Presentation from OpenTech June 2015 London. Includes learnings from open addresses, analogies with cholera, thoughts on what this means for data infrastructure.
Intelligence, Insight, and the role of Scale: Data stories from the business ...Paul Miller
A presentation to the IDCC 2013 conference in Amsterdam, 15 January 2013.
The presentation looks at the growing use of data in business, science, and everyday life, and asks whether or not we always need the scale encouraged by Big Data enthusiasts.
Data-Driven Selling and The Value of Data In The Water IndustrySunit Mohindroo
Slides from Peter Gallant's talk at the Feb 18, 2014 Event: Going Beyond The Spreadsheet - A Lunch & Learn co-hosted by WatrHub Inc. and WaterTAP Ontario.
The tale of a smarter planet (video storboard)ChrisLuongo2
"A butterfly flaps its wings in China, and sometimes later a thunderstorm drenches Chicago. We've all heard some variation of that description--of how one event can contribute to a seemingly unrelated event through a series of exquisite and intricate interactions . . . ."
Intelligence, Insight, and the role of Scale: Data stories from the business ...Paul Miller
A presentation to the IDCC 2013 conference in Amsterdam, 15 January 2013.
The presentation looks at the growing use of data in business, science, and everyday life, and asks whether or not we always need the scale encouraged by Big Data enthusiasts.
Data-Driven Selling and The Value of Data In The Water IndustrySunit Mohindroo
Slides from Peter Gallant's talk at the Feb 18, 2014 Event: Going Beyond The Spreadsheet - A Lunch & Learn co-hosted by WatrHub Inc. and WaterTAP Ontario.
The tale of a smarter planet (video storboard)ChrisLuongo2
"A butterfly flaps its wings in China, and sometimes later a thunderstorm drenches Chicago. We've all heard some variation of that description--of how one event can contribute to a seemingly unrelated event through a series of exquisite and intricate interactions . . . ."
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. The downsides: challenges to personal privacy, over-hyped expectations, and boggling tech complexity. Lee Rainie shares the latest research from Pew about libraries and puts it into context with the expanding Internet of Things.
Presentation I did at Social Bar at the 4th of November in Berlin. It's a 10 minute talk about open government data for people who are not familiar with the topic.
7.1 Evaluating Information7.2 Neo-Luddite Views of Compute.docxsleeperharwell
7.1 Evaluating Information
7.2 Neo-Luddite Views of Computers, Technology, and Quality of Life
7.3 Digital Divides y
7.4 Control of Our Devices and Data
7.5 Making Decisions About Technology A
Exercises a
A
356 Chapter 7 Evaluating and Controlling Technology
In this chapter, we consider such questions as these: Does the openness and
"democracy" of the Web increase distribution of useful information or of inac
curate, foohsh, and biased information? How should we handle the latter? How
can we evaluate complex computer models of physical and social phenomena?
Is computing technology evil? Why do some people think it is? How does access
to digital technology ditfer among dilferent populations? How should we control
technology to ensure positive uses and consequences? How soon will robots and
digital devices be more intelligent than people? What will happen after that?
Whole books focus on these topics. The presentations here are necessarily
brief. They introduce issues, arguments, and many questions.
7.1 Evaluating Information
A little learning is a dang 'rous thing;
Drink deep, or taste not the Pierian spring;
There shallow draughts intoxicate the brain,
And drinking largely sobers us again.
—Alexander Pope, 1709'
7.1.1 The Need for Responsible Judgment
What is real? What is fake? Why does it matter?
We can get the wrong answer to a question quicker than our fathers and
mothers could find a pencil.
—Robert McHenry^
There is a daunting amount of information on the Web—^and much of it is wrong.
Quack medical cures abound. Distorted history, errors, outdated information, bad
financial advice—it is all there. Marketers and pubUc relations firms spread unlabeled
advertisements through blogs, social media, and video sites. Search engines have
largely replaced librarians for finding information, but search engines rank informa
tion sources at least partially by popularity and give prominent display to content
providers who pay; librarians do not. Wikipedia, the biggest online encyclopedia, is
immensely popular, but can we rely on its accuracy and objectivity when anyone can
edit any article at any time? On social journalism sites, readers submit and vote on
news stories. Is this a good way to get news? The nature of the Intemet encourages
people to post their immediate thoughts and reactions without taking time for con
templation or for checking facts. How do we know what is worth reading in contexts
where there are no editors selecting well-written and well-researched articles?
