This document discusses password security and remote cloud storage options. It begins with a brief history of passwords and how they unlock interfaces. It then provides tips for choosing strong passwords and using password managers. The document also discusses demanding encryption and knowing what data companies store from users. Several open source cloud storage case studies are presented as alternatives to corporate cloud services, such as Tahoe-LAFS, Freedom Box, Occupy Here, Guifi.net, and Urbit. The future of storage is discussed as moving away from remote cloud models towards more distributed and user-controlled options.
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Evan Donovan
Describes what the Semantic Web is in non-technical terms, and how/why it has come about.
Shows some ways in which Google & Facebook are using Semantic Web technologies & techniques, and provides some initial pointers as to how they could be used in a nonprofit context.
According to Gartner, “By 2018, organizations with data virtualization capabilities will spend 40% less on building and managing data integration processes for connecting distributed data assets.” This solidifies Data Virtualization as a critical piece of technology for any flexible and agile modern data architecture.
This session will:
• Introduce data virtualization and explain how it differs from traditional data integration approaches
• Discuss key patterns and use cases of Data Virtualization
• Set the scene for subsequent sessions in the Packed Lunch Webinar Series, which will take a deeper dive into various challenges solved by data virtualization.
Agenda:
• Introduction & benefits of DV
• Summary & Next Steps
• Q&A
Watch full webinar here: https://goo.gl/EFQNFs
This webinar is part of the Data Virtualization Packed Lunch Webinar Series: https://goo.gl/W1BeCb
Connecting for Change: 5 Reasons Why Nonprofits Should Care About the Semanti...Evan Donovan
Describes what the Semantic Web is in non-technical terms, and how/why it has come about.
Shows some ways in which Google & Facebook are using Semantic Web technologies & techniques, and provides some initial pointers as to how they could be used in a nonprofit context.
According to Gartner, “By 2018, organizations with data virtualization capabilities will spend 40% less on building and managing data integration processes for connecting distributed data assets.” This solidifies Data Virtualization as a critical piece of technology for any flexible and agile modern data architecture.
This session will:
• Introduce data virtualization and explain how it differs from traditional data integration approaches
• Discuss key patterns and use cases of Data Virtualization
• Set the scene for subsequent sessions in the Packed Lunch Webinar Series, which will take a deeper dive into various challenges solved by data virtualization.
Agenda:
• Introduction & benefits of DV
• Summary & Next Steps
• Q&A
Watch full webinar here: https://goo.gl/EFQNFs
This webinar is part of the Data Virtualization Packed Lunch Webinar Series: https://goo.gl/W1BeCb
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
Kevin Johnson, John Sawyer and Tom Eston have spent quite a bit of time evaluating mobile applications in their respective jobs. In this presentation they will provide the audience an understanding of how to evaluate mobile applications, examples of how things have been done wrong and an understanding of how you can perform this testing within your organization.
This talk will work with applications from the top three main platforms; iOS, Android and Blackberry. Kevin, Tom and John have used a variety of the top 25 applications for each of these platforms to provide real world examples of the problems applications face.
The Internet of Things: We've Got to ChatDuo Security
BSides SF, February 2014: http://www.securitybsides.com/w/page/70849271/BSidesSF2014
Duo's Zach Lanier (@quine) & Mark Stanislav (@markstanislav) on IoT (Internet of Things) security, announcing http://BuildItSecure.ly
This presentation originally developed as part of FOSSSL 2006 (FOSSMil), was recently slightly updated and delivered at CERT SL Conference.
In my talk, I discuss why FOSS is generally considered to be more secure than proprietary software.
First episode of the podcast at the Crossroads of Project SAFE. It's all about the first truly grass-roots internet with Secure Access For Everyone--the SAFE Network.
This is an approximate transcript of the first episode.
Check out www.safecrossroads.net for this episode and lots more stuff.
We live in a disconnected and battery powered world, but our technology and best practices are a leftover from the always connected and steadily powered past. In this session we will explore a new web design paradigm called "Offline First" that's been evolving over the past year and how this applies to Drupal 8 and our project's future. There'll be mentions of things like headless Drupal, restful and relaxed web services, content synchronization, distributed systems and other exciting things.
This was presented during DrupalCamp Gothenburg November 2014[1] and Drupal Learning Meetup in London December 2014[2]
[1]: http://gothenburg.drupalcamp.se/
[2]: http://www.meetup.com/Drupal-London/events/218826091/
Smart Bombs: Mobile Vulnerability and ExploitationTom Eston
Kevin Johnson, John Sawyer and Tom Eston have spent quite a bit of time evaluating mobile applications in their respective jobs. In this presentation they will provide the audience an understanding of how to evaluate mobile applications, examples of how things have been done wrong and an understanding of how you can perform this testing within your organization.
This talk will work with applications from the top three main platforms; iOS, Android and Blackberry. Kevin, Tom and John have used a variety of the top 25 applications for each of these platforms to provide real world examples of the problems applications face.
