Chris Messina gave a talk about how social networks and identity providers are shaping the modern internet landscape. He discussed how Twitter was used to organize protests in Iran and Moldova. The US government even asked Twitter to delay maintenance during the Iranian election. Messina argued that large companies are competing to become people's primary identity provider and control their online presence. However, individuals should maintain control over their own online identity and data. Messina promotes using an independent personal homepage and OpenID as one's identity provider rather than relying solely on large networks like Facebook or Google.
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
Boost For Kids sponsored "Social Media For Investigations" education protocol training at Toronto Police College. Presentation slides of Detective Jeff Bangild
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Scott Mills
Boost For Kids sponsored "Social Media For Investigations" education protocol training at Toronto Police College. Presentation slides of Detective Jeff Bangild
Youth Communication and Privacy in the Social Media AgeNathan Wright
"Youth Communication and Privacy in the Social Media Age" presentation given at the American Library Association's youth privacy conference in Chicago on March 24, 2011.
Bombshell Revelation of US and Saudi Culpability in Creating ISIS Ignored by ...Chris Helweg
, the Qatari story would be totally ignored by the American mainstream media. In fact, not a single major outlet in the United States ran the story, though there were a few English-language articles in the Middle East. The only appearances in the U.S. were alternative media like Zero Hedge, the Ron Paul Institute, Antiwar.com, and a few others, mostly bloggers picking up from Zero Hedge.
This is a presentation for parents.
It commences with a quiz to see what they know about online profiles and goes on to give some facts and trends about the things students are up to online and why parents should support them.
What is the role of social media and networking in the workplace? What can you do to protect yourself as an employer from improper usage? Do you have a strategy for using social media. This Power Point will explore all of these themes.
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
I presented this at the 2013 New York State CyberSecurity conference.
An earlier version was presented at the NCSC.NL 2013 conference at The Hague.
Updated versions will be presented at GBATA 2013 in Helsinki, ASIS 59 in Chicago and elsewhere.
Mae Khoory International DevelopmentReflection Paper 3 Dr. IPazSilviapm
Mae Khoory
International Development
Reflection Paper 3
Dr. Indrakshi Tandon
Critique the relationship between international financial institutions (i.e. the World Bank and the IMF) and developing nations, and their promotion of neoliberal economic policies.
The World Bank and the International Monetary Fund has expanded their global reach and exert a great amount of influence when dealing with foreign countries and their internal affairs. These financial institutions hold a lot of power when it comes to determining the future of a developing country (or any country whether rich or poor, that took a loan from them). A great example of how these financial institutions utilize their power is the in documentary watched in class, which exhibited the IMF and the Suharto Regime, their relations, what went wrong and the consequences suffered.
Just a brief summary of both financial institutions, the World Bank was founded at the United Nations Monetary and Financial Conference (also known as the Bretton Woods Conference) in 1944. The International Monetary Fund was also founded alongside the World Bank in 1945, which was in the end of World War II. These financial institutions followed the Bretton Woods system; this system was used to control the value of money between countries. They were established in an era where the political climate was completely different than the current political climate. At the beginning, their aim was to help developing countries emerge from poverty and instability, but that slowly changed into an aggressive implementation of neoliberal economic policies that did more harm than good to the underdeveloped countries.
After gathering information and building up a fundamental idea of both these financial institutions and their forceful implementation of neoliberal policies on developing countries; I have concluded that developing countries are the puppets of these financial institutions, and these financial institutions are the puppets of the neoliberal “regime”. Firstly, why do I say neoliberal “regime”? Let us begin by defining a regime. In politics, a regime is a form of government (or a set of rules) that shapes the procedures of a government and its relationship with the society. In this case, the regime consists of private and powerful individuals who own large and powerful corporations that permit control for their own interests in order to gain profit; they shape the procedures of the (underdeveloped) society. I am pointing out the fact that these financial institutions use neoliberal policies as a form of governing on a country.
Why do I say puppet? In regards to the developing country’s relationship with these institutions, they fell into the hands of these powerful entities in (most likely) the desperation of their need for money. After being loaned the money, the IMF and the World Bank are able to control these countries’ internal affairs because now, they have a say in how they should use that money. Wher ...
Youth Communication and Privacy in the Social Media AgeNathan Wright
"Youth Communication and Privacy in the Social Media Age" presentation given at the American Library Association's youth privacy conference in Chicago on March 24, 2011.
Bombshell Revelation of US and Saudi Culpability in Creating ISIS Ignored by ...Chris Helweg
, the Qatari story would be totally ignored by the American mainstream media. In fact, not a single major outlet in the United States ran the story, though there were a few English-language articles in the Middle East. The only appearances in the U.S. were alternative media like Zero Hedge, the Ron Paul Institute, Antiwar.com, and a few others, mostly bloggers picking up from Zero Hedge.
