As nurses, we are responsible of helping our patients maintain good hygiene and physical comfort, especially if they are unable to do so. The simple morning care and bedside care can contribute a lot in meeting this need. Positioning of bedridden patients aim to maintain physical comfort. However, these activities are the ones commonly not prioritized, or worse, not done by nurses, especially in government hospitals.
The document provides details on assessing a patient's oxygenation through nursing history, physical examination, and diagnostic tests. The nursing history focuses on collecting information on symptoms like chest pain, fatigue, dyspnea, cough, wheezing, respiratory infections, allergies, health risks, medications, smoking, and other exposures. The physical examination involves inspection of the skin, breathing patterns, and palpation techniques to examine thoracic excursion, tactile fremitus, thrills, and heaves.
The document discusses normal and altered urinary and bowel elimination, including the anatomy and physiology related to waste excretion, common problems that can disrupt normal elimination, and nursing responsibilities in assessing and promoting normal elimination or treating disrupted patterns. Nursing goals are maintaining or restoring normal elimination, preventing risks like skin breakdown, and managing conditions like incontinence, constipation, or the use of ostomies through various interventions.
The document discusses various topics related to loss, grief, and the dying process. It describes how grief involves a sequence of emotional, cognitive, and psychological responses to loss. It outlines common stages in the grieving process including denial, anger, bargaining, depression, and acceptance. It also discusses physical, psychological, social, and spiritual needs of the dying, including the role of healthcare providers in providing support and a peaceful end of life experience.
This document discusses oxygenation and factors that can impact it. It covers the structures and processes involved in respiration and oxygen transport. Key points include the role of the respiratory and cardiovascular systems in gas exchange and oxygen transport, factors that can disrupt oxygen balance like diseases and lifestyle, signs of inadequate oxygenation, common tests to evaluate oxygen status like ABGs and chest x-rays, and nursing responsibilities related to promoting optimal respiratory and cardiovascular function.
The document defines oxygenation as the delivery of oxygen to body tissues and cells, describes the physiological process of oxygen transport from the lungs to cells, and outlines factors that can affect oxygen levels as well as signs and symptoms of hypoxia. It also provides details on administering oxygen to improve uptake and delivery through various methods and equipment.
This document discusses threat analysis and strategies for securing voting systems. It outlines potential threats like attacks on voters, candidates, or polling infrastructure. Different means of representing threats are examined, like attack trees that break down goals and methods of attackers. Challenges in threat analysis include the variety of possible attacks and dimensions to predict. The document also considers "unthinkable" attack scenarios and recommends strategies such as using independent expert teams and red team exercises to test systems and procedures. The conclusion is that threat trees can help identify flaws but unforeseen circumstances remain a challenge.
The document discusses fluid and electrolyte balance in the human body. It covers key topics like the components of body fluids, fluid compartments, electrolytes, fluid movement through diffusion, osmosis and active transport, causes of fluid shifts, effects of fluid imbalances, edema, and fluid resuscitation approaches.
As nurses, we are responsible of helping our patients maintain good hygiene and physical comfort, especially if they are unable to do so. The simple morning care and bedside care can contribute a lot in meeting this need. Positioning of bedridden patients aim to maintain physical comfort. However, these activities are the ones commonly not prioritized, or worse, not done by nurses, especially in government hospitals.
The document provides details on assessing a patient's oxygenation through nursing history, physical examination, and diagnostic tests. The nursing history focuses on collecting information on symptoms like chest pain, fatigue, dyspnea, cough, wheezing, respiratory infections, allergies, health risks, medications, smoking, and other exposures. The physical examination involves inspection of the skin, breathing patterns, and palpation techniques to examine thoracic excursion, tactile fremitus, thrills, and heaves.
The document discusses normal and altered urinary and bowel elimination, including the anatomy and physiology related to waste excretion, common problems that can disrupt normal elimination, and nursing responsibilities in assessing and promoting normal elimination or treating disrupted patterns. Nursing goals are maintaining or restoring normal elimination, preventing risks like skin breakdown, and managing conditions like incontinence, constipation, or the use of ostomies through various interventions.
The document discusses various topics related to loss, grief, and the dying process. It describes how grief involves a sequence of emotional, cognitive, and psychological responses to loss. It outlines common stages in the grieving process including denial, anger, bargaining, depression, and acceptance. It also discusses physical, psychological, social, and spiritual needs of the dying, including the role of healthcare providers in providing support and a peaceful end of life experience.
