Make Life (Media Studies for a Life in Media 07)Mark Deuze
Seventh of an 8-part series of slidepacks for a course and book about the role, insights, and possible future of media studies for a life in media. Feel free to use, please cite, and share your comments!
My presentation at InterAction's Forum 2014
http://www.interaction.org/forum-2014-workshops#FRI10:45-12:15
The Changing World of Internet Domains: What Every NGO Should Know about the Expanding Internet and What it Means for Your NGO (Room 159A/B)
The workshop is designed for nonprofit decision makers and NGO staff who manage and/or oversee their organization’s web and marketing/communications strategy. This session is geared towards professionals who would be interested in learning more about the upcoming launch of new top-level domains like .NGO and others, and how changes in the Internet landscape and the use of new technologies will impact the way they do fundraising, partnering, branding and marketing. Lastly, it will look at how these changes can help raise awareness for their causes.
Speakers:
Andrew Mack, Principal, AMGlobal Consulting
David Vyorst, ISOC DC Chapter and Co-Founder, Relay Station Digital Strategies
Corey Griffin, Associate Director of Strategic Partnerships at Peace Corps, formerly with Microsoft
Alan Robbins, Partner & Global Head of Membership & Alliances, Devex
Make Life (Media Studies for a Life in Media 07)Mark Deuze
Seventh of an 8-part series of slidepacks for a course and book about the role, insights, and possible future of media studies for a life in media. Feel free to use, please cite, and share your comments!
My presentation at InterAction's Forum 2014
http://www.interaction.org/forum-2014-workshops#FRI10:45-12:15
The Changing World of Internet Domains: What Every NGO Should Know about the Expanding Internet and What it Means for Your NGO (Room 159A/B)
The workshop is designed for nonprofit decision makers and NGO staff who manage and/or oversee their organization’s web and marketing/communications strategy. This session is geared towards professionals who would be interested in learning more about the upcoming launch of new top-level domains like .NGO and others, and how changes in the Internet landscape and the use of new technologies will impact the way they do fundraising, partnering, branding and marketing. Lastly, it will look at how these changes can help raise awareness for their causes.
Speakers:
Andrew Mack, Principal, AMGlobal Consulting
David Vyorst, ISOC DC Chapter and Co-Founder, Relay Station Digital Strategies
Corey Griffin, Associate Director of Strategic Partnerships at Peace Corps, formerly with Microsoft
Alan Robbins, Partner & Global Head of Membership & Alliances, Devex
How to Better Engage the Communites and Local Governments in DisastersBBGgov
The Broadcasting Board of Governors and Voice of America, in partnership with the Aid and Development Forum, held a pre-conference training on media response during disasters. Topics included:
Improving the interaction between media and response teams: how to communicate and develop relationships with humanitarian agencies and address challenges that humanitarian groups face when collaborating with media during a disaster.
Effective communication and new trends: applying social media in disaster relief, how to make the most of new technologies and social networks
How to collaborate with the private sector: using case studies, the session will focus on utilizing partnerships with the private sector companies to rebuild local communities
How to better engage communities and local governments: managing partnerships during a disaster
Strategic communication, news media and influencePOLIS LSE
Slides for a presentation to the NATO defence college in Rome in March 2017 looking at the news and social media context and how it is becoming more networked. It looks at the positive and negative aspects of digital change and the structural shifts in communication, especially in journalism and its consumption and dissemination.
Presentation to European Parliament on fake news, changes in our media environment, and what can be done to ensure news and media serve our democracies, with links to underlying independent, evidence-based research.
Min 350 words.Discussion Questions For your forum post, d.docxendawalling
*Min 350 words.*
Discussion Questions
: For your forum post, distinguish the way the media was utilized by terrorist organizations in the past to advance their objectives to that being employed today. Specifically address both the pre-9/11 style terrorist means of communication and influence and contrast them with the current day terrorist internet/social media based methods.