This is a presentation for parents.
It commences with a quiz to see what they know about online profiles and goes on to give some facts and trends about the things students are up to online and why parents should support them.
What is the role of social media and networking in the workplace? What can you do to protect yourself as an employer from improper usage? Do you have a strategy for using social media. This Power Point will explore all of these themes.
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
I presented this at the 2013 New York State CyberSecurity conference.
An earlier version was presented at the NCSC.NL 2013 conference at The Hague.
Updated versions will be presented at GBATA 2013 in Helsinki, ASIS 59 in Chicago and elsewhere.
Mae Khoory International DevelopmentReflection Paper 3 Dr. IPazSilviapm
Mae Khoory
International Development
Reflection Paper 3
Dr. Indrakshi Tandon
Critique the relationship between international financial institutions (i.e. the World Bank and the IMF) and developing nations, and their promotion of neoliberal economic policies.
The World Bank and the International Monetary Fund has expanded their global reach and exert a great amount of influence when dealing with foreign countries and their internal affairs. These financial institutions hold a lot of power when it comes to determining the future of a developing country (or any country whether rich or poor, that took a loan from them). A great example of how these financial institutions utilize their power is the in documentary watched in class, which exhibited the IMF and the Suharto Regime, their relations, what went wrong and the consequences suffered.
Just a brief summary of both financial institutions, the World Bank was founded at the United Nations Monetary and Financial Conference (also known as the Bretton Woods Conference) in 1944. The International Monetary Fund was also founded alongside the World Bank in 1945, which was in the end of World War II. These financial institutions followed the Bretton Woods system; this system was used to control the value of money between countries. They were established in an era where the political climate was completely different than the current political climate. At the beginning, their aim was to help developing countries emerge from poverty and instability, but that slowly changed into an aggressive implementation of neoliberal economic policies that did more harm than good to the underdeveloped countries.
After gathering information and building up a fundamental idea of both these financial institutions and their forceful implementation of neoliberal policies on developing countries; I have concluded that developing countries are the puppets of these financial institutions, and these financial institutions are the puppets of the neoliberal “regime”. Firstly, why do I say neoliberal “regime”? Let us begin by defining a regime. In politics, a regime is a form of government (or a set of rules) that shapes the procedures of a government and its relationship with the society. In this case, the regime consists of private and powerful individuals who own large and powerful corporations that permit control for their own interests in order to gain profit; they shape the procedures of the (underdeveloped) society. I am pointing out the fact that these financial institutions use neoliberal policies as a form of governing on a country.
Why do I say puppet? In regards to the developing country’s relationship with these institutions, they fell into the hands of these powerful entities in (most likely) the desperation of their need for money. After being loaned the money, the IMF and the World Bank are able to control these countries’ internal affairs because now, they have a say in how they should use that money. Wher ...
64The Empire Strikes Back Social Media Uprisings and .docxevonnehoggarth79783
64
The Empire Strikes Back:
Social Media Uprisings and
the Future of Cyber Activism
by Ramtin Amin
ramtin amin is a Master in Public Policy
student at the John f. Kennedy school of
Government at Harvard University where he
concentrates in international and global
affairs. He has conducted extensive
research at the nexus of technology and
democracy and plans to pursue doctoral
work in this field upon graduating.
Neda Agha-Soltan and a few close friends
headed toward the center of Tehran, Iran,
in June 2009 to join thousands of others
in an anti-government protest following
the disputed presidential election. After
becoming stuck in traffic, Agha-Soltan
and her friends eventually decided to exit
the car to cool off. As she stepped out and
gazed at the crowd, the sound of a
gunshot rang through the air. A single
bullet was fired, and she fell to
the ground.
Bystanders captured her last moments
on a cell phone, and within hours the
grainy, low-resolution footage was
uploaded to the Internet and soon spread
virally across the globe. With links to
the video posted on YouTube, Facebook,
and Twitter, the amateur clip eventually
harnessed the attention of the mainstream
media, grabbing headlines on CNN and
in the New York Times.
Agha-Soltan’s death became a symbol for
the Iranian anti-government movement,
and online social media amplified that
symbol for the rest of the world to see.
TRADITIONAL POWER CIRCUMVENTED
The image of Agha-Soltan’s death was not
one that Iran’s government wanted the
world to see. In a country notorious for
its media censorship, the emergence of
online social networking sites and cell
phone cameras now allows citizens to
bypass state-censored media instantly and
transmit a message or video clip to
countless others at little or no cost. Digital
media has enabled average citizens,
including the two bystanders at the scene
of Agha-Soltan’s death, to provoke
outrage and motivate millions of people
to their feet at the touch of a button. Such
a level of power was previously limited to
just a small number of people within a
governing regime or those leading an
opposition group.
