Semantics empowered Physical-Cyber-Social Systems for EarthCubeAmit Sheth
Presentation at the EarthCube Face Face-to-Face Workshop of Semantics & Ontologies Workgroup: April 30-May 1, 2012, Ballston, VA.
Workshop site: http://earthcube.ning.com/group/semantics-and-ontologies/page/workshops
For more recent material on this topic, see: http://wiki.knoesis.org/index.php/PCS
Engage 2013 at SXSWedu, Nada Dabbagh PhD, Strategically Designed Personal Lea...Cengage Learning
Personal Learning Environments or PLEs enable the creation of personal and social learning spaces
to support learner-centered and personalized learning experiences empowering students to direct
their own learning and develop self-regulated learning skills. PLEs are built bottom-up, by the student,
starting with personal goals, information management, and individual knowledge construction, and
progressing to socially mediated knowledge and networked learning. A PLE can be entirely controlled
and adapted by a student providing an engaged learning experience, however students must acquire
and apply a set of personal knowledge management and self-regulatory skills to create effective PLEs.
This talk will address this critical issue focusing on the use of social media as an educational platform
for scaffolding the strategic design of PLEs.
Semantics empowered Physical-Cyber-Social Systems for EarthCubeAmit Sheth
Presentation at the EarthCube Face Face-to-Face Workshop of Semantics & Ontologies Workgroup: April 30-May 1, 2012, Ballston, VA.
Workshop site: http://earthcube.ning.com/group/semantics-and-ontologies/page/workshops
For more recent material on this topic, see: http://wiki.knoesis.org/index.php/PCS
Engage 2013 at SXSWedu, Nada Dabbagh PhD, Strategically Designed Personal Lea...Cengage Learning
Personal Learning Environments or PLEs enable the creation of personal and social learning spaces
to support learner-centered and personalized learning experiences empowering students to direct
their own learning and develop self-regulated learning skills. PLEs are built bottom-up, by the student,
starting with personal goals, information management, and individual knowledge construction, and
progressing to socially mediated knowledge and networked learning. A PLE can be entirely controlled
and adapted by a student providing an engaged learning experience, however students must acquire
and apply a set of personal knowledge management and self-regulatory skills to create effective PLEs.
This talk will address this critical issue focusing on the use of social media as an educational platform
for scaffolding the strategic design of PLEs.
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
The Network of Excellence in Internet Science aims to achieve a deeper multidisciplinary understanding of the Internet as a societal and technological artefact.
More information: http://internet-science.eu/
Twitter: @i_scienceEU
This keynote presentation was given at the "Digital Learners - Myths and Realities" staff conference at Canterbury Christ Church University on 21st November, 2012.
Multiagent Systems as a Team Member: Presented at the 9th International Technology, Knowledge, and Society Conference in Vancouver, Canada. Presented by Common Ground Publishing - 2013.
Designing For Discovery With Faceted NavigationJim Kalbach
Faceted navigation has become very popular in the last decade. It’s seen as way to improve the findability of information on many sites, particularly those with large collections of products or documents. The design of real-world faceted navigation systems, however, proves to be more intricate than people first assume, and designers must be aware of many details.
This workshop covers principles of faceted classification and shows you how to use facets in web design. Many examples of faceted navigation will be presented and discussed. A clear, structured framework for understanding the individual components is presented to help you understand all the decisions involved. The topics are brought to life through several hands-on exercises.
Features
Using facets. After a brief overview of facets, we’ll discuss how to plan out their implementation.
Interface design. You’ll learn about the layout, display, and interaction with facets in detail. We’ll examine real-world examples, and you’ll apply what you’ve learnt in hands-on exercises.
Advanced topics. You will also be exposed to advanced topics in faceted navigation design, selecting multiple values, grouping, and more.
