How The Love of Music has changed our Business WorldThorsten Faltings
Over the last decade, there was a Giant Refresh in the Business World:
- Many destroyed value chains,
- Business Innovation everywhere,
- Various new markets with new leaders,
- Empowered & emancipated Consumers.
This is the story about how the love of music laid the Foundation for many Innovations in the past 12 years, turning the Business World upside down.
A presentation by SUI GENERIS GROUP
ATTY. ALDER K. DELLORO
MR. LUDOVICO K. DELLORO
ATTY. ANTON CARLO E. ESPINO
MS. AUREN GALANG
MR. CARLO MARTIN
MS. MARIA THERESA MIJARES
MR. ALBERT ONG
REP. WILLIAM IRWIN TIENG
How The Love of Music has changed our Business WorldThorsten Faltings
Over the last decade, there was a Giant Refresh in the Business World:
- Many destroyed value chains,
- Business Innovation everywhere,
- Various new markets with new leaders,
- Empowered & emancipated Consumers.
This is the story about how the love of music laid the Foundation for many Innovations in the past 12 years, turning the Business World upside down.
A presentation by SUI GENERIS GROUP
ATTY. ALDER K. DELLORO
MR. LUDOVICO K. DELLORO
ATTY. ANTON CARLO E. ESPINO
MS. AUREN GALANG
MR. CARLO MARTIN
MS. MARIA THERESA MIJARES
MR. ALBERT ONG
REP. WILLIAM IRWIN TIENG
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...editor1knowledgecuddle
The last few years has been recorded an uncontrollable increase in music distribution over the Internet. This phenomenon is common in many countries and therefore involves many issues such as: Methods for distribution, music production organization, copyright issues, file and media formatting at the final stage for the audiovisual products to be circulated. The revolution in music prototyping (especially the MP3 music format and the MPEG-4 combined audio-video type for archiving) urged many people to turn to the Internet for free and easy-to-find music. Music files can be downloaded easily from the Internet anywhere in the world and be burned into a CD or DVD or transferred to a friend via USB sticks. Music is also widely available as streams in Internet through various services such as MySpace, YouTube and iTunes. Internet also is full of questions on what is legal and what is not, because the phenomenon of massive file exchange is hard to supervise and the laws valid in assorted countries diverge. Mathematical modelling of illegal distribution can be used for providing forensic services in an attempt to distinguish facts from speculation, evidence from erosive communication and trafficking. The technical, social, financial and legal parameters of this battlefield are examined in this paper under the prism of networked economies.
Block 3.2: Connectivities built by memory modalities.
Sandra Trostel (Independent filmmaker, digital storyteller):
Documentary film as a freely available cultural asset – a case study on the project “All creatures welcome”.
presentation given at South Tyrol Free Software Conference on November 18, 2011. It explores how the new world of abundance creates and requires new kinds of open, digital innovation. It also looks at some of the possible business models for companies based around open data.
Presentation by John Blossom, Shore Communications, at Smart Content: The Content Analytics Conference, October 19, 2010, http://smartcontentconference.com
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...editor1knowledgecuddle
The last few years has been recorded an uncontrollable increase in music distribution over the Internet. This phenomenon is common in many countries and therefore involves many issues such as: Methods for distribution, music production organization, copyright issues, file and media formatting at the final stage for the audiovisual products to be circulated. The revolution in music prototyping (especially the MP3 music format and the MPEG-4 combined audio-video type for archiving) urged many people to turn to the Internet for free and easy-to-find music. Music files can be downloaded easily from the Internet anywhere in the world and be burned into a CD or DVD or transferred to a friend via USB sticks. Music is also widely available as streams in Internet through various services such as MySpace, YouTube and iTunes. Internet also is full of questions on what is legal and what is not, because the phenomenon of massive file exchange is hard to supervise and the laws valid in assorted countries diverge. Mathematical modelling of illegal distribution can be used for providing forensic services in an attempt to distinguish facts from speculation, evidence from erosive communication and trafficking. The technical, social, financial and legal parameters of this battlefield are examined in this paper under the prism of networked economies.
Block 3.2: Connectivities built by memory modalities.
