A talk from the Gaming & Entertainment Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, who will take care of protecting it
Conversation about the challenges that the industry has in terms of data analytics (standards, cybersecurity, data management protocols, etc) knowing that content, interactions and transactions will be creating data outside of "computers", but everywhere.
https://awexr.com
Software Security For DevOps And Continuous Deployment In The CloudInterCon
A session by Thomas R. Truitt, President, Open Systems Technologies Corporation on the topic of 'Software Security For DevOps And Continuous Deployment In The Cloud' at InterCon USA 2019, held at Caesars Palace, Las Vegas on 18-20 June, 2019.
Software Security For DevOps And Continuous Deployment In The CloudInterCon
A session by Thomas R. Truitt, President, Open Systems Technologies Corporation on the topic of 'Software Security For DevOps And Continuous Deployment In The Cloud' at InterCon USA 2019, held at Caesars Palace, Las Vegas on 18-20 June, 2019.
Extending CyberSecurity Beyond The Office PerimeterVeriato
The traditional office has now morphed into a hybrid model where most employees work remotely. The shift to remote work isn't entirely new. Between 2005 and 2018, there was a 173% increase in the US remote workforce.
This trend spiked significantly in 2020 when roughly 88% of organizations worldwide encouraged remote work to flatten the COVID-19 spread.
Join Dr. Christine Izuakor and Veriato's Head of Marketing, Pete Nourse In this free webinar as they discuss:
How corporate office perimeters continue to evolve in real-time as the world changes
Latest threats to organizations in and out of the office in the new year
Keeping your data and systems safe while they sit in your employees' house
A user-centric approach to extending security beyond the traditional office perimeter
Wearables are small electronic devices, often comprising one or more sensors and having computational capability. Devices such as wrist watches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransomed collection and other illegal activities necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.
Keith’s powerpoint presentation on IT Ethics used during a “give n’ take” conversation with Meridian Community College Information Technology students.
Security in Internet of Things(IoT) Ecosystemrahulbindra
The paper analyzes the various security and regulatory frameworks around "Internet of Things" put in place by prominent organizations and bodies across the globe and proposes a consolidated model for IoT ecosystem governance.
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS
Mirko Ross of Digital Worx presented at a workshop on Internet of Things Security at ThingsCon Amsterdam 2017 1 December 2017. From Internet of Shit to secure Internet of Thing – What we can learn from epic securtiy fails to create better IoT products and applications.
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...Dataconomy Media
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Lead Security Architect At Lloyds Bank Group
Watch more from Data Natives Berlin 2016 here: http://bit.ly/2fE1sEo
Visit the conference website to learn more: www.datanatives.io
Follow Data Natives:
https://www.facebook.com/DataNatives
https://twitter.com/DataNativesConf
Stay Connected to Data Natives by Email: Subscribe to our newsletter to get the news first about Data Natives 2017: http://bit.ly/1WMJAqS
About the Author:
Anish has been working in the security and cryptography area for the past 15 years, as a researcher and as a consultant. His first brush with payments systems was 15 years ago when he was involved in building a micropayments system for Ericsson. He has spent half his career researching cryptographic algorithms and protocols at three different research groups including Microsoft Research. He also has published multiple papers in the area of security and cryptography and contributed to thought leadership in security space, through guides, POV, white papers and talks. He has also worked as a strategy consultant for Accenture and Capgemini. Most recently he has been involved in the Blockchain ecosystem as one of the founding members of UKDCA . He is also on the advisory board for Ripple Labs, IEET, EA ventures, Adjoint and Chain of Things. These days he works for large UK bank where he is lead security architect.
The Basics: Reviewing & Producing ESI EvidenceAaron Vick
This presentation covers technical topics and needs for understanding electronic discovery, what it is, how it is formatted, and how to review ESI in order to create a production.
Keeping up with the Revolution in IT SecurityDistil Networks
For many of today’s businesses, web applications are their lifeline. The growing complexity involved in keeping these applications fast, secure, and available can be seen as a byproduct of shifts in how these apps are developed, deployed, and attacked. This discussion will explore how high level trends in today’s web environments and the cyber attack landscape are shaping tomorrow’s application security solutions.
Key Takeaways:
- Trends in contemporary web applications that are forcing security evolution
- How today’s cyber attack landscape impacts cybersecurity
- What modern IT security solutions look like
- Distil Networks Overview
HIPAA Compliance For Emerging TechnologiesSynerzip
We are now facing dramatic and sweeping changes with AR/VR systems, Big Data, 3D printing, HealthTech, Internet of Things, Robots, and Artificial Intelligence systems. This program will cover how HIPAA covered entities and business associates (whether onsite or offshore) can meet their HIPAA compliance security & PHI requirements in the face of rapid changes caused by these emerging technologies.
