Presentation by Yao-Min (Frank) Fang during the Sensor Web System and Visualization paper session of the Sensor Web Enablement workshop (held during the 2011 Cybera Summit).
Cyber Summit 2016: Technology, Education, and DemocracyCybera Inc.
What are the opportunities and the challenges offered by emerging modes of technologically-inflected communication and decision-making? What is our role and responsibility as educators and as developers of research and teaching digital infrastructures? What do students need in the 21st century? As education institutions and providers struggle to respond to the first two questions, are we abrogating our responsibility to the last?
In this talk, Matt Ratto will describe some of the opportunities and the challenges we currently face, laying out a model of action for how to potentially address the questions raised above. Core to his thinking are two related points; first that we must help students develop a greater sense of how the informational world and its attendant infrastructures helps shape how and what we think, and second, that a good way to do this is to give students the space to engage in reflexive acts of technological production – what Matt has termed ‘critical making.’ He will provide concrete examples from both his research and his teaching that demonstrate the value and importance of reflexive, hands-on work with digital technologies in helping students develop the critical digital literacy skills they need to function in today’s society.
Matt Ratto is an Associate Professor in the Faculty of Information at the University of Toronto and directs the Semaphore Research cluster on Inclusive Design, Mobile and Pervasive Computing and, as part of Semaphore, the Critical Making lab.
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCybera Inc.
There is a prevailing belief that users are the weakest link the security chain. In this presentation, Dr. Chiasson discusses how this perspective is inherently counterproductive to achieving increased cyber security and explore alternatives with a higher chance of improving security. Why do users behave insecurely even though most will readily state that security and privacy are important? This talk will cover some of our recent research exploring reasons why users' actions do not necessarily reflect their desire for security and how the configuration of security systems may actually weaken security in practice. She presents her work using eye-tracking to determine how users make phishing determinations, and how we can persuade users to behave more securely through improving their mental models of passwords and by making adjustments to the system configurations.
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCybera Inc.
Serious threats to private and governmental organizations do not only come from the outside world, but also come from within. Some employees and contractors with legitimate access to buildings, networks, assets and information deliberately misuse their priviledged access to cause harm to their organization. What are the reasons behind their actions? Is it debts, greed, ideology, disgruntlement, or divided loyalty?
Regardless of their motivations or vulnerabilities, traitors have very similar types of personality and display a certain pattern of behaviours before committing an insider incident. As a prevention measure, it is vital that organizations and employees understand, recognize and detect the common indicators of insider threat. Would you recognize the signs?
Mario Vachon is an Insider Threat Security Specialist with the RCMP Departmental Security Branch.
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCybera Inc.
Canada allocates a substantial amount of public funding to research, which is a critical factor in ensuring we remain innovative and competitive. Increasingly this funding is geared to the support and development of digital research infrastructure (DRI), including the underlying networks and the associated data acquisition, storage, analysis and visualization. In order to maximize the benefits of increasingly complex DRI and the research it facilitates, it is important to make sure data is properly stewarded, accessible and reusable. By adopting appropriate approaches to research data management we are better positioned to respond to challenges, such as effectively measuring research impacts, and ensuring the reproducibility, privacy, and security of research outputs.
Research Data Canada (RDC) is a member-driven organization committed to developing a sustainable approach to research data management, one based on interoperability and best practices. This session will provide an update on the efforts of RDC and partner organizations, including: CANARIE, Compute Canada, CARL Portage Network, CASRAI, the TriAgencies, and the Leadership Council for Digital Infrastructure. Intersections with international activities and projects will also be highlighted. These efforts are ultimately designed to faciliate a cohesive national approach to research data management, and one based on a clearly articulated vision for supporting innovation and discovery in Canada.
Mark Leggott is the Executive Director of Research Data Canada.
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCybera Inc.
The Internet has revolutionized how — and how much — each of us can know. Our digital tools put the knowledge of the world at our fingertips — and soon, maybe, right into our heads. But what kinds of of knowledge do our devices give us, and how are they reshaping and challenging the role that education and libraries should play in our lives?
This talk was delivered by Michael Patrick Lynch, professor of philosophy at the University of Connecticut, where he directs the university’s Humanities Institute.