But this phenomenon is not unique
to Iran. Around the world, social
networking sites like YouTube and
Facebook are becoming unlikely leaders
of political power, as citizens circumvent
single political or religious leaders to
become champions of their
own campaigns.
DIGITAL ACTIVISM IN ACTION
Digital activism, also known as cyber
activism or e-activism, describes how
citizens can use digital tools to effect
social and political change. These digital
tools range from mobile phones and
digital cameras to Web 2.0 social
networking sites like YouTube, Facebook,
and Twitter.
65harvard kennedy school review | volume 10 | 2009–2010
unlikely leaders
activism became recognized as a source of
political power.
NOT WITHOUT LIMITATIONS
The Burmese and Moldovan cases also
demonstrate tha.
Presentation for the Seminar on Contemporary Issues of Communication and Culture, Escola de Sociologia e Políticas Públicas, Lisbon University Institute, Lisbon, Portugal, 29 April 2021.
Kaelan Wong Professor Gina Gemmel English 161 Dece.docxcroysierkathey
Kaelan Wong
Professor Gina Gemmel
English 161
December 12, 2017
Social Media’s Victory in the 2016 Presidential Election
There has been a lot of talk since the 2016 presidential election because of how unique it
was compared to all the previous ones. Only recently has social media started to play a
significant role in political campaigns, which can clearly be seen with Donald trump’s campaign
in the 2016 election. This paper examines articles written by Michael Barbaro and Christine
Lagorio-Chafkin for the New York Times alongside academic journals written by Gunn Enli and
Frida Ghitis for the European Journal of Communications and the World Politics Review,
respectively. Regarding social media, many tend to focus on its rise in popular culture, the
following of people of people that it tends to bring, and its use by the candidate or its political
party. Although there are people who argue that Trump’s political views and ideologies are what
gave him an advantage, Trump’s social media is what led him to victory.
For one thing, it is clear that social media is generally on the rise in society, today. A
majority of researchers would agree that the rise of social media has been prominent in these past
few years. Michael Barbaro, author of “Pithy, Mean, and Powerful: Donald Trump Mastered
Twitter for 2016,” states how social media is free and can relay information to the public in a
quick way. Barbaro points out how this can be useful, especially as it slowly substitutes for
“costly, conventional” methods. As an example, Barbaro mentions how rival campaigns
acknowledge the advantage Trump has because of his millions of Twitter followers and how he
gets more mentions and retweets compared to other candidates. Gunn Enli, author of “Twitter as
Student 2
Arena for the Authentic Outsider: Exploring the Social Media Campaigns of Trump and Clinton
in the 2016 US Presidential Election,” takes this further, believing that social media can easily
reach the masses and serve as a main source of information. Enli reminds us that new platforms
have emerged while existing ones have expanded. Christin Lagorio-Chafkin, author of “Reddit
and the God Emperor of the Internet,” has a more specific focus on social media, claiming that
Reddit has become one of the most significant websites on the internet. Lagorio-Chafkin
observes how Trump’s subreddit “The_Donald” has gained around 300,000 members (It has
over half a million now as of October 2017). On the other hand, Frida Ghitis, author of “Trump’s
Victory Was Aided by Russia’s Weaponized Social Media Campaign,” takes on a different
focus: WikiLeaks. Arguably a type of social media, WikiLeaks grew to a significant size such
that it could be used to weaponize information. While all four authors believe that social media is
on the rise, Barbaro and Enli focused on Twitter’s rise. On the other hand, Lagorio-Chafkin puts
his focus on Reddit’s ...
AuthorityIs the page signed INCLUDEPICTURE httplib.nmsu.ed.docxikirkton
Authority
Is the page signed INCLUDEPICTURE "http://lib.nmsu.edu/instruction/checkbox.gif" \* MERGEFORMATINET
Is there an author? ?
Is the author qualified? An expert?
HYPERLINK "http://www.factcheck.org" Who is the sponsor?Is the sponsor of the page reputable? How reputable?
Is there a link to information about the author or the sponsor?
If the page includes neither a signature nor indicates a sponsor, is there any other way to determine its origin?
Look for a header or footer showing affiliation.
Look at the URL. http://www.fbi.gov
Look at the domain. .edu, .com, .ac.uk, .org, .net
Rationale
1. Anyone can publish anything on the web.
2. It is often hard to determine a web page's authorship.
3. Even if a page is signed, qualifications are not usually provided.
4. Sponsorship is not always indicated.
Accuracy
Is the information reliable and error-free?
Is there an editor or someone who verifies/checks the information?
Rationale
1. See number 1 above
2. Unlike traditional print resources, web resources rarely have editors or fact-checkers.
3. Currently, no web standards exist to ensure accuracy.
Objectivity
Does the information show a minimum of bias?
Is the page designed to sway opinion?
Is there any advertising on the page?
Rationale
1. Frequently the goals of the sponsors/authors are not clearly stated.
Currency
Is the page dated?
