The document outlines the planning and research for a student film project called "Swede" which will recreate the trailer for the movie "Ted". The students divided responsibilities - Judy researched film techniques and locations, Katia researched costumes and props, Patrycia wrote the script, and Noor created storyboards. They researched film trailers and analyzed shots. Potential locations included houses, parks, and schools. Katia's and Judy's houses will be used most, along with a local park. Each student's roles and the scheduling and locations were mapped out to prepare for filming.
CodeMeter - Ihr Fuhrschein zum Kryptographie-Experteteam-WIBU
Mit Kryptographie ist es wie mit dem Autofahren. Zuerst muss man die Basismethoden der Kryptographie kennen lernen, genau wie es mit der Bedeutung aller Anzeigen beim Autofahren ist – erst wenn man alle Bestandteile des Armaturenbretts kennt, kann man auf der Autobahn fahren. Und ähnlich ist es beim Auto: war es gestern noch modern, kann es heute altmodisch sein; auch die Überalterung bei Sicherheit beschleunigt sich.
CodeMeter®, mit der umfangreichen Erfahrung und des Wissens von Wibu-Systems entwickelt, bietet ein umfangreiches Sortiment an kryptographischen Methoden. Aber auch die besten Schutzlösungen wie CodeMeter könnten versagen, wenn es schlecht und unsicher implementiert wurde oder die notwendigen Sicherheitsvorkehrungen fehlen.
Ein essentiell wichtiger Punkt ist die sichere Speicherung von privaten und geheimen Schlüsseln. Die erste Frage, die Sie sich stellen sollten, ist, wo Ihre Lizenzen gespeichert werden sollen. Der Hardware-basierte Schutz CmDongle ist sicher ähnlich einer uneinnehmbaren Festung. Die Software-basierte Lösung CmActLicense gibt es als Schlüsselspeicher inklusive der einzigartigen und geschützten Technologie SmartBind®. Die privaten und geheimen Schlüssel liegen dann in einer verschlüsselten Lizenz-Datei, deren Schlüssel der Fingerabdruck des PCs ist, an den die Lizenz-Datei gebunden ist.
Die zweite wichtige Entscheidung ist, wie die Verschlüsselung arbeitet: sie hängt von Einsatzgebiet und Bedrohungsszenario ab.
Zum Schluss noch ein paar interessante Fakten: wussten Sie, dass im Counter Mode (CTR) die Verschlüsselung mit AES eigentlich nur ein XOR ist?
Betrachten wir beispielsweise ein Datenbankfeld mit einem Booleschen Wert. Bei einer einfachen Verschlüsselung mit AES, ergibt dies genau zwei mögliche verschlüsselte Werte. D.h. ein Angreifer muss nur einen Datensatz im Original kennen, um den unverschlüsselten Wert bei allen Datensätzen zu kennen.
Inhalt:
- HASH Funktionen
° SHA 256
- Symmetrische Verschlüsselung
* AES 128
* Direkte Verschlüsselung im CmContainer
* Indirekte Verschlüsselung
* Verschlüsselung ohne CmContainer
* Auswahl des richtigen Betriebsmodus
- Asymmetrische Verschlüsselung
* ECC 224
* RSA 2048
Webinar anchauen: https://youtu.be/q5QZqi64Rqk
CodeMeter - Ihr Fuhrschein zum Kryptographie-Experteteam-WIBU
Mit Kryptographie ist es wie mit dem Autofahren. Zuerst muss man die Basismethoden der Kryptographie kennen lernen, genau wie es mit der Bedeutung aller Anzeigen beim Autofahren ist – erst wenn man alle Bestandteile des Armaturenbretts kennt, kann man auf der Autobahn fahren. Und ähnlich ist es beim Auto: war es gestern noch modern, kann es heute altmodisch sein; auch die Überalterung bei Sicherheit beschleunigt sich.