This document discusses oxygenation and factors that can impact it. It covers the structures and processes involved in respiration and oxygen transport. Key points include the role of the respiratory and cardiovascular systems in gas exchange and oxygen transport, factors that can disrupt oxygen balance like diseases and lifestyle, signs of inadequate oxygenation, common tests to evaluate oxygen status like ABGs and chest x-rays, and nursing responsibilities related to promoting optimal respiratory and cardiovascular function.
The document defines oxygenation as the delivery of oxygen to body tissues and cells, describes the physiological process of oxygen transport from the lungs to cells, and outlines factors that can affect oxygen levels as well as signs and symptoms of hypoxia. It also provides details on administering oxygen to improve uptake and delivery through various methods and equipment.
This document discusses threat analysis and strategies for securing voting systems. It outlines potential threats like attacks on voters, candidates, or polling infrastructure. Different means of representing threats are examined, like attack trees that break down goals and methods of attackers. Challenges in threat analysis include the variety of possible attacks and dimensions to predict. The document also considers "unthinkable" attack scenarios and recommends strategies such as using independent expert teams and red team exercises to test systems and procedures. The conclusion is that threat trees can help identify flaws but unforeseen circumstances remain a challenge.
The document discusses fluid and electrolyte balance in the human body. It covers key topics like the components of body fluids, fluid compartments, electrolytes, fluid movement through diffusion, osmosis and active transport, causes of fluid shifts, effects of fluid imbalances, edema, and fluid resuscitation approaches.
Findings From Co-Creation Workshops on Using AI to Counter Fake NewsTitanEurope1
TITAN (EU R&I project) is dedicated to fighting disinformation, and is doing so through the co-creation of an AI-based engine that encourages citizens’ critical thinking to help them better identify false information online. Whilst AI offers exciting and unprecedented opportunities to deliver social good, the project team recognises it can entail ethical dangers too, from usability and understanding issues, to biases and data quality. To help counter any ethical implications, and enlighten the process of developing a trustworthy, ethically, and societally acceptable AI tool, TITAN has adopted a citizen-centric approach to understand requirements and needs. Citizens from across Europe have been involved in a co-creation process where their values, concerns and requirements were discussed, the results of which will become the foundation for the digital development of TITAN.
The first round of citizen co-creation was conducted during five-hour workshop's with 30 citizens in each session, in 8 different European countries - Denmark, Ireland, Italy, Spain, Lithuania, Belgium, Bulgaria and Slovakia. The co-creation framework created by TITAN partner the not-for-profit Danish Board of Technology consists of tried and tested engagement and co-creation methodologies.
Read more about the techniqies adopted at https://www.titanthinking.eu/post/building-together-insights-from-8-countries-co-creating-the-titan-ai-tool-to-fight-disinformation
This document provides contact information for various HellermannTyton locations around the world and describes the company's products and services. HellermannTyton designs innovative fiber splicing closures and copper cable management systems that protect connections from adverse environments while allowing access for installation and maintenance. Their modular closures can be expanded over time to increase capacity and ensure a future-proof network design. The company aims to provide high quality, customized solutions and be a leading partner for their customers' cable and connectivity needs.
Eurodocs faxepark horizon 2020 presentation 2014 11-13Eurodocs AB
This document summarizes Souheil "Sosso" Bcheri's career and business ventures. It discusses his background growing up in Lebanon and Sweden, and his education in statistics, IT security, and internet technologies. It outlines his work founding Eurodocs AB to develop electronic identification and digital signature solutions. It also describes his involvement in the ABC4Trust EU project to research anonymous authentication technologies, and tips he provides about obtaining financing and working on EU projects.
This document provides an overview of manufacturing and engineering in Lithuania. Some key points:
- Lithuania has experienced strong GDP growth in recent years and has a young, skilled workforce. Manufacturing accounts for 20% of GDP.
- The largest sectors for foreign direct investment projects are manufacturing, business services, and IT. The top investing countries are the US, Sweden, Norway, and the UK.
- Lithuania has a number of international manufacturing companies with plants in sectors such as automotive, electronics, food, and furniture. The engineering industry is also strong, growing over 64% in the last 5 years.