If so, when was the last update?
How current are the links? Have some expired or moved?
Rationale
1. Publication or revision dates are not always provided.
2. If a date is provided, it may have various meanings. For example,
It may indicate when the material was first written
It may indicate when the material was first placed on the Web
It may indicate when the material was last revised
2. Often the Web serves as a virtual "Hyde Park Corner", a soapbox.
Coverage
What topics are covered?
What does this page offer that is not found elsewhere?
What is its intrinsic value?
How in-depth is the material?
Rationale
1. Web coverage often differs from print coverage.
2. Frequently, it's difficult to determine the extent of coverage of a topic from a web page. The page may or may not include links to other web pages or print references.
3. Sometimes web information is "just for fun", a hoax, someone's personal expression that may be of interest to no one, or even outright silliness.
110
Internet Activism
& the Party-State in China
Guobin Yang
GUOBIN YANG is Associate Pro-
fessor of Sociology and Commu-
nication in the Annenberg School
for Communication and the De -
partment of Sociology at the Uni-
versity of Pennsylvania. His publi-
cations include The Power of the
Internet in China: Citizen Activism
Online (2009), Re-Envisioning the
Chinese Revolution: The Politics and
Poetics of Collective Memories in Re -
form China (edited with Ching Kwan
Lee, 2007), and China’s Red Guard
Generation: Loyalty, Dissent, and
Nostalgia, 1966–1999 (forthcoming,
Columbia Univers ...
101810 602 PMTwitter, Facebook, and social activism The N.docxpaynetawnya
10/18/10 6:02 PMTwitter, Facebook, and social activism : The New Yorker
Page 1 of 6http://www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwell?printable=true
A
Social media can’t provide what social change has always required.
ANNALS OF INNOVATION
SMALL CHANGE
Why the revolution will not be tweeted.
by Malcolm Gladwell
OCTOBER 4, 2010
t four-thirty in the afternoon on Monday, February 1, 1960, four college students sat down at the lunch counter at
the Woolworth’s in downtown Greensboro, North Carolina. They were freshmen at North Carolina A. & T., a black
college a mile or so away.
“I’d like a cup of coffee, please,” one of the four, Ezell Blair, said to the waitress.
“We don’t serve Negroes here,” she replied.
The Woolworth’s lunch counter was a long L-shaped bar that could seat sixty-six people, with a standup snack bar at
one end. The seats were for whites. The snack bar was for blacks. Another employee, a black woman who worked at the
steam table, approached the students and tried to warn them away. “You’re acting stupid, ignorant!” she said. They didn’t
move. Around five-thirty, the front doors to the store were locked. The four still didn’t move. Finally, they left by a side
door. Outside, a small crowd had gathered, including a photographer from the Greensboro Record. “I’ll be back
tomorrow with A. & T. College,” one of the students said.
By next morning, the protest had grown to twenty-seven men and four women, most from the same dormitory as the
original four. The men were dressed in suits and ties. The students had brought their schoolwork, and studied as they sat
at the counter. On Wednesday, students from Greensboro’s “Negro” secondary school, Dudley High, joined in, and the
number of protesters swelled to eighty. By Thursday, the protesters numbered three hundred, including three white
women, from the Greensboro campus of the University of North Carolina. By Saturday, the sit-in had reached six
hundred. People spilled out onto the street. White teen-agers waved Confederate flags. Someone threw a firecracker. At
10/18/10 6:02 PMTwitter, Facebook, and social activism : The New Yorker
Page 2 of 6http://www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwell?printable=true
T
G
noon, the A. & T. football team arrived. “Here comes the wrecking crew,” one of the white students shouted.
By the following Monday, sit-ins had spread to Winston-Salem, twenty-five miles away, and Durham, fifty miles
away. The day after that, students at Fayetteville State Teachers College and at Johnson C. Smith College, in Charlotte,
joined in, followed on Wednesday by students at St. Augustine’s College and Shaw University, in Raleigh. On Thursday
and Friday, the protest crossed state lines, surfacing in Hampton and Portsmouth, Virginia, in Rock Hill, South Carolina,
and in Chattanooga, Tennessee. By the end of the month, there were sit-ins throughout the South, as far west as Texas. “I
asked every student I met what the f ...
37 role of social media in political and regime change the college studyMary Smith
It is an educational blog and intended to serve as complete and self-contained work on essays, paragraph, speeches, articles, letters, stories, quotes.
https://www.thecollegestudy.net/
Drafted first chapter of Welcome to the Fifth Estate by Geoff Livingston before editorial review. This document discusses Fifth Estate, Long Tail and social media control theories.
C.P John, politician from Kerala, India, talks about how the process of political change is affected in the digital age and by the advent of websites like wikileaks, twitter, facebook etc
Similar to Social Network Supermarkets and How to Defeat Them (20)
Future of the Social Web and How to Stop ItChris Messina
The talk I presented in Chicago at SocialDevCamp.