CodeMeter®, mit der umfangreichen Erfahrung und des Wissens von Wibu-Systems entwickelt, bietet ein umfangreiches Sortiment an kryptographischen Methoden. Aber auch die besten Schutzlösungen wie CodeMeter könnten versagen, wenn es schlecht und unsicher implementiert wurde oder die notwendigen Sicherheitsvorkehrungen fehlen.
Ein essentiell wichtiger Punkt ist die sichere Speicherung von privaten und geheimen Schlüsseln. Die erste Frage, die Sie sich stellen sollten, ist, wo Ihre Lizenzen gespeichert werden sollen. Der Hardware-basierte Schutz CmDongle ist sicher ähnlich einer uneinnehmbaren Festung. Die Software-basierte Lösung CmActLicense gibt es als Schlüsselspeicher inklusive der einzigartigen und geschützten Technologie SmartBind®. Die privaten und geheimen Schlüssel liegen dann in einer verschlüsselten Lizenz-Datei, deren Schlüssel der Fingerabdruck des PCs ist, an den die Lizenz-Datei gebunden ist.
Die zweite wichtige Entscheidung ist, wie die Verschlüsselung arbeitet: sie hängt von Einsatzgebiet und Bedrohungsszenario ab.
Zum Schluss noch ein paar interessante Fakten: wussten Sie, dass im Counter Mode (CTR) die Verschlüsselung mit AES eigentlich nur ein XOR ist?
Betrachten wir beispielsweise ein Datenbankfeld mit einem Booleschen Wert. Bei einer einfachen Verschlüsselung mit AES, ergibt dies genau zwei mögliche verschlüsselte Werte. D.h. ein Angreifer muss nur einen Datensatz im Original kennen, um den unverschlüsselten Wert bei allen Datensätzen zu kennen.
Inhalt:
- HASH Funktionen
° SHA 256
- Symmetrische Verschlüsselung
* AES 128
* Direkte Verschlüsselung im CmContainer
* Indirekte Verschlüsselung
* Verschlüsselung ohne CmContainer
* Auswahl des richtigen Betriebsmodus
- Asymmetrische Verschlüsselung
* ECC 224
* RSA 2048
Webinar anchauen: https://youtu.be/q5QZqi64Rqk
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
2. Option
We picked option 2: Each person has a different job
Judy
- Locations
- Storyboard
Katia
- Costume,
Props & Actors
Patrycia
-Script
- Storyboard
Noor
- Storyboard
3. Research Part A (Swede research) Judy
File name
Film link
Jaws
http://www.youtube.com/w
atch?v=TeSXbsmKL_k
Avatar
http://www.youtube.com/w
atch?v=VER9EmjHoEA&safe=
active
Avengers
http://www.youtube.com/w
atch?v=2aLgdMz0p5Y&safe=
active
The Hobbit
http://www.youtube.com/w
atch?v=WMbL3oLUMoc&saf
e=active
Inception
http://www.youtube.com/w
atch?v=nLbX1G9CkUg&safe=
active
Olympus Has Fallen
http://www.youtube.com/w
atch?v=n62boLlltQ&safe=active
Screen grab
4. Research Part B (Trailer Research)
Judy
Film Name
Film Link
Skyfall
http://www.youtube.com/
watch?v=6kw1UVovByw&
safe=active
Pitch Perfect
http://www.youtube.com/
watch?v=UMS1S3YxyoY&s
afe=active
The Perks Of Being a
Wallflower
http://www.youtube.com/
watch?v=9rWKrtym8Hs&s
afe=active
Oz the Great and Powerful http://www.youtube.com/
watch?v=YhLaBpvS7os&sa
fe=active
2012
http://www.youtube.com/
watch?v=rvI66Xaj9o&safe=active
Screen Grabs
5. Research Part A (Swede research)
Katia
Film name
Film link
Jaws
http://www.youtube.com/