- Lithuania offers competitive advantages for foreign investment including a business-friendly tax and regulatory environment, EU
This document provides information about a networking event between Maryland and Dutch cybersecurity companies. It lists the speakers from Ausley Associates, the Netherlands Embassy, the Maryland Department of Commerce, and bwtech@UMBC. The background discusses Rotterdam and The Hague as hubs for the Dutch cybersecurity industry. Statistics are given for cybersecurity businesses and employees in both Maryland and the Netherlands. The 2017 cohort of the Maryland-Netherlands program is highlighted, with two Dutch participants planning to expand to Maryland. Advantages of doing business in the Netherlands are outlined. Baltimore Innovation Week 2017 is then briefly introduced from September 29 to October 7.
Bernard Van Isacker - PhoenixKM - Experience in social mediaWeb2LLP
Fifth session of the Web2LLP pilot for the online training course on web strategies and maximising the social media presence of Lifelong Learning Projects.
Topic: Round-table with experienced managers and trouble-shooting
Author: Bernard Van Isacker
Website: http://web2llp.eu/training/pilot-online-session-5-roundtable
Protecting apps and APIs using Nordic eIDsErik Wahlström
The document discusses three ways to use Nordic electronic IDs (eIDs) to protect applications and APIs. It describes eIDs as digital passports issued by governments to authenticate and digitally sign documents. The three approaches are: 1) Using the Swedish Mobile BankID to authenticate via a browser redirect, 2) Leveraging OAuth2 and a browser flow to authenticate with any eID, and 3) Connecting two devices to allow authentication via an eID on another device.
Foredrag holdt for Forum for samfunnssikkerhet og beredskap i Trøndelag 9. mars 2010. Tar for seg elektroniske spor som vi legger igjen, med spesielt fokus på kommunikasjonsdata og datalagringsdirektivet.
This is a presentation I held at the Computers, Privacy and Data Protection conference in Brussels in January 2010 (www.cpdpconferences.org). I present You Decide, a school project aimed at empowering young people to make their own (good) decisions when they use the internet and social media.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Findings From Co-Creation Workshops on Using AI to Counter Fake NewsTitanEurope1
TITAN (EU R&I project) is dedicated to fighting disinformation, and is doing so through the co-creation of an AI-based engine that encourages citizens’ critical thinking to help them better identify false information online. Whilst AI offers exciting and unprecedented opportunities to deliver social good, the project team recognises it can entail ethical dangers too, from usability and understanding issues, to biases and data quality. To help counter any ethical implications, and enlighten the process of developing a trustworthy, ethically, and societally acceptable AI tool, TITAN has adopted a citizen-centric approach to understand requirements and needs. Citizens from across Europe have been involved in a co-creation process where their values, concerns and requirements were discussed, the results of which will become the foundation for the digital development of TITAN.
The first round of citizen co-creation was conducted during five-hour workshop's with 30 citizens in each session, in 8 different European countries - Denmark, Ireland, Italy, Spain, Lithuania, Belgium, Bulgaria and Slovakia. The co-creation framework created by TITAN partner the not-for-profit Danish Board of Technology consists of tried and tested engagement and co-creation methodologies.
Read more about the techniqies adopted at https://www.titanthinking.eu/post/building-together-insights-from-8-countries-co-creating-the-titan-ai-tool-to-fight-disinformation
This document provides contact information for various HellermannTyton locations around the world and describes the company's products and services. HellermannTyton designs innovative fiber splicing closures and copper cable management systems that protect connections from adverse environments while allowing access for installation and maintenance. Their modular closures can be expanded over time to increase capacity and ensure a future-proof network design. The company aims to provide high quality, customized solutions and be a leading partner for their customers' cable and connectivity needs.
Eurodocs faxepark horizon 2020 presentation 2014 11-13Eurodocs AB
This document summarizes Souheil "Sosso" Bcheri's career and business ventures. It discusses his background growing up in Lebanon and Sweden, and his education in statistics, IT security, and internet technologies. It outlines his work founding Eurodocs AB to develop electronic identification and digital signature solutions. It also describes his involvement in the ABC4Trust EU project to research anonymous authentication technologies, and tips he provides about obtaining financing and working on EU projects.
This document provides an overview of manufacturing and engineering in Lithuania. Some key points:
- Lithuania has experienced strong GDP growth in recent years and has a young, skilled workforce. Manufacturing accounts for 20% of GDP.
- The largest sectors for foreign direct investment projects are manufacturing, business services, and IT. The top investing countries are the US, Sweden, Norway, and the UK.
