(1967)
• Long
before
it
was
fashionable,
Mumford
sought
to
balance
the
presence
of
technology
in
our
lives
with
design
principles
taken
from
ecology
Mumford
(1895-‐1990)
6.
“If
we
are
to
prevent
megatechnics
from
further
controlling
and
deforming
every
aspect
of
human
culture,
we
shall
be
able
to
do
so
only
with
the
aid
of
a
radically
different
model
derived
directly,
not
from
machines,
but
from
living
organisms
and
organic
complexes
(ecosystems).”
Mumford,
The
Myth
of
the
Machine
7. Mumford:
against
the
“myth
of
the
machine”
• The
“myth
of
the
machine”
was
Mumford’s
term
for
our
mistaken
belief
that
technology
is
the
factor
that
ul=mately
determines
the
direc=on
of
history
• Insofar
as
we
believe
in
what
technology
cri=cs
call
“technological
determinism,”
we
become
cap=ve
to
its
spell,
and
as
a
result
act
passively
toward
technological
change
• Technology
does
not
have
determining
power
on
its
own,
and
only
exerts
itself
if
we
believe
in
the
myth
of
its
ul=mate
power
• A
strong
and
confident
culture
–
with
its
beliefs,
values,
and
ethics
-‐-‐
is
the
best
means
to
channel
technology’s
energies
in
a
socially
construc=ve
manner
and
deflect
the
myth
of
the
machine
• One
powerful
resource
for
culture
with
which
technology
might
be
shaped
to
humane
purposes
was
ecology,
as
he
saw
in
ecology
and
design
principles
inspired
by
ecology
a
correc=ve
to
raw
technological
forces
• One
form
this
work
has
taken
is
the
pursuit
of
elements
of
what
scholars
call
a
“technoculture”:
elements
or
principles
within
culture
resistant
to
the
myth
of
the
machine,
and
useful
in
adap=ng
it
to
socially
construc=ve
ends
8. Exhibit
#2:
• Daniel
Boors=n
was
a
Pulitzer-‐prize
Daniel
BoorsPn
winning
historian,
a
former
Librarian
of
the
U.S.
Congress,
and
one
of
the
most
widely
read
public
intellectuals
in
20th
century
America
• A
law
professor
by
profession,
he
was
beaer
known
as
a
historian,
and
his
many
books
on
American
history
sold
millions
of
copies
• His
best
known
book
on
technology
is
The
Republic
of
Technology,
published
in
1978
• The
key
idea
that
follows
from
this
book
is
the
“republic
of
technology,”
the
term
Boors=n
gave
to
the
form
in
which
technology
had
reorganized
society
and
Daniel
BoorsPn,
poli=cs
in
the
20th
century
1914-‐2004
9. “Our
Republic
of
Technology
is
not
only
more
democra=c
but
also
more
in
the
American
mode.
Anyone
can
be
a
ci=zen.
Largely
a
crea=on
of
American
civiliza=on
in
the
last
century,
this
republic
offers
a
foretaste
of
American
life
in
our
next
century.
It
is
open
to
all,
because
it
is
a
community
of
shared
experience.”
BoorsPn
The
Republic
of
Technology
10. BoorsPn:
toward
a
republic
of
technology
• The
rela=ve
freedom
in
American
and,
by
extension,
Western
culture,
has
acted
to
historically
free
up
the
crea=ve
energy
and
entrepreneurialism
necessary
to
technological
innova=on
• This
same
talent
for
innova=on,
ironically,
also
leads
to
a
loss
of
the
freedom
and
diversity
that
characterized
life
in
the
West
• That
is
because
as
technology
becomes
more
powerful
in
American
(or
any
other)
society,
it
threatens
the
very
culture
of
innova=on
from
which
it
originally
sprung
• Technology,
ini=ally
a
spur
to
growth
and
ingenuity,
becomes
a
force
for
social
control,
excessive
cultural
accelera=on,
and
homogeniza=on
• That
is
because
technology,
when
it
is
unconstrained,
leads
to
two
nega=ve
outcomes
that
threaten
to
destroy
the
culture
of
innova=on:
Obsolescence:
With
the
advent
of
a
highly
technological
modern
world,
technology
has
changed
the
texture
of
life,
speeding
up
reality
remarkably
and
rendering
old
values,
paaerns,
and
technologies
obsolete
Convergence:
Technology
has
a
tendency
to
homogenize
experience
and
assimilate
reality
to
itself
11. Exhibit
#3:
Langdon
Winner
• Winner
is
a
professor
of
technology
studies
at
Rensselaer
Polytechnic
Ins=tute
in
New
York
state
• He
is
the
author
of
several
books
on
technology,
including:
Autonomous
Technology
The
Whale
and
the
Reactor:
A
Search
for
Limits
in
an
Age
of
High
Technology
• A
former
rock
cri=c,
he
was
a
contribu=ng
editor
at
Rolling
Stone
in
the
late
1960s
and
early
1970s
• He
is
especially
interested
in
how
technology
and
our
poli=cal
systems
relate
12. Exhibit
#3:
Langdon
Winner
“While
it
is
widely
admiaed
that
the
structure
and
processes
of
technology
now
cons=tute
an
important
part
of
the
human
world,
the
request
that
this
be
opened
up
for
poli=cal
discussion
is
s=ll
somehow
seen
as
an
aaempt
to
foul
the
nest.”