Faking photos is not new; photographers have long staged scenes and altered
photos in dark rooms. When we see a video of a currently popular performer sing
ing with Elvis Presley (who died in 1977), we know we are watching creative
7.1 Evaluating Information 357
entertainment—digital magic at work. But the same technologies can deceive, and
circulation of a fake photo on the Internet can start a riot or bring death threats to an
innocent person. Here is a.
Artificial Intelligence in Biodiversity and Citizen ScienceKatina Michael
There’s little doubt that Artificial Intelligence has the potential to radically transform our world. Perhaps it's already doing so. In the fields of citizen science and biodiversity research, it offers some extraordinary opportunities - from the instant visual recognition of species to deep environmental insights generated out of big data analysis. These same developments also raise numerous questions about the impact A.I. will have on humanity and the natural environment. This workshop will examine the risks and opportunities presented by A.I. in the fields of citizen science and biodiversity. What are some of the key issues that researchers, practitioners, policy makers and the general public are or should be thinking about? More here: http://www.katinamichael.com/seminars/2017/10/31/examples-of-ai-in-biodiversitycitizen-science
A lot of talk about the future of the internet sounds almost hippie-spiritual or faux-philosophical. The Internet is not the same as the world-wide-web. But the Internet-of-Things and the Semantic Web - all parts of Web 3.0, are beginning to be very important to our learning environments. Here is a summary of key features, ranging from access, creativity, and information architecture.
Briefing on US EPA Open Data Strategy using a Linked Data Approach3 Round Stones
An overview presented by Ms. Bernadette Hyland on 18-Nov 2014 on the US EPA Open Data strategy, focusing on the Resource Conservation & Recovery Act (RCRA) dataset to be published as linked data . This work is in support of Presidential Memorandum M13-13 - Open Data Policy and Managing Information as an Asset.
#Shared smartcitiesworld data trusts - peter w - 2019-06-18Peter Wells
Presentation at an event called SmartCitiesWorld in London about co-creating cities with citizens
Link: https://www.smartcitiesworld.net/round-table-new/whose-city-is-it-anyway-co-creating-smart-cities-with-citizens
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. The downsides: challenges to personal privacy, over-hyped expectations, and boggling tech complexity. Lee Rainie shares the latest research from Pew about libraries and puts it into context with the expanding Internet of Things.
Presentation I did at Social Bar at the 4th of November in Berlin. It's a 10 minute talk about open government data for people who are not familiar with the topic.
7.1 Evaluating Information7.2 Neo-Luddite Views of Compute.docxsleeperharwell
7.1 Evaluating Information
7.2 Neo-Luddite Views of Computers, Technology, and Quality of Life
7.3 Digital Divides y
7.4 Control of Our Devices and Data
7.5 Making Decisions About Technology A
Exercises a
A
356 Chapter 7 Evaluating and Controlling Technology
In this chapter, we consider such questions as these: Does the openness and
"democracy" of the Web increase distribution of useful information or of inac
curate, foohsh, and biased information? How should we handle the latter? How
can we evaluate complex computer models of physical and social phenomena?
Is computing technology evil? Why do some people think it is? How does access
to digital technology ditfer among dilferent populations? How should we control
technology to ensure positive uses and consequences? How soon will robots and
digital devices be more intelligent than people? What will happen after that?
Whole books focus on these topics. The presentations here are necessarily
brief. They introduce issues, arguments, and many questions.
7.1 Evaluating Information
A little learning is a dang 'rous thing;
Drink deep, or taste not the Pierian spring;
There shallow draughts intoxicate the brain,
And drinking largely sobers us again.
—Alexander Pope, 1709'
7.1.1 The Need for Responsible Judgment
What is real? What is fake? Why does it matter?
We can get the wrong answer to a question quicker than our fathers and
mothers could find a pencil.
—Robert McHenry^
There is a daunting amount of information on the Web—^and much of it is wrong.
