This presentation asks 7 key questions to demystify the magic of Aadhaar:
# Is Aadhaar a unique ID?
# Who certifies the identity, age, address, resident status, or even existence of persons assigned a Aadhaar number?
What documents were used to issue Aadhaar numbers?
# Who audited and verified the Aadhaar?
# What is the location address of enrolment operators submitting enrolment packets to be assigned Aadhaar numbers?
# Does Aadhaar identify anyone?
# Whose purpose does Aadhaar serve?
The presentation lists the key implications of the responses of the UIDAI to these questions under the Right to Information Act.
Benami voters and laundering elections with aadhaarAnupam Saraph
Why is Aadhaar worse for democracy than Cambridge Analytica?
The UIDAI's own claims about Aadhaar tell how Aadhaar not only destroys democracy but also the sovereignty of India. It pushes control of the elections into the hands of the ecosystem of Aadhaar: those who create Aadhaar enrolments, those who authenticate using Aadhaar, those who decide if your Aadhaar is deactivated and those who make beneficiary and electoral rolls with Aadhaar numbers.
Quick summary of points submitted to the PMO on why the UIDAI is not even an ID, not even needed, how it facilitates anti-nationals, destroys governance, creates pandora accounts and destroys sovereignty.
UIDAI Portal: Official Website for AadhaarChetanMoga
UIDAI portal is the official website of UIDAI which is the nodal agency that manages the Aadhaar biometric identification system. This presentation will help you navigate through the UIDAI portal easily.
Benami voters and laundering elections with aadhaarAnupam Saraph
Why is Aadhaar worse for democracy than Cambridge Analytica?
The UIDAI's own claims about Aadhaar tell how Aadhaar not only destroys democracy but also the sovereignty of India. It pushes control of the elections into the hands of the ecosystem of Aadhaar: those who create Aadhaar enrolments, those who authenticate using Aadhaar, those who decide if your Aadhaar is deactivated and those who make beneficiary and electoral rolls with Aadhaar numbers.
Quick summary of points submitted to the PMO on why the UIDAI is not even an ID, not even needed, how it facilitates anti-nationals, destroys governance, creates pandora accounts and destroys sovereignty.
UIDAI Portal: Official Website for AadhaarChetanMoga
UIDAI portal is the official website of UIDAI which is the nodal agency that manages the Aadhaar biometric identification system. This presentation will help you navigate through the UIDAI portal easily.
Presentation given by R S Sharma, Director General, UID Authority of India, Government of India on August 2nd, 2011 at eWorld Forum (www.eworldforum.net) in the session Unique Identification Number (UID)
Aadhaar authentication how to use virtual id (vid)Ujjwal Singh
The Virtual ID, which would be a random 16-digit number, together with biometrics of the user would give limited details like name, address and photograph, which are enough for any verification. This will give the users the option of not sharing their Aadhaar number at the time of authentication.
The significance of aadhaar card to get an instant loanAnisha Sachit
The amount of money coming either by your salary, interest of your savings account or from your second income and the amount of money going out i.e. the money spent it may be normal your monthly expenses including the money spend on your luxuries, together constitute the cash flow
Blog: https://financebuddha.com/blog/top-4-thumb-rules-of-perfect-cash-flow
What purpose do the economy, energy, or environment serve?Anupam Saraph
Address to the Pune International Centre Conference on:
Energy, Environment and Economic Growth: Emerging Challenges on 22-23 January 2021
Are we addicted to the economy? Have we forgotten it is the environment that gives life, not the economy? Do we recognize that energy, green or otherwise, will not protect the planet, or create reverence for the sacred, or care and respect for the community of life?
The IPCC says 10 years is all we have. Start your own initiatives to be a climate change leader. Help ensure we halt, even reduce global warming. Help ensure we protect our streams and rivers to ensure our life line.
Share widely with clubs in your city and across your district. Be a climate leader. Say I Can.
Summary of talk at the Centre for Energy and Environment Studies at the Rijksuniversiteit Groningen.