Reply to each post there are TWO of them
*150 words min each*
1. For centuries, decades, and years now terrorist organizations has used the media to spread their message across the world, reaching hundreds of thousands of people. According, to Felger and Lesinger, “The media do not create terrorism, but certain actions of the media can facilitate the achievement of the strategic goals of terrorist groups” (Felger & Lesinger, 2017). Terrorists’ organizations utilize media outlets such as local and international newspapers and television. The ultimate goal of terrorists groups is to create fear and terror in order to get their message across whether it’s for religion or political reasons. We all know that the media is a powerful tool that sometimes could be misleading. Before the creation of the Internet terrorist would use newspapers, radio stations, and even word of mouth to spread their news. As one can imagine those methods took a while to spread throughout the local community or world. In addition, the facts and small details became lost in the translation of the events that actually took place. In the past terrorists used, rebel radio stations, television, underground newspapers, flyers, posters, and other types of publications to communicate, recruit, train, as a means to spread propaganda (Hoffman, 2006, p. 199).
Terrorist organizations has always used the media to spread propaganda or their agendas, however the 9/11 attacks has forever changed how terrorist organizations utilized the media to spread their fears on a global scale. In today’s society technology has made it a lot easier for terrorist organizations to spread their word and intentions. Just about every person in the world is carrying a smartphone. Smartphones allows individuals to access media outlets at all times. Information can be passed on through smartphones in a matter of seconds. In today’s society terrorist organizations also uses social media to help spread their intentions. They also use social media platforms to recruit and post training videos. In conclusion, after reading this week’s lesson we can determine that before social media, the internet and advance technology it was a lot harder for terrorist groups to spread their intentions, however they still made it happen.
2. In our discussion this week we must analyze the way terrorist organizations “utilized” the media in the past. I specifically highlight the word “utilize” because that’s exactly what terrorist organizations did. They used the media for their own benefit. In
Inside Terrorism
Bruce Hoffman specific.
Presentation on cyber warfare, recent examples, current capabilities of the major players, and issues relating to the advancement of cyber warfare and cyber security in the United States. The Cyber War Forum Initiative is promoted for its role in solving many elements of the issues facing the US.
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Bernard Marr
Online hate speech is a big issue, and many are worried that it leads to radicalization and actions in the real world. Here, we look at how artificial intelligence (AI) can now be used to detect hate speech and predict its impact.
New Media for Civic Engagement (U.S - Islamic World Forum)Riyaad Minty
Presented at the U.S - Islamic World Forum in Doha 2010 (www.dohanetwork.org)
A case study of how New Media was used during the Gaza War and the Iranian Election unrest.
*refer to slide notes for details of each slide
COM 251Communication- Information- and SocietyChapter 5-Digital Commun.docxnoel23456789
COM 251 Communication, Information, and Society
Chapter 5: Digital Communication and MoJo
ONLINE COMMUNICATION
ONLINE COMMUNICATION & MOBILE JOURNALISM
In this presentation, we will discuss:
 What is online communication?
 Who are the digital natives?
 What is mobile journalism?
ONLINE COMMUNICATION
How people as well as computers communicate with each other through a computer network and the internet.
TYPES OF ONLINE COMMUNICATION
Emails
SMS
Chats
Forums
Instant Messaging
VoIP
Social Media
Key benefits of social media
• Encourage participation, conversation, and community - spread key messages, influence decision making, and promote behavior change.
• Reach people when, where, and how it is convenient for them, which improves the availability of content and might influence satisfaction and trust in messages delivered.
• Build awareness and credibility.
Components of a social media post
•# before a relevant keyword or phrase (no spaces) in a post - to categorize those posts and help them
show more easily when searching
•@ @replies, @tags - auto-suggest dropdown based on what you've typed after the @ symbol
•Video/ Photo material •Hyperlinks – www….
•Text, Text, Text….
Can you image what the future will look like?
The term digital native describes a person who has grown up in the digital age, rather than having acquired familiarity with digital systems as an adult, as a digital immigrant.
Example of social media segmentation use…
Mobile Journalism
Began as a phenomenon known as Backpack Journalism
News outlets began to realize that literally millions of human
beings were walking around with video cameras
They began accepting and then paying people for their video.