Social Tags and Music Information Retrieval (Part II)Paul Lamere
Part 2 of the slides for the Social Tags and Music Information Retrieval Tutorial - Abstract: Social Tags are free text labels that are applied to items such as artists, playlists and songs. These tags have the potential to have a positive impact on music information retrieval research. In this tutorial we describe the state of the art in commercial and research social tagging systems for music. We explore some of the motivations for tagging. We describe the factors that affect the quantity and quality of collected tags. We present a toolkit that MIR researchers can use to harvest and process tags. We look at how tags are collected and used in current commercial and research systems. We explore some of the issues and problems that are encountered when using tags. We present current MIR-related research centered on social tags and suggest possible areas of exploration for future resear
A Graph-based Clustering Scheme for Identifying Related Tags in FolksonomiesSymeon Papadopoulos
Conference presentation.
Full reference:
S. Papadopoulos, Y. Kompatsiaris, A. Vakali. “A Graph-based Clustering Scheme for Identifying Related Tags in Folksonomies”. In Proceedings of DaWaK'10, 12th International Conference on Data Warehousing and Knowledge discovery (Bilbao, Spain), Springer-Verlag, 65-76
Tagging isn’t new - it’s been around for a dog’s age in internet years. But in the past few years some fresh ideas and tools have reinvigorated the social tagging world. These new approaches include an attempt to improve findability through a bit of structure and control. While the idea of adding control to folksonomy seems like going against the whole selling point of social tagging (flexibility, openness), it is bringing the tagging to a new level, making it more viable for practical use in enterprises. This session will present hybrid approaches to formal taxonomies and social tagging. How can they be used in the corporate environment? What type of content is appropriate for social tagging? What kind of software is available for the enterprise? Learn how social tagging is not necessarily anathema to corporate taxonomy programs and how this hybrid approach can bring the best of both worlds: a fresh, up to date taxonomy with the structure needed to improve information findability.
Key Takeaways:
Folksonomy and taxonomy defined
Drawbacks of pure social tagging
Social tagging in the enterprise
Hybrid taxonomy & folksonomy approaches: Four models
These are the slides from my presentation to the NYC Python Meetup on July 28, 2009. The presentation was an overview of data analysis techniques and various python tools and libraries, along with the practical example (with code and algorithms) of a Twitter spam filter implemented with NLTK.
Network of Excellence in Internet Science (Multidisciplinarity and its Implic...i_scienceEU
The Network of Excellence in Internet Science aims to achieve a deeper multidisciplinary understanding of the Internet as a societal and technological artefact.
More information: http://internet-science.eu/
Twitter: @i_scienceEU
This keynote presentation was given at the "Digital Learners - Myths and Realities" staff conference at Canterbury Christ Church University on 21st November, 2012.
Multiagent Systems as a Team Member: Presented at the 9th International Technology, Knowledge, and Society Conference in Vancouver, Canada. Presented by Common Ground Publishing - 2013.
Designing For Discovery With Faceted NavigationJim Kalbach
Faceted navigation has become very popular in the last decade. It’s seen as way to improve the findability of information on many sites, particularly those with large collections of products or documents. The design of real-world faceted navigation systems, however, proves to be more intricate than people first assume, and designers must be aware of many details.
This workshop covers principles of faceted classification and shows you how to use facets in web design. Many examples of faceted navigation will be presented and discussed. A clear, structured framework for understanding the individual components is presented to help you understand all the decisions involved. The topics are brought to life through several hands-on exercises.
Features
Using facets. After a brief overview of facets, we’ll discuss how to plan out their implementation.
Interface design. You’ll learn about the layout, display, and interaction with facets in detail. We’ll examine real-world examples, and you’ll apply what you’ve learnt in hands-on exercises.
Advanced topics. You will also be exposed to advanced topics in faceted navigation design, selecting multiple values, grouping, and more.
Social Tags and Music Information Retrieval (Part II)Paul Lamere
Part 2 of the slides for the Social Tags and Music Information Retrieval Tutorial - Abstract: Social Tags are free text labels that are applied to items such as artists, playlists and songs. These tags have the potential to have a positive impact on music information retrieval research. In this tutorial we describe the state of the art in commercial and research social tagging systems for music. We explore some of the motivations for tagging. We describe the factors that affect the quantity and quality of collected tags. We present a toolkit that MIR researchers can use to harvest and process tags. We look at how tags are collected and used in current commercial and research systems. We explore some of the issues and problems that are encountered when using tags. We present current MIR-related research centered on social tags and suggest possible areas of exploration for future resear
A Graph-based Clustering Scheme for Identifying Related Tags in FolksonomiesSymeon Papadopoulos
Conference presentation.