I described the nature of systems challenges and ways to identify that a challenge is a systems challenge. I then highlighted a few projects currently undertaken by the Government of India and described the systems challenges they created for India. Finally I described the methodology of systems interventions that avoid creating systems challenges and help accomplish difficult missions.
Wicked problems are those that benefit us individually but hurt us as a society. They turn up decades later in unexpected places, often far away from where you are. Often it's too late to be able to address them in our lifetime when we notice them.
Here is my short list of 3 wicked problems we are facing today. Sadly government's don't have think tanks that even understand, let alone address any of these problems.
This is part of my address to 600 students on the biggest challenges they need to deal with in their life.
Address delivered to the aspiring Ph.D. students on responsible conduct of research. Lists various examples of research from diverse fields that have raised questions about the responsible conduct. Asks what the purpose of responsible research should be and how and who should evaluate it.
There may be a video link to the actual talk somewhere, will link it when I have it.
How does one create enduring water security for each community?
These points are a summary of the steps required to be taken to ensure that no community will be without water for a single day and no community would suffer floods. The simple steps described here will ensure resilience from climate change.
This is the slide deck of my introductory sessions on Systems Thinking. Systems Thinking will help you understand change in the systems you are a part. It offers insights into counterintuitive outcomes you often observe in your own systems. It offers insights into making impact and why impacts fail. It hopes to give you the strength to leave your system better than when you found it.
Why the United Kingdom scrapped its UIDAnupam Saraph
Presentation made in June 2014 to explain David Cameroon's reasons for keeping his election promise in 2011 and scrapping the UK's UID program and destroying its database.
There is no escape from the cyber space and risks associated with it. Therefore we need to have a strategy to minimise our risks, including, protection from obsolescence, unfair practices, and protection of our identity and digital assets.
Slide deck used for talk for Moneylife Foundation. Video of talk at: https://www.youtube.com/watch?v=IMD8eO0aQUU&feature=youtu.be
Smart Projects for Smart Cities: The Government Way (Updated to Nov 2015)Anupam Saraph
This is a case study illustrating how bad projects are the norm in smart cities. It illustrates the bad governance and failure of the Ministry of Environment, Ministry of Urban Affairs, the State government and the Urban Local Body to protect public interest.
This case study demonstrates with the example of one stream of how the Pune Municipal Corporation and the JNNURM have been instrumental in destroying urban streams across Pune. JNNURM has funded similar projects across the country.
This has resulted in heavy costs to citizens, particularly:
• 66 Crores of tax money wasted on one streami alone in private interest to steal the green belt and water stream
• Project aimed to continuously waste more money in private interest to destroy all natural streams in Pune and in every urban centre under JNNURM
• Approximately 90 crores worth of wetland and green belt stolen from the public in Devnadi alone
• Water table for entire Baner in Pune (aprox 10 sq Km) destroyed (aprox annual cost of replacing the services 5X the current annual supply of water by tanker mafia)
• Pollution of the ground water and spread of water borne disease by laying sewage lines in the stream (Aprox 44 crores per year in purified drinking water costs for Baner alone + medical expenses to treat water borne disease and mosquito borne disease)
• Crime, failure of the Development Plan by promoting slums to grab the land of the river (Cost to mental health, peace and well being for entire Baner; crime rate up in Baner by more than 100% in last 5 years)
• Risk of damage by flooding increased at least 60 fold as the stream is channelized, constricted and flow changed to 1/60 of its avg. width
• Biodiversity and lungs of the Baner area destroyed by removing the trees and vegetation from the green belt and the river
Keynote address for Common Purpose workshop on Urban Sprawls in Dubai.
Urban sprawls have made cities unliveable. Despite the high costs of sprawls they have grown like cancer across the world.
What are the drivers that make cities sprawl? Can we regulate the sprawl? How can we ensure cities do not grow for ever?
How does the speed of urban transportation drive the urban sprawl? What is the role city nervous systems have to ensure liveable cities?
Draft Clean Ganga Bill 2014: An enduring answer to every Indian's plea for cl...Anupam Saraph
The Supreme Court of India the agony of every Indian in stating "When will Ganga flow with its pristine glory? We are not sure if our generation can see it. We would like at least our future generation to see the development,".