It’s a real thing The Wall Street Journal trains all reporters to use their phone as still and video
cameras
CNN iReport is an entire website dedicated to citizen journalism
TV stations are equipping their reporters with apps that will push back content
from the field
Sites such as MobileVideoDIY and apps such as Storymaker help anyone with a
smartphone produce professional quality video packages
What is at stake? • Legal responsibilities (Freedom of speech/press vs. responsibility):
- Copyrights.
- Defamation.
- Wiretapping.
- Invasion of Privacy.
What is at stake?
• Ethical and moral responsibilities : - Blasphemy. - Immoral content - Disrespect for specific social groups. (children, the elderly, victims etc.).
- Disrespect for one’s own family, group of friends, colleagues etc.
What is at stake?
• Social Responsibility:
- Environmental responsibility.
- Human rights responsibility.
- Philanthropic responsibility.
- Economic responsibility.
What is at stake?
• Risks:
- Your own privacy. - Your own security / safety?
(you may face threats and aggression) - Psychological consequences. - Plagiarism (vs. copyright).
WHAT TO KEEP
• Online communication shapes human societies.
• Types of online communication include email, videoconferencin.
Whether offline or online, your relationship with the public and the media has the power to mobilize new people to undertake the kinds of activities that have the intent or effect of influencing government action, public policy, public participation, social change. Find out how...
Social Media in Crisis Management: ISCRAM Summer School 2011Connie White
This is a lecture for PhD students at a summer school hosted by Information Systems for Crisis Response and Management, ISCRAM www.iscram.org. This lecture covers social media and the information systems concepts that show how social media can support emergency management.
A Long Way Gone Essay - morganmrFRINQportfolio. A Long Way Gone By Ishmael Beah Essay Example | Topics and Well Written .... A long way gone essay summary. A Long Way Gone Essay Question. Visual Essay on A Long Way Gone by althea natali. A long way gone essay thesis writing. A Long Way Gone Critique Essay Example | Topics and Well Written Essays .... A Long Way Gone by Ishmael Beah Assignment Example | Topics and Well .... A Long Way Gone Writing Assignment. A Long Way Gone-- Writing a Personal Narrative by Writing by Rachel. In A long way gone by Ishmael Beah (300 Words) - PHDessay.com. A Long Way Gone Outline for Essay by Inspire with Literature | TpT. A Long Way Gone Theme Essay - Theme Image. A long way gone essay - poetic. A Long Way Gone Essay: Fiction or Reality?. A Long Way Gone Essay Questions. A Long Way Gone Theme Essay Pre-Writing PowerPoint by Inspire with .... ᐅ Essays On A Long Way Gone
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Gab Billones
Here are my slides in Episode 2 of the Department of Education (DepEd) Philippines' Wellness Check Webinar Series on the topic of "Fighting the Infodemic."
Topics:
- Context: The Current Media Landscape and the Rise of Citizen Journalism
- The New Global Pandemic: Fake News and Disinformation and Reasons Why It Exists
- Disinformation vs Misinformation vs Mal-information
- Responsible Digital Citizenship and Practical Ways to Spot and Respond to Fake News
References:
1. How Media Landscape Is Changing (richmedia.com/richideas/articles/how-we-consume-media-is-changing)
2. Digital 2020: The Philippines (https://datareportal.com/reports/digital-2020-philippines)
3. WATCH: What's wrong with clickbait headlines? (https://www.rappler.com/newsbreak/fact-check/243857-video-tutorial-keep-clickbait-headlines-from-spreading)
4. https://www.webwise.ie/teachers/what-is-fake-news/
5. Journalism, 'Fake News' and Disinformation: A Handbook for Journalism Education and Training (https://en.unesco.org/fightfakenews)
6. The future of fake news: don't believe everything you read, see or hear (https://www.theguardian.com/technology/2017/jul/26/fake-news-obama-video-trump-face2face-doctored-content)
7. Bellingcat Investigation Toolkit (Bellingcat's Online Investigation Toolkit)
8. Fake News and Cyber Propaganda: The Use and Abuse of Social Media (https://www.trendmicro.com/vinfo/pl/security/news/cybercrime-and-digital-threats/fake-news-cyber-propaganda-the-abuse-of-social-media)
9. Fake News and Cyber Propaganda: The Use and Abuse of Social Media (https://www.trendmicro.com/vinfo/pl/security/news/cybercrime-and-digital-threats/fake-news-cyber-propaganda-the-abuse-of-social-media)