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
Extending CyberSecurity Beyond The Office PerimeterVeriato
The traditional office has now morphed into a hybrid model where most employees work remotely. The shift to remote work isn't entirely new. Between 2005 and 2018, there was a 173% increase in the US remote workforce.
This trend spiked significantly in 2020 when roughly 88% of organizations worldwide encouraged remote work to flatten the COVID-19 spread.
Join Dr. Christine Izuakor and Veriato's Head of Marketing, Pete Nourse In this free webinar as they discuss:
How corporate office perimeters continue to evolve in real-time as the world changes
Latest threats to organizations in and out of the office in the new year
Keeping your data and systems safe while they sit in your employees' house
A user-centric approach to extending security beyond the traditional office perimeter
Wearables are small electronic devices, often comprising one or more sensors and having computational capability. Devices such as wrist watches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransomed collection and other illegal activities necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.
Keith’s powerpoint presentation on IT Ethics used during a “give n’ take” conversation with Meridian Community College Information Technology students.
Security in Internet of Things(IoT) Ecosystemrahulbindra
The paper analyzes the various security and regulatory frameworks around "Internet of Things" put in place by prominent organizations and bodies across the globe and proposes a consolidated model for IoT ecosystem governance.
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS
Mirko Ross of Digital Worx presented at a workshop on Internet of Things Security at ThingsCon Amsterdam 2017 1 December 2017. From Internet of Shit to secure Internet of Thing – What we can learn from epic securtiy fails to create better IoT products and applications.
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...Dataconomy Media
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Lead Security Architect At Lloyds Bank Group
Watch more from Data Natives Berlin 2016 here: http://bit.ly/2fE1sEo
Visit the conference website to learn more: www.datanatives.io
Follow Data Natives:
https://www.facebook.com/DataNatives
https://twitter.com/DataNativesConf
Stay Connected to Data Natives by Email: Subscribe to our newsletter to get the news first about Data Natives 2017: http://bit.ly/1WMJAqS
About the Author:
Anish has been working in the security and cryptography area for the past 15 years, as a researcher and as a consultant. His first brush with payments systems was 15 years ago when he was involved in building a micropayments system for Ericsson. He has spent half his career researching cryptographic algorithms and protocols at three different research groups including Microsoft Research. He also has published multiple papers in the area of security and cryptography and contributed to thought leadership in security space, through guides, POV, white papers and talks. He has also worked as a strategy consultant for Accenture and Capgemini. Most recently he has been involved in the Blockchain ecosystem as one of the founding members of UKDCA . He is also on the advisory board for Ripple Labs, IEET, EA ventures, Adjoint and Chain of Things. These days he works for large UK bank where he is lead security architect.
The Basics: Reviewing & Producing ESI EvidenceAaron Vick
This presentation covers technical topics and needs for understanding electronic discovery, what it is, how it is formatted, and how to review ESI in order to create a production.
Keeping up with the Revolution in IT SecurityDistil Networks
For many of today’s businesses, web applications are their lifeline. The growing complexity involved in keeping these applications fast, secure, and available can be seen as a byproduct of shifts in how these apps are developed, deployed, and attacked. This discussion will explore how high level trends in today’s web environments and the cyber attack landscape are shaping tomorrow’s application security solutions.
Key Takeaways:
- Trends in contemporary web applications that are forcing security evolution
- How today’s cyber attack landscape impacts cybersecurity
- What modern IT security solutions look like
- Distil Networks Overview
HIPAA Compliance For Emerging TechnologiesSynerzip
We are now facing dramatic and sweeping changes with AR/VR systems, Big Data, 3D printing, HealthTech, Internet of Things, Robots, and Artificial Intelligence systems. This program will cover how HIPAA covered entities and business associates (whether onsite or offshore) can meet their HIPAA compliance security & PHI requirements in the face of rapid changes caused by these emerging technologies.
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
The world today is seemingly always plugged into the Internet and technologies are constantly sharing data about our personal and professional lives. Device connectivity is on an upward trend with Cisco estimating that 50 billion devices will be connected to the Internet by 2020. Collection and data sharing by these devices introduces a host of new vulnerabilities, raising concerns about safety, security, and privacy for policymakers and regulators.