This ‘Clean Ganga Act 2014’ is a draft to provide a enduring mechanism to ensure "suitable means for maintenance of ecological flow." as promised by the government to the court. It aims to empower citizens and local-bodies to discharge their responsibility of protection, conservation and restoration of the lost glory of the Ganga and all water bodies across the country.
This draft is the result of more than 5 years of efforts of river activists across India and Policy-makers of various State and National Water Policies, under the leadership of Raincatcher and Waterman, Magsaysay Award winner Dr. Rajendrasingh.
Roadmap for Digital India submitted to the Prime Minister of India and the Information Technology Minister of India.
Ideas that protect the assets of the country, ensure right projects are being undertaken, no one is denied benefits, justice, equality, liberty and fraternity are within reach, the future scenarios are shared and democracy is not a distant dream.
Designing sustainable and resilient citiesAnupam Saraph
Talk given at Future Proofing Indian Cities in 2011
How does one leverage systems principles to build sustainable and resilient cities? A walk through 5 design principles based on systems characteristics for city designers.
Presentation given by R S Sharma, Director General, UID Authority of India, Government of India on August 2nd, 2011 at eWorld Forum (www.eworldforum.net) in the session Unique Identification Number (UID)
Aadhaar authentication how to use virtual id (vid)Ujjwal Singh
The Virtual ID, which would be a random 16-digit number, together with biometrics of the user would give limited details like name, address and photograph, which are enough for any verification. This will give the users the option of not sharing their Aadhaar number at the time of authentication.
The significance of aadhaar card to get an instant loanAnisha Sachit
The amount of money coming either by your salary, interest of your savings account or from your second income and the amount of money going out i.e. the money spent it may be normal your monthly expenses including the money spend on your luxuries, together constitute the cash flow
Blog: https://financebuddha.com/blog/top-4-thumb-rules-of-perfect-cash-flow
What purpose do the economy, energy, or environment serve?Anupam Saraph
Address to the Pune International Centre Conference on:
Energy, Environment and Economic Growth: Emerging Challenges on 22-23 January 2021
Are we addicted to the economy? Have we forgotten it is the environment that gives life, not the economy? Do we recognize that energy, green or otherwise, will not protect the planet, or create reverence for the sacred, or care and respect for the community of life?
The IPCC says 10 years is all we have. Start your own initiatives to be a climate change leader. Help ensure we halt, even reduce global warming. Help ensure we protect our streams and rivers to ensure our life line.
Share widely with clubs in your city and across your district. Be a climate leader. Say I Can.
Summary of talk at the Centre for Energy and Environment Studies at the Rijksuniversiteit Groningen.
I described the nature of systems challenges and ways to identify that a challenge is a systems challenge. I then highlighted a few projects currently undertaken by the Government of India and described the systems challenges they created for India. Finally I described the methodology of systems interventions that avoid creating systems challenges and help accomplish difficult missions.
Wicked problems are those that benefit us individually but hurt us as a society. They turn up decades later in unexpected places, often far away from where you are. Often it's too late to be able to address them in our lifetime when we notice them.
Here is my short list of 3 wicked problems we are facing today. Sadly government's don't have think tanks that even understand, let alone address any of these problems.
This is part of my address to 600 students on the biggest challenges they need to deal with in their life.
Address delivered to the aspiring Ph.D. students on responsible conduct of research. Lists various examples of research from diverse fields that have raised questions about the responsible conduct. Asks what the purpose of responsible research should be and how and who should evaluate it.
There may be a video link to the actual talk somewhere, will link it when I have it.
How does one create enduring water security for each community?
These points are a summary of the steps required to be taken to ensure that no community will be without water for a single day and no community would suffer floods. The simple steps described here will ensure resilience from climate change.
This is the slide deck of my introductory sessions on Systems Thinking. Systems Thinking will help you understand change in the systems you are a part. It offers insights into counterintuitive outcomes you often observe in your own systems. It offers insights into making impact and why impacts fail. It hopes to give you the strength to leave your system better than when you found it.