10. 5 ways to spot disinformation on your social media feeds (https://abcnews.go.com/US/ways-spot-disinformation-social-media-feeds/story?id=67784438)
11. During this coronavirus pandemic, ‘fake news’ is putting lives at risk: UNESCO (https://news.un.org/en/story/2020/04/1061592)
12. "Fake News", Disinformation, and Propaganda (https://guides.library.harvard.edu/fake)
13. World trends in freedom of expression and media development: global report 2017/2018 (https://unesdoc.unesco.org/ark:/48223/pf0000261065)
14. Fake news and the spread of misinformation: A research roundup (https://journalistsresource.org/studies/society/internet/fake-news-conspiracy-theories-journalism-research/)
15. How to spot coronavirus fake news – an expert guide (https://theconversation.com/how-to-spot-coronavirus-fake-news-an-expert-guide-133843)
16. How to Talk to Your Facebook Friends about Fake News (https://www.theopennotebook.com/2017/02/21/how-to-talk-to-your-facebook-friends-about-fake-news/)\
המצגת עוסקת בנגישות לאינטרנט ע"פ התקן הישראלי להצגת תכנים נגישים באתרי אינטרנט המבוסס על הנחיות ה Wcag 2.0 של משרד ה W3C הבינלאומי. מציגה את עיקרי התקן, דוגמאות לבעיות נגישות באתרי אינטרנט וטיפים להנגשת אתרים.
ליאור שיאון, CTO GetTaxi, מספר בכנס איגוד האינטרנט "פיתוח וניו מדיה תחת אש" על יוזמת הפיתוח האישית שלו שהובילה ליצירת "מפת המקלטים".
http://www.isoc.org.il/conf_heb/under_fire.html
How to Better Engage the Communites and Local Governments in DisastersBBGgov
The Broadcasting Board of Governors and Voice of America, in partnership with the Aid and Development Forum, held a pre-conference training on media response during disasters. Topics included:
Improving the interaction between media and response teams: how to communicate and develop relationships with humanitarian agencies and address challenges that humanitarian groups face when collaborating with media during a disaster.
Effective communication and new trends: applying social media in disaster relief, how to make the most of new technologies and social networks
How to collaborate with the private sector: using case studies, the session will focus on utilizing partnerships with the private sector companies to rebuild local communities
How to better engage communities and local governments: managing partnerships during a disaster
Strategic communication, news media and influencePOLIS LSE
Slides for a presentation to the NATO defence college in Rome in March 2017 looking at the news and social media context and how it is becoming more networked. It looks at the positive and negative aspects of digital change and the structural shifts in communication, especially in journalism and its consumption and dissemination.
Presentation to European Parliament on fake news, changes in our media environment, and what can be done to ensure news and media serve our democracies, with links to underlying independent, evidence-based research.
Min 350 words.Discussion Questions For your forum post, d.docxendawalling
*Min 350 words.*
Discussion Questions
: For your forum post, distinguish the way the media was utilized by terrorist organizations in the past to advance their objectives to that being employed today. Specifically address both the pre-9/11 style terrorist means of communication and influence and contrast them with the current day terrorist internet/social media based methods.
Reply to each post there are TWO of them
*150 words min each*
1. For centuries, decades, and years now terrorist organizations has used the media to spread their message across the world, reaching hundreds of thousands of people. According, to Felger and Lesinger, “The media do not create terrorism, but certain actions of the media can facilitate the achievement of the strategic goals of terrorist groups” (Felger & Lesinger, 2017). Terrorists’ organizations utilize media outlets such as local and international newspapers and television. The ultimate goal of terrorists groups is to create fear and terror in order to get their message across whether it’s for religion or political reasons. We all know that the media is a powerful tool that sometimes could be misleading. Before the creation of the Internet terrorist would use newspapers, radio stations, and even word of mouth to spread their news. As one can imagine those methods took a while to spread throughout the local community or world. In addition, the facts and small details became lost in the translation of the events that actually took place. In the past terrorists used, rebel radio stations, television, underground newspapers, flyers, posters, and other types of publications to communicate, recruit, train, as a means to spread propaganda (Hoffman, 2006, p. 199).
