Did you hear it? That is the people-centric tsunami alarm. It warns you that a wave has reached the shores and is inundating every economy worldwide. Over the next few years, as the water recedes, the topology of the landscape--the way you engage and serve people--will be subtly, ultimately, and irrevocably changed forever. In this session, Michael Becker provides a global view of organizational-centric and people-centric approaches to personal data and identity management.
This document provides a brief history of big data, from the earliest known uses of data storage thousands of years ago to modern applications of big data. It outlines key developments such as the creation of early data storage and analysis methods, the development of computerized data processing, and the growth of data collection and sharing through the internet and mobile technology. The document also discusses the increasing volume of data generated every day through online activities and defines some of the main challenges in working with big data today.
ISSIP_Collab_SJSU_2024_Spring
Thank-you to the student team at SJSU for creating my Jim Spohrer AI Digital Twin (version 1) using the HeyGen.com platform
SJSU MIS (Management of Information Systems) Student Team:
Vincent Li (https://www.linkedin.com/in/vincentwli/)
Viola Shao (https://www.linkedin.com/in/viola-shao/)
Bradford Lee (https://www.linkedin.com/in/bradfordblee/)
Vy Nguyen (https://www.linkedin.com/in/vy-nguyen-communication/)
Victor Lin (https://www.linkedin.com/in/victor-lin27/)
Nikhil Bhatia (https://www.linkedin.com/in/nikhilbhatia89 /)
Join us at the Computer History Museum Celebration Friday May 24,2024 10am PT.
Deliverables
SJSU HeyGen English: https://app.heygen.com/share/f9b2e5170c61463e8a30daec60f0f01f
SJSU HeyGen French: https://app.heygen.com/share/dc221eecaf8f47f0a5a36960d51ca617
SJSU Case: https://bradfordbl.github.io
SJSU Whitepaper: TBD
SJSU_ISSIP_EC_Recording: TBD
SJSU_ISSIP_EC_Slides: TBD
ISSIP Thank-you
JCS ISSIP Blog Post: https://issip.org/2024-collab-ai_digital_twins/
JCS Article to Present: https://service-science.info/archives/6612
JCS Training Data: https://youtu.be/DUqPYEp9buQ
JCS How_Made Recording: https://youtu.be/isQmUg_rZH8
JCS How_Made Slides: https://www.slideshare.net/slideshow/sjsu-students-ai-digital-twin-of-jim-spohrer-20240506-v2-pptx/267857304
Authors: By <a href='https://www.linkedin.com/in/bradfordblee/'>Bradford Lee (LI)</a>. <a href='https://www.linkedin.com/in/nikhilbhatia89/'>Nikhil Bhatia (LI)</a>, <a href='https://www.linkedin.com/in/victor-lin27/'>Victor Lin (LI)</a>, <a href='https://www.linkedin.com/in/vincentwli/'>Vincent Li (LI)</a>, <a href='https://www.linkedin.com/in/viola-shao/'>Viola Shao (LI)</a>, <a href='https://www.linkedin.com/in/vy-nguyen-communication/'>Vy Nguyen (LI)</a>.
The document provides an update from the HOPE X conference on issues related to online identity. It discusses the history of the "nymwars" debate on anonymity and transparency online. It then outlines the ongoing debate around key concepts like trust, identity, and reputation. The document promotes participating in efforts around the National Strategy for Trusted Identities in Cyberspace (NSTIC) to influence identity policies and protect anonymity and pseudonymity. It introduces the two presenters and their backgrounds in online identity issues.
356 Part II • Predictive AnalyticsMachine LearningFace re.docxdomenicacullison
356 Part II • Predictive Analytics/Machine Learning
Face recognition, although seemingly similar to image
recognition, is a much more complicated undertaking.
The goal of face recognition is to identify the individ-
ual as opposed to the class it belongs to (human), and
this identification task needs to be performed on a
nonstatic (i.e., moving person) 3D environment. Face
recognition has been an active research field in AI
for many decades with limited success until recently.
Thanks to the new generation of algorithms (i.e., deep
learning) coupled with large data sets and computa-
tional power, face recognition technology is starting to
make a significant impact on real-world applications.
From security to marketing, face recognition and the
variety of applications/use cases of this technology
are increasing at an astounding pace.
Some of the premier examples of face recogni-
tion (both in advancements in technology and in the
creative use of the technology perspectives) come
from China. Today in China, face recognition is a
very hot topic both from business development and
from application development perspectives. Face
recognition has become a fruitful ecosystem with
hundreds of start-ups in China. In personal and/or
business settings, people in China are widely using
and relying on devices whose security is based on
automatic recognition of their faces.
As perhaps the largest scale practical applica-
tion case of deep learning and face recognition in
the world today, the Chinese government recently
started a project known as “Sharp Eyes” that aims at
establishing a nationwide surveillance system based
on face recognition. The project plans to integrate
security cameras already installed in public places
with private cameras on buildings and to utilize AI
and deep learning to analyze the videos from those
cameras. With millions of cameras and billions of
lines of code, China is building a high-tech authori-
tarian future. With this system, cameras in some cit-
ies can scan train and bus stations as well as airports
to identify and catch China’s most wanted suspected
criminals. Billboard-size displays can show the faces
of jaywalkers and list the names and pictures of peo-
ple who do not pay their debts. Facial recognition
scanners guard the entrances to housing complexes.