- Lithuania has a number of international manufacturing companies with plants in sectors such as automotive, electronics, food, and furniture. The engineering industry is also strong, growing over 64% in the last 5 years.
- Lithuania offers competitive advantages for foreign investment including a business-friendly tax and regulatory environment, EU
This document provides information about a networking event between Maryland and Dutch cybersecurity companies. It lists the speakers from Ausley Associates, the Netherlands Embassy, the Maryland Department of Commerce, and bwtech@UMBC. The background discusses Rotterdam and The Hague as hubs for the Dutch cybersecurity industry. Statistics are given for cybersecurity businesses and employees in both Maryland and the Netherlands. The 2017 cohort of the Maryland-Netherlands program is highlighted, with two Dutch participants planning to expand to Maryland. Advantages of doing business in the Netherlands are outlined. Baltimore Innovation Week 2017 is then briefly introduced from September 29 to October 7.
Bernard Van Isacker - PhoenixKM - Experience in social mediaWeb2LLP
Fifth session of the Web2LLP pilot for the online training course on web strategies and maximising the social media presence of Lifelong Learning Projects.
Topic: Round-table with experienced managers and trouble-shooting
Author: Bernard Van Isacker
Website: http://web2llp.eu/training/pilot-online-session-5-roundtable
Protecting apps and APIs using Nordic eIDsErik Wahlström
The document discusses three ways to use Nordic electronic IDs (eIDs) to protect applications and APIs. It describes eIDs as digital passports issued by governments to authenticate and digitally sign documents. The three approaches are: 1) Using the Swedish Mobile BankID to authenticate via a browser redirect, 2) Leveraging OAuth2 and a browser flow to authenticate with any eID, and 3) Connecting two devices to allow authentication via an eID on another device.
Foredrag holdt for Forum for samfunnssikkerhet og beredskap i Trøndelag 9. mars 2010. Tar for seg elektroniske spor som vi legger igjen, med spesielt fokus på kommunikasjonsdata og datalagringsdirektivet.
This is a presentation I held at the Computers, Privacy and Data Protection conference in Brussels in January 2010 (www.cpdpconferences.org). I present You Decide, a school project aimed at empowering young people to make their own (good) decisions when they use the internet and social media.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
What I’m going to present to you today is based on an EU-funded project that Teknologirådet participated in, and that was finished last year, called PRISE.
Our focus was on technologies and means to ensure the security of the society, but the result should be applicable also to safety and security in the transport sector. We started out by making an overview of different basic technologies that make up security applications. These technologies are also central in ITS applications:
Communication technologies is a basis for all ITS applications. The use of positioning technology such as GPS is an example - and in particular when the position of the vehicle is communicated to other systems. A very relevant example is eCall – that will ”phone home” – or rather 112 – and give a full report when a vehicle has been involved in an accident. The potential for use of positioning or locating technologies in other applications, such as traffic planning, is growing with every gadget we get with a GPS. In a few years most of us will walk or drive around with more than one of these on us. And communication technology is more than what we traditionally think of – phone calls, e-mails and such. There is also communication between an RFID sender and the toll booth that we pass, between the two cameras involved in automated traffic control over a distance etc. The main privacy challenge with communications technology is eavesdropping – that someone can get hold of the information during the communication.
And of course we looked at sensors, such as cameras (electro optical sensors). In safety and security in the transport sector they are both used traditionally – for surveillance for instance in busses and trains, but also for ATC, licence plate registration and recognition etc.
Other sensors can be RFID chips for road pricing or toll. Black boxes (i didn’t find a good picture of that), ticketing systems for public transport. And – if we leave the road for a while – embedded in identity documents used when we travel abroad. The main privacy challenge with sensors is transparency: It is often impossible for a person to know if he or she is captured by a camera, of if an RFID tag is read by a reader.
I’d like to also touch on biometrics. We see an increasing use of this in the transport sector, mainly for security reasons, or a combination of security and efficiency: Check-in at airports using fingerprints, iris scans etc. On the roads, license plate recognition is the most used (“biometrics” for cars), and of course with enough cameras – like in London – there is a potential to follow a car around town with the cameras. As facial recognition improves, we will see the possibility of following a person around on CCTV. Biometrics are of course very closely linked to the person they belong to, but the privacy challenges are mainly connected to how you collect the information and how you handle it later. Is it communicated in any way – from a local checkpoint to a central register? Or is it only stored locally – for instance on the subjects ID-card?