Sandra Trostel (Independent filmmaker, digital storyteller):
Documentary film as a freely available cultural asset – a case study on the project “All creatures welcome”.
presentation given at South Tyrol Free Software Conference on November 18, 2011. It explores how the new world of abundance creates and requires new kinds of open, digital innovation. It also looks at some of the possible business models for companies based around open data.
Presentation by John Blossom, Shore Communications, at Smart Content: The Content Analytics Conference, October 19, 2010, http://smartcontentconference.com
I think SEM campaigns have an incredible importance for the advertising agencies. In this document I briefly explain how I would approach a SEM campaign for the last advertising agency I worked in: McCann Erickson Spain.
Over two billion people signed up for Facebook. This site the most used site for people when using the Internet. People are not watching TV so much anymore - they using Facebook, Youtube and Netflix and number of popular web sites.
Some people denote their time working for others online. What drives people to write an article on Wikipedia? They don´t get paid. Companies are enlisting people to help with innovations and sites such as Galaxy Zoo ask people to help identifying images. And why do people have to film themselves singing when they cannot sing and post the video on Youtube?
In this lecture we talk about how people are using the web to interact in new ways, and doing stuff.
Find a publicly-traded company (Microsoft) using a financial infor.docxvoversbyobersby
Find a publicly-traded company (Microsoft) using a financial information website. For The Following Company :
Microsoft
Watch the Industry Averages and Financial Ratios video and use the industry classification from the financial services website to locate the company's SIC code on the U.S. Department of Labor's website.
Find the industry ratios for the company using the Dun & Bradstreet® Key Business Ratios link in the Week 2 Electronic Reserve Readings. If your company's SIC code does not appear in the dropdown menu, choose another company.
Calculate the following ratios for the company using the two most recent annual financial statements found on the financial information website you used earlier. Be careful not to use quarterly information, and include ratios for both years.
· Current Ratio
· Quick Ratio
· Collection Period
· Return on Equity (~Net Worth)
Observe the year to year ( 2 years ) trend for each ratio and what it tells you about the organization's financial health.
Compare the ratios for the company you selected with the appropriate industry ratios shown on the Dun & Bradstreet® report.
Write a 1,050-1,400 word response about how the company you selected performed year to year and versus the industry based on what the ratios indicate. Show your calculations for the ratios and attach copies of the financial statements used as an exhibit.
Case4
Read the case on page 183 entitled The Digital Music Distribution Revolution.
The Digital Music DistributionRevolution1
Fraunhofer and MP3 In 1991, Fraunhofer IIS of Germany developed an algorithm that would set in motion a revolution in how music was distributed, stored, and consumed. The algorithm ( commonly referred to as a codec) allowed compression of digital audio to approx-imately one- tenth of its original size with minimal compromise in audible quality. The format also enabled song information such as the song title and artist to be embedded within the file. This format for compressed audio files was later dubbed MPEG- 1 layer 3— a. k. a. MP3. By 1995, software programs were available that enabled consumers to convert tracks from compact discs to MP3 files. This tech-nology transformed how music could be manipulated— a song was now a file that could be kept on a hard drive, and the file was small enough to be shared over the Internet. The MP3 format became wildly popular by users sharing their music online, and software companies began releasing many variants of MP3 encoders ( utilities that compress files into MP3s) and decoders ( utilities that play back MP3s). Hardware manufacturers decided to capitalize on this new trend and several hardware MP3 players began appearing on the market.
With the growing popularity of the file format, Fraunhofer was faced with a dilemma— should it enforce its patent on the use of the MP3 algorithm and attempt to collect royalties for its use, or should it allow users and software/ hardware man-ufacturers to make free use of the alg ...
Charla sobre la Gestión de la Reputación Online en la RSCElena Ibáñez
Charla impartida en el Club de Excelencia en Sostenibilidad sobre la importancia de la reputación online en las estrategias de comunicación de las empresas.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
2. Introduction (I): what is a Virtual Community - A virtual community is a population of individuals with shared or complementary interests who interact across a host platform. - Not all social media, user-generated content or Web 2.0 initiatives are virtual communities - The key defining feature of a virtual community is the presence of collective feedback in which both contribution and use are open
3. Introduction (II): which types of Virtual Communities can we find?1) Socializing –Facebook, Second Life 2) Gaming–Everquest, Full Tilt Poker 3) Knowledge Sharing –Wikipedia, Slashdot, SMC… 4) Activism–MoveOn, ImmigrationVoice5) Development–Linux, InnovationJam6) Exchange–eBay, Craigslist7) Content Sharing – NAPSTER!!