An interesting example of this surveillance
system is the “shame game” (Mozur, 2018). An
intersection south of Changhong Bridge in the city of
Xiangyang previously was a nightmare. Cars drove
fast, and jaywalkers darted into the street. Then,
in the summer of 2017, the police put up cameras
linked to facial recognition technology and a big out-
door screen. Photos of lawbreakers were displayed
alongside their names and government identifica-
tion numbers. People were initially excited to see
their faces on the screen until propaganda outlets
told them that this was a form of punishment. Using
this, citizens not only became .
This document summarizes issues related to privacy and emerging technologies. It discusses how technologies like body cameras, big data, and the internet of things impact privacy based on international human rights standards. Specific concerns addressed include behavioral marketing, data aggregation, metadata collection, and government surveillance partnerships with private companies. The document advocates that any reforms around these issues must consider the close relationship between companies and governments when it comes to accessing people's personal information.
The document discusses future security challenges at the ZACon conference. It summarizes opinions that information security problems have persisted for 25 years and hacking capabilities now exceed anti-virus budgets. It then explores emerging security frontiers like the semantic web, social networking, human-machine interfaces, virtual worlds, and technologies that are already here like service-oriented architectures and cloud computing. Each new development exceeds our current capacity to secure systems and properly manage related data and risks. The document calls for a risk-based progression in security as new technologies evolve.
What’s driving Big Data in a Communication Context?Fluid A/S
This document discusses how big data is driving real-time and context-driven communication. It notes that increasing internet access and e-commerce are generating vast amounts of user data. Technologies like the internet of things, social media, and cloud computing are also contributing to big data. However, privacy concerns have grown due to government surveillance programs revealed by Edward Snowden. He advocates for data security and user consent before data collection. The document argues companies should develop data strategies that give users choice and control over their data, and use data to anticipate needs and respond to customers in real-time across channels.
This document provides a brief history of big data, from the earliest known uses of data storage thousands of years ago to modern applications of big data. It outlines key developments such as the creation of early data storage and analysis methods, the development of computerized data processing, and the growth of data collection and sharing through the internet and mobile technology. The document also discusses the increasing volume of data generated every day through online activities and defines some of the main challenges in working with big data today.
ISSIP_Collab_SJSU_2024_Spring
Thank-you to the student team at SJSU for creating my Jim Spohrer AI Digital Twin (version 1) using the HeyGen.com platform
SJSU MIS (Management of Information Systems) Student Team:
Vincent Li (https://www.linkedin.com/in/vincentwli/)
Viola Shao (https://www.linkedin.com/in/viola-shao/)
Bradford Lee (https://www.linkedin.com/in/bradfordblee/)
Vy Nguyen (https://www.linkedin.com/in/vy-nguyen-communication/)
Victor Lin (https://www.linkedin.com/in/victor-lin27/)
Nikhil Bhatia (https://www.linkedin.com/in/nikhilbhatia89 /)
Join us at the Computer History Museum Celebration Friday May 24,2024 10am PT.
Deliverables
SJSU HeyGen English: https://app.heygen.com/share/f9b2e5170c61463e8a30daec60f0f01f
SJSU HeyGen French: https://app.heygen.com/share/dc221eecaf8f47f0a5a36960d51ca617
SJSU Case: https://bradfordbl.github.io
SJSU Whitepaper: TBD
SJSU_ISSIP_EC_Recording: TBD
SJSU_ISSIP_EC_Slides: TBD
ISSIP Thank-you
JCS ISSIP Blog Post: https://issip.org/2024-collab-ai_digital_twins/
JCS Article to Present: https://service-science.info/archives/6612
JCS Training Data: https://youtu.be/DUqPYEp9buQ
JCS How_Made Recording: https://youtu.be/isQmUg_rZH8
JCS How_Made Slides: https://www.slideshare.net/slideshow/sjsu-students-ai-digital-twin-of-jim-spohrer-20240506-v2-pptx/267857304
Authors: By <a href='https://www.linkedin.com/in/bradfordblee/'>Bradford Lee (LI)</a>. <a href='https://www.linkedin.com/in/nikhilbhatia89/'>Nikhil Bhatia (LI)</a>, <a href='https://www.linkedin.com/in/victor-lin27/'>Victor Lin (LI)</a>, <a href='https://www.linkedin.com/in/vincentwli/'>Vincent Li (LI)</a>, <a href='https://www.linkedin.com/in/viola-shao/'>Viola Shao (LI)</a>, <a href='https://www.linkedin.com/in/vy-nguyen-communication/'>Vy Nguyen (LI)</a>.
