This document discusses open standards and open data. It provides background on open data initiatives in the UK from 2006 to 2012. It also discusses the definition and importance of open standards, giving examples of standards used for plug sockets, audio files and Microsoft Office documents. Open standards are defined as standards developed through an open process, published freely and able to be implemented by multiple vendors. The document advocates for open standards and data to ensure interoperability between systems.
Kevin Haley Esq. of Brann and Isaacson explains some of the important issues with changes to the "Safe Harbor" laws in the EU.
What is Safe Harbor?
In early October, in a case involving Facebook, the European Court of Justice invalidated a 15 year old international agreement that permitted US companies to avoid compliance with the letter of European privacy law. Under the so-called “Safe Harbor” at issue in the Facebook case, US companies were permitted to self-certify that they provided a level of protection comparable to that in the EU to personal data stored on their servers located in the US. The ECJ’s ruling at least in part was based on an allegation that US government electronic surveillance-exposed by Edward Snowden-renders personal data housed on US servers unsafe. The rejection of the so-called EU “Safe Harbor” has at least some American companies scrambling to find a way to comply with EU privacy laws. What does this case mean for US catalogers, and more broadly, what are US catalogers doing to comply with the patchwork of international privacy regulations?
Will it matter to your company?
This Pub Talk was a good discussion of this potentially far-reaching topic. While the law is still unfolding there are still plenty of things you can get ahead on right now. Kevin explain what may happen, what it will impact and what you should be doing to make sure you aren't surprised later.
EU Privacy Shield - Understanding the New Framework from TRUSTeTrustArc
Webinar to understand the new EU-US Privacy Shield Framework which replaces the EU-US Safe harbor framework followed by a demo of the TRUSTe EU data privacy transfer assessment.
Visit https://info.truste.com/WB-2016-02-10-Insight-Series-Privacy-Shield_RegPage-On-Demand_Recording.html to view the complete webinar.
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...AltheimPrivacy
Check out this link for the latest version: http://www.slideshare.net/EDiscoveryMap/the-eu-data-protection-reforms-impact-on-cross-border-ediscovery-27629797
The European Commission's proposal for a new General Data Protection Regulation (GDPR), represents the most significant global development in data protection law since Directive 95/46. It will considerably impact cross-border e-discovery in the EU.
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...AltheimPrivacy
This is a new set of slides, adapted after the 10/21/2013 LIBE Committee vote on the proposed amendments to the Regulation. Quite a few of the original GDPR rules have changed so far.
Data Privacy vs. National Security post Safe HarborGayle Gorvett
Recent Developments in Transatlantic Data Privacy regulation including adoption of Privacy Shield, GDPR and increasing requests for data access for National Security
Kevin Haley Esq. of Brann and Isaacson explains some of the important issues with changes to the "Safe Harbor" laws in the EU.
What is Safe Harbor?
In early October, in a case involving Facebook, the European Court of Justice invalidated a 15 year old international agreement that permitted US companies to avoid compliance with the letter of European privacy law. Under the so-called “Safe Harbor” at issue in the Facebook case, US companies were permitted to self-certify that they provided a level of protection comparable to that in the EU to personal data stored on their servers located in the US. The ECJ’s ruling at least in part was based on an allegation that US government electronic surveillance-exposed by Edward Snowden-renders personal data housed on US servers unsafe. The rejection of the so-called EU “Safe Harbor” has at least some American companies scrambling to find a way to comply with EU privacy laws. What does this case mean for US catalogers, and more broadly, what are US catalogers doing to comply with the patchwork of international privacy regulations?
Will it matter to your company?
This Pub Talk was a good discussion of this potentially far-reaching topic. While the law is still unfolding there are still plenty of things you can get ahead on right now. Kevin explain what may happen, what it will impact and what you should be doing to make sure you aren't surprised later.
EU Privacy Shield - Understanding the New Framework from TRUSTeTrustArc
Webinar to understand the new EU-US Privacy Shield Framework which replaces the EU-US Safe harbor framework followed by a demo of the TRUSTe EU data privacy transfer assessment.
Visit https://info.truste.com/WB-2016-02-10-Insight-Series-Privacy-Shield_RegPage-On-Demand_Recording.html to view the complete webinar.
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...AltheimPrivacy
Check out this link for the latest version: http://www.slideshare.net/EDiscoveryMap/the-eu-data-protection-reforms-impact-on-cross-border-ediscovery-27629797
The European Commission's proposal for a new General Data Protection Regulation (GDPR), represents the most significant global development in data protection law since Directive 95/46. It will considerably impact cross-border e-discovery in the EU.
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...AltheimPrivacy
This is a new set of slides, adapted after the 10/21/2013 LIBE Committee vote on the proposed amendments to the Regulation. Quite a few of the original GDPR rules have changed so far.
