The future of technology in peacebuilding: Presentation at MIT Media LabSanjana Hattotuwa
In early April this year, I was invited to deliver a keynote address at the inaugural Build Peace conference, held at MIT Media Lab. My presentation was given, almost to the day, twenty years after the Rwandan genocide. Just before I went on stage, we all observed a minute's silence to remember the victims.
The genocide wasn't on my mind when I made the slides for the presentation, but brought into sharp focus the thrust of my submission, which was to look ten to fifteen years into the future, and how information and communications technologies (ICTs) would feature in both the genesis and inflammation of complex political emergencies (CPEs) - in other words, violent conflict - as well as aid in peacebuilding and conflict transformation.
The future of technology in peacebuilding: Presentation at MIT Media LabSanjana Hattotuwa
In early April this year, I was invited to deliver a keynote address at the inaugural Build Peace conference, held at MIT Media Lab. My presentation was given, almost to the day, twenty years after the Rwandan genocide. Just before I went on stage, we all observed a minute's silence to remember the victims.
The genocide wasn't on my mind when I made the slides for the presentation, but brought into sharp focus the thrust of my submission, which was to look ten to fifteen years into the future, and how information and communications technologies (ICTs) would feature in both the genesis and inflammation of complex political emergencies (CPEs) - in other words, violent conflict - as well as aid in peacebuilding and conflict transformation.
(DOC) Effects of Globalization essay | Estelle Gras - Academia.edu. How to Write the Best Globalization Essay: A Step by Step Guide. Essay "How has globalization influenced development?" - How has .... Essay about negative effects of globalization.
Cybersecurity Strategies - time for the next generationHinne Hettema
In this talk, presented in June 2016 at KAIST, I argue that it is time for the next generation of cybersecurity strategies. These must have a governance focus, and be based on international laws, declarations and agreements, basic internet rights and public good provisions.
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)Flupa
DESIGNING INCLUSIVE PRODUCTS
Conférence de Sara Wachter-Boettcher
Même si nos projets commencent toujours avec de très bonnes intentions, on se retrouve souvent avec des produits pilotés par des stéréotypes toxiques qui sont véhiculés dans la culture tech : des balances connectées qui déduisent que tout le monde veut perdre du poids, des formulaires qui ne correspondent pas aux personnes transgenres, des bots lecteurs de curriculum qui désavantagent les femmes,les systèmes de reconnaissance faciale qui n’arrivent pas à identifier les personnes de couleur…
Aujourd’hui, la technologie a pris une place centrale dans le quotidien de nos utilisateurs jusqu’à aller dans le moindre recoin de leur intimité, nous avons notre part de responsabilité par nos décisions lorsque ces produits incluent ou rejettent des utilisateurs. Durant cette keynote, Sara Wachter-Boettcher expliquera comment la culture de l’industrie tech est en train de créer des produits qui exploitent des préjugés, manipulent et blessent des utilisateurs, mais nuisent également à la démocratie. Elle nous présentera également le comportement à adopter pour éviter de créer ce type de produit : comment concevoir des hypothèses dans notre processus de travail, vérifier que les décisions prises autour du produit soient correctes auprès de différents utilisateurs et différentes situations, avoir des discussions avec ses équipes et les entreprises et poursuivre une démarche de conception plus éthique et inclusive pour notre industrie.
Plus d'infos sur : uxday.flupa.eu/designing-inclusive-products
Tim Estes - Generating dynamic social networks from large scale unstructured ...Digital Reasoning
Tim Estes, CEO of Digital Reasoning, delivered this presentation at the Strata Conference (Feb 2011). It discusses how large scale blog data can be mined to yield social networks of influencers, connections, discussion topics, etc.
Wikileaks, the Arab Spring, and the Occupy movement have made the need for user-controlled digital technologies clear, as activists have used the Internet and mobile phones to organise and to communicate with each other and with potential supporters. The consequences of failures in these systems, particularly security breaches, can be extreme: activists may face fines, jail time, or even death. Free and open source software (FOSS) provides one potential solution to these problems, as it is focused on users' needs. FOSS communities also already overlap significantly with many other activist communities, and are working to develop cross-movement connections as well as useful tools. However, many FOSS communities, and particularly those defined by a commitment to open source, rather than than free, software, are reluctant to take overt political stands. Similarly, many activists on both the left and the right have an aversion to digital technologies for both ideological and practical reasons. This means that there are frequently significant barriers to increasing the links between FOSS and progressive political movements. This presentation explores the connections between FOSS communities and the broader activist landscape. It looks at the politics of FOSS, the ways in which global movements and FOSS communities are building links, and the potential benefits of actively seeking cross-fertilisation of ideas and politics between FOSS and progressive movements.