watch?v=TeSXbsmKL_k
Tokyo Drift
http://www.youtube.com/
watch?v=VtcLfPn_FMk
Jurassic Park
http://www.youtube.com/
watch?v=ddmiVl2PfDk&saf
e=active
Pacific Rim
http://www.youtube.com/
watch?v=fRAqvsD1uxw
Thor 2
http://www.youtube.com/
watch?v=wskbymJRnTc
Screen grabs
6. Research Part B (Trailer Research)
Katia
Film name
Film link
Enchanted
http://www.youtube.com/
watch?v=8VzckcesYKs&safe
=active
Fast And Furious 6
http://www.youtube.com/
watch?v=4AFZEkFiqKE&saf
e=active
Juno
http://www.youtube.com/
watch?v=QuN0Z65sp5c
Screen grabs
7. Research Part A (Swede research)
Patrycia
Film name
Film link
Jaws
http://www.youtube.com/
watch?v=TeSXbsmKL_k
Avatar
http://www.youtube.com/
watch?v=VER9EmjHoEA&s
afe=active
Iron man 3
http://www.youtube.com/
watch?v=o5SiyOnwhyg&sa
fe=active
Avengers 2
http://www.youtube.com/
watch?v=F4CW6jzVuRs&sa
fe=active
Screen grabs
8. Research Part B (Trailer Research)
Patrycia
Insidious
http://www.youtube.com/
watch?v=fBbi4NeebAk
Ted
http://www.youtube.com/
watch?v=9fbo_pQvU7M
Men In Black
http://www.youtube.com/
watch?v=Y2r9AIfYcV8men
Brother Grimm
http://www.youtube.com/
watch?v=LfXQpg5m0iI
Charlie And The chocolate
Factory
http://www.youtube.com/
watch?v=jyB4s9eox2o
9. Research Part A (Swede research)
Noor
Film name
Film link
The dark knight rises
http://www.youtube.com/
watch?v=P2mGihl_coA&sa
fe=active
Pacific rim
http://www.youtube.com/
watch?v=CrpjTMmqmeo&
safe=active
Iron Man 3
http://www.youtube.com/
watch?v=PEVKFbr0sEc&saf
e=active
The Avengers
http://www.youtube.com/
watch?v=itZdwGzvLVk&saf
e=active
MIB
http://www.youtube.com/
watch?v=79v0X0rPeDw&s
afe=active
Screen grab
10. Research Part B (Trailer Research)
Noor
Film name
Film title & link
Bad Teacher
http://www.youtube.com/watch?
v=q7eRiOR86hY
Snow white and
the huntsman
http://www.youtube.com/watch?
v=VY67V0wOlz8
Life Of Pi
http://www.youtube.com/watch?
v=j9Hjrs6WQ8M
Ted
http://www.youtube.com/watch?
v=8YBlnHxkCJc
Screen grab
12. Long Term Planning
DAY
Mon
Tue
Details
of
planning
Each person
to have
completed
the swede
and trailer
research.
Each person
works on
their
individual
work.
Script and
Storyboard
work
together to
help each
other.
Wed
Script and
storyboard
help each
other.
And
locations
and
Costume,
props &
actors help
each other.
Thu
Finish off
individual
work and
put all the
power
points
together.
Fri
Start
filming
some
scenes at
school in
the media
room.
Film at
Katia’s
house after
school.
Sat
Film some
scenes at
Katia’s
house.
Sun
Film the rest
of the
scenes at
Judy’s
house.
19. Costumes (Katia)
Character
Lori ( John’s girlfriend) – Robe
Lori (John’s girlfriend) – Normal clothes
John as a child – Pyjamas
John’s casual clothes
Costume
Lori is seen wearing a towel
when answering the door but
we changed this to a robe.
Lori is seen wearing the
same outfit throughout
the trailer.
John is seen in pyjamas at
the beginning of the trailer.
Throughout the rest of the trailer
John wears the same clothes.
20. Character
Ted
Costume
A teddy bear onesie was borrowed for this.