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
"Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Driven Innovation." A presentation by Adam Thierer (Mercatus Center at George Mason University) made on September 11, 2014 at AEI-FCC Conference on "Regulating the Evolving Broadband Ecosystem."
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
Mobile devices and applications have taken the world by storm. Millions of consumers are using these devices for everything from conducting financial transactions, accessing health care information and sharing personal experiences over social media. Unfortunately there is still little regard or concern with how mobile platforms and major social networks collect, transmit and store personal and corporate information. This exacerbates existing privacy concerns and the need for new regulations in the age of big data. In this presentation we discuss the latest privacy concerns with this new technology. Topics will include:
• All new privacy concerns with mobile application data, geolocation, address book harvesting , third party information sharing and the latest mobile technology such as NFC (Near Field Communication)
• A close look at the top 20 mobile applications and how they transmit, store and reuse personal or private information
• Comparison of current privacy policies of the major social networks, what they tell you and what they don't
• Ramifications of international and US privacy regulations and how this impacts mobile devices, social networks, you and your business
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
Everybody wants to achieve privacy by design? But how do you do that? This slideshare will show you how. What is privacy? What thought processes will bring about understanding of the security measures to take in order to ensure your users privacy?
I gave this version of my Design for Privacy presentation to the NY Experience Group of Publicis Sapient on Monday, 4 October 2021. It includes examples of privacy and security issues, our role in designing for privacy as design professionals, as well as best practices for privacy to keep in mind.
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
Now big data has become a hot topic in academia and industry, it is affecting the mode of thinking and working, daily life. But there are many security risks in data collection, storage and use. Privacy leakage caused serious problems to the user, false data will lead to error results of big data analysis. This paper first introduces the security problems faced by big data,analyzes the causes of privacy problems,discussesthe principle to solve the problem. Finally,discusses technical means for privacy protection.
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
Now big data has become a hot topic in academia and industry, it is affecting the mode of thinking and working, daily life. But there are many security risks in data collection, storage and use. Privacy leakage caused serious problems to the user, false data will lead to error results of big data analysis. This paper first introduces the security problems faced by big data,analyzes the causes of privacy problems,discussesthe principle to solve the problem. Finally,discusses technical means for privacy protection.
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
Presentation to the Science and Technology Committee of the American Bar Association on legal issues associated with employers enabling employee Bring Your Own Device policies.
What should organizations be concerned about when using Machine Learning for Predictive Modeling techniques? Divergence Academy and Divergence.AI are leading efforts to bring Algorithmic Accountability awareness to masses.
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
Understanding the future based on the current technology, with a focus on Big Data and Internet of Things (IoT). A discussion of privacy and personal information and how it affects us.
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
The american workplace is in a period of unprecedented change as the combination of mobile technology and social media is changing the "who, what, when and where" of work.
Bill Meyer (Virtual Science Center): Turning Kids on to STEM by Letting Them ...AugmentedWorldExpo
A talk from the Training & Education Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Bill Meyer (Virtual Science Center): Turning Kids on to STEM by Letting Them Discover How VR and AR Tricks Our Brain
How exactly does Virtual and Augmented Reality game human perception so things we know aren’t there seem to exist? Can simple and robust public learning experiences empower and delight people of all ages to experiment and discover the answers for themselves? The answer is yes. This talk will present examples and discuss how UX best practices can be applied to create effective inquiry-based learning experiences that unpack seemingly complex modern technologies. Through iterative design coupled with repeated visitor testing, we deconstructed the surprising perceptual science and technology behind VR and AR into 16 cool hands-on experiences that spark “aha” moments and minimize the need for wordy explanations. We keep concepts intuitive, playful, and fun to understand. Our traveling exhibition goal is to show visitors they're smarter than they suspect, inspire students to aim for STEM careers, and help teachers lead deeper NGSS and Common Core dives both in and out of the classroom. This 45 second video shows an example exhibit and part of our visitor testing process: https://youtu.be/Sgh0Sys57lY Without needing to learn the terms, visitors discover the secrets of how things like Motion Parallax, Stereo Vision, 3D Audio Spatialization, Outside-In, and Inside-Out Tracking work in concert to make virtual, augmented and mixed reality experiences possible.