Quack medical cures abound. Distorted history, errors, outdated information, bad
financial advice—it is all there. Marketers and pubUc relations firms spread unlabeled
advertisements through blogs, social media, and video sites. Search engines have
largely replaced librarians for finding information, but search engines rank informa
tion sources at least partially by popularity and give prominent display to content
providers who pay; librarians do not. Wikipedia, the biggest online encyclopedia, is
immensely popular, but can we rely on its accuracy and objectivity when anyone can
edit any article at any time? On social journalism sites, readers submit and vote on
news stories. Is this a good way to get news? The nature of the Intemet encourages
people to post their immediate thoughts and reactions without taking time for con
templation or for checking facts. How do we know what is worth reading in contexts
where there are no editors selecting well-written and well-researched articles?
Faking photos is not new; photographers have long staged scenes and altered
photos in dark rooms. When we see a video of a currently popular performer sing
ing with Elvis Presley (who died in 1977), we know we are watching creative
7.1 Evaluating Information 357
entertainment—digital magic at work. But the same technologies can deceive, and
circulation of a fake photo on the Internet can start a riot or bring death threats to an
innocent person. Here is a.
Artificial Intelligence in Biodiversity and Citizen ScienceKatina Michael
There’s little doubt that Artificial Intelligence has the potential to radically transform our world. Perhaps it's already doing so. In the fields of citizen science and biodiversity research, it offers some extraordinary opportunities - from the instant visual recognition of species to deep environmental insights generated out of big data analysis. These same developments also raise numerous questions about the impact A.I. will have on humanity and the natural environment. This workshop will examine the risks and opportunities presented by A.I. in the fields of citizen science and biodiversity. What are some of the key issues that researchers, practitioners, policy makers and the general public are or should be thinking about? More here: http://www.katinamichael.com/seminars/2017/10/31/examples-of-ai-in-biodiversitycitizen-science
A lot of talk about the future of the internet sounds almost hippie-spiritual or faux-philosophical. The Internet is not the same as the world-wide-web. But the Internet-of-Things and the Semantic Web - all parts of Web 3.0, are beginning to be very important to our learning environments. Here is a summary of key features, ranging from access, creativity, and information architecture.
Briefing on US EPA Open Data Strategy using a Linked Data Approach3 Round Stones
An overview presented by Ms. Bernadette Hyland on 18-Nov 2014 on the US EPA Open Data strategy, focusing on the Resource Conservation & Recovery Act (RCRA) dataset to be published as linked data . This work is in support of Presidential Memorandum M13-13 - Open Data Policy and Managing Information as an Asset.
#Shared smartcitiesworld data trusts - peter w - 2019-06-18Peter Wells
Presentation at an event called SmartCitiesWorld in London about co-creating cities with citizens
Link: https://www.smartcitiesworld.net/round-table-new/whose-city-is-it-anyway-co-creating-smart-cities-with-citizens
Launch of ODI 2019 data trust pilots workPeter Wells
Slidedeck from April 2019 launch of ODI data trust pilots work, includes slides from ODI team, Involve, Comms Chambers, Chris Reed, Nabeel Ahmed from OpenNorth and Sylvie Delacroix
Alan turing institute workshop what is a data trust - 2018 - peter wells -...Peter Wells
Presentation at Alan Turing Institute event on data trusts, 28 August 2018
https://www.turing.ac.uk/events/data-trusts-workshop
see also: https://theodi.org/article/what-is-a-data-trust
Talk by Peter Wells about the UK government cat register and how he used it make terrible jokes, put more cats on the web and think about the future of data.
https://medium.com/@peterkwells/gov-cats-f143d4a7407b#.jsfmpqlen
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
2. Cholera
The last time I was in this building I went to
a talk on an early example of data analysis
and data visualisation.
John Snow famously traced a fatal cholera
epidemic in Soho in 1854 to a local water
pump.
Because of cholera in the pump the water
was not safe to use.
Read more about John Snow: http://en.wikipedia.org/wiki/John_Snow_%28physician%29
@peterkwells
3. Cholera and infrastructure
The Soho outbreak started at a
water pump, it could have been a
water reservoir.
The cholera bacteria would
spread and contaminate the water
downstream. An entire set of
water infrastructure could have
been contaminated.
The water would not have been
safe to use. Yet water is essential
to life.
Image CC-BY-2.0 by Woodley Wonderworks: https://www.flickr.com/photos/wwworks/
@peterkwells
4. Safe water
As a society we invest in water
infrastructure. We have:
- inspections
- alerting systems
- purification
- education
We put more focus at the top of the
infrastructure, on water producers and
distributors, than we do on water users.