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
Although there is no well-established definition of big data, its main characteristic is its sheer volume. Large volumes of data are generated by people (e.g., via social media) and by technology, including sensors (e.g., cameras, microphones), trackers (e.g., RFID tags, web surfing behavior) and other devices (e.g., mobile phones, wearables for self-surveillance/quantified self), whether or not they are connected to the Internet of Things. However, the large volumes of data needed to capitalize on the benefits of big data can to some extent also be established by the reuse of existing data, a source that is sometimes overlooked.
Data can be reused for purposes similar to that for which it was initially collected, but also beyond these purposes. Similarly, data can be reused in its original context, but also beyond this context. However, such repurposing and recontextualizing of data may lead to privacy issues. For instance, data reuse may lead to issues regarding informed consent and informational self-determination. When the data is used for profiling and other types of predictive analytics, also issues regarding stigmatization and discrimination may arise. This presentation by Bart Custers, Head of Research, eLaw – Center for Law and Digital Technologies at Leiden University, The Netherlands, focuses on the privacy issues of big data sharing and reuse and how these issues could be addressed.
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cybera Inc.
Stephen Childs was hired by the University of Calgary to develop an individual-level predictive model mapping students' decisions to attend the University. In his experience, the higher education sector was slow to use all the data it has available, but this is now changing.
As interest in making use of organizational data grows, staff must consider how these models will be used, and any problems that could arise. When individual predictions become the basis for decisions, how do we ensure our algorithms don't make existing problems worse? A framework for handling these issues now will let organizations handle these issues in a way that is consistent with their values.
Given the culture of today's institutions, and the success of predictive analytics in other fields, there is no doubt that these tools will be used. These techniques can improve student success and the competitiveness of educational organizations, but the benefits should not be gained at the expense of individuals within the system. This talk will propose a set of best practices for using institutional data for predictive modelling to address equity, privacy and other concerns. We must start thinking of this now, before other practices become entrenched.
Cyber Summit 2016: Technology, Education, and DemocracyCybera Inc.
What are the opportunities and the challenges offered by emerging modes of technologically-inflected communication and decision-making? What is our role and responsibility as educators and as developers of research and teaching digital infrastructures? What do students need in the 21st century? As education institutions and providers struggle to respond to the first two questions, are we abrogating our responsibility to the last?
In this talk, Matt Ratto will describe some of the opportunities and the challenges we currently face, laying out a model of action for how to potentially address the questions raised above. Core to his thinking are two related points; first that we must help students develop a greater sense of how the informational world and its attendant infrastructures helps shape how and what we think, and second, that a good way to do this is to give students the space to engage in reflexive acts of technological production – what Matt has termed ‘critical making.’ He will provide concrete examples from both his research and his teaching that demonstrate the value and importance of reflexive, hands-on work with digital technologies in helping students develop the critical digital literacy skills they need to function in today’s society.
Matt Ratto is an Associate Professor in the Faculty of Information at the University of Toronto and directs the Semaphore Research cluster on Inclusive Design, Mobile and Pervasive Computing and, as part of Semaphore, the Critical Making lab.
Cyber Summit 2016: Understanding Users' (In)Secure BehaviourCybera Inc.
There is a prevailing belief that users are the weakest link the security chain. In this presentation, Dr. Chiasson discusses how this perspective is inherently counterproductive to achieving increased cyber security and explore alternatives with a higher chance of improving security. Why do users behave insecurely even though most will readily state that security and privacy are important? This talk will cover some of our recent research exploring reasons why users' actions do not necessarily reflect their desire for security and how the configuration of security systems may actually weaken security in practice. She presents her work using eye-tracking to determine how users make phishing determinations, and how we can persuade users to behave more securely through improving their mental models of passwords and by making adjustments to the system configurations.
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCybera Inc.
Serious threats to private and governmental organizations do not only come from the outside world, but also come from within. Some employees and contractors with legitimate access to buildings, networks, assets and information deliberately misuse their priviledged access to cause harm to their organization. What are the reasons behind their actions? Is it debts, greed, ideology, disgruntlement, or divided loyalty?
Regardless of their motivations or vulnerabilities, traitors have very similar types of personality and display a certain pattern of behaviours before committing an insider incident. As a prevention measure, it is vital that organizations and employees understand, recognize and detect the common indicators of insider threat. Would you recognize the signs?
Mario Vachon is an Insider Threat Security Specialist with the RCMP Departmental Security Branch.
Cyber Summit 2016: Research Data and the Canadian Innovation ChallengeCybera Inc.