The document provides an update from the HOPE X conference on issues related to online identity. It discusses the history of the "nymwars" debate on anonymity and transparency online. It then outlines the ongoing debate around key concepts like trust, identity, and reputation. The document promotes participating in efforts around the National Strategy for Trusted Identities in Cyberspace (NSTIC) to influence identity policies and protect anonymity and pseudonymity. It introduces the two presenters and their backgrounds in online identity issues.
356 Part II • Predictive AnalyticsMachine LearningFace re.docxdomenicacullison
356 Part II • Predictive Analytics/Machine Learning
Face recognition, although seemingly similar to image
recognition, is a much more complicated undertaking.
The goal of face recognition is to identify the individ-
ual as opposed to the class it belongs to (human), and
this identification task needs to be performed on a
nonstatic (i.e., moving person) 3D environment. Face
recognition has been an active research field in AI
for many decades with limited success until recently.
Thanks to the new generation of algorithms (i.e., deep
learning) coupled with large data sets and computa-
tional power, face recognition technology is starting to
make a significant impact on real-world applications.
From security to marketing, face recognition and the
variety of applications/use cases of this technology
are increasing at an astounding pace.
Some of the premier examples of face recogni-
tion (both in advancements in technology and in the
creative use of the technology perspectives) come
from China. Today in China, face recognition is a
very hot topic both from business development and
from application development perspectives. Face
recognition has become a fruitful ecosystem with
hundreds of start-ups in China. In personal and/or
business settings, people in China are widely using
and relying on devices whose security is based on
automatic recognition of their faces.
As perhaps the largest scale practical applica-
tion case of deep learning and face recognition in
the world today, the Chinese government recently
started a project known as “Sharp Eyes” that aims at
establishing a nationwide surveillance system based
on face recognition. The project plans to integrate
security cameras already installed in public places
with private cameras on buildings and to utilize AI
and deep learning to analyze the videos from those
cameras. With millions of cameras and billions of
lines of code, China is building a high-tech authori-
tarian future. With this system, cameras in some cit-
ies can scan train and bus stations as well as airports
to identify and catch China’s most wanted suspected
criminals. Billboard-size displays can show the faces
of jaywalkers and list the names and pictures of peo-
ple who do not pay their debts. Facial recognition
scanners guard the entrances to housing complexes.
An interesting example of this surveillance
system is the “shame game” (Mozur, 2018). An
intersection south of Changhong Bridge in the city of
Xiangyang previously was a nightmare. Cars drove
fast, and jaywalkers darted into the street. Then,
in the summer of 2017, the police put up cameras
linked to facial recognition technology and a big out-
door screen. Photos of lawbreakers were displayed
alongside their names and government identifica-
tion numbers. People were initially excited to see
their faces on the screen until propaganda outlets
told them that this was a form of punishment. Using
this, citizens not only became .
This document summarizes issues related to privacy and emerging technologies. It discusses how technologies like body cameras, big data, and the internet of things impact privacy based on international human rights standards. Specific concerns addressed include behavioral marketing, data aggregation, metadata collection, and government surveillance partnerships with private companies. The document advocates that any reforms around these issues must consider the close relationship between companies and governments when it comes to accessing people's personal information.
The document discusses future security challenges at the ZACon conference. It summarizes opinions that information security problems have persisted for 25 years and hacking capabilities now exceed anti-virus budgets. It then explores emerging security frontiers like the semantic web, social networking, human-machine interfaces, virtual worlds, and technologies that are already here like service-oriented architectures and cloud computing. Each new development exceeds our current capacity to secure systems and properly manage related data and risks. The document calls for a risk-based progression in security as new technologies evolve.
What’s driving Big Data in a Communication Context?Fluid A/S
This document discusses how big data is driving real-time and context-driven communication. It notes that increasing internet access and e-commerce are generating vast amounts of user data. Technologies like the internet of things, social media, and cloud computing are also contributing to big data. However, privacy concerns have grown due to government surveillance programs revealed by Edward Snowden. He advocates for data security and user consent before data collection. The document argues companies should develop data strategies that give users choice and control over their data, and use data to anticipate needs and respond to customers in real-time across channels.
Presentation delivered in the University of Azores. The class about Travel Technology is an initiative by TTS in collaboration with its R&D company, TTS Lab.
More about the course you can find at http://protraveltech.tts.com/
The document summarizes the emerging opportunities and challenges around personal data as a new asset class. It outlines how personal data is being generated at unprecedented scales from various sources. However, the current personal data ecosystem remains fragmented without common standards or principles. The summary identifies key stakeholders in the ecosystem, including individuals, private sector companies, and governments, and notes they each have different and sometimes conflicting needs and interests. It argues a balanced ecosystem can be achieved by adopting an end-user centric approach that empowers individuals and aligns all stakeholders around common goals of trust, transparency and value creation.