The goal is to make water that’s safe
for people to use.
A Doctor from the World Health Organisation
@peterkwells
6. Open Addresses
Organisations have to buy lists of UK addresses, licensing is complicated, the
quality isn’t great, the data doesn’t meet all the needs.
It’s hard to build new services.
Open Addresses explored whether it was possible to build a new UK address list,
to make things simpler and make addresses more widely used.
@peterkwells
7. Addressing needs
Denmark had a 1000% increase in the organisations that use address data by
making address data simpler to use.
We discovered other needs and benefits:
- people who move into new houses need their addresses to be published faster
- people name their houses and need other people to know about it
- people need it to be easier to enter addresses on websites
- (I could go on…)
@peterkwells
More and better services that would make life
a little bit easier
8. Getting addresses
As well as understanding the needs we had to find data.
There are 26-40m addresses in the UK.
The Land Registry publishes over 18 million addresses in the Price Paid Dataset.
Sounds great!
@peterkwells
Aside: we also did some neat stuff on mathematical inference for addresses.
Check out www.openaddressesuk.org...
9. Land Registry says no...
Image from Owen Boswarva: http://mapgubbins.tumblr.com/post/107499166390/it-was-all-a-dream-land-registrys-price-paid
@peterkwells
10. Third Party Rights are
complex and can be fatal
Address datasets can include third-party database rights:
1. if the data was directly copied from an existing address database
2. if an existing list of addresses (obtained through another route) was corrected or
validated based on an existing address database
Unauthorised use of third party rights creates risk for both data publishers and
consumers.
The service can simply…... stop.
@peterkwells
11. Third party rights, they’re
everywhere!
As we inspected other datasets we saw similar issues with unauthorised rights:
- websites for data capture that used third party address products
- datasets that had been cleansed with third party address products
- a clean website followed by automated back-end validation
Even with submission guidelines, provenance tracking and takedown policies the legal
position for Open Addresses was really complex.
We made a :(
@peterkwells
12. Lightbulb
It is complicated to determine if unauthorised third party rights
exist. You need to inspect the data and how it was produced
@peterkwells
Image by Richard Rutter: https://www.
flickr.com/photos/clagnut/
13. Safe water - a reprise
As a society we invest in water
infrastructure:
- inspections
- alerting systems
- purification
- education
We put more focus at the top of the
infrastructure, on water producers and
distributors, than we do on water users.
The goal is to make water that’s safe
for people to use.
Image CC-BY-2.0 by Woodley Wonderworks: https://www.flickr.com/photos/wwworks/
@peterkwells
A Doctor from the World Health Organisation
14. Digital cholera
@peterkwells
Copyright is a good thing (don’t believe me? ask a musician) so I’m using a harsh metaphor, but
the metaphor is useful.
Don’t take away
my copyright!
15. Digital cholera
@peterkwells
The water may be infected with
cholera.
Therefore we inspect it to see if
the water is safe to use.
Land Registry address data may
be infected with digital cholera.
Therefore we inspect it to see if
the data is safe to use.
We learnt it wasn’t so we didn’t….
16. Digital cholera
@peterkwells
Not just about unauthorised third party rights.
Inappropriate releases of personal data.
Incomplete data.
Incorrect data.
Remember it’s a metaphor.
19. Purification?
@peterkwells
Tricky. There is no equivalent of a purification tablet.
We need to cleanse data infrastructure of digital cholera or we need to rebuild it.
It is simplest if the data is kept pure by whoever creates and maintains it.
Just as with water.
20. Education
@peterkwells
The ODI already have a wealth of education material and are including the thinking and
learning from Open Addresses in some future work:
Send your ideas more here:http://theodi.org/who-owns-our-data-infrastructure?
21. Water is essential to life so we invest in
maintaining our water infrastructure to make
water safe to use.
Data gives us more and better services. It is is
essential to life. We need to invest in
maintaining useful data infrastructure to make
data safe to use.
@peterkwells
22. @peterkwellsImage by Don Graham: https://www.flickr.com/photos/23155134@N06/
If we don’t look after our
data infrastructure we risk
simply ending up with
some rusty and unused
data pumps….