Canada allocates a substantial amount of public funding to research, which is a critical factor in ensuring we remain innovative and competitive. Increasingly this funding is geared to the support and development of digital research infrastructure (DRI), including the underlying networks and the associated data acquisition, storage, analysis and visualization. In order to maximize the benefits of increasingly complex DRI and the research it facilitates, it is important to make sure data is properly stewarded, accessible and reusable. By adopting appropriate approaches to research data management we are better positioned to respond to challenges, such as effectively measuring research impacts, and ensuring the reproducibility, privacy, and security of research outputs.
Research Data Canada (RDC) is a member-driven organization committed to developing a sustainable approach to research data management, one based on interoperability and best practices. This session will provide an update on the efforts of RDC and partner organizations, including: CANARIE, Compute Canada, CARL Portage Network, CASRAI, the TriAgencies, and the Leadership Council for Digital Infrastructure. Intersections with international activities and projects will also be highlighted. These efforts are ultimately designed to faciliate a cohesive national approach to research data management, and one based on a clearly articulated vision for supporting innovation and discovery in Canada.
Mark Leggott is the Executive Director of Research Data Canada.
Cyber Summit 2016: Knowing More and Understanding Less in the Age of Big DataCybera Inc.
The Internet has revolutionized how — and how much — each of us can know. Our digital tools put the knowledge of the world at our fingertips — and soon, maybe, right into our heads. But what kinds of of knowledge do our devices give us, and how are they reshaping and challenging the role that education and libraries should play in our lives?
This talk was delivered by Michael Patrick Lynch, professor of philosophy at the University of Connecticut, where he directs the university’s Humanities Institute.
Cyber Summit 2016: Privacy Issues in Big Data Sharing and ReuseCybera Inc.
Although there is no well-established definition of big data, its main characteristic is its sheer volume. Large volumes of data are generated by people (e.g., via social media) and by technology, including sensors (e.g., cameras, microphones), trackers (e.g., RFID tags, web surfing behavior) and other devices (e.g., mobile phones, wearables for self-surveillance/quantified self), whether or not they are connected to the Internet of Things. However, the large volumes of data needed to capitalize on the benefits of big data can to some extent also be established by the reuse of existing data, a source that is sometimes overlooked.
Data can be reused for purposes similar to that for which it was initially collected, but also beyond these purposes. Similarly, data can be reused in its original context, but also beyond this context. However, such repurposing and recontextualizing of data may lead to privacy issues. For instance, data reuse may lead to issues regarding informed consent and informational self-determination. When the data is used for profiling and other types of predictive analytics, also issues regarding stigmatization and discrimination may arise. This presentation by Bart Custers, Head of Research, eLaw – Center for Law and Digital Technologies at Leiden University, The Netherlands, focuses on the privacy issues of big data sharing and reuse and how these issues could be addressed.
Cyber Summit 2016: Establishing an Ethics Framework for Predictive Analytics ...Cybera Inc.
Stephen Childs was hired by the University of Calgary to develop an individual-level predictive model mapping students' decisions to attend the University. In his experience, the higher education sector was slow to use all the data it has available, but this is now changing.
As interest in making use of organizational data grows, staff must consider how these models will be used, and any problems that could arise. When individual predictions become the basis for decisions, how do we ensure our algorithms don't make existing problems worse? A framework for handling these issues now will let organizations handle these issues in a way that is consistent with their values.
Given the culture of today's institutions, and the success of predictive analytics in other fields, there is no doubt that these tools will be used. These techniques can improve student success and the competitiveness of educational organizations, but the benefits should not be gained at the expense of individuals within the system. This talk will propose a set of best practices for using institutional data for predictive modelling to address equity, privacy and other concerns. We must start thinking of this now, before other practices become entrenched.
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cybera Inc.
Canada’s National Research and Education Network, like other ultra-speed research networks, has evolved to transfer massive amounts of data at 100Gbps and beyond. But with the volume of data traffic growing at more than 50% per year, the ability to move increasing volumes of data is challenging. What are the kinds of applications in research and education that are driving this growth? What are the implications of the coming data tsunami on our communication networks? And what happens to network economics to keep up with the demand? CANARIE’s Chief Technology Officer, Mark Wolff, explores these topics and offer insights into how the NREN will evolve to continue to meet the unique needs of Canada’s research and education community.
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing DataCybera Inc.