Data Privacy vs. National Security post Safe HarborGayle Gorvett
Recent Developments in Transatlantic Data Privacy regulation including adoption of Privacy Shield, GDPR and increasing requests for data access for National Security
Presentation done at Criminal Investigation Fall Summit
Investigative Sciences for Law Enforcement Technologies (ISLET)
Century College
White Bear Lake, MN
Nov 5, 2008
Project Description of the Linked Open Data (LOD) PILOT Austria - presented at the PiLOD event at VU Amsterdam (Netherlands) on 29.01. 2014 (see: http://www.pilod.nl/) by Martin Kaltenböck of Semantic Web Company.
Quant - Interchain Development And Cross-Chain Protocols. BlockchainLive 2018Gilbert Verdian
The Internet of Trust: Network of inter-connected blockchain networks to transact Value.
I covered the history of the Internet, the mistakes we made with OSI and why we’re making the same mistakes again on blockchain.
The problem with Blockchain today is lack of Openness, Adoption and Proprietary Technology
#Overledger solves this.
Slides (currently unannotated) to support the "Preparing for the Future: Technological Challenges and Beyond" workshop presented with Brian Kelly - http://ukwebfocus.com/events/ili-2015-preparing-for-the-future/
Note - slideshare seems to have messed up the conversion - some slides are (unintentionally) blank....
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
32. The UKGLF addresses the use and re-use of the following types
of information:
- non-personal information subject to copyright and database
right that is collected and produced by government and the
public sector and which is published or accessible under access
legislation such as the Freedom of Information Act or the
Environmental Information Regulations (much of this
information will be accessible on public sector web sites or
already published by the public sector);
- previously unpublished datasets released by the public sector
on portals such as data.gov.uk; and
- original and open source software and source code produced
by the public sector or commissioned under Framework 1 of the
NESTA agreements (see glossary) or similar agreements.
36. Take a look around you…
…see that plug socket? If you’re in the UK, it should conform to British
Standard BS1363 (you can read the spec if you have have you credit card to
hand…). Take a listen around you… is that someone listening to an audio
device playing an MP3 music file? ISO/IEC 11172-3:1993 (or ISO/IEC 13818-
3:1995) helped make that possible… “that” being the agreed upon standard
that let the music publisher put the audio file into a digital format that the
maker of the audio device knows how to recognise and decode.
(Beware, though. The MP3 specification is tainted with all sorts of patents –
so you need to check whether or if you need to pay someone in order to
build a device that encodes or decodes MP3 files.) If the music happens to be
being played from a CD (hard to believe, but bear with me!), then you’ll be
thankful the CD maker and the audio player manufacturer agreed to both
work with a physical object that conforms to IEC 60908 ed2.0 (“Audio
recording – Compact disc digital audio system”), and that maybe makes use
of Standard ECMA-130 (also available as ISO/IEC 10149:1995). That
Microsoft Office XML document you just opened somewhere? ISO/IEC
29500-1:2011. And so on…
40. “Standard - codified knowledge providing
specifications for interfaces between software, systems
or the documents and data that pass between them.”
[Open Standards Consultation – Glossary]
“*O]penstandards must allow all possible competitors
to operate on a basis of equal access to the ability to
implement the standard” [An Economic Basis for Open
Standards, RA Ghosh]
41. “ For the purpose of UK Government software
interoperability, data and document formats, the definition of
open standards is those standards which fulfil the
following[5] criteria:
42. are maintained through a collaborative
and transparent decision-making
process that is independent of any
individual supplier and that is accessible
to all interested parties;
44. Credit: Adam Cooper, CETIS
http://blogs.cetis.ac.uk/adam/2008/03/18/beyond-standards-part-1/
45. are adopted by a specification or
standardisationorganisation, or a
forum or consortium with a feedback
and ratification process to ensure
quality;
48. as a whole have been implemented
and shared under different
development approaches and on a
number of platforms from more than
one supplier, demonstrating
interoperability and platform/vendor
independence;
49. owners of patents essential to implementation
have agreed to licence these on a royalty free
and non-discriminatory basis for implementing
the standard and using or interfacing with other
implementations which have adopted that same
standard. Alternatively, patents may be covered
by a non-discriminatory promise of non-
assertion. Licences, terms and conditions must
be compatible with implementation of the
standard in both proprietary and open source
software. These rights should be irrevocable
unless there is a breach of licence conditions.
Here we see the result of pulling data into a Google Spreadsheet from a CSV file published at a particular web address. We now have the ability to run the full range of spreadsheet tools over the data – data which is being pulled in from the datastore, remember.(A similar functionality presumably exists in Microsoft Excel?)
Through the provision of an API on top of the aggregated local council data, OpenlyLocal can also be treated as a database in its own right. In the example shown here, committee membership is displayed via a treemap showing party affiliations of committee members. (Hovering over a particular grouping displays a list of names of council members on that committee from that party political grouping.) Whilst it would be a major task to take data from every council website in a variety of formats in order to generate similar views for other councils, the work done by OpenlyLocal in aggregating this data and then republishing it via a single API in a single format means that the treemap view can be applied to each council whose data is stored in OpenlyLocal.In passing, it is also worth mentioning how the use of visualisations can be helpful in cleaning data or identifying possible errors in it. In the above example, we see that party affiliations for councillors on the Isle of Wight Council are declared as both Liberal Democrat and and Liberal Democrat Group.