https://awexr.com
Nick Klingensmith (Microsoft): Increasing Immersion with the MR Lighting ToolsAugmentedWorldExpo
A talk from the Gaming & Entertainment Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Nick Klingensmith (Microsoft): Increasing Immersion with the MR Lighting Tools
To-date, most 3D graphics have been rendered on opaque displays. Now, not only are we putting holograms into the real world, but we're also doing it on additive displays! How do we render holograms that look good in this environment, and how do we make them look like they belong? The Mixed Reality Lighting Tools are a collection of easy Unity based solutions, from replicating your environment's lighting, to casting believable additive shadows. Come find out how easy it is to make your Mixed Reality application more immersive!
https://awexr.com
A talk from the Creator Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Rokid: Design a seamless solution for AR glasses
Qi Xiong | Rokid
Paris Fan | Rokid
Nan Wang | Rokid
Gonglue Jiang | Rokid
In this talk, we will discuss how Rokid creates a seamless AR experience from two aspects: ergonomic design(hardware) and systematic UI/UX design(software). The presentation will also share the insights of the entire product development cycle of Rokid Glass: from crafting product appearance with strict constraints, deploying user interfaces on a new and unique AR device, to the case studies and progressive design of real implementations. The talk offers a glimpse of the future AR design methodology by demonstrating the superpower enabled by design thinking. Rokid Glass is an AI-enabled, all-in-one AR glasses already in mass production, with seamless user experience which widely adopted by the industry.
https://awexr.com
A talk from the Marking & Sales Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Tom De Vos | Fat Boy
Dalia Lasaite | CGTrader
Augmented Reality is having a profound impact on the way people shop online. By enabling consumers to interact with and try products before purchasing as they would in a brick and mortar store, Augmented Reality has been proven to increase sales conversions, reduce product returns and extend online engagement. This presentation will examine the latest technologies, trends and strategies for deploying AR for e-Commerce.
https://awexr.com
Chloe Doyeon Kim (MAXST): The Current and Future State of MAXST PlatformAugmentedWorldExpo
A talk from the Enterprise Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Chloe Doyeon Kim (MAXST): The Current and Future State of MAXST Platform
MAXST, a persistent challenger, is proudly specialized in Augmented Reality working with prominent Korean enterprises, such as Hyundai, Samsung Display, Samsung Electronics, and KT. MAXST’s cloud-based AR platform pursues innovation in terms of AR development tools, AR production costs, and profitability. We also believe Visual SLAM is critical basis for Future AR. We will reveal our stories and insight to the immersive world of today and tomorrow.
https://awexr.com
A talk from the Start-up Pitch Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Owning Augmented Space
Neil Mandt | The Layer Group
Brian Wassom | Warner Norcross + Judd LLP
"How can I own the AR 'air rights' around my physical property?" This may be the most commonly asked legal question around AR content. It is gaining new momentum and importance today, as location-based AR finally turns a profit, and as the quest for the Open AR Cloud takes shape. Finding the answers requires crossing the boundaries of multiple legal disciplines and practical concerns, and will not always be easy. This session will equip you to understand the legal risks and give you strategies to protect the integrity of both physical space and digital expression.
https://awexr.com
Victor Sun (Shadow Creator): How to turn Mixed Reality “headset” into “glasses”?AugmentedWorldExpo
A talk from the XR Enablement Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Victor Sun (Shadow Creator): How to turn Mixed Reality “headset” into “glasses”?
Microsoft has released HoloLens 2 on MWC. I think it is the benchmark for mixed reality devices, but it only reaches the pass mark. In order to be used by ordinary consumers, headsets must be turned into glasses to eliminate their fears of tech equipment.
https://awexr.com
A talk from the XR Enablement Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Chris Pickett (DigiLens): XR is Hard: Here’s Why
Not only does it take great hardware and apps to bridge our digital and physical worlds, but also endurance to survive as the market matures.
https://awexr.com
Antti Sunnari (Dispelix Ltd): Full-color, single-waveguide near-eye displays ...AugmentedWorldExpo
A talk from the XR Enablement Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Antti Sunnari (Dispelix Ltd): Full-color, single-waveguide near-eye displays for AR glasses and MR headsets
For years, many have tried to develop a see-through, near-eye display technology that combines beautiful design, excellent image quality and scalable mass production with high yields. At Dispelix, we’ve figured it out. Dispelix is helping product companies to create beautiful AR glasses based on single-waveguide full-color displays with superior image quality and mass manufacturability.
https://awexr.com
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applica...AugmentedWorldExpo
A talk from the XR Enablement Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Jian Liang (HiScene): AR for Industry in China: From Concepts to Real Applications
AI/AR industry has attracted attention never seen before of academia and industry, into which numerous talents and resources have been invested. However, academic achievements are not equal to products, which need to be adjusted and optimized in technology, engineering, product, etc. according to specific application scenarios. This talk will share with you some difficulties, misconceptions and experience in commercializing AR based on HiScene’s practice.
https://awexr.com
Augmented reality meets Television -Ellen DeGeneres' Game of Games AR AppAugmentedWorldExpo
A talk from the Gaming & Entertainment Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Augmented reality meets Television -Ellen DeGeneres' Game of Games AR App
Daniel Leary | The Ellen DeGeneres Show
Alexa Hook | The Ellen DeGeneres Show
Paul Hake | HitPoint Inc.