Imagining and Empowering: Rethinking and Retooling for the Digital Future(s)Gigi Johnson
Enjoy my keynote presentation slides from the Friends of the National Library of Medicine on "Post-Pandemic Libraries: The Upcoming Era of Change". My session, which started the day, was about "Imagining and Empowering: Rethinking and Retooling for the Digital Future(s)". Add'l info: linktr.ee/gigijohnson
When Privacy Scales - Intelligent Product Design under GDPRAmanda Casari
Data-driven companies making intelligent products must design for security and privacy to be competitive globally. The EU General Data Protection Regulation (GDPR), implemented May 2018, is the benchmark that global data privacy will be measured against.
This presentation outlines the basic tenets of personal data and details the high-level changes that GDPR-compliant businesses face. It translates the current and near-future impact to teams designing products driven by machine learning and artificial intelligence and shares use cases of how SAP Concur is designing to meet this challenge while still delivering services to its end users that are driven by advanced algorithms.
Presented at The AI Conference, San Francisco, September 2018
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...Gerd Leonhard
This is a slightly edited version of my slides presented in London on June 7, 2013 and the Reuters Institute see https://reutersinstitute.politics.ox.ac.uk/research/conferences/forthcoming-conferences/big-data-big-ideas-for-media.html
BTW: You can download ALL of my slideshows, free books and other stuff at http://futuristgerd.com/downloads/
"Data stockpiles are growing exponentially...consumer profiles, media content usage patterns, Twitter and Facebook posts, online purchases, public records, real-time media user behavior and much more. The Big Ideas conference speakers will inspire tactics and strategies to harness these data.
The media industry's leading edge experts from journalism and business disciplines will detail their own case studies, outlining their challenges and triumphs using tools to understand complex data sets. They will outline how these experiences have paved the way to prize-winning journalism, audience insights and growing revenues..."
Protéger ses données personnelles dans un environnement multi-device: un enje...Ensighten
Ordinateurs, Mobiles, Tablettes, Montres, Voitures, … Aujourd’hui, grâce à des technologies de communication et de traitement de l‘information de plus en plus performantes et de moins en moins chères, nous entrons dans un monde multi devices où tout objet physique va être “connecté”, commandé à distance et pourra communiquer avec d’autres. Ce nouvel eco-système offre des opportunités sans précédent de nouveaux services et de personnalisation qui vont bouleverser notre vie courante. Cependant, plus il se développe, plus les individus prennent conscience des risques inhérents, plus spécifiquement autour de la protection de leurs données et de leur vie privée. Aussi, ce monde connecté confronte les entreprises à des cyber attaques de plus en plus nombreuses et élaborées, mettant à rude épreuve l’intégrité de leurs systèmes d’information et de leurs données clients. Dès lors, cet enjeu de protection devient commun aux deux parties avec, en filigrane, la confiance et la qualité de l’engagement.
Hervé Le Jouan, CEO de Privowny et figure reconnue du monde mobile et de la donnée, nous expliquera pourquoi et comment ces enjeux constituent une opportunité unique de mettre les individus au centre, de leur donner un pouvoir de visibilité et de contrôle qui bénéficiera assurément aux entreprises: une confiance éclairée!
The SXSW festival overview document discusses several themes that emerged around innovation, technology, and society based on sessions attended at SXSW 2016. Key themes included: 1) sorting fact from fiction around AI, robotics, and androids; 2) the role of data as an input for outcomes; 3) the growing presence of virtual reality; 4) how technology can be applied to social good; and 5) the continued focus on diversity, inclusion, and representation. Mobile applications were discussed but did not reveal major new platforms, while ad blocking was a hotly debated topic between publishers and proponents.
The document discusses the nature of data driven service innovation. Some key points made include:
- Data driven service innovation aims to create new services by finding innovative uses of data, but this process is messy and experimental as requirements are poorly defined initially.
- Big data projects resemble research more than production, requiring agility to combine conventional project management with an ability to fail fast and learn from mistakes.
- The complexity of modern ICT systems makes perfect causal understanding impossible. We must acknowledge our ignorance and use a probe-sense-analyze-act approach.
- Developing services is challenging as the customer experience is co-created and hard to define formally. Operational staff closest to customers provide important insights.
Future of value of data asia iot-asia presentation - 22 march 2018Future Agenda
Ahead of a series of major foresight events across Asia, we are very pleased to be sharing some initial views this week in Singapore on the key topic of the future value of data.
The value of data is an issue of interest to many. In a world where multiple systems are being transformed by digital, there are a host of organisations rushing to capitalise on the opportunity. They are not only digitising their businesses and creating new digital business models and platforms, but within this many are also seeing that their future value lies in data on which such models depend. This is common to a wide range of sectors and is evidently fuelling a 'data land grab' by many. There is however an important underlying question that has not yet been clearly addressed. This is what we actually mean by the 'value' of data. Recent events suggest that data sets can be both the most precious economic asset on earth as well as a liability that is used against our most precious institutions. The question of where the value in data lies then, is pivotal to how we understand the future of data ownership, access, regulation and use.
The data debate is becoming extreme. Many protagonists adopt 'all or nothing' positions around issues such as privacy, encryption, security and economic freedom. Data can clearly fulfil different roles in the economy, in society and for organisations and individuals. However, some simplistic views help us understand some roles - but also mislead and blind us.