Full reference:
S. Papadopoulos, Y. Kompatsiaris, A. Vakali. “A Graph-based Clustering Scheme for Identifying Related Tags in Folksonomies”. In Proceedings of DaWaK'10, 12th International Conference on Data Warehousing and Knowledge discovery (Bilbao, Spain), Springer-Verlag, 65-76
Tagging isn’t new - it’s been around for a dog’s age in internet years. But in the past few years some fresh ideas and tools have reinvigorated the social tagging world. These new approaches include an attempt to improve findability through a bit of structure and control. While the idea of adding control to folksonomy seems like going against the whole selling point of social tagging (flexibility, openness), it is bringing the tagging to a new level, making it more viable for practical use in enterprises. This session will present hybrid approaches to formal taxonomies and social tagging. How can they be used in the corporate environment? What type of content is appropriate for social tagging? What kind of software is available for the enterprise? Learn how social tagging is not necessarily anathema to corporate taxonomy programs and how this hybrid approach can bring the best of both worlds: a fresh, up to date taxonomy with the structure needed to improve information findability.
Key Takeaways:
Folksonomy and taxonomy defined
Drawbacks of pure social tagging
Social tagging in the enterprise
Hybrid taxonomy & folksonomy approaches: Four models
These are the slides from my presentation to the NYC Python Meetup on July 28, 2009. The presentation was an overview of data analysis techniques and various python tools and libraries, along with the practical example (with code and algorithms) of a Twitter spam filter implemented with NLTK.
From Data to Insights: how to build accurate customer insights from online co...Pulsar Platform
This case study for the RTO2 project (Real-Time O2) delves into the different parts of social media monitoring tools and analysis.
Presented at MRS Social Media Research Conference 2010 by Francesco D'Orazio, Research Director at Face, and Jake Steadman, Brand and Social Media Insight at O2.
TED Fuller event | digital user-generated content - My tales from the fieldDr Mariann Hardey
Workshop presentation for TEDfuller event at University Lincoln on user-generated content and digital technology. Pitfalls and opportunities for social researchers.
Collaborative mapping is the crucial need in any rescue and relief operation. Our recent experience lead us to focus the research on the development of a unique platform [web and mobile] that allows different levels of geolocated information sharing, on a “user permissions” base [anonymus user, registered user level 1, ….]. Our approach is to use the solutions that are free and open [such as Google Maps, Google Earth, Google 3d, Ushahidi, OpenStreetMap, or Android apps for route tracking] and to develop a stable tool through the integration of diverse solutions ensuring a high level of sharing and collaboration among different players.
Web and mobile emergency networks to real-time information and geodata management.
Authors: DI LOLLI - LANFRANCO - LOMBARDO - RAPISARDI
VVF TAS Torino | Università di Torino | NatRisk | Open Resilience
Personal Informatics Workshop at CHI 2010 (Poster)Ian Li
People strive to gain better knowledge of themselves by collecting information about their behaviors, habits, and thoughts. Personal informatics systems facilitates the collection and reflection on personal information. This workshop brought together researchers in a wide range of disciplines to discuss challenges and explore opportunities for HCI in the field of personal informatics. We identified technical and design issues. We discussed the benefits of reflecting on information about different facets of one's life, such as increased self-awareness, holistic engagement with life, and achievement of life balance. Key research areas include: ubiquitous computing, life logging, visualizations, persuasive technologies, interaction design, and the psychology of self-knowledge and self-awareness.
These are the slides for Robert H. McDonald for the Future Trends Panel Presentation at the the Inter-institutional Approaches to Supporting Scholarly Communication Symposium held on August 16, 2012 at the Georgia Institute of Technology.
Knowledge Management (KM) is a social activity. More and more organizations use social software as a tool to bridge the gap between technology- and human-oriented KM. In order to create interoperable, transferable solutions, it is necessary to utilize standards. In this paper, we analyze which standards can be applied and which gaps currently exist. We present the concept of knowledge bundles, capturing information on knowledge objects, activities and people as a prerequisite for social-focused KM. Based on our concept and examples, we derive the strong need for standardization in this domain. As a manifesto this paper tries to stimulate discussion and initiating a broad initiative working towards a common standard for the next generation of knowledge management systems. Our manifesto provides with eight recommendations how the KM community should act to address future challenges.