Terrorist organizations has always used the media to spread propaganda or their agendas, however the 9/11 attacks has forever changed how terrorist organizations utilized the media to spread their fears on a global scale. In today’s society technology has made it a lot easier for terrorist organizations to spread their word and intentions. Just about every person in the world is carrying a smartphone. Smartphones allows individuals to access media outlets at all times. Information can be passed on through smartphones in a matter of seconds. In today’s society terrorist organizations also uses social media to help spread their intentions. They also use social media platforms to recruit and post training videos. In conclusion, after reading this week’s lesson we can determine that before social media, the internet and advance technology it was a lot harder for terrorist groups to spread their intentions, however they still made it happen.
2. In our discussion this week we must analyze the way terrorist organizations “utilized” the media in the past. I specifically highlight the word “utilize” because that’s exactly what terrorist organizations did. They used the media for their own benefit. In
Inside Terrorism
Bruce Hoffman specific.
Presentation on cyber warfare, recent examples, current capabilities of the major players, and issues relating to the advancement of cyber warfare and cyber security in the United States. The Cyber War Forum Initiative is promoted for its role in solving many elements of the issues facing the US.
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Bernard Marr
Online hate speech is a big issue, and many are worried that it leads to radicalization and actions in the real world. Here, we look at how artificial intelligence (AI) can now be used to detect hate speech and predict its impact.
New Media for Civic Engagement (U.S - Islamic World Forum)Riyaad Minty
Presented at the U.S - Islamic World Forum in Doha 2010 (www.dohanetwork.org)
A case study of how New Media was used during the Gaza War and the Iranian Election unrest.
*refer to slide notes for details of each slide
COM 251Communication- Information- and SocietyChapter 5-Digital Commun.docxnoel23456789
COM 251 Communication, Information, and Society
Chapter 5: Digital Communication and MoJo
ONLINE COMMUNICATION
ONLINE COMMUNICATION & MOBILE JOURNALISM
In this presentation, we will discuss:
 What is online communication?
 Who are the digital natives?
 What is mobile journalism?
ONLINE COMMUNICATION
How people as well as computers communicate with each other through a computer network and the internet.
TYPES OF ONLINE COMMUNICATION
Emails
SMS
Chats
Forums
Instant Messaging
VoIP
Social Media
Key benefits of social media
• Encourage participation, conversation, and community - spread key messages, influence decision making, and promote behavior change.
• Reach people when, where, and how it is convenient for them, which improves the availability of content and might influence satisfaction and trust in messages delivered.
• Build awareness and credibility.
Components of a social media post
•# before a relevant keyword or phrase (no spaces) in a post - to categorize those posts and help them
show more easily when searching
•@ @replies, @tags - auto-suggest dropdown based on what you've typed after the @ symbol
•Video/ Photo material •Hyperlinks – www….
•Text, Text, Text….
Can you image what the future will look like?
The term digital native describes a person who has grown up in the digital age, rather than having acquired familiarity with digital systems as an adult, as a digital immigrant.
Example of social media segmentation use…
Mobile Journalism
Began as a phenomenon known as Backpack Journalism
News outlets began to realize that literally millions of human
beings were walking around with video cameras
They began accepting and then paying people for their video.
It’s a real thing The Wall Street Journal trains all reporters to use their phone as still and video
cameras
CNN iReport is an entire website dedicated to citizen journalism
TV stations are equipping their reporters with apps that will push back content
from the field
Sites such as MobileVideoDIY and apps such as Storymaker help anyone with a
smartphone produce professional quality video packages
What is at stake? • Legal responsibilities (Freedom of speech/press vs. responsibility):
- Copyrights.
- Defamation.
- Wiretapping.
- Invasion of Privacy.
What is at stake?
• Ethical and moral responsibilities : - Blasphemy. - Immoral content - Disrespect for specific social groups. (children, the elderly, victims etc.).