Oil: The perspective that data is the new oil is one example in common debate: Vast hordes of it can make its owners very wealthy and powerful but it is however not a finite, exhaustible resource, nor are the costs of extraction high. So maybe it is not really like oil?
Currency: Equally some suggest that data is the new currency. Data can certainly serve as a medium for exchange and can also be used as a store of value… but describing data as currency really doesn't tell us much. It just confirms that data has value in certain contexts.
Water: Others we have talked to take a more holistic view and suggest data to be more like water - abundant and essential. It enables many other things of greater economic value to grow and develop. But in many contexts, it itself is maybe seen to have little or no value.
All three analogies have merit, but none seem to be quite right? There is no clear shared view on what data actually is - this may hold us back. As we move ahead, many now recognise that we need a better, more informed, forward looking, global, cross-industry view. If companies, governments and individuals are going to make the most of all the new data increasingly available, then several now consider that we need a more coherent picture of its real value. Too many strategic assumptions are being made without a shared, informed common perspective.
Presentation by George Roberts on 'Who and how am I online? Personal identity management for professional development – from the end-user’s perspective' at the LLLWFD ID Management assembly, Birmingham, May 2011
Big Data must be processed with advanced collection and analysis tools, based on predetermined algorithms, in order to obtain relevant information. Algorithms must also take into account invisible aspects for direct perceptions. Big Data issues is multi-layered. A distributed parallel architecture distributes data on multiple servers (parallel execution environments) thus dramatically improving data processing speeds. Big Data provides an infrastructure that allows for highlighting uncertainties, performance, and availability of components.
DOI: 10.13140/RG.2.2.12784.00004
The 5 Biggest Technology Trends In 2022Bernard Marr
The document discusses 5 major technology trends for 2022: 1) Artificial intelligence becoming more prevalent in everyday devices and tools, 2) Everything transitioning to an "as a service" model and no-code interfaces becoming more popular, 3) Continued digitization, data collection, and virtualization including the development of "metaverses", 4) Increased focus on transparency, governance, and accountability of AI and technology, and 5) Growing investment and viability of sustainable energy solutions like wind, solar, and green hydrogen.
This document summarizes a proposal from ConnectX for a satellite-based private network that would store financial and other sensitive data in space, eliminating the need for internet connectivity. The network would use a constellation of small satellites and new 3D data transmission and storage technology for unprecedented security and lower costs compared to terrestrial cloud storage. ConnectX aims to provide a secure platform for cryptocurrency and other sensitive data storage and transactions off-planet.
Society and Education in the World of 2040Ben Kahn
In 3 sentences:
Artificial intelligence and ubiquitous connectivity through the Internet of Things will transform society by 2040, automating many jobs currently performed by humans. This will require rethinking education to focus on skills like collaboration, problem solving, and lifelong learning to help humans adapt. By 2040, nearly every aspect of life will be impacted by AI, with data and algorithms embedded everywhere and driving most processes in ways that will challenge ideas of what it means to be human.
BetaGroup - Tech Trends in 2017, a snap shot by BetaGroupMohammed Cherif
The document discusses 13 emerging technology trends for the next few years: 1) Artificial Intelligence and Machine Learning, 2) Intelligent Apps, 3) Intelligent Things, 4) Virtual and Augmented Reality, 5) Digital Twins, 6) Blockchain, 7) Conversational Systems, 8) Digital Technology Platforms, 9) Adaptive Security Architecture, 10) Mesh App & Service Architecture, 11) Humanized Big Data, 12) Physical Digital Integrations, and 13) Everything on Demand. Each trend is briefly described and examples are provided. The document cautions that accurately predicting technology's future is difficult due to potential surprises.
TCS Innovation Forum - The Digital World in 2025 - 28 05 15Future Agenda
On 28th May we are running a min workshop at the London TCS Innovation Forum. This is looking how digital and data are changing society and this presentation is a starting point for that discussion.
Presentation delivered in the University of Azores. The class about Travel Technology is an initiative by TTS in collaboration with its R&D company, TTS Lab.
More about the course you can find at http://protraveltech.tts.com/
The document summarizes the emerging opportunities and challenges around personal data as a new asset class. It outlines how personal data is being generated at unprecedented scales from various sources. However, the current personal data ecosystem remains fragmented without common standards or principles. The summary identifies key stakeholders in the ecosystem, including individuals, private sector companies, and governments, and notes they each have different and sometimes conflicting needs and interests. It argues a balanced ecosystem can be achieved by adopting an end-user centric approach that empowers individuals and aligns all stakeholders around common goals of trust, transparency and value creation.
Imagining and Empowering: Rethinking and Retooling for the Digital Future(s)Gigi Johnson
Enjoy my keynote presentation slides from the Friends of the National Library of Medicine on "Post-Pandemic Libraries: The Upcoming Era of Change". My session, which started the day, was about "Imagining and Empowering: Rethinking and Retooling for the Digital Future(s)". Add'l info: linktr.ee/gigijohnson
When Privacy Scales - Intelligent Product Design under GDPRAmanda Casari
Data-driven companies making intelligent products must design for security and privacy to be competitive globally. The EU General Data Protection Regulation (GDPR), implemented May 2018, is the benchmark that global data privacy will be measured against.