A presentation on how we are preparing to step through 'boxed media' into the world of Life Media Covergence.
1. Boxed Media
2. The Mobile Medium
3. Future of Media
Linked Data and Semantic Technologies can support a next generation of science. This talk shows examples of discovery, access, integration, analysis, and shows directions towards prediction and vision.
SP1: Exploratory Network Analysis with GephiJohn Breslin
ICWSM 2011 Tutorial
Sebastien Heymann and Julian Bilcke
Gephi is an interactive visualization and exploration software for all kinds of networks and relational data: online social networks, emails, communication and financial networks, but also semantic networks, inter-organizational networks and more. Designed to make data navigation and manipulation easy, it aims to fulfill the complete chain from data importing to aesthetics refinements and interaction. Users interact with the visualization and manipulate structures, shapes and colors to reveal hidden properties. The goal is to help data analysts to make hypotheses, intuitively discover patterns or errors in large data collections.
In this tutorial we will provide a hands-on demonstration of the essential functionalities of Gephi, based on a real case scenario: the exploration of student networks from the "Facebook100" dataset (Social Structure of Facebook Networks, Amanda L. Traud et al, 2011). The participants will be guided step by step through the complete chain of representation, manipulation, layout, analysis and aesthetics refinements. Particular focus will be put on filters and metrics for the creation of their first visualizations. They will be incited to compare the hypotheses suggested by their own exploration to the results actually published in the academic paper afterwards. They finally will walk away with the practical knowledge enabling them to use Gephi for their own projects. The tutorial is intended for professionals, researchers and graduates who wish to learn how playing during a network exploration can speed up their studies.
Sébastien Heymann is a Ph.D. Candidate in Computer Science at Université Pierre et Marie Curie, France. His research at the ComplexNetworks team focuses on the dynamics of realworld networks. He leads the Gephi project since 2008, and is the administrator of the Gephi Consortium.
Julian Bilcke is a Software Engineer at ISC-PIF (Complex Systems Institute of Paris, France). He is a founder and a developer for the Gephi project since 2008.
DeepFake Detection: Challenges, Progress and Hands-on Demonstration of Techno...Symeon Papadopoulos
Slides accompanying an online webinar on DeepFake Detection and a hands-on demonstration of the MeVer DeepFake Detection service. The webinar is supported by the US-Paris Tech Challenge award for our work on the InVID-WeVerify plugin.
Deepfakes: An Emerging Internet Threat and their DetectionSymeon Papadopoulos
Webinar talk in the context of the AI4EU Web Cafe. Recording of the talk available on: https://youtu.be/wY1rvseH1C8
Deepfakes have emerged for some time now as one of the largest Internet threats, and even though their primary use so far has been the creation of pornographic content, the risk of them being abused for disinformation purposes is growing by the day. Deepfake creation approaches and tools are continuously improving in terms of result quality and ease of use by non-experts, and accordingly the amount of deepfake content on the Internet is quickly growing. For that reason, approaches for deepfake detection are a valuable tool for media companies, social media platforms and ultimately citizens to help them tell authentic from deepfake generated content. In this presentation, I will be presenting a short overview of the developments in the field of deepfake detection, and present our lessons learned from working on the problem in the context of the Deepfake Detection Challenge and from developing a service for the H2020 WeVerify project.
Deepfake Detection: The Importance of Training Data Preprocessing and Practic...Symeon Papadopoulos
Talk on the AI4Media Workshop on GANs for Media Content Generation, October 1st 2020, https://ai4media.eu/events/gan-media-generation-workshop-oct-2020/
Short panel presentation given in the context of the AI4EU WebCafe "The COVID-19 and Contact Tracing Apps" on June 23rd 2020, focusing on the problem of COVID-19 misinformation and how this could potentially affect the adoption of contact tracing apps.
Lecture given on January 28, 2019 to post-graduate students of the Computer Engineering and Media program, at the School of Journalism and Media, Aristotle University of Thessaloniki.