Why the United Kingdom scrapped its UIDAnupam Saraph
Presentation made in June 2014 to explain David Cameroon's reasons for keeping his election promise in 2011 and scrapping the UK's UID program and destroying its database.
There is no escape from the cyber space and risks associated with it. Therefore we need to have a strategy to minimise our risks, including, protection from obsolescence, unfair practices, and protection of our identity and digital assets.
Slide deck used for talk for Moneylife Foundation. Video of talk at: https://www.youtube.com/watch?v=IMD8eO0aQUU&feature=youtu.be
Smart Projects for Smart Cities: The Government Way (Updated to Nov 2015)Anupam Saraph
This is a case study illustrating how bad projects are the norm in smart cities. It illustrates the bad governance and failure of the Ministry of Environment, Ministry of Urban Affairs, the State government and the Urban Local Body to protect public interest.
This case study demonstrates with the example of one stream of how the Pune Municipal Corporation and the JNNURM have been instrumental in destroying urban streams across Pune. JNNURM has funded similar projects across the country.
This has resulted in heavy costs to citizens, particularly:
• 66 Crores of tax money wasted on one streami alone in private interest to steal the green belt and water stream
• Project aimed to continuously waste more money in private interest to destroy all natural streams in Pune and in every urban centre under JNNURM
• Approximately 90 crores worth of wetland and green belt stolen from the public in Devnadi alone
• Water table for entire Baner in Pune (aprox 10 sq Km) destroyed (aprox annual cost of replacing the services 5X the current annual supply of water by tanker mafia)
• Pollution of the ground water and spread of water borne disease by laying sewage lines in the stream (Aprox 44 crores per year in purified drinking water costs for Baner alone + medical expenses to treat water borne disease and mosquito borne disease)
• Crime, failure of the Development Plan by promoting slums to grab the land of the river (Cost to mental health, peace and well being for entire Baner; crime rate up in Baner by more than 100% in last 5 years)
• Risk of damage by flooding increased at least 60 fold as the stream is channelized, constricted and flow changed to 1/60 of its avg. width
• Biodiversity and lungs of the Baner area destroyed by removing the trees and vegetation from the green belt and the river
Keynote address for Common Purpose workshop on Urban Sprawls in Dubai.
Urban sprawls have made cities unliveable. Despite the high costs of sprawls they have grown like cancer across the world.
What are the drivers that make cities sprawl? Can we regulate the sprawl? How can we ensure cities do not grow for ever?
How does the speed of urban transportation drive the urban sprawl? What is the role city nervous systems have to ensure liveable cities?
Draft Clean Ganga Bill 2014: An enduring answer to every Indian's plea for cl...Anupam Saraph
The Supreme Court of India the agony of every Indian in stating "When will Ganga flow with its pristine glory? We are not sure if our generation can see it. We would like at least our future generation to see the development,".
This ‘Clean Ganga Act 2014’ is a draft to provide a enduring mechanism to ensure "suitable means for maintenance of ecological flow." as promised by the government to the court. It aims to empower citizens and local-bodies to discharge their responsibility of protection, conservation and restoration of the lost glory of the Ganga and all water bodies across the country.
This draft is the result of more than 5 years of efforts of river activists across India and Policy-makers of various State and National Water Policies, under the leadership of Raincatcher and Waterman, Magsaysay Award winner Dr. Rajendrasingh.
Roadmap for Digital India submitted to the Prime Minister of India and the Information Technology Minister of India.
Ideas that protect the assets of the country, ensure right projects are being undertaken, no one is denied benefits, justice, equality, liberty and fraternity are within reach, the future scenarios are shared and democracy is not a distant dream.
Designing sustainable and resilient citiesAnupam Saraph
Talk given at Future Proofing Indian Cities in 2011
How does one leverage systems principles to build sustainable and resilient cities? A walk through 5 design principles based on systems characteristics for city designers.
Section 4 is the most important Section in the Right to Information Act. As yet it is the least used by information seekers, the least enforced by Information Commissioners and the least complied to by government agencies.
This presentation makes a case for making Section 4 work.
Presentation at seminar on "Role of Civil Society in enhancing transparency".