Ellen DeGeneres, America's most loved comedian and popular TV host, entered the augmented reality era with the "Game of Games" show. Over 900,000 app users get to tune in and play along with Ellen with AR by unlocking prizes that jump from the TV screen into viewers' phones. The app has hit 741,614 AR gift box markers scanned from NBC broadcasts of Game of Games, during the weekly Play Along Live game. At AWE, HitPoint Studios gives an insight into the creative and technical process of building the "Game of Games" Game app and how to connect traditional TV shows with AR technology.
https://awexr.com
Jennifer Cook (Dreamscape Immersive): Dreamscape Immersive PresentationAugmentedWorldExpo
A talk from the Gaming & Entertainment Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Jennifer Cook (Dreamscape Immersive): Dreamscape Immersive Presentation
https://awexr.com
AWE USA 2019: 2 Partners sharing 1 vision for smart operatorsAugmentedWorldExpo
A talk from the Enterprise Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
2 Partners sharing 1 vision for smart operators
Mark Fleischer | AMA XPERTEYE INC.
Peter Verstraeten | Proceedix
The partnership between XpertEye and Proceedix offers a best-in-class solution to empower smart operators and technicians. The combination leverages both mobile technology and smart glasses for remote assistance and instruction and inspection execution.
https://awexr.com
Phil LaFond (Bosch Automotive Service Solutions Inc.): Bosch Technical Traini...AugmentedWorldExpo
A talk from the Main Stage at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Phil LaFond (Bosch Automotive Service Solutions Inc.): Bosch Technical Training Supported by AR
Learn how Bosch is using Augmented Reality to facilitate technical training.
https://awexr.com
Scott Montgomerie (Scope AR): AR’s Influence on the Workforce of Tomorrow: Jo...AugmentedWorldExpo
A talk from the Main Stage at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Scott Montgomerie (Scope AR): AR’s Influence on the Workforce of Tomorrow: Job Eliminator or Creator?
As the speed of technology continues to accelerate automation in the manufacturing world, the inevitable question of whether or not the “human touch” will become obsolete is top of mind for workers. The fear that robots and smart technologies will take everyone's jobs is prevalent, but not necessarily true. AR has the power to be a job creator, not a job eliminator. Its ability to make anyone an instant expert can in fact increase job security by quickly helping workers become more proficient in tasks. Learn about real-world use cases where AR is making people better, and safer, at their jobs, and explore why enterprises who create a workplace that’s augmented, not automated, will be the leaders of tomorrow.
https://awexr.com
Hugo Swart (Qualcomm, Inc.): How 5G, Distributed Processing and Technology Ad...AugmentedWorldExpo
A talk from the Main Stage at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Hugo Swart (Qualcomm, Inc.): How 5G, Distributed Processing and Technology Advancements are Accelerating the Timeline to a Ubiquitous XR World
XR has the potential to become one of the world’s most disruptive computing platforms in the coming decade. Over the past year, we’ve seen significant strides in technology and with the introduction of new XR form factors such as standalone, tethered viewers and dual-mode HMDs – there has been an acceleration of XR opportunities, use cases and adoption. In this keynote presentation, Hugo Swart, Head of XR at Qualcomm Technologies, Inc. will speak to cutting-edge technological developments and how Qualcomm has met previous challenges, with a forward outlook on how strong ecosystem collaboration, the proliferation of 5G and AI will fast-track the industry timeline to an XR ubiquitous world.