The City of Calgary is responsible for providing municipal services to 1.1 million people and 16,000 employees with more than 700 sites and critical infrastructure units. The municipal services represent a $60B asset base including water and wastewater treatment plants, light rapid transit, emergency services, roads and recreation facilities, and has revenue and procurement streams of $4.0B annually. During his tenure, Owen Key, Chief Security Officer and the Chief Information Officer for the City, has implemented enterprise systems for CCTV, access and ID control, physical security information management systems, and has responsibility for information security.
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cybera Inc.
The law has long struggled to keep pace with the rapid change that comes with the Internet and new technologies. From the cross-border challenges posed by a global network to the privacy implications of big data, law and policy simply cannot move at “Internet speed.” Yet despite the difficulties, politicians and policy makers increasingly find themselves at the heart of emerging policy issues, asked to address the balance between privacy and surveillance, the competing copyright interests of creators and users, and the market structure for network providers and disruptive competitors. This keynote talk will explore the emerging law and policy challenges, highlighting how all Internet users have the opportunity to help shape the digital policy landscape. Dr. Michael Geist is a law professor at the University of Ottawa where he holds the Canada Research Chair in Internet and E-commerce Law.
As institutions start to delve into the staff / student / consumer data they have been storing for years, new questions are emerging about the repercussions of using this data. How will it be analyzed? Who is doing the analysis? And what steps should be taken to protect user’s privacy?
Historically, the University of Alberta lacked a centrally managed repository for reporting data, resulting in inconsistency and disparity in access for units across campus. Meaningful and actionable reports were limited, and only focused on the interests and goals of the few units with data analysts who could synthesize the information.
Over the last couple of years, the University of Alberta has undertaken major changes in how information is managed and utilized. At the forefront of this change has been an increased interest in supporting the development of analytics and supporting tools. Beginning with the implementation of a centrally managed data warehouse with self-service capabilities, and the introduction of cloud services with business process analysis tools, the University is just starting down the road of big data.
This presentation explores opportunities and challenges for the University of Alberta in utilizing big data.
Predicting the Future With Microsoft BingCybera Inc.
The next generation of data scientists will be asked to build predictive models that can extract inferences from very large datasets which are unobservable at the surface, even to the best domain experts. Microsoft has access to some truly large data sets, web and search data from the Bing search engine and social data through collaborations with Twitter. In this talk, we show you how a small team of data scientists used this data to build the Bing Predicts engine — a collection of machine learnt predictive models that is beating industry experts at predicting the outcome of events like the Super Bowl, the Oscars, elections and referendums and even breakthroughs in health sciences. The talk will also give a preview of how organizations can adopt a big data mindset to generate and experiment with large data sets and to make amazing predictions using their own data.
Analytics 101: How to not fail at analyticsCybera Inc.
"Data Scientist" is perhaps the hottest job title of recent years. But what is a data scientist? What does a data scientist actually do? And where can they be found? In this talk, presenter Daniel Haight describes the benefits of analytics to decision-making, and explores the characteristics of successful organizations that have fostered their own team of data scientists.
The MOOC movement is only four years old, but has already had a tremendous impact on teaching and learning. While the some of the original hype surrounding MOOCs has not been realized, the reality is that they are here for good and are influencing institutional thinking. This talk will discuss the past, present and future of MOOCs.
While the use of online instructional technologies allows the presentation of theoretical science materials, how do we deal with the fact that such courses often include hands-on labs? Laboratory simulations can only provide a solution for online students in a limited and often artificial way. Nearly 20 years ago, Athabasca University developed a solution to the problem of students having to travel to complete their lab work. Emerging technologies at the time allowed for quantitative physics labs to be sent to students as a small kit. The physics initiative was so successful, with over 5,000 students served, that it was picked up in other fields at Athabasca University.
Over the years, such material has become cheaper, easier to use, and more integrated with modern computers. Athabasca is now pioneering ways to put real labs directly onto the internet. In this session, the methods used to make real lab experiences available to online students will be discussed, and some of them demonstrated.
Canadian municipalities are making great strides when it comes to sharing their data in fun, interactive ways. In this session, presenters will look at cities that are using their data to create useful apps and services for citizens; and describe how all community leaders can get involved to make their municipality more open and accessible.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges. This session will offer insights into best practices for healthcare analytics programs, as well as use cases that demonstrate the potential benefits that can be realized through this work.
Checking in on Healthcare Data AnalyticsCybera Inc.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges.
Open access and open data: international trends and strategic contextCybera Inc.
