eBay.com.au: Do you know what you signed up for?EmilyGL
This presentation analyses eBay's Terms of Use, with a focus on privacy. This presentation is licensed under a Creative Commons Attrtibution Share-Alike 3.0 Australia License.
eBay.com.au: Do you know what you signed up for?EmilyGL
This presentation analyses eBay's Terms of Use, with a focus on privacy. This presentation is licensed under a Creative Commons Attrtibution Share-Alike 3.0 Australia License.
Sony Entertainment Network (SEN) Online Policy Primer PresentationKarl Nemsow
NET303 Online Policy Primer Presentation (Curtin University SP3 2012) by Karl Nemsow
AUDIO: “Five Armies” by Kevin Macleod from Incomptech. This work is licensed under a Creative Commons License CC-BY-3.0. Available at http://incompetech.com/music/royalty-free/mp3-royaltyfree/Five%20Armies.mp3
Brian Miller, solicitor and partner at Stone King LLP and Lauren Mitchum, trainee solicitor, provide a useful guide to ensuring your website is compliant with the law in all aspects, including advice on domain names, website content, disability discrimination, online terms, display of mandatory information, the impact of the Consumer Contracts Regulations, privacy policies and cookies, online advertising and the processing of payments
This is a high-level introduction from The Lorenzi Group discussing the after-effects of the recent data breach at Epsilon. We cover what consumers and businesses need to be aware of and how they can begin to protect themselves.
Ookoodoo wishlist review. See the original blog post at [https://wishsimply.com/blog/wish-list-service-review-for-Ookoodoo] and follow to read the comparison summary table at [https://wishsimply.com/compare-wishlist-services].
Are you looking to have your own Membership porn Website? Then checkout here for the requirements of what you need to start your own membership website.
Sony Entertainment Network (SEN) Online Policy Primer PresentationKarl Nemsow
NET303 Online Policy Primer Presentation (Curtin University SP3 2012) by Karl Nemsow
AUDIO: “Five Armies” by Kevin Macleod from Incomptech. This work is licensed under a Creative Commons License CC-BY-3.0. Available at http://incompetech.com/music/royalty-free/mp3-royaltyfree/Five%20Armies.mp3
Brian Miller, solicitor and partner at Stone King LLP and Lauren Mitchum, trainee solicitor, provide a useful guide to ensuring your website is compliant with the law in all aspects, including advice on domain names, website content, disability discrimination, online terms, display of mandatory information, the impact of the Consumer Contracts Regulations, privacy policies and cookies, online advertising and the processing of payments
This is a high-level introduction from The Lorenzi Group discussing the after-effects of the recent data breach at Epsilon. We cover what consumers and businesses need to be aware of and how they can begin to protect themselves.
Ookoodoo wishlist review. See the original blog post at [https://wishsimply.com/blog/wish-list-service-review-for-Ookoodoo] and follow to read the comparison summary table at [https://wishsimply.com/compare-wishlist-services].
Are you looking to have your own Membership porn Website? Then checkout here for the requirements of what you need to start your own membership website.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Neuro-symbolic is not enough, we need neuro-*semantic*
Primer
1. a User Agreement
a Privacy Policy
“Membership is a privilege not an entitlement”
(ebay,2010)
ebay are not AUCTIONEERS
(ebay,2010)
but
Figure 1
A new ebay member you must accept
the terms and conditions in both
and
so what are you in for ?
its handy to know that
must be 18 years or older to join
2. only an online venue,
communicate
anything, anytime, anywhere.
(ebay,2010)
almost
(ebay,2010)
offer,
by agreeing to the User Agreement & Privacy Policy
in order to buy,sell and
so
Figure 2
allowing members to with each other
you allow ebay to
3. use Your Information
full name
user ID
address
city
state
country
postcode
email
phone no
you have also expressly consented for ebay to use and disclose
your information at their absolute sole discretion to
government
law enforcement
third parties
data stored on
US servers
The primary purpose for information collection:
“to provide you with a smooth, efficient, safer and
customised trading experience.”
(ebay,2010)
and Your Information
also includesFigure 3
ebay affiliates and subsidiaries
(ebay,2010)
Paypal
Skype
Gumtree
to verify who you are
(ebay,2010)
such as
4. are collected and stored
granting ebay a licence to use Your Information in any
media now known or not currently known (ebay,2010)
you have your responsibilities
your
bidding
selling
buying
behaviour
discussion boards
cafes
chat rooms
feedback
activities
Figure 4
plus
with a “non-exclusive, worldwide, perpetual, irrevocable, royalty-free,
sublicensable” (ebay ,2010) right to use Your Information.
M
O
N
I
T
O
R
E
D
5. Ot
you are
protect your user
ID and password
complete all transactions
incomplete transaction could result in liability to seller and ebay
binding contracts between buyers and sellers
liability onus on members
Figure 5
you are legally responsible for all your activities
don’t involve yourself in fraud
pay your fees
(ebay,2010)
6. not to be
the risk taker
So don’t interfere with ebay’s
ISP’s or upload viruses, worms,
programming routines or
malicious code
so don’t
Figure 6
become
threatening
harassing
defamatory
deceptive
fulfill your obligations to ebay
You
no spam
(ebay,2010)
7. intellectual property rights
or copyright
eBay’s Privacy Policy states, "we can
(and you authorise us to) disclose our
User ID,name, street address, city,
state, postcode, country, phone
number, email, and company name to
eBay VeRO Program participants as
we in our sole discretion” (ebay,2010)
ebay is responsible for
eBbay veRO
Program
participants
legitimate sellers can be targeted not knowing exactly why
Figure 7
breach trademark,
can report you to ebay
because
sellers report competitors fοr non-existent violations
program can cause problems
could result in
suspended or
terminated
account
(Make money on ebay,2010)
or court action
8. nothing
almost
meanwhile
ebay disclaims any liability in
transactions
disputes
any court proceedings
A licenYou grantormation is
no warranty
Figure 8
no guarantee that a transaction will actually be completed
mediation
loss or damage
arbitration
no guarantee personal information or private
communications will always remain private (ebay,2010)
9. ebay will automatically track some of your behavior within its site
url details of visited site before entering
ebay and the site you go to next.
what browser and
ip address you use
install
Figure 9
ebay acts as a passive conduit of Your Information
for online distribution and publication. (ebay,2010)
all personal correspondence
monitor and store
ebay will also
be aware of identity theft
Figure 10
your user ID, email, contact
details given to other members
J
j
(ebay,2010)
10. Local Shared Objects (LSO), commonly called flash cookies.
gives you, at no additional cost, free,
hard to remove
difficult to find
large 100 kb file
holds more info
no expiration date
respawning of deleted
HTTP cookies
Web site hosts and advertisers do not like relying on HTTP cookies.
(Kassner,2009)
easy to remove, short life
so be aware
cookies on your hard drive
(Sotani, Canty, Mayo, Thomas, & Hoofnagle , 2009)
Figure 11
“merely visiting some websites can cause Flash data from a third party advertiser to be
stored on the user’s computer, often unbeknownst to the user”. (Soltani,2009)
traffic counts are rendered inaccurate
(Cooper,2010)
Improves
tracking
of user
11. ebay disclosing personal information
to advertisers and third parties who
use profiling to better target you as a potential customer
happy bidding !
of
ebay or related entities may ring you offering promotions
Figure 12
ad banners
product offerings
communications
admin notices
with
(ebay,2010)
(ebay,2010)