https://awexr.com
Valentin Heun (PTC): One Reality - A 3rd generation AR User InterfaceAugmentedWorldExpo
A talk from the Creator Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Valentin Heun (PTC): One Reality - A 3rd generation AR User Interface
Many of our technological innovations seem to expand the computational abilities without the human in the loop. Augmented Reality is one of the view technologies that promises technological advances that enable us humans a better connection with the ubiquitous technology around us. We are not there yet to make use of such a user interface. We currently have individual islands of interactivity via AR. This conference may have many spatial demos as well, however, a single ubiquitous layer that penetrates all screens, surfaces, machines, and environments are not available. This is what the PTC Reality Lab researches. The core of this research is the ability to use AR in a scalable distributed platform to bridge among technological domains to allow the weaving of multiple technologies into one user experience. The resulting user experience is called One Reality. The goal for One Reality is to provide one seamless, ubiquitous flow of user experience for all technologies that touch the user’s decision making. This talk will iterate on the different stages of Augmented Reality User Interfaces and identifies One Reality as the 3rd stage in the evolution of AR user interfaces. This visionary talk aims to inspire the audience to think beyond the known applications for Augmented Reality.
https://awexr.com
Anton Ebert (Siemens Healthcare): Challenges and approaches on integrating a ...AugmentedWorldExpo
A talk from the Training & Education Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Anton Ebert (Siemens Healthcare): Challenges and approaches on integrating a cutting edge technology in modern healthcare businesses
This session will provide insights and a basis for further discussions on how technologies like Augmented and Virtual Reality are being tested and explored in the healthcare sector.
https://awexr.com
Sarah Hill (Healium by StoryUP Studios): Healing Stories Powered by BiometricsAugmentedWorldExpo
A talk from the Humanities Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Sarah Hill (Healium by StoryUP Studios): Healing Stories Powered by Biometrics
Users aren't just watching your content, they're feeling it with their wearables. Brain patterns and heart rate are XR storytelling's new inputs. Peek inside the world's first VR & AR content channel powered by a brain-computer interface and heart rate to learn about a new study on XR's therapeutic impact on anxiety.
https://awexr.com
Iva Leon (ARVR Women and Allies): Building community with social VRAugmentedWorldExpo
A talk from the Humanities Track at AWE USA 2019 - the World's #1 XR Conference & Expo in Santa Clara, California May 29-31, 2019.
Iva Leon (ARVR Women and Allies): Building community with social VR
Social VR platforms like Facebook Spaces can help community builders and purpose-driven organizations innovate the way they engage their members and bring people together. Find out how ARVR Women uses social VR to elevate the visibility of their members and add value to the group.
https://awexr.com
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
Rosario B. Casas ( www.vramericas.com): If data will be all over the space, who will take care of protecting it
1. If data will be all over the
space, who will take care
of protecting it
Rosario B. Casas
@rosariobc
@vramericas
Julia Costin
@ITGirl_ITWorld
@Americas_cyber
6. DIGITAL OR PHYSICAL WORLD
“Digital and physical worlds collide as
augmented reality moves from science fiction
into everyday consumer and business life,
opening up new opportunities for digital
marketers.”
7. TALENT GAP
The demand for cybersecurity professionals over the past five
years grew over 3.5 faster than the demand for other IT jobs and
about 12 times faster than for all other jobs.
Cybersecurity is increasingly vital as more and more people are
connected by the Internet, businesses are dependent on cloud-
based and big data services, and governments are facing
increased web-based attacks related to terrorism, espionage or
other areas.
11. EARLY MOMENT
• Quick prototyping and product release
• Cyber experts waiting for a mature industry to define
standards and policies
• “they have not looked at the security/privacy issues
in VR/ AR, as the technology has not matured yet
and the use of technology is not widespread
amongst consumers”
12. DATA COLLECTION
• Legitimate users may be unaware that their personal
data may have been captured and, then, leaked
13. PERSONAL DATA AND
PREFERENCES
• Location, social ties, verbal communication, product
preferences, sensitive information, etc.
• Physical daily environment and interactions
14. NON VERBAL DATA
• with VR - companies collect non-verbal behavior
(user’s posture, eye-tracking, gestures, facial
expressions, etc.)
*** spending 20 minutes in a VR simulation leaves
about 2 million unique recordings of body language
15. NON VERBAL DATA
What can Non-Verbal behavior tell us about a person?
• Mental State
• Health Information
• Emotions
• Learning behavior - determine future behavior
• Body language - data can be used to estimate students’
test scores, determine emotions, etc.
16. BIOMETRIC IDENTIFIERS
• Data generated by automatic measurements of an
individual’s’ biological characteristics, such as fingerprint,
voiceprint, eye retinas, irises, or other unique biological
patterns or characteristics that can be used to identify a
specific individual.
18. • Digital blackmail
• Hackers access to this data could lead to digital replicas/
digital clones of you being created and used to
impersonate you for malicious reasons.
• Many times, VR/AR systems haven't implemented
encryption for network connects
• Many VR/AR systems rely on third-party apps or
integrations -