Why Everyone Needs DevOps Now: My Fourteen Year Journey Studying High Perform...Akamai Technologies
How do great IT organizations simultaneously deliver stellar service levels and fast flow of new features into production? It requires creating a “super-tribe”, where development, test, IT operations and information security genuinely work together to solve business objectives as opposed to throwing each under the bus. In this talk, Gene Kim will describe what successful development organization transformations look like, and how they were achieved from a Dev and Ops perspective. Drawing upon a 14 year study of high performing IT organizations, Gene will share the best known methods, recipes and case studies of how to implement successful DevOps-style transformations. See Gene Kim's Edge Presentation: http://www.akamai.com/html/custconf/edgetv-developers.html#gene-kim
The Akamai Edge Conference is a gathering of the industry revolutionaries who are committed to creating leading edge experiences, realizing the full potential of what is possible in a Faster Forward World. From customer innovation stories, industry panels, technical labs, partner and government forums to Web security and developers' tracks, there’s something for everyone at Edge 2013.
Learn more at http://www.akamai.com/edge
Citizen Voices in a Networked Age of #BigDataStuart Shulman
A talk prepared for the Citizen Voices Conference sponsored by the World Bank:
http://live.worldbank.org/citizen-voices-conference-webcast-and-live-blog
Networks, swarms and policy: what collective intelligence means for policy ma...Alberto Cottica
Policy makers are taking up network thinking; citizens are self-organizing in smart swarms displaying collectivley intelligent behaviour. I address the implications of these phenomena for policy making, and look at some tools being built by a project called CATALYST that might help both citizens and policy makers.
What could kill NSTIC? A friendly threat assessment in 3 parts.Phil Wolff
At two events 18-months apart, teams of suits, geeks, and wonks (industry experts, technologists, public policy analysts) brainstormed and scored what could lead to failure of NSTIC, an international effort to create an identity ecosystem. The whitepaper at http://pde.cc/nsticrisks recaps the long list of potential threats, a shorter list of preventive strategies, compares the 2011 and 2012 events, and names the two greatest threats: poor user experience (harming trust, adoption, use) and imbalance among the forces tying the identity ecosystem together.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
More Related Content
Similar to #ThisIsNotNormal: How a Moment Created a Movement
(DOC) Effects of Globalization essay | Estelle Gras - Academia.edu. How to Write the Best Globalization Essay: A Step by Step Guide. Essay "How has globalization influenced development?" - How has .... Essay about negative effects of globalization.
Cybersecurity Strategies - time for the next generationHinne Hettema
In this talk, presented in June 2016 at KAIST, I argue that it is time for the next generation of cybersecurity strategies. These must have a governance focus, and be based on international laws, declarations and agreements, basic internet rights and public good provisions.
Flupa UX Days 2018 | Sara Wachter-Boettcher (EN)Flupa
DESIGNING INCLUSIVE PRODUCTS
Conférence de Sara Wachter-Boettcher
Même si nos projets commencent toujours avec de très bonnes intentions, on se retrouve souvent avec des produits pilotés par des stéréotypes toxiques qui sont véhiculés dans la culture tech : des balances connectées qui déduisent que tout le monde veut perdre du poids, des formulaires qui ne correspondent pas aux personnes transgenres, des bots lecteurs de curriculum qui désavantagent les femmes,les systèmes de reconnaissance faciale qui n’arrivent pas à identifier les personnes de couleur…
Aujourd’hui, la technologie a pris une place centrale dans le quotidien de nos utilisateurs jusqu’à aller dans le moindre recoin de leur intimité, nous avons notre part de responsabilité par nos décisions lorsque ces produits incluent ou rejettent des utilisateurs. Durant cette keynote, Sara Wachter-Boettcher expliquera comment la culture de l’industrie tech est en train de créer des produits qui exploitent des préjugés, manipulent et blessent des utilisateurs, mais nuisent également à la démocratie. Elle nous présentera également le comportement à adopter pour éviter de créer ce type de produit : comment concevoir des hypothèses dans notre processus de travail, vérifier que les décisions prises autour du produit soient correctes auprès de différents utilisateurs et différentes situations, avoir des discussions avec ses équipes et les entreprises et poursuivre une démarche de conception plus éthique et inclusive pour notre industrie.
Plus d'infos sur : uxday.flupa.eu/designing-inclusive-products
Tim Estes - Generating dynamic social networks from large scale unstructured ...Digital Reasoning
Tim Estes, CEO of Digital Reasoning, delivered this presentation at the Strata Conference (Feb 2011). It discusses how large scale blog data can be mined to yield social networks of influencers, connections, discussion topics, etc.
