DOOH Presentation by OMD for DOOH and DA WebinarIAB Europe
Following their participation in the IAB Europe webinar on DOOH and Digital Audio, OMD have put together a brief presentation taking a deeper look into their DOOH campaign for HP.
Information Day, Sept 2021
Europe begins to reposition itself in the world, by taking on greater responsibility for its own safety and well-being.
The first call for proposals.
DOOH Presentation by OMD for DOOH and DA WebinarIAB Europe
Following their participation in the IAB Europe webinar on DOOH and Digital Audio, OMD have put together a brief presentation taking a deeper look into their DOOH campaign for HP.
Information Day, Sept 2021
Europe begins to reposition itself in the world, by taking on greater responsibility for its own safety and well-being.
The first call for proposals.
TV and digital video continue to collide and nothing represents that more than over-the-top (OTT). As an emerging medium, OTT has its share of challenges and opportunities - but one thing is clear, consumers are increasingly accessing video outside of traditional pay TV models. But how are they viewing OTT? And how are advertisers using it?
Check out The OTT Reality Check slideshow to get a snapshot on the latest trends within space.
Universal media access as proposed almost two decades ago is now reality. We can generate, distribute, share, and consume any media content, anywhere, anytime, and with/on any device. A technical breakthrough was the adaptive streaming over HTTP resulting in the standardization of MPEG-DASH, which is now successfully deployed in a plethora of environments. The next big thing in adaptive media streaming is virtual reality applications and, specifically, omnidirectional (360°) media streaming, which is currently built on top of the existing adaptive streaming ecosystems. This tutorial provides a detailed overview of adaptive streaming of both traditional and omnidirectional media. The tutorial focuses on the basic principles and paradigms for adaptive streaming as well as on already deployed content generation, distribution, and consumption workflows. Additionally, the tutorial provides insights into standards and emerging technologies in the adaptive streaming space. Finally, the tutorial includes the latest approaches for immersive media streaming enabling 6DoF DASH through Point Cloud Compression (PCC) and concludes with open research issues and industry efforts in this domain. More information available at: https://multimediacommunication.blogspot.com/2019/07/acmmm19-tutorial-journey-towards-fully.html
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
How Millennium Management achieves provable security with AWS Zelkova - FSV30...Amazon Web Services
Data exfiltration is a key concern for financial institutions, which often store personally identifiable information, payment card information, and proprietary methods or algorithms. Balancing security and agility in identity and access management (IAM) policies is critical. To achieve this balance, Millennium Management developed a security framework that integrates into CI/CD pipelines. This framework utilizes semantic reasoning, proprietary security evaluations, and AWS Zelkova to achieve provably secure IAM policies pre-deployment in a distributed, multi-account environment. Learn how Millennium combined Zelkova with services such as AWS Step Functions, AWS Lambda, and AWS CodePipeline—for rapid development while mitigating data exfiltration risk.
The Shift from Federated to Decentralized IdentityEvernym
Up until recently, the majority of digital identity systems have been federated, where a small group of “identity providers” supply individuals with a digital identity that can be used to access other websites and services within the federation. Now we’re seeing the shift to decentralized identity solutions and open ecosystems based on verifiable credentials, where anyone can participate, issue, and verify.
In the first of a new series on digital identity and government, we invited leading experts from Accenture and Evernym to discuss the state of digital identity systems within the public sector and the reasons why government interest in decentralized models continues to increase.
We covered:
- The key differences between federated and decentralized identity systems
- An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada)
- What decentralization means for portability, scalability, flexibility, and privacy
- How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
Getting to Know the FIDO Specifications - Technical TutorialFIDO Alliance
What if we could replace passwords with authentication that is stronger and simpler? Web service providers and enterprises worldwide are looking for a solution to move beyond the frustrating user experience and less-than-stellar security of single-factor password authentication systems. Today FIDO is that solution, providing a rich set of specifications and certifications for an emerging and interoperable ecosystem of hardware, mobile and biometrics-based devices. This ecosystem enables enterprises and web service providers to easily deploy strong authentication solutions that reduce password dependencies and provide a superior, simpler and trusted user experience.
- Learn the ins and outs of FIDO’s specifications, including their applicability to both passwordless (UAF) and second factor (U2F) authentication use cases.
- Learn how FIDO separates user verification from authentication along with other details on the FIDO registration and login process.
- Learn how FIDO authentication protects user privacy and prevents phishing and man-in-the-middle attacks.
OpenID for Verifiable Credentials is a family of protocols supporting implementation of applications with Verifiable Credentials, i.e. verifiable credential issuance, credential presentation, and pseudonyms authentication.
TV and digital video continue to collide and nothing represents that more than over-the-top (OTT). As an emerging medium, OTT has its share of challenges and opportunities - but one thing is clear, consumers are increasingly accessing video outside of traditional pay TV models. But how are they viewing OTT? And how are advertisers using it?
Check out The OTT Reality Check slideshow to get a snapshot on the latest trends within space.