The cartoon depiction of me is by David Lanham (http://dlanham.com).
http://www.socialdevcampchicago.com/
OpenID & OAuth for the Consumer Web Workshop, Part 1 of 3Chris Messina
This is the first 1/3 of a workshop I gave with Eric Sachs and David Primmer of Google at the Cloud Identity Summit.
http://www.cloudidentitysummit.com/
Slides from my session at Google I/O covering the latest and most important trends of the Social Web and dive deep into where this is all going, at the conceptual level.
From the concepts of digital identity, relationships, and social objects, this session will cover emerging technologies like WebFinger, Salmon, ActivityStrea.ms, OpenID, and OAuth.
http://code.google.com/events/io/2010/sessions/open-and-social-web.html
ActivityStrea.ms: Is It Getting Streamy In Here?Chris Messina
From Facebook's newsfeed to Twitter's relentless real-time updates, the metaphor of the "stream" has taken social networking beyond blog posts and on to rich social activities. Learn about ActivityStrea.ms - the open format adopted by Facebook, MySpace, and Windows Live - and how it's fundamentally changing the social web.
http://my.sxsw.com/events/event/400
One more variant of the Identity is the Platform talk — this time given at Netflix, mentioning Google's new Social Search experiment for the first time.
This is the talk I gave at Mindtrek in Tampere, Finland.
Video is available here:
http://factoryjoe.com/blog/2009/10/01/video-of-my-talk-identity-is-the-platform/
Presented by Chris Messina (OpenID Foundation), David Recordon (Six Apart), Joseph Smarr (Plaxo). As evidenced by Barack Obama’s successful presidential campaign, we have clearly entered the age of the social web. This developer-oriented workshop will emphasize the use and application of free, open building blocks for enabling social networking features on your site or service, and provide illuminating insights from some of the key figures creating these technologies.
http://en.oreilly.com/oscon2009/public/schedule/detail/8575
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Social Network Supermarkets and How to Defeat Them
1. SOCIAL NETWORK
SUPERMARKETS &
HOW TO DEFEAT THEM
Chris Messina • Open Source Bridge • June 18, 2009 • Portland, Oregon
Before I begin, I want to point out this is not a technical talk. Itʼs a little more philosophical and at a higher level.
3. to be perfectly honest, I have no idea what I was thinking when I proposed the title for this
talk. And I’ve actually struggled a bit to put together a coherent narrative for you, but I think I
managed to pull it off.
Just barely. I want to start by talking about something that’s still going on and that has a
great deal of significance in the world... It’s something that is representative of what’s going
on in the world and on the web. (CLICK)
8. Wear Green For a FREE Iran
Photo by David Lay
and people in the western world responded by joining the protest on their own.
9. Rules when supporting the Iranian People on Twitter:
1. Change your name and location to Tehran. This will
provide cover for the Tweeters in Tehran.
2. If you have proxy IP numbers to contribute, keep them
private. DM them to @stopAhmadi or @iran09
3. Use only #iranelection or #gr88
4. Use your common sense to sniff a tweet for Iranian
government misinformation - try and find corroboration
before you retweet.
5. Never name a source. Simply relay the information from
an Iranian source using F/Iran at the beginning.
and people spread around helpful tips on how to support the Iranian people on Twitter.
Convening and organizing through public channels — which were once trivialized and tossed
aside.
10. #IranElection
People organized themselves on Twitter and Facebook to protest what they felt was a corrupt
election. It was a global, sustained, protest using social media.
11. Washington Taps Into a Potent
New Force in Diplomacy
By MARK LANDLER and BRIAN STELTER
WASHINGTON — The Obama administration says it has
tried to avoid words or deeds that could be portrayed as
American meddling in Iran’s presidential election and its
tumultuous aftermath.
Yet on Monday afternoon, a 27-year-old State
Department official, Jared Cohen, e-mailed the social-
networking site Twitter with an unusual request: delay
scheduled maintenance of its global network, which
would have cut off service while Iranians were using
Twitter to swap information and inform the outside world
about the mushrooming protests around Tehran.
The request, made to a Twitter co-founder, Jack Dorsey,
is yet another new-media milestone: the recognition by
the United States government that an Internet blogging
service that did not exist four years ago has the potential
to change history in an ancient Islamic country.
“This was just a call to say: ‘It appears Twitter is playing
an important role at a crucial time in Iran. Could you keep
it going?’ ” said P.J. Crowley, the assistant secretary of
state for public affairs.
Source: New York Times
Apparently, Twitter was such a significant source of information that the State Department
asked Twitter to push back their scheduled maintenance...