Presentation on the topic of sensing air-quality at city level based on Twitter data given at the IEEE Image, Video, and Multidimensional Signal Processing (IVMSP) 2018 workshop in Aristi, Greece.
Aggregating and Analyzing the Context of Social Media ContentSymeon Papadopoulos
Introduction to the Context Analysis and Aggregation service of InVID. Given at the Workshop on Content Verification Tools hosted by the journalists' association in Thessaloniki, Greece on June 6, 2018.
Summary of problems and research results on the problem of verifying multimedia content on the Internet. Includes results from the REVEAL and InVID research projects. Presented at the Technology Forum, Thessaloniki, May 16, 2018.
Presentation of web-based service developed within REVEAL and InVID on Experts’ Meeting on Digital Image Authentication and Classification, December 6, 2017.
Tutorial for ACM Multimedia 2016, given together with Gerald Friedland, with contributions from Julia Bernd and Yiannis Kompatsiaris. The presentation covered an introduction to the problem of disclosing personal information through multimedia sharing, the associated security risks, methods for conducting multimodla inferences and technical frameworks that could help alleviate such risks.
Presentation of the joint participation between CERTH and CEA LIST in the MediaEval 2015 edition of the Retrieving Diverse Social Images Task in Wurzen, Germany on 14-15 September, 2015.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
The WeKnowIt Project
1. Emerging, Collective Intelligence for Personal, Organisational
and Social Use
Symeon Papadopoulos,
Yiannis Kompatsiaris (CERTH-ITI)
www.weknowit.eu
Trento, April 20
ICMR 2011
3. motivation
• Users upload, tag, share, connect & search
availability of massive amounts of user-generated
content and data
• Existing applications are limited to simple user data
management or shallow analysis
• Potential for much more if we mine the data and exploit them
in the right context
4. collective intelligence
…a form of intelligence emerging from online user activities
Collective Intelligence >> sum of individuals’ intelligences
5. an example
one of my photos @ flickr
my location: N/A
my tags: wki experiment bcn
(…pretty uninformative)
6. an example
one of my photos @ flickr others’ photos @ flickr
tags
location
7. an example
alternative views / trends / facts
one of my photos @ flickr
8. an example my friend’s photos @ flickr
one of my photos @ flickr
what did he visit next?
22. architecture / integration
Service Integration
Knowledge and Content Storage
Scenario-driven Service Composition
23. use case: emergency response
Media Intelligence
Personal Intelligence Photo arrives at ER control centre
>> Automatic localisation of photo
>> Login, Upload
>> Photo & speech auto-tagging
>> Spam detection
>> Personalized Access
Mass Intelligence
>> Clustering
>> Enrichment from additional sources
Social Intelligence
>> ER Alert Service
>> Reputation Service
Organisational Intelligence
>> Log Merging & Viewing
>> Incident Information Access
24. use case: travel Travel Preparation
Mass Intelligence
>> Landmark & Event detection
>> Ranked facet lists of POIs
>> Hybrid Image Clustering
Media Intelligence
>> Image Localisation
>> Tag suggestions Mobile Guidance
Personal Intelligence
Post Travel >> Personal Recommendations
Social Intelligence
>> Group profiling & recommendations
>> Friends position, alert
25. case: community detection in social media (1/2)
• Structural similarity + Local expansion
(highly efficient and scalable approach)
• Not necessary to know the number
of clusters
• Noise resilient
(not all nodes need to be part of a
+
community)
• Generic approach adaptable to
many applications
(depending on node – edge
representation)
S. Papadopoulos, Y. Kompatsiaris, A. Vakali. “A Graph-based Clustering Scheme for Identifying Related Tags in Folksonomies”.
In Proceedings of DaWaK'10, Springer-Verlag, 65-76
26. case: community detection in social media (2/2)
PHOTOS & METADATA
SPATIAL CLUSTERING + TEMPORAL ANALYSIS
tags: sagrada familia,
cathedral, barcelona
taken: 12 May 2009
lat: 41.4036, lon: 2.1743
CLASSIFICATION TO LANDMARKS/EVENTS
COMMUNITY DETECTION
VISUAL
TAG
HYBRID
S. Papadopoulos, C. Zigkolis, Y. Kompatsiaris, A. Vakali. “Cluster-based Landmark and Event Detection on Tagged Photo
Collections”. In IEEE Multimedia Magazine 18(1), pp. 52-63, 2011
32. conclusions
...so far
• CI emerges from massive online activities
• it is hard to extract and manage
• ...but is definitely worth the effort.
in the future...