This presentation outlines the basic tenets of personal data and details the high-level changes that GDPR-compliant businesses face. It translates the current and near-future impact to teams designing products driven by machine learning and artificial intelligence and shares use cases of how SAP Concur is designing to meet this challenge while still delivering services to its end users that are driven by advanced algorithms.
Presented at The AI Conference, San Francisco, September 2018
Self-Sovereign Identity technology has enormous potential to empower individuals and address privacy challenges globally. It uses shared ledgers (blockchain) to give individuals the power to create and manage their own identifiers, collect verified claims and interact with others on the network on their terms. This lighting talk by one of the pioneers working on this new emerging layer of the internet for 15 years will give a high level picture of how it works covering the core standards and technologies along with outlining some potential use-cases.
Big Data and the Future of Journalism (Futurist Keynote Speaker Gerd Leonhard...Gerd Leonhard
This is a slightly edited version of my slides presented in London on June 7, 2013 and the Reuters Institute see https://reutersinstitute.politics.ox.ac.uk/research/conferences/forthcoming-conferences/big-data-big-ideas-for-media.html
BTW: You can download ALL of my slideshows, free books and other stuff at http://futuristgerd.com/downloads/
"Data stockpiles are growing exponentially...consumer profiles, media content usage patterns, Twitter and Facebook posts, online purchases, public records, real-time media user behavior and much more. The Big Ideas conference speakers will inspire tactics and strategies to harness these data.
The media industry's leading edge experts from journalism and business disciplines will detail their own case studies, outlining their challenges and triumphs using tools to understand complex data sets. They will outline how these experiences have paved the way to prize-winning journalism, audience insights and growing revenues..."
Protéger ses données personnelles dans un environnement multi-device: un enje...Ensighten
Ordinateurs, Mobiles, Tablettes, Montres, Voitures, … Aujourd’hui, grâce à des technologies de communication et de traitement de l‘information de plus en plus performantes et de moins en moins chères, nous entrons dans un monde multi devices où tout objet physique va être “connecté”, commandé à distance et pourra communiquer avec d’autres. Ce nouvel eco-système offre des opportunités sans précédent de nouveaux services et de personnalisation qui vont bouleverser notre vie courante. Cependant, plus il se développe, plus les individus prennent conscience des risques inhérents, plus spécifiquement autour de la protection de leurs données et de leur vie privée. Aussi, ce monde connecté confronte les entreprises à des cyber attaques de plus en plus nombreuses et élaborées, mettant à rude épreuve l’intégrité de leurs systèmes d’information et de leurs données clients. Dès lors, cet enjeu de protection devient commun aux deux parties avec, en filigrane, la confiance et la qualité de l’engagement.
Hervé Le Jouan, CEO de Privowny et figure reconnue du monde mobile et de la donnée, nous expliquera pourquoi et comment ces enjeux constituent une opportunité unique de mettre les individus au centre, de leur donner un pouvoir de visibilité et de contrôle qui bénéficiera assurément aux entreprises: une confiance éclairée!
The SXSW festival overview document discusses several themes that emerged around innovation, technology, and society based on sessions attended at SXSW 2016. Key themes included: 1) sorting fact from fiction around AI, robotics, and androids; 2) the role of data as an input for outcomes; 3) the growing presence of virtual reality; 4) how technology can be applied to social good; and 5) the continued focus on diversity, inclusion, and representation. Mobile applications were discussed but did not reveal major new platforms, while ad blocking was a hotly debated topic between publishers and proponents.
The document discusses the nature of data driven service innovation. Some key points made include:
- Data driven service innovation aims to create new services by finding innovative uses of data, but this process is messy and experimental as requirements are poorly defined initially.
- Big data projects resemble research more than production, requiring agility to combine conventional project management with an ability to fail fast and learn from mistakes.
- The complexity of modern ICT systems makes perfect causal understanding impossible. We must acknowledge our ignorance and use a probe-sense-analyze-act approach.
- Developing services is challenging as the customer experience is co-created and hard to define formally. Operational staff closest to customers provide important insights.
Future of value of data asia iot-asia presentation - 22 march 2018Future Agenda
Ahead of a series of major foresight events across Asia, we are very pleased to be sharing some initial views this week in Singapore on the key topic of the future value of data.
The value of data is an issue of interest to many. In a world where multiple systems are being transformed by digital, there are a host of organisations rushing to capitalise on the opportunity. They are not only digitising their businesses and creating new digital business models and platforms, but within this many are also seeing that their future value lies in data on which such models depend. This is common to a wide range of sectors and is evidently fuelling a 'data land grab' by many. There is however an important underlying question that has not yet been clearly addressed. This is what we actually mean by the 'value' of data. Recent events suggest that data sets can be both the most precious economic asset on earth as well as a liability that is used against our most precious institutions. The question of where the value in data lies then, is pivotal to how we understand the future of data ownership, access, regulation and use.