12. Washington Taps Into a Potent
New Force in Diplomacy
By MARK LANDLER and BRIAN STELTER
WASHINGTON — The Obama administration says it has
tried to avoid words or deeds that could be portrayed as
American meddling in Iran’s presidential election and its
tumultuous aftermath.
Yet on Monday afternoon, a 27-year-old State
Department official, Jared Cohen, e-mailed the social-
networking site Twitter with an unusual request: delay
scheduled maintenance of its global network, which
would have cut off service while Iranians were using
Twitter to swap information and inform the outside world
The request, made to a Twitter co-founder, Jack Dorsey,
about the mushrooming protests around Tehran.
is yet anotherThe request, made to a milestone: Jack Dorsey,
new-media Twitter co-founder, the recognition by
is yet another new-media milestone: the recognition by
the United States government that an Internet blogging
the United States government that an Internet blogging
service that did not exist four years ago has the potential
service that did not exist four years ago has the potential
to change history in an ancient Islamic country.
to change history in an ancient Islamic country.
“This was just a call to say: ‘It appears Twitter is playing
an important role at a crucial time in Iran. Could you keep
it going?’ ” said P.J. Crowley, the assistant secretary of
state for public affairs.
Source: New York Times
Apparently, Twitter was such a significant source of information that the State Department
asked Twitter to push back their scheduled maintenance...
14. #pman
and this wasn’t the first time Twitter was used to organize people in an ad hoc fashion.
In April, the youth in Moldova stages similar protests, using the hashtag “pman”, for “Piata
Marii Adunari Nationale", which is Romanian name for the biggest square in Chisinau,
Moldova's capital.
15. Early this month, in the lead up to the Tiananmen 20th anniversary, China blocked sites
including Twitter, Flickr and Microsoft’s Hotmail.
but it’s not just in places known for their repressive politics.
16. this is also happening in places like Australia where the government has implemented its own
firewall amidst much protest.
in many ways, this is the same thing that has happened throughout the course of history,
when any new medium has entered the fray.
17. this is also happening in places like Australia where the government has implemented its own
firewall amidst much protest.
in many ways, this is the same thing that has happened throughout the course of history,
when any new medium has entered the fray.
18. “When the people fear their government,
there is tyranny; when the government fears
the people, there is liberty.”
—thomas jefferson
and so governments are reacting in quite the way you’d expect, by trying desperately to
control that which they do not understand, and that which they do not control.
of course, what this has resulted in is a great deal of new freedoms for many people around
the world.
19. but, something else is going on here that I think we’ve largely failed to recognize.
in the place of civic government, and new relationship (CLICK) between companies and
private citizens is emerging.
20. Photo by code poet
we just think it’s a free market right? capitalism, yay!
commercial interest and freedom of expression are coming together in awkward and
uncomfortable ways... and it’s accelerating, with unknown consequences.
now, I’ll attempt to make the connection to supermarkets later but for now let’s turn to a
popular and well-loved service... (CLICK).
22. Source: SFGate
now, it’s unfortunate, but not all that uncommon for a site like Flickr to ban a user or delete
their account for spamming, harassment or some other issue.
In the particular case of Shepherd Johnson, he chose to pick on the wrong Flickr user: the
President.
After posting several comments critical of the administration and a photo of a prisoner from
Abu Graib, his account was summarily deleted, along with his 1200 photos. A tragedy for
Shepherd, certainly, but it’s not the first time such a thing has happened.
23. so common are such scuffles that Flickr has a well known set of guidelines setting out just
how members of the community should behave.
but here’s where things start to change, and take on a new significance.
24. on January 31 of last year, Flickr became an OpenID provider, so that means that you can use
your Flickr/Yahoo account to sign in anywhere that OpenID is accepted.
See where I’m going here?
25. Photo by Jessi Bryan
okay, call me an identity alarmist — the proverbial canary in the coalmine....
but I want to impress upon you both the importance of the social web today, and of the
fragile existence of user identity given our current approach to what I call “web citizenship”.
(click)
26. and this is why i think openid is SO important as a transformational technology.
27. the stakes for internet identity are heating up. there is competition to be your identity
provider on the web.
i want you to really consider what the economic benefit to being in charge of your identity on
the web is.
28. Tim O’Reilly’s five rules
The perpetual beta becomes a process for engaging
customers.
Share and share-alike data, reusing others’ and providing
APIs to your own.
Ignore the distinction between client and server.
On the net, open APIs and standard protocols win.
Lock-in comes from data accrual, owning a namespace
or non-standard formats.
Photo by Dan Farber
In 2006, Tim O’Reilly wrote up five rules for web 2.0.
among them (CLICK)
29. Tim O’Reilly’s five rules
The perpetual beta becomes a process for engaging
customers.
Share and share-alike data, reusing others’ and providing
APIs to your own.
Ignore the distinction between client and server.
On the net, open APIs and standard protocols win.