• other domains: news, finance, e-gov
• real-time CI
• CI Linked Data
35. content in weknowit
offline model creation, training
Standard annotated corpora used for training.
• Single-modality: text (Brown corpus), speech (TIMIT database),
standard training data image (Corel database)
• Single-source: prepared by a single person/organization
• Consistent quality: absence of spam, malicious or erroneous data
• Small-moderate volume: Manually produced
Massive user generated content and feedback from Web 2.0 applications
• Multi-modality: e.g. image + tags, image + geo-location + time
massive Web 2.0 • Multi-source: may be generated by different applications, user communities,
e.g. Flickr, Panoramio, PhotoBucket
• Inconsistent quality: noise, spam, ambiguity
• Huge volume: Massively produced and disseminated
online user profiling, method invocation
Online content and user actions by WeKnowIt users. It is mainly used for
WKI user-contributed triggering WeKnowIt services and for providing context to them, e.g.
user profile, input content to be used as example for querying, etc.
36. technical approach
Variety of approaches depending on content-metadata input.
massive Web 2.0 –
massive Web 2.0 – standard training data semi-structured
unstructured
WKI user-contributed standard
Statistical approaches Content analysis Knowledge Based
Probabilistic models Text models (n-gram, LDA, CRF) Lookup (WordNet)
(pLSA, Bag-Of-Words) Image processing Thesaurus Lookup (GeoPlanet)
Graph-based approaches (visual feature extraction) Concept detection
(SNA, community detection) Speech modeling (Wikipedia, domain
(spectral analysis, HMM) ontologies)
37. massive Web 2.0 WKI user-contributed standard training data
Locations Topics Social connections
WP1 Get recommendations Tag normalization
Emergency alert service
Tag processing WP4
Visual analysis WP2 Community analysis tool
WP2 Text classification
Text annotation
ClustTour
Events
POI recommendation WP3 Speech search
Local tag community detector WP2
WP3 POI clustering Semantic photo query
Search place POI Entities
Named entity detection Log merger
WP5 csxPOIs WP3 WP5
Entity facet extraction - ranking Semaplorer(++)
Representation Access
CURIO Storage Account Manager
WP1 WP1
VERACITY Login
WP2 Speech Indexing
WP5 Event model F + M3O WP4 Community administration platform
WP6 Data Storage
WP6 Common data model WP5 Group Management
GUI ER CSG
WP6 Mobile app Travel preparation
Manage Item Comment
System Integration
WP1 Tag Users messaging Desktop proto WP7 Mobile guidance
WP3
Search Knowledge Base Lexical Spam Detector Post ER tool Post-travel logging
38. weknowit work structure
WP9: Management
management
WP1: Personal Intelligence
WP6: Architecture / Integration
WP2: Media Intelligence
WP3: Mass Intelligence WP7.I Use Case: ER
WP4: Social Intelligence
WP7.II Use Case: Travel
WP5: Organisational Intelligence
research development
WP8: Dissemination & Exploitation
dissemination & exploitation
39. Causality Pattern in Event-Model-F
• Event (cause) implies other event (effect)
• Causal relationship holds under some justification
• Causes and effects are events, and only events
40. OntoMDE
• Specification of MoOn using eCore and OAM as UML2 class diagram
• Transformation steps implemented
• Evaluation with ontologies of different complexity
42. results: dissemination
Activities
• Collective Intelligence Workshops and Special Session
• Summer schools
Publications
• 8 journal publications
• Trans. on MultiMedia, IEEE MultiMedia, J. of Web Semantics, MTAP, etc.
• 59 conference papers
• ACM MultiMedia, SIGIR, CVPR, ESWC, WWW, ICIP, WSDM, etc.
• 2 CI book chapters + 1 CI White Paper
• 3 patent applications