4. Description: what is Napster (I)?Napster was an online music file sharing service created by Shawn Fanning while he was attending Northeastern University in Boston and operating between June 1999 and July 2001. Its technology allowed people to easily share their MP3 files among each other, bypassing the established market for such songs and thus leading to the music industry's accusations of massive copyright violations. Aggregating more than 10 million users in the first six month period and attaining a growth rate of 200,000 new subscribers in a single day, the online music file sharing service Napster.com became the noisy centre of a new social reality that struck terror into even the most sturdy of music entertainment executives.
5. What is Napster (II)?Although the original service was shut down by court order, it paved the way for decentralized peer-to-peer file-distribution programs, which have been much harder to control. The service was named Napster after Fanning's hairstyle-based nickname.Napster's brand and logo were purchased after the company closed its doors and continue to be used by a pay service.
6. Motivation to contributing to Napster (I):- IDEOLOGICAL: for many the creative and cultural possibilities had previously been corrupted by the corporate entertainment industry. As a contrast, Napster would have presented an escape from the masses and a return to individuality.- TECHNOLOGICAL EASINESS: Napster had a type of software combining the convergence of mp3 music files with an Internet relay chat feature and an informational website. Coordinated by a couple of central server computers, they enabled not only community, but also free access to and download of up to 100 million copyrighted songs archived on the private hard drives of up to 100 million subscribers worldwide.
7. Motivation to contributing to Napster (II):- COMMUNITY BELONGING: To oppose market place logics that usually drive acquisition of music as a commodity, Napster was constructed around the circulation of music as a gift. Gift giving becomes a distinctive mode of communication and helped to build Napster as an alternative space of choice.
8. Barriers to contributing to Napster:- ETHICS: Holbrook’s (1999) typology of consumer value posits that ethics (including justice, virtue and morality) is one of eight values that may be obtained in the consumption experience. It appeared to be a legal activity but it infringed the copyright.- UNCONVINIENCE: software download necessary and some minimal technological steps.- SECURITY: method based on the free access of the personal computers within the community and could identify the IP. - FINANCIAL: not agreeing with an evolved paying model.
9. Typical life cycle of a community member* 1. Peripheral (Lurker) – An outside, unstructured participation 2. Inbound (Novice) – Newcomer is invested in the community and heading towards full participation 3. Insider (Regular) – Full committed community participant 4. Boundary (Leader) – A leader, sustains membership participation and brokers interactions 5. Outbound (Elder) – Process of leaving the community due to new relationships, new positions, new outlooks. In this case also due to new paying model. * Wikipedia
10. How the virtual circle worked for that community reaching the tipping point?Following Napster founder Shawn Fanning the motivation to start Napster’s system of gift circulation and multiplication was rooted in frustration not only with MP3.com, Lycos, or Scour.net, but also to create a music community. There was really nothing like it at the timeNapster consumers circulated the gift and, in doing so, they seek to consume music in ideological opposition to the well established principles of a functionally differentiated system of modern music production and consumption in the triangle of commodification, copyright and corporations and against the ongoing de-sacrilization of music into the profane sphere of capitalist markets throughout the past 130 years. Napster, by contrast, understood itself as a locus of communally enacted social change and the fostering the regaining of social freedom.
11. Epilogue:"What record companies don't really understand is that Napster is just one illustration of the growing frustration over how much the record companies control what music people get to hear, over how the air waves, record labels and record stores, which are now all part of this 'system' that recording companies have pretty much succeeded in establishing, are becoming increasingly dominated by musical "products" to the detriment of real music. Why should the record company have such control over how he, the music lover, wants to experience the music? From the point of view of the real music lover, what's currently going on can only be viewed as an exciting new development in the history of music. And, fortunately for him, there does not seem to be anything the old record companies can do about preventing this evolution from happening"The Artist Formally Known As Prince 2000