The data debate is becoming extreme. Many protagonists adopt 'all or nothing' positions around issues such as privacy, encryption, security and economic freedom. Data can clearly fulfil different roles in the economy, in society and for organisations and individuals. However, some simplistic views help us understand some roles - but also mislead and blind us.
Oil: The perspective that data is the new oil is one example in common debate: Vast hordes of it can make its owners very wealthy and powerful but it is however not a finite, exhaustible resource, nor are the costs of extraction high. So maybe it is not really like oil?
Currency: Equally some suggest that data is the new currency. Data can certainly serve as a medium for exchange and can also be used as a store of value… but describing data as currency really doesn't tell us much. It just confirms that data has value in certain contexts.
Water: Others we have talked to take a more holistic view and suggest data to be more like water - abundant and essential. It enables many other things of greater economic value to grow and develop. But in many contexts, it itself is maybe seen to have little or no value.
All three analogies have merit, but none seem to be quite right? There is no clear shared view on what data actually is - this may hold us back. As we move ahead, many now recognise that we need a better, more informed, forward looking, global, cross-industry view. If companies, governments and individuals are going to make the most of all the new data increasingly available, then several now consider that we need a more coherent picture of its real value. Too many strategic assumptions are being made without a shared, informed common perspective.
Presentation by George Roberts on 'Who and how am I online? Personal identity management for professional development – from the end-user’s perspective' at the LLLWFD ID Management assembly, Birmingham, May 2011
Big Data must be processed with advanced collection and analysis tools, based on predetermined algorithms, in order to obtain relevant information. Algorithms must also take into account invisible aspects for direct perceptions. Big Data issues is multi-layered. A distributed parallel architecture distributes data on multiple servers (parallel execution environments) thus dramatically improving data processing speeds. Big Data provides an infrastructure that allows for highlighting uncertainties, performance, and availability of components.
DOI: 10.13140/RG.2.2.12784.00004
The 5 Biggest Technology Trends In 2022Bernard Marr
The document discusses 5 major technology trends for 2022: 1) Artificial intelligence becoming more prevalent in everyday devices and tools, 2) Everything transitioning to an "as a service" model and no-code interfaces becoming more popular, 3) Continued digitization, data collection, and virtualization including the development of "metaverses", 4) Increased focus on transparency, governance, and accountability of AI and technology, and 5) Growing investment and viability of sustainable energy solutions like wind, solar, and green hydrogen.
This document summarizes a proposal from ConnectX for a satellite-based private network that would store financial and other sensitive data in space, eliminating the need for internet connectivity. The network would use a constellation of small satellites and new 3D data transmission and storage technology for unprecedented security and lower costs compared to terrestrial cloud storage. ConnectX aims to provide a secure platform for cryptocurrency and other sensitive data storage and transactions off-planet.
Society and Education in the World of 2040Ben Kahn
In 3 sentences:
Artificial intelligence and ubiquitous connectivity through the Internet of Things will transform society by 2040, automating many jobs currently performed by humans. This will require rethinking education to focus on skills like collaboration, problem solving, and lifelong learning to help humans adapt. By 2040, nearly every aspect of life will be impacted by AI, with data and algorithms embedded everywhere and driving most processes in ways that will challenge ideas of what it means to be human.
BetaGroup - Tech Trends in 2017, a snap shot by BetaGroupMohammed Cherif
The document discusses 13 emerging technology trends for the next few years: 1) Artificial Intelligence and Machine Learning, 2) Intelligent Apps, 3) Intelligent Things, 4) Virtual and Augmented Reality, 5) Digital Twins, 6) Blockchain, 7) Conversational Systems, 8) Digital Technology Platforms, 9) Adaptive Security Architecture, 10) Mesh App & Service Architecture, 11) Humanized Big Data, 12) Physical Digital Integrations, and 13) Everything on Demand. Each trend is briefly described and examples are provided. The document cautions that accurately predicting technology's future is difficult due to potential surprises.
TCS Innovation Forum - The Digital World in 2025 - 28 05 15Future Agenda
On 28th May we are running a min workshop at the London TCS Innovation Forum. This is looking how digital and data are changing society and this presentation is a starting point for that discussion.
Similar to The Meeting Of The Waters Becker 10MAY22 (20)
IMPACT Silver is a pure silver zinc producer with over $260 million in revenue since 2008 and a large 100% owned 210km Mexico land package - 2024 catalysts includes new 14% grade zinc Plomosas mine and 20,000m of fully funded exploration drilling.
Discover timeless style with the 2022 Vintage Roman Numerals Men's Ring. Crafted from premium stainless steel, this 6mm wide ring embodies elegance and durability. Perfect as a gift, it seamlessly blends classic Roman numeral detailing with modern sophistication, making it an ideal accessory for any occasion.
https://rb.gy/usj1a2
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Tastemy Pandit
Know what your zodiac sign says about your taste in food! Explore how the 12 zodiac signs influence your culinary preferences with insights from MyPandit. Dive into astrology and flavors!