Which leads us to storage. When I started working in the computer industry, the problem used to be that there wasn’t enough storage – in fact a chunk of the Norwegian Motor vehicle registry was deleted at one point - i think it was in the 80s - to save storage space. Today the problem – from a privacy perspective - is the opposite. There is so much storage space and it’s so cheap that it’s actually cheaper to just keep data than to delete it when you don’t need it any more. We store data about everything: Toll booth passing, air and sea travel, travel by public transport, information about vehicles...
And information in different databases can be analysed and put together And here we come to the privacy concerns: Is the data correct? Updated? Complete? Is it secure? Or is it easy to get access to data you don’t really need to see? Is it only used for the purpose that it was collected for? If not, we have what we call function creep, and it is a big concern in the privacy communities. Function creep is for instance when you start giving tax authorities access to toll booth data so they can check that people don’t get tax deductions they aren’t entitled to...
In order to take privacy into consideration, the privacy impact need to be assessed for all projects that involve personal data. I’m very happy that The Norwegian Ministry of Administration and Government Reform has made a guide for making such an assessment.
I was also very pleased when I found this quote in the new National Transport Plan from the Ministry of Transport and Communication.
And this: And just a small disclaimer: These are my own translations from Norwegian to English, not official ones.
Making an evaluation is nice, but what do you do when you find that the things that you REALLY REALLY want to do come with a cost for privacy? I think we should be realistic enough to acknowledge that we still will get both safety and security technologies or means that will affect privacy in the future. An ITS example – although not so safety or security related – could be road pricing. Road pricing can be implemented in many ways. The simplest one is that you pay a certain amount of money when you pass a toll booth – most commonly on your way into a big city. Of course this can be really unfair. Someone who lives just outside the ”border” and drives 10 minutes to work, pays the same as someone who drives around inside the city limits all day! With a ”black box” and a GPS you could make a much more fair system, where those who drive the most, in rush hours, on the most densely trafficked roads, pays the most. Similar systems could of course be part of a safety system, where back boxes could be checked by the police or insurance companies, or the car could ”phone home” every time you commit a traffic violation. But this is a type of technology that people find extremely privacy violating. We need to ask ourselves: Does the gain in safety or security outweigh the cost to privacy? In cases where you – after careful analysis – end up implementing something that you know will impact privacy, it is important to try and minimise the effect as much as possible.
We need some tools. The PRISE project have identified three types of such tools.
The first is legal tools. Which is what we always want to do, isn’t is – just regulate ourselves away from the problem? Legal tools regulate the use of the technology, and sometimes we need this because most technologies can be used for many different purposes.
Data storage for instance can be used to store a lot of information that does not affect peoples’ privacy, but because it can also be used for storing personal data, we need to regulate what can be stored, for how long, etc.
Most people have one or more cameras – we can’t ban cameras just because they can be used to violate privacy. But if you want to set it up as a surveillance means in a public space we regulate where you can put them and who you must inform the public.
We also have some technical tools. These can be the implementation of privacy enhancing technologies,
Such as data minimisation – that is not collecting more data than you need in the first place.
Like this.
Or anonymisation, or pseudonymisation.
Organisational tools are often forgotten, but they are very important. Because for many technologies it’s how they’re actually put to use that decide whether they are privacy friendly or not. It doesn’t help to have laws protecting privacy, when the employees at the toll both company will tell the “concerned” husband that his wife passed the booth 30 minutes ago anyway!
And it doesn’t help that an ICT system has excellent features for assigning roles and access rights, if all employees are just entered as ”administrators”.
If you have money, you have the power to change things.
Governments have money. Make privacy a criteria in public procurement. Private enterprises make a living by delivering products and services that are in demand. If privacy is in demand, they will deliver it.
Evaluate the use and effect of technologies and means for security. Did the cameras really reduce the crime rate? Does the police get more convictions when they can store telecommunications data longer? It sounds obvious, but the fact is that for Norway, nobody can answer these questions.
Terminate it if it doesn’t work
OR if it’s no longer needed. When something bad happens we want our politicians to react. – And they want to be seen to do something. Sometimes we end up with new security measures. And Security measures already installed and funded have this annoying habit of becoming permanent – even when there is no apparent reason why they should. We need routines to make sure that we get rid of privacy infringing security measures that doesn’t work or are no longer needed.