Governments around the world fund billions of dollars in research every year. Ensuring that the results of research are available to the public, other researchers and industry has become an important underlying value in order to maximize the impact of our publicly funded research. This session will discuss what’s driving the trend towards greater openness and provide an overview of international developments that will help put Canada’s activities into context.
I didn't know i was a geomatics companyCybera Inc.
This explores the integration of spatial data into our work and personal lives, where it is evolving to, and how spatial information will play a critical role in the next decades. It discusses how companies are innovating new solutions that rely on spatial information, but consider themselves outside the domain of “geomatics companies” and what this means for the ecosystem.
Integrating Geospatial into the EverydayCybera Inc.
Geospatial data have been an integral part of the everyday at the City of Calgary since the City’s incorporation in the late 19th century. Today, geospatial professionals at the City of Calgary assemble and manage increasing variety and volume of geospatial data, and work to integrate these data into everyday business operations, including planning and response to civil emergencies such as the 2013 flood event. Despite challenges to data integration, coordination with business and technology partners have resulted in successful development, deployment and maintenance of specific business and enterprise tools that leverage rich spatial and business data with emerging technologies throughout the corporation in the 21st century.
The CEW is a not-for-profit organization based in Winnipeg, Manitoba that designs and delivers digital learning solutions to support workforce skills development. This presentation will share CEW's experiences in combining traditional learning theory with emerging technologies to develop innovative resources.
Hear more about the journey of designing adaptive and mobile learning solutions, including 3D Virtual Reality environments for training in the trades.
Take Aways for attendees:
An improved understanding of the complexities of blended learning
Greater appreciation of the life cycle of designing and developing learning technologies
Lessons learned
Educational Technology is becoming increasingly important in the higher education sector as innovative educators are using technology to improve pedagogy and student learning. This is not limited to academic institutions as corporate trainers also seek to leverage their people development resources to improve the operating performance of their organizations.
As a result the field of EdTech has been growing rapidly over the past decade as entrepreneurs see the opportunities to use technology to improve the speed and depth of learning. The drive ultimately stems from the transition to a knowledge economy where information is the vital fuel and improved learning can provide breakthrough insights that have substantial public or private value.
This presentation will look at the trends impacting and being impacted by EdTech, student and faculty perceptions, economics, adoption success, factors, investment patterns and the major technologies that are being used in higher educational institutions.
Digital Social Innovation and the Impact of Data Analytics Cybera Inc.
This presentation reviews how emerging digital technologies are being used to enable social innovation. An ecosystem is growing worldwide that is utilizing advancements in hardware, networks, data and collaboration to accelerate initiatives for social good. Highlighted are examples of how groups like DataKind and Data for Good are helping nonprofit organizations enhance their social impact through data analytics and visualization.
Jim discusses how Canada is currently positioned to take advantage of the data deluge, and how a range of stakeholders are involved in ongoing discussions to ensure Canada has the policies, infrastructure and tools to leverage this rich resource.
Jordan Engbers - Making an Effective Data ScientistCybera Inc.
It is difficult for organizations to find and train effective data scientists because of the
multidisciplinary nature of the requisite skillset, typically a combination of programming,
statistics and domain knowledge. Furthermore, data science technologies are evolving at a
rapid pace, requiring practitioners to constantly explore new tools and methodologies. Given this broad and changing landscape, how do we prepare the next generation of data scientists? Since we cannot predict what specific skills or knowledge will be required in the coming years, I propose that we focus on fostering generalist traits, like creativity, curiosity, critical thinking, and a scientific mindset. If we encourage a generalist approach to problem solving, new data scientists will be able to learn skills as necessary and adapt effectively to coming data science technologies.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Cyber Summit 2016: The Data Tsunami vs The Network: How More Data Changes Eve...Cybera Inc.
Canada’s National Research and Education Network, like other ultra-speed research networks, has evolved to transfer massive amounts of data at 100Gbps and beyond. But with the volume of data traffic growing at more than 50% per year, the ability to move increasing volumes of data is challenging. What are the kinds of applications in research and education that are driving this growth? What are the implications of the coming data tsunami on our communication networks? And what happens to network economics to keep up with the demand? CANARIE’s Chief Technology Officer, Mark Wolff, explores these topics and offer insights into how the NREN will evolve to continue to meet the unique needs of Canada’s research and education community.
Cyber Summit 2016: Issues and Challenges Facing Municipalities In Securing DataCybera Inc.