Universal media access as proposed almost two decades ago is now reality. We can generate, distribute, share, and consume any media content, anywhere, anytime, and with/on any device. A technical breakthrough was the adaptive streaming over HTTP resulting in the standardization of MPEG-DASH, which is now successfully deployed in a plethora of environments. The next big thing in adaptive media streaming is virtual reality applications and, specifically, omnidirectional (360°) media streaming, which is currently built on top of the existing adaptive streaming ecosystems. This tutorial provides a detailed overview of adaptive streaming of both traditional and omnidirectional media. The tutorial focuses on the basic principles and paradigms for adaptive streaming as well as on already deployed content generation, distribution, and consumption workflows. Additionally, the tutorial provides insights into standards and emerging technologies in the adaptive streaming space. Finally, the tutorial includes the latest approaches for immersive media streaming enabling 6DoF DASH through Point Cloud Compression (PCC) and concludes with open research issues and industry efforts in this domain. More information available at: https://multimediacommunication.blogspot.com/2019/07/acmmm19-tutorial-journey-towards-fully.html
What are decentralized identifiers (DIDs), how do they enable self-sovereign identity, and what does W3C standardization mean for interoperability and adoption?
Evernym's Drummond Reed and Brent Zundel discussed all this and more on our Sep 26, 2019 webinar.
How Millennium Management achieves provable security with AWS Zelkova - FSV30...Amazon Web Services
Data exfiltration is a key concern for financial institutions, which often store personally identifiable information, payment card information, and proprietary methods or algorithms. Balancing security and agility in identity and access management (IAM) policies is critical. To achieve this balance, Millennium Management developed a security framework that integrates into CI/CD pipelines. This framework utilizes semantic reasoning, proprietary security evaluations, and AWS Zelkova to achieve provably secure IAM policies pre-deployment in a distributed, multi-account environment. Learn how Millennium combined Zelkova with services such as AWS Step Functions, AWS Lambda, and AWS CodePipeline—for rapid development while mitigating data exfiltration risk.
The Shift from Federated to Decentralized IdentityEvernym
Up until recently, the majority of digital identity systems have been federated, where a small group of “identity providers” supply individuals with a digital identity that can be used to access other websites and services within the federation. Now we’re seeing the shift to decentralized identity solutions and open ecosystems based on verifiable credentials, where anyone can participate, issue, and verify.
In the first of a new series on digital identity and government, we invited leading experts from Accenture and Evernym to discuss the state of digital identity systems within the public sector and the reasons why government interest in decentralized models continues to increase.
We covered:
- The key differences between federated and decentralized identity systems
- An analysis of a few notable government-led projects, such as Aadhaar (India), Verify (UK), eIDAS (EU), and the Ontario Digital Identity Program (Canada)
- What decentralization means for portability, scalability, flexibility, and privacy
- How governments and commercial organizations can enhance existing federated identity systems with verifiable credentials
Getting to Know the FIDO Specifications - Technical TutorialFIDO Alliance
What if we could replace passwords with authentication that is stronger and simpler? Web service providers and enterprises worldwide are looking for a solution to move beyond the frustrating user experience and less-than-stellar security of single-factor password authentication systems. Today FIDO is that solution, providing a rich set of specifications and certifications for an emerging and interoperable ecosystem of hardware, mobile and biometrics-based devices. This ecosystem enables enterprises and web service providers to easily deploy strong authentication solutions that reduce password dependencies and provide a superior, simpler and trusted user experience.
- Learn the ins and outs of FIDO’s specifications, including their applicability to both passwordless (UAF) and second factor (U2F) authentication use cases.
- Learn how FIDO separates user verification from authentication along with other details on the FIDO registration and login process.
- Learn how FIDO authentication protects user privacy and prevents phishing and man-in-the-middle attacks.
OpenID for Verifiable Credentials is a family of protocols supporting implementation of applications with Verifiable Credentials, i.e. verifiable credential issuance, credential presentation, and pseudonyms authentication.
MovieMania - Movie Quiz was organised by AVS Society, Students' Union 2017, SCB Medical College, Cuttack on 11th March 2017 on the occasion of the Annual Function "Hurricane'17 The Storm of Festivity"
This quiz is based on Indian film industry. It was conducted under QuNITe Premier League QPL 2.0, 2017. QuNITe is the official quiz club of NIT Jamshedpur.
MovieMania - Movie Quiz was organised by AVS Society, Students' Union 2017, SCB Medical College, Cuttack on 11th March 2017 on the occasion of the Annual Function "Hurricane'17 The Storm of Festivity"
2.
1. Who, apart from Aamir Khan, wants to marry Preity
Zinta in Dil Chahta Hai?
a) Shah Rukh Khan b) Ayub Khan
c) Akshay Khanna d) Shaif Ali khan
3.
2. Who plays the blind friend in the 1964 Dosti?
a)Mohan b)Dina
c)Ramu d)Shamu
4.