- Disrespect for one’s own family, group of friends, colleagues etc.
What is at stake?
• Social Responsibility:
- Environmental responsibility.
- Human rights responsibility.
- Philanthropic responsibility.
- Economic responsibility.
What is at stake?
• Risks:
- Your own privacy. - Your own security / safety?
(you may face threats and aggression) - Psychological consequences. - Plagiarism (vs. copyright).
WHAT TO KEEP
• Online communication shapes human societies.
• Types of online communication include email, videoconferencin.
Whether offline or online, your relationship with the public and the media has the power to mobilize new people to undertake the kinds of activities that have the intent or effect of influencing government action, public policy, public participation, social change. Find out how...
Social Media in Crisis Management: ISCRAM Summer School 2011Connie White
This is a lecture for PhD students at a summer school hosted by Information Systems for Crisis Response and Management, ISCRAM www.iscram.org. This lecture covers social media and the information systems concepts that show how social media can support emergency management.
A Long Way Gone Essay - morganmrFRINQportfolio. A Long Way Gone By Ishmael Beah Essay Example | Topics and Well Written .... A long way gone essay summary. A Long Way Gone Essay Question. Visual Essay on A Long Way Gone by althea natali. A long way gone essay thesis writing. A Long Way Gone Critique Essay Example | Topics and Well Written Essays .... A Long Way Gone by Ishmael Beah Assignment Example | Topics and Well .... A Long Way Gone Writing Assignment. A Long Way Gone-- Writing a Personal Narrative by Writing by Rachel. In A long way gone by Ishmael Beah (300 Words) - PHDessay.com. A Long Way Gone Outline for Essay by Inspire with Literature | TpT. A Long Way Gone Theme Essay - Theme Image. A long way gone essay - poetic. A Long Way Gone Essay: Fiction or Reality?. A Long Way Gone Essay Questions. A Long Way Gone Theme Essay Pre-Writing PowerPoint by Inspire with .... ᐅ Essays On A Long Way Gone
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Gab Billones
Here are my slides in Episode 2 of the Department of Education (DepEd) Philippines' Wellness Check Webinar Series on the topic of "Fighting the Infodemic."
Topics:
- Context: The Current Media Landscape and the Rise of Citizen Journalism
- The New Global Pandemic: Fake News and Disinformation and Reasons Why It Exists
- Disinformation vs Misinformation vs Mal-information
- Responsible Digital Citizenship and Practical Ways to Spot and Respond to Fake News
References:
1. How Media Landscape Is Changing (richmedia.com/richideas/articles/how-we-consume-media-is-changing)
2. Digital 2020: The Philippines (https://datareportal.com/reports/digital-2020-philippines)
3. WATCH: What's wrong with clickbait headlines? (https://www.rappler.com/newsbreak/fact-check/243857-video-tutorial-keep-clickbait-headlines-from-spreading)
4. https://www.webwise.ie/teachers/what-is-fake-news/
5. Journalism, 'Fake News' and Disinformation: A Handbook for Journalism Education and Training (https://en.unesco.org/fightfakenews)
6. The future of fake news: don't believe everything you read, see or hear (https://www.theguardian.com/technology/2017/jul/26/fake-news-obama-video-trump-face2face-doctored-content)
7. Bellingcat Investigation Toolkit (Bellingcat's Online Investigation Toolkit)
8. Fake News and Cyber Propaganda: The Use and Abuse of Social Media (https://www.trendmicro.com/vinfo/pl/security/news/cybercrime-and-digital-threats/fake-news-cyber-propaganda-the-abuse-of-social-media)
9. Fake News and Cyber Propaganda: The Use and Abuse of Social Media (https://www.trendmicro.com/vinfo/pl/security/news/cybercrime-and-digital-threats/fake-news-cyber-propaganda-the-abuse-of-social-media)
10. 5 ways to spot disinformation on your social media feeds (https://abcnews.go.com/US/ways-spot-disinformation-social-media-feeds/story?id=67784438)
11. During this coronavirus pandemic, ‘fake news’ is putting lives at risk: UNESCO (https://news.un.org/en/story/2020/04/1061592)
12. "Fake News", Disinformation, and Propaganda (https://guides.library.harvard.edu/fake)
13. World trends in freedom of expression and media development: global report 2017/2018 (https://unesdoc.unesco.org/ark:/48223/pf0000261065)
14. Fake news and the spread of misinformation: A research roundup (https://journalistsresource.org/studies/society/internet/fake-news-conspiracy-theories-journalism-research/)
15. How to spot coronavirus fake news – an expert guide (https://theconversation.com/how-to-spot-coronavirus-fake-news-an-expert-guide-133843)
16. How to Talk to Your Facebook Friends about Fake News (https://www.theopennotebook.com/2017/02/21/how-to-talk-to-your-facebook-friends-about-fake-news/)\
המצגת עוסקת בנגישות לאינטרנט ע"פ התקן הישראלי להצגת תכנים נגישים באתרי אינטרנט המבוסס על הנחיות ה Wcag 2.0 של משרד ה W3C הבינלאומי. מציגה את עיקרי התקן, דוגמאות לבעיות נגישות באתרי אינטרנט וטיפים להנגשת אתרים.