The City of Calgary is responsible for providing municipal services to 1.1 million people and 16,000 employees with more than 700 sites and critical infrastructure units. The municipal services represent a $60B asset base including water and wastewater treatment plants, light rapid transit, emergency services, roads and recreation facilities, and has revenue and procurement streams of $4.0B annually. During his tenure, Owen Key, Chief Security Officer and the Chief Information Officer for the City, has implemented enterprise systems for CCTV, access and ID control, physical security information management systems, and has responsibility for information security.
Cyber Summit 2016: Using Law Responsibly: What Happens When Law Meets Technol...Cybera Inc.
The law has long struggled to keep pace with the rapid change that comes with the Internet and new technologies. From the cross-border challenges posed by a global network to the privacy implications of big data, law and policy simply cannot move at “Internet speed.” Yet despite the difficulties, politicians and policy makers increasingly find themselves at the heart of emerging policy issues, asked to address the balance between privacy and surveillance, the competing copyright interests of creators and users, and the market structure for network providers and disruptive competitors. This keynote talk will explore the emerging law and policy challenges, highlighting how all Internet users have the opportunity to help shape the digital policy landscape. Dr. Michael Geist is a law professor at the University of Ottawa where he holds the Canada Research Chair in Internet and E-commerce Law.
As institutions start to delve into the staff / student / consumer data they have been storing for years, new questions are emerging about the repercussions of using this data. How will it be analyzed? Who is doing the analysis? And what steps should be taken to protect user’s privacy?
Historically, the University of Alberta lacked a centrally managed repository for reporting data, resulting in inconsistency and disparity in access for units across campus. Meaningful and actionable reports were limited, and only focused on the interests and goals of the few units with data analysts who could synthesize the information.
Over the last couple of years, the University of Alberta has undertaken major changes in how information is managed and utilized. At the forefront of this change has been an increased interest in supporting the development of analytics and supporting tools. Beginning with the implementation of a centrally managed data warehouse with self-service capabilities, and the introduction of cloud services with business process analysis tools, the University is just starting down the road of big data.
This presentation explores opportunities and challenges for the University of Alberta in utilizing big data.
Predicting the Future With Microsoft BingCybera Inc.
The next generation of data scientists will be asked to build predictive models that can extract inferences from very large datasets which are unobservable at the surface, even to the best domain experts. Microsoft has access to some truly large data sets, web and search data from the Bing search engine and social data through collaborations with Twitter. In this talk, we show you how a small team of data scientists used this data to build the Bing Predicts engine — a collection of machine learnt predictive models that is beating industry experts at predicting the outcome of events like the Super Bowl, the Oscars, elections and referendums and even breakthroughs in health sciences. The talk will also give a preview of how organizations can adopt a big data mindset to generate and experiment with large data sets and to make amazing predictions using their own data.
Analytics 101: How to not fail at analyticsCybera Inc.
"Data Scientist" is perhaps the hottest job title of recent years. But what is a data scientist? What does a data scientist actually do? And where can they be found? In this talk, presenter Daniel Haight describes the benefits of analytics to decision-making, and explores the characteristics of successful organizations that have fostered their own team of data scientists.
The MOOC movement is only four years old, but has already had a tremendous impact on teaching and learning. While the some of the original hype surrounding MOOCs has not been realized, the reality is that they are here for good and are influencing institutional thinking. This talk will discuss the past, present and future of MOOCs.
While the use of online instructional technologies allows the presentation of theoretical science materials, how do we deal with the fact that such courses often include hands-on labs? Laboratory simulations can only provide a solution for online students in a limited and often artificial way. Nearly 20 years ago, Athabasca University developed a solution to the problem of students having to travel to complete their lab work. Emerging technologies at the time allowed for quantitative physics labs to be sent to students as a small kit. The physics initiative was so successful, with over 5,000 students served, that it was picked up in other fields at Athabasca University.
Over the years, such material has become cheaper, easier to use, and more integrated with modern computers. Athabasca is now pioneering ways to put real labs directly onto the internet. In this session, the methods used to make real lab experiences available to online students will be discussed, and some of them demonstrated.
Canadian municipalities are making great strides when it comes to sharing their data in fun, interactive ways. In this session, presenters will look at cities that are using their data to create useful apps and services for citizens; and describe how all community leaders can get involved to make their municipality more open and accessible.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges. This session will offer insights into best practices for healthcare analytics programs, as well as use cases that demonstrate the potential benefits that can be realized through this work.
Checking in on Healthcare Data AnalyticsCybera Inc.