Wikileaks, the Arab Spring, and the Occupy movement have made the need for user-controlled digital technologies clear, as activists have used the Internet and mobile phones to organise and to communicate with each other and with potential supporters. The consequences of failures in these systems, particularly security breaches, can be extreme: activists may face fines, jail time, or even death. Free and open source software (FOSS) provides one potential solution to these problems, as it is focused on users' needs. FOSS communities also already overlap significantly with many other activist communities, and are working to develop cross-movement connections as well as useful tools. However, many FOSS communities, and particularly those defined by a commitment to open source, rather than than free, software, are reluctant to take overt political stands. Similarly, many activists on both the left and the right have an aversion to digital technologies for both ideological and practical reasons. This means that there are frequently significant barriers to increasing the links between FOSS and progressive political movements. This presentation explores the connections between FOSS communities and the broader activist landscape. It looks at the politics of FOSS, the ways in which global movements and FOSS communities are building links, and the potential benefits of actively seeking cross-fertilisation of ideas and politics between FOSS and progressive movements.
Why Everyone Needs DevOps Now: My Fourteen Year Journey Studying High Perform...Akamai Technologies
How do great IT organizations simultaneously deliver stellar service levels and fast flow of new features into production? It requires creating a “super-tribe”, where development, test, IT operations and information security genuinely work together to solve business objectives as opposed to throwing each under the bus. In this talk, Gene Kim will describe what successful development organization transformations look like, and how they were achieved from a Dev and Ops perspective. Drawing upon a 14 year study of high performing IT organizations, Gene will share the best known methods, recipes and case studies of how to implement successful DevOps-style transformations. See Gene Kim's Edge Presentation: http://www.akamai.com/html/custconf/edgetv-developers.html#gene-kim
The Akamai Edge Conference is a gathering of the industry revolutionaries who are committed to creating leading edge experiences, realizing the full potential of what is possible in a Faster Forward World. From customer innovation stories, industry panels, technical labs, partner and government forums to Web security and developers' tracks, there’s something for everyone at Edge 2013.
Learn more at http://www.akamai.com/edge
Citizen Voices in a Networked Age of #BigDataStuart Shulman
A talk prepared for the Citizen Voices Conference sponsored by the World Bank:
http://live.worldbank.org/citizen-voices-conference-webcast-and-live-blog
Networks, swarms and policy: what collective intelligence means for policy ma...Alberto Cottica
Policy makers are taking up network thinking; citizens are self-organizing in smart swarms displaying collectivley intelligent behaviour. I address the implications of these phenomena for policy making, and look at some tools being built by a project called CATALYST that might help both citizens and policy makers.
What could kill NSTIC? A friendly threat assessment in 3 parts.Phil Wolff
At two events 18-months apart, teams of suits, geeks, and wonks (industry experts, technologists, public policy analysts) brainstormed and scored what could lead to failure of NSTIC, an international effort to create an identity ecosystem. The whitepaper at http://pde.cc/nsticrisks recaps the long list of potential threats, a shorter list of preventive strategies, compares the 2011 and 2012 events, and names the two greatest threats: poor user experience (harming trust, adoption, use) and imbalance among the forces tying the identity ecosystem together.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
2. What is #ThisIsNotNormal?
• Stemmed from the shock of events which followed the inauguration of DT.
⚫Themes evident in word cloud
• Movement to denounce DT’s presidency and remind people that the changes
occurring should concern them.
⚫Sexism and Islamophobia in the White House
⚫Ties to Russia excused
⚫Inexperience of people being put in important positions
• Stemmed from moments of shock when different stories broke; has turned
into a catchphrase used in resistance.
6. Locating #ThisIsNotNormal Within the
Context of Algorithm & Biopolitics
“Algorithm ultimately exercises control over us...the processes of soft
biopower work in a similar fashion… New cybernetic category
constructions are the consequence of this modularity and ultimately
allow for a ‘free,’ but constantly conditioned, user.” (Cheney Lippold,
2011, 178)
• Algorithm places users in “categories of identity” and persuades
users toward normalized behaviors. (Cheney Lippold, 2011, 177)
• Impact of algorithm on the #ThisIsNotNormal movement?
• Filter Bubble can provide insight on disconnect between networks.
7. Conclusion & Future Implications
• #ThisIsNotNormal turned a moment into a movement.
• Is the data useful?
⚫Not big data (Kate Crawford), and not very useful on its own.
⚫Should combine this data with data about other hashtags to tell a better story.
⚫Look to word cloud and SNA to determine which hashtags and networks to look at.
• Future questions:
⚫Will DT’s presidency be normalized?
⚫Is this “resistance” sustainable?
⚫How will algorithm affect the online movement?
8. Works Cited
boyd, danah and Kate Crawford. 2012. “Critical Questions for Big Data.”
Information,
Communication & Society 15 (2): 662-79.
Baer, Drake. ‘The ‘Filter Bubble’ Explains Why Trump Won and You Didn’t See
It Coming.” Science
of US. NY Mag, 2017.
http://nymag.com/scienceofus/2016/11/how-facebook-and-the-filter-bubble-
pushed-trump-to-victory.html
Cheney-Lippold, John. “A New Algorithmic Identity: Soft Biopolitics and the
Modulation of control.” Theory, Culture and Society, 2011: 177-178.