Langdon
Winner
Autonomous
Technology
13. Winner:
learning
from
Frankenstein’s
monster
• We
are
vulnerable
as
a
society
to
what
Winner
calls
our
“technological
somnambulism,”
i.e.,
our
semi-‐conscious,
sleep-‐walking
agtude
toward
technology
• That
is,
once
we
release
technologies
into
the
world,
we
then
promptly
forget
our
responsibility
to
them
• He
means
here
our
responsibility
to
manage
them,
to
ensure
that
we
have
the
poli=cal
and
cultural
means
to
debate
and
manage
them,
e.g.,
cellphones
and
the
lack
of
e=queae
• In
this,
we
repeat
the
mistake
made
by
Dr.
Frankenstein
in
the
original
1812
novel
of
the
same
name
wriaen
by
Mary
Shelley
• In
the
movies
–
usually
starring
Boris
Karloff
–
the
monster
is
usually
seen
as
the
villain,
and
there
is
a
general
theme
of
technology
“run
amok”
reliably
expressed
there
• But
in
the
original
novel,
the
villain
is
Dr.
Frankenstein
–
the
monster
is
unnamed
–
who
upon
the
minute
the
monster
comes
to
life,
runs
off
to
Geneva
and
leaves
his
creature
alone
• For
Winner,
the
fact
that
we
make
the
monster
a
villain
in
the
movies
reflects
how
we
as
a
society
avoid
the
ques=ons
of
our
remarkable
neglect
to
think
through
what
a
technology
does
and
how
it
changes
us
14. • Donna
Haraway
is
a
social
cri=c
at
the
Exhibit
#4:
University
of
Santa
Cruz
in
California
Donna
Haraway
• Among
her
major
books
are
included:
Primate
Visions:
Race
and
Nature
in
the
World
of
Modern
Science
Simians,
Cyborgs
and
Women:
The
Reinven/on
of
Nature
The
Companion
Species
Manifesto:
Dogs,
People,
and
Significant
Otherness
• She
is
famous
for
a
1991
essay
she
wrote
called
“A
Cyborg
Manifesto”
in
which
she
documents
the
terms
in
which
all
human
beings
can
be
considered,
in
a
technological
environment
in
which
we
are
immersed
and
on
which
we
are
dependent,
cyborgs
• She
doesn’t
mean
this
cyborg
iden=ty
on
a
merely
metaphorical
basis,
but
sees
it
in
more
literal
and
objec=ve
terms
15. “A
cyborg
is
a
cyberne=c
organism,
a
hybrid
of
machine
and
organism,
a
creature
of
social
reality
as
well
as
a
creature
of
fic=on.”
Haraway
A
Cyborg
Manifesto
16. Haraway:
get
to
know
your
inner
cyborg
• Haraway
argues
that
the
cyborg
is
not
a
nega=ve
development
in
society,
but
a
recogni=on
of
significant
changes
to
what
it
means
to
be
human
in
a
world
in
which
we
are
so
in=mate
with
technology
• Cyborgs
are
primarily
important
to
us
because,
as
models
of
21st
century
humanity,
they
signal
the
breakdown
of
fundamental
dis=nc=ons
in
culture
that
were
intact
for
centuries
Machine/human
Culture/nature
Physical/non-‐physical
world
(e.g.,
maaer
and
consciousness)
• Rather
than
lament
the
dehumanizing
effects
of
technology,
cyborgs
see
technology
as
something
that
has
extended
and
evolved
our
humanity
17. Lessons
from
the
technological
realists
Mumford:
• The
best
defense
against
the
“myth
of
the
machine”
is
a
strong
and
confident
technoculture.
BoorsPn:
• Technology
has
to
be
made
compa=ble
with
history
and
with
diversity
in
ideas
and
experience
to
be
con=nuing
value
to
people.
Winner:
• We
have
to
manage
and
debate
the
terms
of
our
rela=onship
with
technologies
before
they
become
en=rely
embedded
in
our
lives.
Haraway:
• Technology
has
forced
a
reinven=on
of
what
we
consider
to
be
our
humanity.
The
cyborg
recognizes
this
fact,
and
gives
us
permission
to
think
about
and
work
with
it,
rather
than
lament
the
loss
of
our
humanity
in
a
technological
world.