Data science and the use of big data in healthcare delivery could revolutionize the field by decreasing costs and vastly improving efficiency and outcomes. There is an abundance of healthcare data in Canada, but it is mostly siloed and difficult to access due to privacy and security challenges.
Open access and open data: international trends and strategic contextCybera Inc.
Governments around the world fund billions of dollars in research every year. Ensuring that the results of research are available to the public, other researchers and industry has become an important underlying value in order to maximize the impact of our publicly funded research. This session will discuss what’s driving the trend towards greater openness and provide an overview of international developments that will help put Canada’s activities into context.
I didn't know i was a geomatics companyCybera Inc.
This explores the integration of spatial data into our work and personal lives, where it is evolving to, and how spatial information will play a critical role in the next decades. It discusses how companies are innovating new solutions that rely on spatial information, but consider themselves outside the domain of “geomatics companies” and what this means for the ecosystem.
Integrating Geospatial into the EverydayCybera Inc.
Geospatial data have been an integral part of the everyday at the City of Calgary since the City’s incorporation in the late 19th century. Today, geospatial professionals at the City of Calgary assemble and manage increasing variety and volume of geospatial data, and work to integrate these data into everyday business operations, including planning and response to civil emergencies such as the 2013 flood event. Despite challenges to data integration, coordination with business and technology partners have resulted in successful development, deployment and maintenance of specific business and enterprise tools that leverage rich spatial and business data with emerging technologies throughout the corporation in the 21st century.
The CEW is a not-for-profit organization based in Winnipeg, Manitoba that designs and delivers digital learning solutions to support workforce skills development. This presentation will share CEW's experiences in combining traditional learning theory with emerging technologies to develop innovative resources.
Hear more about the journey of designing adaptive and mobile learning solutions, including 3D Virtual Reality environments for training in the trades.
Take Aways for attendees:
An improved understanding of the complexities of blended learning
Greater appreciation of the life cycle of designing and developing learning technologies
Lessons learned
Educational Technology is becoming increasingly important in the higher education sector as innovative educators are using technology to improve pedagogy and student learning. This is not limited to academic institutions as corporate trainers also seek to leverage their people development resources to improve the operating performance of their organizations.
As a result the field of EdTech has been growing rapidly over the past decade as entrepreneurs see the opportunities to use technology to improve the speed and depth of learning. The drive ultimately stems from the transition to a knowledge economy where information is the vital fuel and improved learning can provide breakthrough insights that have substantial public or private value.
This presentation will look at the trends impacting and being impacted by EdTech, student and faculty perceptions, economics, adoption success, factors, investment patterns and the major technologies that are being used in higher educational institutions.
Digital Social Innovation and the Impact of Data Analytics Cybera Inc.
This presentation reviews how emerging digital technologies are being used to enable social innovation. An ecosystem is growing worldwide that is utilizing advancements in hardware, networks, data and collaboration to accelerate initiatives for social good. Highlighted are examples of how groups like DataKind and Data for Good are helping nonprofit organizations enhance their social impact through data analytics and visualization.
Jim discusses how Canada is currently positioned to take advantage of the data deluge, and how a range of stakeholders are involved in ongoing discussions to ensure Canada has the policies, infrastructure and tools to leverage this rich resource.
Jordan Engbers - Making an Effective Data ScientistCybera Inc.
It is difficult for organizations to find and train effective data scientists because of the
multidisciplinary nature of the requisite skillset, typically a combination of programming,
statistics and domain knowledge. Furthermore, data science technologies are evolving at a
rapid pace, requiring practitioners to constantly explore new tools and methodologies. Given this broad and changing landscape, how do we prepare the next generation of data scientists? Since we cannot predict what specific skills or knowledge will be required in the coming years, I propose that we focus on fostering generalist traits, like creativity, curiosity, critical thinking, and a scientific mindset. If we encourage a generalist approach to problem solving, new data scientists will be able to learn skills as necessary and adapt effectively to coming data science technologies.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Sensor web enablement for debris flow monitoring system in taiwan
1. Sensor Web Enablement for
Debris Flow Monitoring System
in Taiwan
Yao-Min (Frank) Fang
Geographic Information Systems
Research Center
Feng Chia University
Taiwan
OGC Compliance
Testing Center www.gis.tw
5. Sensors in Debris Flow Monitoring
Station
Geophone Meteorological
sensors
Solar irradiation sensor
Water Level Meter CCD Camera
Temperature and Atmospheric
humidity sensor pressure sensor
Soil water Wire Sensor Wind speeds and
content sensor directions sensor
7. Current Debris Flow Monitoring System
Real –time data is transmitted
to ERC at SWCB by advanced
communication technology,
3.5G
such as satellite, 3.5G, and
Internet.