Lock-in comes from data accrual, owning a namespace
or non-standard formats.
Photo by Dan Farber
he pointed out that lock-in — that is, the inability to move freely — comes from, among
others things, owning a namespace.
and that’s exactly the business that large social networks are getting in to.
30. why should anyone care?
why should anyone care?
after all:
real identity on the web is hard.
the benefits just aren’t obvious yet.
so why should anyone care?
31. internet identity needs to be
easy, convenient & useful
if i’m going to sell you internet identity i need to make it easy, convenient and useful
in other words, if it’s too hard for you to do it for yourself given the value, you’re going to let
someone else do it for you.
32. which is why so many companies are ready to make it easy to outsource your identity them.
33. • facebook.com/chrismessina
• friendfeed.com/chrismessina
• google.com/profiles/chrismessina
• twitter.com/chrismessina
So while you’re trying to “claim” your identity across the web (CLICK)
34. • facebook.com/chrismessina
• friendfeed.com/chrismessina
• google.com/profiles/chrismessina
• twitter.com/chrismessina
companies are ratcheting up their efforts to be namespace for people on the web.
35. i love this tweet from Dave Morin, a friend of mine who also happens to run Facebook’s
developer platform.
“slash” is the new “at”.
and who has a greater interest in establishing that than his employer?
36. @chrismessina
it’s currently the trend to refer to people by their Twitter usernames with the @ in front.
but what I facebook usernames take off, and you start referring to people like (CLICK) this?
40. Etc.
and so on. So long as you as the individual are not in charge of your namespace, there will be
a battle over who is.
41. These characters vying to provide you with a universal account are what we call “identity
providers” in the land of OpenID.
You might ask then (CLICK)
42. how do you choose the right
identity provider?
how exactly DO you go about picking an identity provider?
Well (click)
45. perhaps.
but without context, does this convey who you are to someone? When someone Googles
you... or now, BINGs you(?), which of your profiles do you want showing up first?
Because in some ways, that’s what this is really all about: being the authority over your
own identity.
46. This is my homepage. It’s admittedly sparse. Not the best thing I’ve ever done... but I have
complete control over it.
It’s also what I use as my OpenID. And, as it turns out, it’s also the first result when you
search for “chris messina” on Google.
47. now, why is this is important? why should any one care?
well, I think it’s because, for the first time ever, a whole lot more people care about your
identity online, and you should care too. (CLICK)
48. morality,
creativity,
spontaneity,
problem solving,
lack of prejudice,
Self-actualization acceptance of facts
self-esteem, confidence,
achievement, respect of others,
Esteem respect by others
friendship, family, sexual intimacy
Love/belonging
security of: body, employment, resources,
Safety morality, the family, health, property
breathing, food, water, sex, sleep, homeostasis, excretion
Physiological
Mazlow’s Hierarchy of Needs
we’re seeing a shift to using real identity because the social web is playing an increasingly
important role in “self-actualization”.
we’ve got our biological needs met, we feel safe for the most part, and with safety in
numbers comes belonging to a collective... we also are connecting with people in very real
ways, providing us with esteem — allowing us to move up the pyramid to the top, where we
can begin to operate at a much higher order of being.
49. so while our physiological needs are being met at a fundamental level by supermarkets like
Whole Foods (at the bottom of the pyramid)
50. are we ready to self-actualize through services like facebook or twitter alone?
54. Photo by Mae Encarnado
We’re the live free or die state. So while I live in San Francisco now (the most populous state),
I came from a much smaller place.
55. Print from the Library of Congress
and that meant reading the works of folks like Ralph Waldo Emerson and (CLICK)
56. Print from the Library of Congress
...and Henry David Thoreau who started a movement known as transcendentalism — an
idealistic movement centered on intuition and, among things... (CLICK)
57. Elston Press
reliance on the self. They advocated freedom from — at their time — interference from the
government, going to live in nature, to have a more direct experience with the world.
Regardless of the foibles of their particular movement, what is important for us to learn from
their example is not to think about our current situation in absolute terms but reflect on the
relative importance of individuality and independence.
58. supermarkets like whole foods aren’t going away — and indeed they make our lives
incredibly easier (CLICK)
59. morality,
creativity,
spontaneity,
problem solving,
lack of prejudice,
Self-actualization acceptance of facts
self-esteem, confidence,
achievement, respect of others,
Esteem respect by others
friendship, family, sexual intimacy
Love/belonging
security of: body, employment, resources,
Safety morality, the family, health, property
breathing, food, water, sex, sleep, homeostasis, excretion
Physiological
Mazlow’s Hierarchy of Needs
and they free us up to focus on those upper levels of the pyramid.
60. Photo by Alby Headrick
but, it’s still important that we maintain the ability or knowledge that enables us to grow our
own food even if we take for granted and enjoy the convenience of the supermarkets.