Draft State Right to Water Bill 2015 Ver 4.0Anupam Saraph
The result of more than 5 years of efforts of river activists across India and Policy-makers of various State and National Water Policies, under the leadership of Raincatcher and Waterman, Magsaysay Award winner Dr. Rajendrasingh, here is a draft Right to Water Bill for States.
This ‘Right to Water Act 2015’ empowers the citizens and the local-bodies a right, and not a privilege, to discharge their responsibility of protection, conservation and restoration of all water bodies for enabling the right to equitable access and abundant quantity of quality water responsibly abstracted from the water cycle for wholesome sustenance and dignity of citizens and all life forms.
Which State's will see it prudent to deliver this legal framework to its citizens this year?
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
2. AADHAAR IS NOT UNIQUE
UIDAI Says Your Biometric Cannot Retrieve a Unique Record
SOURCE: RESPONSES FROM THE UIDAI TO QUESTIONS ASKED UNDER THE RIGHT TO INFORMATION ACT
This Implies It Cannot De-Duplicate Or Clean Any Database
It Cannot Guarantee Money Transfers to Unique Real Individuals
It Cannot Save Any Money
2
3. AADHAAR NOT CERTIFIED
UIDAI Says It Doesn’t Certify Identity, Address Or Anything
SOURCE: RESPONSES FROM THE UIDAI TO QUESTIONS ASKED UNDER THE RIGHT TO INFORMATION ACT
This Implies It Cannot Guarantee Any Information
This Implies That It Masquerades As A Proof Of Identity That It Isn’t
It Also Means No One Is Responsible For Crimes Propagated By Relying On Aadhaar
3
4. AADHAAR BASIS NOT KNOWN
UIDAI Says It Has No Information About Documents Used To Issue Aadhaar
SOURCE: RESPONSES FROM THE UIDAI TO QUESTIONS ASKED UNDER THE RIGHT TO INFORMATION ACT
This Implies Aadhaar May Have Been Issued Without Documents Or With Invalid Documents
Use of Aadhaar To Issue Other IDs Destroys The Ability To Distinguish Genuine And Fake Individuals
UIDAI Hasn’t Verified Any Documents r Anyone
4
5. AADHAAR HAS NEVER BEEN
AUDITED
UIDAI Says The Database Hasn’t Ever Been Audited, Verified
SOURCE: RESPONSES FROM THE UIDAI TO QUESTIONS ASKED UNDER THE RIGHT TO INFORMATION ACT
This Implies Aadhaar Is Not Free From Ghosts, Duplicates
Aadhaar Does Not Provide Any Advantage Over Any Existing ID
Use Of This Database Is No Different From Making Up A Fake Database
5
6. ENROLMENT OPERATORS
LOCATION PRIVATE
UIDAI Says It Cant Reveal Enrolment Operators Location
SOURCE: RESPONSES FROM THE UIDAI TO QUESTIONS ASKED UNDER THE RIGHT TO INFORMATION ACT
Only 20 Registrars Hiring Enrolment Agencies Allotted 1 Billion Numbers
Together They Do Not Have Geographical Presence in 600,000 Villages, 5,000 Towns Across India
If Enrolment Operators Location is Private, It Casts Doubts on Enrolment Process, Outreach
6
7. USE OF AADHAAR IS NOT
IDENTIFICATION
UIDAI Doesn’t Identify Anyone, It Never Can
SOURCE: RESPONSES FROM THE UIDAI TO QUESTIONS ASKED UNDER THE RIGHT TO INFORMATION ACT AND THE AADHAAR ACT 2016
This Implies It Cannot Be Used To Identify Anyone
It Cannot Be Used As Proof Of Anything
It Masquerades As An Identity That It Is Not
7
8. WHOSE PURPOSE DOES IT
SERVE?
How Can Its Continued Use Serve National Or Public Interest?
It Destroys Our Ability To Govern, It Destroys Our Financial Databases, It Destroys Our National Security
It Destroys Databases That Protect Democracy And Our Sovereign Republic
It Destroys Ability to Seek Justice, Dignity, Equality And Liberty
8