Cell phones
Rain Gauge Geophone
Mobile Station
Emergency Response Center Online Notice
Meteorological Wire Sensor
Instrument
CCD Water Content
Radar Water On-Site Station
Level Gauge Power Supply Risk Mgmt.
12. Estimating of debris flow velocity
50m
50m/3sec=17m/s
10 seconds
173m/10sec=17m/s
The comparison of downstream and midstream Underground
Sound analysis by Wavelet Transform at Shen-Mu station
(8/8 4:36~4:42)
17. Compound Hazards occurred
simultaneously:
Compound hazards occurred 甲仙鄉小林村災害
at Xiao-lin Village, Jia-xien, (複合型災害)
Kaoshiung:
Flooding Pre-typhoon
Shallow landslide 2008/11
Debris flow
Deep landslide
Barrier dam Post-Morakot
Dam bursting 2009/8
18. Basin-Wide Monitoring
Network Transmitting
to ERC
Upper Stream
Portable Units
Midstream
Mobile Station
On call for
hazard alert and
response
Long-term
Monitoring On-Site Station
Stream
Down
Hazard Alert & Response Time
19. Basin-Wide Monitoring Network
PointLinePlane: extended to
upper stream and the source of
debris, considering a whole
watershed.
Combining on-site, mobile station,
UAV
and portable units.
Portable Unit
Integrating data from different
agencies.
Mobile Station
地聲
On-Site
日照輻射計
Station CCD
自動溫濕度
水位計
計 大氣壓力計
土壤含水量 鋼索 風力風向計
土石流觀測站先進量測儀器
21. Portable Unit R&D
Design Conception
OGC‐SWE
Standard
Easy to Basic monitoring
Transport functions
Flexible on Various
Instrument Communication Lightweight
Installation Options
Plug-and-Play Easy to Operate
Power Supply
21
22. Portable Unit R&D
Container and Carrier Design Aluminum-alloy carrier
Carry on shoulder or
Military-standard box drag by hand
Full-Function Model
Use cables and nails to 96cm
fix the box. CCD box 16cm 10kg
Power Units 23cm 20kg
56cm
Intermediate
Main
63cm 35kg
Box
Basic &
Model
50cm
35cm
22
23. Portable Unit R&D
Rain
Touch gauge
Screen
Control
interface Data
Geophone Processing
Soil Units
water
moisture Data
Power Transmitter
Units
23
24. Receiving
Storage
Rain gauge Soil moisture meter Receiver Computing
Communication SWCB
Geophone AD Converter Wild Box Module
SAS
CCD Camera
Portable NCDR
Unit
GetObservation() WRA
SOS
Portable Unit1
SPS MOTC
Portable Unit2
CWB
CWB SWCB WRA Portable Unit3
25. Sweet SWE Server
Sensor
Sweet SWE Sensor
Server
Sensor
Application
2011 Geoinformatics Interoperability Days
26. Sweet SWE Server
Sweet SWE Server
SOS
Management Task
OBSERVE
WS
SOS
SPS Service Storage
WNS DB
DB Server
(c) 2011 Open Geospatial Consortium
33. SWE implemented in our monitoring
information service platform
Monitoring information
service has integrated to
debris flow forecasting
system.
34. SWE implemented in monitoring information
service platform Monitoring information
service has integrated to
debris flow forecasting
http://monitor.swcb.gov.tw system.
User can click on sensor
location and inquire
observation data directly.
35. SWE implemented in monitoring information
service platform Monitoring information
service has integrated to
debris flow forecasting
http://monitor.swcb.gov.tw system.
User can click on sensor
location and inquire
observation data directly.
External AP can request
observed data published
in our service platform
Cite observed data
External AP
36. Conclusions
Use 3S technique and a complete monitoring and
management system to provide complex type of
hazards’ real-time data.
Integrate information and data from agencies by
OGC’s SWE standard.
The portable unit includes PAC, battery,
communication, CCD camera, geophone, handy rain
gauge, soil moisture sensor and Sweet Swe Server.
The portable unit had been approved a success on
monitoring landslide and providing SWE-standard
data to different agencies.