ליאור שיאון, CTO GetTaxi, מספר בכנס איגוד האינטרנט "פיתוח וניו מדיה תחת אש" על יוזמת הפיתוח האישית שלו שהובילה ליצירת "מפת המקלטים".
http://www.isoc.org.il/conf_heb/under_fire.html
טל גלילי, סטטיסטיקאי ואקטביסט רשת, מספר בכנס "פיתוח וניו מדיה תחת אש" של איגוד האינטרנט, על פרויקט הקוד , פתוח "אושאידי" ועל היוזמה שלו לתרגם אותה לעברית ולנצל אותה לטובת אסונות עתידיים
אמרי באומר, יוזם האקתון החירום "חוסן לאומי" מספר בכנס איגוד האינטרנט "פיתוח וניו מדיה תחת אש" על היוזמה שלו לגיבוש קבוצת מפתחים להאקתון חירום
http://www.isoc.org.il/conf_heb/under_fire.html
אופיר בן אבי, מנהל ממשל זמין, מספר בכנס איגוד האינטרנט "פיתוח וניו מדיה תחת אש" על יוזמות הפיתוח של ממשל זמין. http://www.isoc.org.il/conf_heb/under_fire.html
יובל טיסונה, מנכל זברהאפס, מספר בכנס איגוד האינטרנט "פיתוחוניו מדיה תחת אש" על האפליקציה שפיתחה החברה שלו "המלחמה הבאה"
http://www.isoc.org.il/conf_heb/under_fire.html
בן לנג בכנס איגוד האינטרנט "פיתוח וניו מדיה תחת אש" מספר על הפעילות שלו במדיה החברתית בזמן המבצע הצבאי, עמוד ענן
http://www.isoc.org.il/conf_heb/under_fire.html
המצגת ניתנת לשימוש באופן חופשי, ללא תשלום או תנאים מגבילים למעט ייחוס לאיגוד האינטרנט הישראלי, כפי שמופיע ב"רישון ייחוס 2.5 ישראל (CC BY 2.5)"מידע נוסף על רישיון השימוש: creativecommons.org/licenses/by/2.5/ilהנ"ל אינו תקף לתמונות וחומרים מממקורות חיצוניים.
המצגת מציגה פרקטיקות לשיפור אבטחת המידע של עובדים בארגונים. היא מבוססת על המלצות של ארגונים ברחבי העולם, כולל מרכזי CERT ופרוייקטים ייעודיים לשיפור אבטחת המידע במדינות שונות. המצגת מיועדת לעובדים עצמם (ולא לצוות ה-IT), ומציגה נושאים כגון אבטחת מידע אישי, מודעות לפישינג ושיטות פריצה, ססמאות, מסירת ואיבוד מידע, ועוד.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
6. Points for improvement
Deepen the already existing cooperation
between pro-Israel NGO's & Gov./IDF.
Technological advantage – social apps, mini
sites, mobile apps – development.
Language – Translation into popular foreign
languages – French, Spanish, Russian,
Arabic, German, etc.