3. The catch-line 'American dream, Indian
soul' was of the film...?
a) Aa Ab Laut Chalein b) Indian
c)Pardes d)American Desi
5.
4. Singer of Rahat fateh ali khan singing in
which movie song?
a) Virsa
b) Blood Money
c) Teri Meri Khani
d) Burraa.
6.
5.Aishwarya Rai was crowned Miss World in
which year?
a) 1995 b)1992
c) 1993 d)1994
7.
6. Which of these films was Ashutosh
Gowariker's directorial debut?
a)Pehla Nasha b)Swades
c)Afsana Pyaar Ka d)Jung
8.
7. Find the in which bollywood movie video clip?
a)Acid factory b)Thank You c)Knock Out d)D-day
9.
8. Lata Mangeshkar was awarded the Padma
Bhushan in which year?
a)1959 b)1969
c)1979 d)1989
10.
9. Which of these actors has never appeared in television
advertisements?
a)Govinda b)Shah Rukh Khan
c)Anil Kapoor d)Hrithik Roshan
e) Sunny Deol
11.
10.Winner of Jhalak dikhhla jaa
Season 3
a) Sushant Singh Rajput
b) Baichung Bhutia
c) Meiyang Chang
d) Gurmeet Choudhary
12.
11. On which actor was the song 'Chhodo kal ki
baatein' from 'Hum Hindustani' filmed?
a)Sunil Dutt b)Manoj Kumar
c)Sanjeev Kumar d)Dilip Kumar
13.
12. Considering the 20th century, who was the
only actor to win the Best Actor award
successively for three years?
a)Amitabh Bachchan b)Naseeruddin Shah
c)Sanjeev Kumar d)Dilip Kumar
14.
13. Considering the 20th century, which of these
actress won the Best Actress award only once?
a)Hema Malini b)Dimple Kapadia
c)Rekha d)Jaya Bhaduri
15.
14. Find the in which bollywood movie song?
a) Mili b)Kora kagaz c)Samadhi d)Uphaar
16.
15. Which Indian movie gained entry into
Hollywood's Oscar Awards in 2003?
a)Dil Chahta hai b)Devdas
c)The Legend of Bhagatsingh d)Asoka
18.
17. Find the Bollywood actress
name?
a) Apsara Soni
b) Deeksha Seth
c) Shazahn Padamsee
d) Shreya Gupta
19.
18. Who was awarded best actor of the
decade (1990-2000)?
a)Amitabh Bachchan b)Anil Kapoor
c)Sunny Deol d)Shahrukh Khan
20.
19. Who were Gatotkacha's parents?
a)Bheema and Draupadi b)Bheema and Hidimbaa
c)Bheema and Nritya d)None of the above
21.
20. What was the only animated film to
be nominated for Best Picture?
a)Beauty and the Beast b)Finding Nemo
c)Toy Story d)Anastasia
22.
21. Find the Singer ?
a)Raghav Sachar
b)Ankit Tiwari
c) Arijit Singh
d)Mustafa Zahid
23.
23. "Maine Pyaar Kiya", "Hum Aapke Hain Koun", "Hum
Saath Saath Hain" and "Vivaah" were family dramas directed
by Sooraj Barjatya. Which of the following actors or actresses
appeared in all four films?
a)Reema Lagoo b)Himani Shivpuri
c)Salman Khan d)Mohnish Behl
24.
25.Who was the youngest actress
to win an Oscar?
a)Patty Duke b)Tatum O'Neal
c)Anna Paquin d)Shirley Temple
25.
26. Find TV Serial actress
a) Riddhi Dogra
b)Pooja bose
c)Nikita Sharma
d)Sonarika Bhadoria
26.
28. Who was the male lead in the Sharmila
Tagore-Shabana Azmi starrer Doosri Dulhan?
a)Dharmendra b)Sanjeev Kumar
c)Jeetendra d)Victor Banerjee
27.
29.Find the winner of Big boss season 2 ?
b) Monica Bedia)Ashutosh kaushik c) Ketki Dave d) Rahul
Mahajan
28.
30. What is Hrithik Roshan's pet name at
home?
a)Duggu b)Pappu
c)Guddu d)Tommy
29.
31. Winner Of SAREGAMAPA Season 1
a) Bela Shenda
b) Shreya Ghosal
d)Vaishali Mhade
c) Sanjivani
30.
32. Madhuri Dixit's name in N Chandra's
'Tezaab' was...?
a)Mohini b)Madhuri
c)Ritu d)Pooja
31.
33. Find in which, Bollywood movie song?
a) Shortcut Romeo
b) 3G Killer Conection
c)Mere Dad ki Maruti
d) Table No. 21
32.
34. What is the name of Rama's brother who
goes with him into exile?
a)Bharatha b)Dasartha
c)Ravana d)Lakshmana
33.
35. In which name of Hollywood movies?
a) Shadow of the
vampire
b)Abraham Lincoln
Vampire Hunter
c)Vampire Knight d)The vampires of
Venice