The Internet of Things: We've Got to ChatDuo Security
BSides SF, February 2014: http://www.securitybsides.com/w/page/70849271/BSidesSF2014
Duo's Zach Lanier (@quine) & Mark Stanislav (@markstanislav) on IoT (Internet of Things) security, announcing http://BuildItSecure.ly
This presentation originally developed as part of FOSSSL 2006 (FOSSMil), was recently slightly updated and delivered at CERT SL Conference.
In my talk, I discuss why FOSS is generally considered to be more secure than proprietary software.
First episode of the podcast at the Crossroads of Project SAFE. It's all about the first truly grass-roots internet with Secure Access For Everyone--the SAFE Network.
This is an approximate transcript of the first episode.
Check out www.safecrossroads.net for this episode and lots more stuff.
We live in a disconnected and battery powered world, but our technology and best practices are a leftover from the always connected and steadily powered past. In this session we will explore a new web design paradigm called "Offline First" that's been evolving over the past year and how this applies to Drupal 8 and our project's future. There'll be mentions of things like headless Drupal, restful and relaxed web services, content synchronization, distributed systems and other exciting things.
This was presented during DrupalCamp Gothenburg November 2014[1] and Drupal Learning Meetup in London December 2014[2]
[1]: http://gothenburg.drupalcamp.se/
[2]: http://www.meetup.com/Drupal-London/events/218826091/
Open Atrium is open source collaboration software that enables organizations to securely connect their teams, projects, and knowledge. A powerful solution, Open Atrium’s framework allows your organization to easily integrate your existing software, while remaining flexible enough to change as your organization grows.
"The goal of Wiki Academy is to improve the quality and quantity of online content on Albanian Culture to better represent Albania to the world.
The WikiAcademy will bring together active online citizens and content experts and help them develop into skilled editors to write high quality articles and source high quality photos regarding Albania in categories such as culture, heritage, social issues, geography, institutions, economy and tourism."
The WikiAcademy will bring together active online citizens and content experts and help them develop into skilled editors to write high quality articles and source high quality photos regarding Albania in categories such as culture, heritage, social issues, geography, institutions, economy and tourism.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
22. MOST IMPORTANTLY:
DO educate yourself
What is the cloud?
What is encryption?
-> ALLOWS YOU TO DECIDE:
What is important for YOU re security,
privacy
26. REFUSE to naturalize remote
cloud storage as the “logical”
end of owning or
generating data
(and while you’re at it, refuse the same thing for every
internet service)
28. WHAT IS THE FUTURE
-> NOT OF THE CLOUD AS
WE KNOW IT <-
BUT OF STORAGE?
29. CASE STUDY 1: TAHOE-LAFS
**SECURE DISTRIBUTED STORAGE**
Tahoe-LAFS is a Free and Open decentralized
cloud storage system. It distributes your data
across multiple servers. Even if some of the
servers fail or are taken over by an attacker,
the entire file store continues to function
correctly, preserving your privacy and security.
https://tahoe-lafs.org/trac/tahoe-lafs
30. Case Study 2: Freedom Box
What is FreedomBox?
● Email and telecommunications that protects privacy and resists eavesdropping
● A publishing platform that resists oppression and censorship.
● An organizing tool for democratic activists in hostile regimes.
● An emergency communication network in times of crisis.
●
http://freedomboxfoundation.org/learn/
31. Case Study 3: Occupy Here
Each Occupy.here router is a LAN island in an archipelago of affiliated
websites.
Anyone within range of an Occupy.here wifi router, with a web-capable smartphone or laptop, can join the
network “OCCUPY.HERE,” load the locally-hosted website http://occupy.here, and use the message board to
connect with other users nearby. The open source forum software offers a simple, mobile-friendly
interface where users can share messages and files.
http://occupyhere.org/
32. Case Study 4: Guifi.net
guifi.net is a telecommunications network, is open, free and
neutral because is built through a peer to peer agreement where
everyone can join the network by providing his connection, and
therefore, extending the network and gaining connectivity to
all.
https://guifi.net/en
33. Case Study 5: Saravá & Espiv
- Political tech group working in Brasil &
Greece
- Run autonomous servers in universities,
teaches students and academics how to write
projects that require -- and sometimes even get
funding to pay for -- autonomous servers
https://wiki.sarava.org/Estudos/Estudos?from=Main.HomePage
https://espiv.net/
34. Case Study 6: Riseup and
Autistici/Inventati
Collectives providing email and VPN services to activists.
Models do not involve remote storage due to server limitations,
but in the future this is an arrangement that could be imagined.
https://help.riseup.net/
http://www.autistici.org/en/index.html
35. CASE STUDY 7 : URBIT
The user of the future will fly her own computer. She will own and control her own identity and
her own data. She will even host her own apps. She will not be part of someone else's Big Data.
She will be her own Little Data. Unless she's a really severe geek, she will pay some service to
store and execute her Urbit ship - but she can move it anywhere else, anytime, for the cost of
the bandwidth.
A user can't manage a general-purpose computer unless she basically understands what it's doing.
She may not be a programmer, but she needs at least a rough mental model of her computer's
state.
A personal computer has to be a *simple* computer. This is why we built a new system software
stack from scratch, with the goal of bringing it in under 10,000 lines of code. Urbit is about
50% over this complexity budget, but nobody's perfect.
http://doc.urbit.org/