Make up was added to make the character
playing Ted look more realistic.
We borrowed some costumes for the prostitutes
however barbies were used instead.
The Prostitutes
24. Where will these scenes be filmed?
Globe: for this we will film a globe in front of a black screen.
Restaurant: for this we will either film in a real restaurant or film lego.
Streets and buildings: Lego buildings and cardboard cutouts will be used here.
The Aquarium: this will be filmed in front of a fish tank with Lego figures or in front of a cardboard cutout.
Room of people: this will be filmed in the living room with a group of people or in a Lego building with Lego
figures.
The Park: for this we will go to a park such as round wood or Hyde Park.
Inside and outside of a car: we will film the inside of a car in an actual car and the outside of the car using toy
cars behind Lego/ cardboard cut outs.
The bedroom, bathroom and living room: these scenes will be filmed in different peoples houses from the
group.
Supermarket: We will film this with Lego or in a room that looks like a supermarket
25. Possible Locations
Globe: in a dark room with a globe (Judy's house).
Restaurant: In Judy's brothers room with his lego, or in someone's living
room at their dinner table or in a restaurant.
Streets and buildings: in Judy's brothers room with lego or cardboard
cutouts.
The Aquarium: in front of a fish tank in Judy's kitchen with Lego figures.
26.
27. Location Scouting
Globe: for the globe this can be filmed in Judy's brothers room in the dark. This location is always
available to film in.
Restaurant: this scene will be filmed in Judy's brothers room with Lego on his shelf.
Streets and buildings: these scenes can be filmed at school in the corner of the media room, as all that
will be needed is Lego or cardboard cutouts. This location is always available.
The Aquarium: this will be done in Judy's kitchen as she has a fish tank there. This location is available.
Judy's brothers room for the following scenes:
- Globe
- Restaurant
Judy's kitchen where the fish tank is.
28. Room of people: this will be filmed in Judy's brothers
room on his shelf with his Lego.
This location is always available.
The Park: this scene will be filmed in a park, such as
Hyde park, round wood etc.
Supermarket: this will probably be filmed in Judy's
brothers room with Lego.
Judy's brothers room for the following scenes:
- room of people
- the supermarket
These three parks are some options for the park scene. They are all quite close and available. The first
one is Emslie Horniman's Pleasance Park, the second Hyde Park and the third Roundwood Park.
29. The bedroom, bathroom and living room: for each one of these scenes they will either be filmed at Judy or Katia's house as
Patrycia's and Noor's houses are unavailable.
Inside and outside of a car: the outside of the car will be filmed in the corner of the Media room or in Judy's brothers room.
Both locations are always available. The inside of the car will be filmed outside someone's house in their mum or dad's car.
Judy's living room, bathroom and bedroom.
The inside and outside of
the car
Katia's living room, bedroom and bathroom.
30. Final Locations
The two main locations for this swede were Katia’s and Judy’s house.
Also we plan to use Emslie Hornimans Park for one scene, which is always available.
From Katia’s house her bedroom, corridor, bathroom, dinning room, living room,
garden, front door and the parking space in front of her house were all used.
From Judy’s house her kitchen and brothers room are used.
Katia’s house was available both Friday and Saturday and Judy’s house was available
both Saturday and Sunday.
<- Outside of Katia’s house
was used to film the car
scene .
31. Katia’s Dinning Room – This was used to film the dinner date scene and one of the
building scenes.
Emslie Hornimans Park –
This was used to film the
“supermarket” scene.
Katia’s Living room – This was used to film all the scenes where the
characters were sitting on a sofa.
33. Katia’s Garden – This was used to film the park shots in.
Katia’s Bedroom – This was used to film the globe scenes in and the fight scenes.
34. Judy’s Kitchen – This was
used to film the aquarium
scene in front of the fish
tank.
Judy’s Brothers Room – This was used to film most of the lego scenes and when
John was little.