61. now maybe this all seems esoteric, but it is leading somewhere.
once you start to grow your own identity on the web... you soon realize (CLICK)
62. identity is the platform
that identity is the platform for the social web.
and this is why so many companies are falling over each other to serve your identity.
so this leads me to (CLICK)
63. Diso
the Diso Project.
to make it make it easier to build social experiences on the web
by deriving standards and formats from popular trends and turning them into reusable
technological building blocks.
64. Diso
Diso Project • http://diso-project.org
the Diso Project.
to make it make it easier to build social experiences on the web
by deriving standards and formats from popular trends and turning them into reusable
technological building blocks.
67. Diso Components*
identity & profile
discovery & access control
contacts & friends
activity streams
messaging
groupings & shared spaces
*subject to change
for the rest of my talk, I want to focus on activity streams. (since I already talked about identity).
68. global. social. ubiquitous. cheap.
Clay Shirky recently gave a TED talk at the State Department and said some very interesting
things.
among them he pointed out that our communications infrastructure has become global,
social, ubuiqous and cheap. The result of that is that people are able to come together like
never before, as I talked about with the Iran Election and Moldova protests.
69. a side effect is that medium is changing or is being changed.
(CLICK) as Marshall McLuhan pointed out decades earlier, the medium is the message -- “the
form of a medium embeds itself in the message, creating a symbiotic relationship by which
the medium influences how the message is perceived.”
70. Scan by Tim Lynch
a side effect is that medium is changing or is being changed.
(CLICK) as Marshall McLuhan pointed out decades earlier, the medium is the message -- “the
form of a medium embeds itself in the message, creating a symbiotic relationship by which
the medium influences how the message is perceived.”
71. the rise of the “real-time web” therefore is one of those shifts, as we move from static-in-
place content, to Dave Winer’s so-called “river of news”...
(CLICK)
this medium is known as the stream, represented by an “activity stream”.
72. the rise of the “real-time web” therefore is one of those shifts, as we move from static-in-
place content, to Dave Winer’s so-called “river of news”...
(CLICK)
this medium is known as the stream, represented by an “activity stream”.
74. actor + verb + object
what we’re attempting to do is to model what people are doing on the web starting with
these basic primitives: “actor”, “verb”, “object”.
75. what we realized was that typical feed formats like RSS and ATOM were developed at a time
when the paradigm was still the “news feed” — a throwback to older forms of content
syndication — performed by “syndicates”.
what people are doing on the web today is much more sophisticated than just writing blog
posts, and we need a format that begins to represent the richness of what people are doing
online.
76. though this effort is just over a year old, MySpace, Facebook and now, as it turns out —
Opera — have implemented support for this format and we’re hoping that more will follow.
77. ®
though this effort is just over a year old, MySpace, Facebook and now, as it turns out —
Opera — have implemented support for this format and we’re hoping that more will follow.
78. social discovery
one of the benefits of this model is what we call “social discovery” -- where you discover new
things through other people.
79. A nice example of this idea is Katamari Damacy, a game where you control a character that
goes around collecting stuff by adhering it to its body.
this is not unlike the way that activities define who you are today.
indeed, as the game progresses, all these things that you collect come to define you and your
experience.
80. what you do
f who you know
so, who you are, therefore, is a function of what you do and who you know.
81. Tools
Subject Goal Outcome
Rules Roles
Community
and there’s actually a field of study that describes all this rather well.
not surprisingly, it’s called “Activity Theory”.
82. “social objects”
when we apply activity theory to social networks, we end up with something that Jyri
Engstrom calls “social objects” — and the social objects and how people interact with them
are what end up defining a space.
83. Diso
so if we go back to the Diso Project, one of the ideas is to take activity streams, activity
theory and identity to develop a distributed social network, where you as an individual actor
are in charge of your fate.
84. just like we make use of supermarkets like Whole Foods to great effect, that benefit all of us,
it is important that we never become so dependent on them that we lose sight of our own
humanity and reliance on them.
85. similarly, we need to be wary of the same sorts of things happening with the large social
networks.
this isn’t about defeating these guys, really. because we need them to help create the social
spaces that contain and aggregate social objects.
but they should exist as players in a much bigger ecosystem.
86. compete on the open web,
not with it.
the point then, is to compete ON the open web, and not with. to keep building it as a public
resource.
87. Map by Bill Cheswick
the web after all, is the largest social network of them all, and must continue to be cultivated,
nourished and protected.
and I believe that that can only be made possible if we start with the smallest unit of the
social web -- identity.
88. end.
chris@citizenagency.com • @chrismessina • factoryjoe.com
Typeface: FTF Flama™ by Mario Feliciano
so that’s it. questions?
89. end.
chris@citizenagency.com • @chrismessina • factoryjoe.com
Typeface: FTF Flama™ by Mario Feliciano
so that’s it. questions?