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...ABHILASH DUTTA
This presentation provides a thorough examination of Over-the-Top (OTT) platforms, focusing on their development and substantial influence on the entertainment industry, with a particular emphasis on the Indian market.We begin with an introduction to OTT platforms, defining them as streaming services that deliver content directly over the internet, bypassing traditional broadcast channels. These platforms offer a variety of content, including movies, TV shows, and original productions, allowing users to access content on-demand across multiple devices.The historical context covers the early days of streaming, starting with Netflix's inception in 1997 as a DVD rental service and its transition to streaming in 2007. The presentation also highlights India's television journey, from the launch of Doordarshan in 1959 to the introduction of Direct-to-Home (DTH) satellite television in 2000, which expanded viewing choices and set the stage for the rise of OTT platforms like Big Flix, Ditto TV, Sony LIV, Hotstar, and Netflix. The business models of OTT platforms are explored in detail. Subscription Video on Demand (SVOD) models, exemplified by Netflix and Amazon Prime Video, offer unlimited content access for a monthly fee. Transactional Video on Demand (TVOD) models, like iTunes and Sky Box Office, allow users to pay for individual pieces of content. Advertising-Based Video on Demand (AVOD) models, such as YouTube and Facebook Watch, provide free content supported by advertisements. Hybrid models combine elements of SVOD and AVOD, offering flexibility to cater to diverse audience preferences.
Content acquisition strategies are also discussed, highlighting the dual approach of purchasing broadcasting rights for existing films and TV shows and investing in original content production. This section underscores the importance of a robust content library in attracting and retaining subscribers.The presentation addresses the challenges faced by OTT platforms, including the unpredictability of content acquisition and audience preferences. It emphasizes the difficulty of balancing content investment with returns in a competitive market, the high costs associated with marketing, and the need for continuous innovation and adaptation to stay relevant.
The impact of OTT platforms on the Bollywood film industry is significant. The competition for viewers has led to a decrease in cinema ticket sales, affecting the revenue of Bollywood films that traditionally rely on theatrical releases. Additionally, OTT platforms now pay less for film rights due to the uncertain success of films in cinemas.
Looking ahead, the future of OTT in India appears promising. The market is expected to grow by 20% annually, reaching a value of ₹1200 billion by the end of the decade. The increasing availability of affordable smartphones and internet access will drive this growth, making OTT platforms a primary source of entertainment for many viewers.
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesHolger Mueller
Holger Mueller of Constellation Research shares his key takeaways from SAP's Sapphire confernece, held in Orlando, June 3rd till 5th 2024, in the Orange Convention Center.
SATTA MATKA SATTA FAST RESULT KALYAN TOP MATKA RESULT KALYAN SATTA MATKA FAST RESULT MILAN RATAN RAJDHANI MAIN BAZAR MATKA FAST TIPS RESULT MATKA CHART JODI CHART PANEL CHART FREE FIX GAME SATTAMATKA ! MATKA MOBI SATTA 143 spboss.in TOP NO1 RESULT FULL RATE MATKA ONLINE GAME PLAY BY APP SPBOSS
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...my Pandit
Explore the fascinating world of the Gemini Zodiac Sign. Discover the unique personality traits, key dates, and horoscope insights of Gemini individuals. Learn how their sociable, communicative nature and boundless curiosity make them the dynamic explorers of the zodiac. Dive into the duality of the Gemini sign and understand their intellectual and adventurous spirit.
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...my Pandit
Dive into the steadfast world of the Taurus Zodiac Sign. Discover the grounded, stable, and logical nature of Taurus individuals, and explore their key personality traits, important dates, and horoscope insights. Learn how the determination and patience of the Taurus sign make them the rock-steady achievers and anchors of the zodiac.
3 Simple Steps To Buy Verified Payoneer Account In 2024SEOSMMEARTH
Buy Verified Payoneer Account: Quick and Secure Way to Receive Payments
Buy Verified Payoneer Account With 100% secure documents, [ USA, UK, CA ]. Are you looking for a reliable and safe way to receive payments online? Then you need buy verified Payoneer account ! Payoneer is a global payment platform that allows businesses and individuals to send and receive money in over 200 countries.
If You Want To More Information just Contact Now:
Skype: SEOSMMEARTH
Telegram: @seosmmearth
Gmail: seosmmearth@gmail.com
Recruiting in the Digital Age: A Social Media MasterclassLuanWise
In this masterclass, presented at the Global HR Summit on 5th June 2024, Luan Wise explored the essential features of social media platforms that support talent acquisition, including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok.
Structural Design Process: Step-by-Step Guide for BuildingsChandresh Chudasama
The structural design process is explained: Follow our step-by-step guide to understand building design intricacies and ensure structural integrity. Learn how to build wonderful buildings with the help of our detailed information. Learn how to create structures with durability and reliability and also gain insights on ways of managing structures.