This deck shows updated poster panels from "My Little Data in a Big Data World," presented at PYData NYC 2015. It describes an early process of retrieving personal data, securing and exploring it, and identifying the tools that will allow people to start cultivating and/or preserving their data identities with code.
Debugging Skynet: A Machine Learning Approach to Log Analysis - Ianir Ideses,...DevOpsDays Tel Aviv
This document proposes using machine learning techniques to analyze logs and surface the most relevant ones. It discusses using both unsupervised and supervised learning. Unsupervised techniques like clustering could analyze large amounts of unlabeled data to group similar logs. Supervised learning would involve acquiring labels to train classifiers on what is relevant versus irrelevant. The proposed solution involves normalizing logs, acquiring labels, training models, and then classifying and enhancing new logs. It suggests this could be done at scale using tools like Spark.
We know there are many challenges around User Experience (UX) for end-users who are trying to use decentralized applications but what about the developers who build those applications? Their experience is often under appreciated.
In this meetup, we'll dig deeper into what developer experience (DevX) really means, the state of it on today's platforms and how we can improve it in the future. We'll survey the landscape and tear down a couple of existing platforms.
Following the talk, we'll move to a panel discussion with developers of apps on multiple different platforms about the pros and cons of development on each platform.
Learn more about NEAR Protocol, a scalable blockchain and smart contract platform, at https://nearprotocol.com
This document discusses private browsing mode and the potential for forensic analysis of private browsing activity. It begins with background on digital forensics and browser architecture. Private browsing is designed to leave no traces after a session, but browser implementations vary. The document then analyzes Internet Explorer 10's "InPrivate" browsing mode, finding that activity records are stored in databases but marked as private and deleted after sessions. However, some records may remain recoverable from log files. The conclusion is that private browsing does leave opportunities for forensic analysis to discover browsing activity.
NEAR Protocol at Future of Blockchain Hackathon London 2019Erik Trautman
Erik Trautman introduces himself as the CEO of NEAR Foundation and describes NEAR Protocol as a community-run blockchain platform that allows developers to easily build decentralized applications using TypeScript. It uses proof-of-stake consensus and dynamic sharding to scale. Developers can write both front-end and back-end code together and deploy applications within 60 seconds through the NEAR studio. The NEAR wallet and explorer are also introduced.
The Design of Blockchain-Based Apps (DApps)Erik Trautman
Decentralized apps are still apps but there are key differences as well which any app designer needs to understand. Onboarding into a token-based ecosystem. Requesting permission for transactions. Handling wait times and confirmation finality. All of these are unexpected for users and, thus, represent key friction points in their interactions.
In this event, we'll cover the full spectrum of what a designer or product person or developer needs to understand about the unique world of creating decentralized applications. We'll start high level and then make our way into more specific case studies of design interactions.
**About the Blockchain Onramp Series**
Blockchain Onramp is a series of events covering the full spectrum of knowledge necessary to operate effectively within the blockchain ecosystem as a designer, developer or product person. After participating in these events, you should be able to take your functional expertise in any of these areas and apply them to blockchain projects.
We are doing this to provide a key -- and currently missing -- plain-English onramp for people of all functional experience who are interested in building real businesses on this new technology.
The format of each event may differ slightly but they will be a combination of expert talks and discussions with industry practitioners.
How do Blockchain and IOT work together? The focus of this presentation is to provide an introduction to Blockchain, review why IOT is critical to blockchain success and identify the leading projects you should be using
Decentralized applications 101: How and why to build a DAppErik Trautman
You're already well familiar with the design, interaction and development patterns of "normal" web and mobile apps. In this meetup, we'll shift the focus to describe what a decentralized app (DApp) actually is from the very top to the nuts and bolts below the surface.
This is intended to help the full spectrum of designers, developers and product people to understand why they might create a DApp in the first place and how that is different than working with web 2 applications. We'll cover the high level user-facing aspects (like interactions and flows) down to the low-level of the stack (the actual blockchain) so you understand what you're getting into.
We assume you know what a blockchain is.
Learn more about NEAR, the scalable developer-friendly blockchain, at https://nearprotocol.com
This deck shows updated poster panels from "My Little Data in a Big Data World," presented at PYData NYC 2015. It describes an early process of retrieving personal data, securing and exploring it, and identifying the tools that will allow people to start cultivating and/or preserving their data identities with code.
Debugging Skynet: A Machine Learning Approach to Log Analysis - Ianir Ideses,...DevOpsDays Tel Aviv
This document proposes using machine learning techniques to analyze logs and surface the most relevant ones. It discusses using both unsupervised and supervised learning. Unsupervised techniques like clustering could analyze large amounts of unlabeled data to group similar logs. Supervised learning would involve acquiring labels to train classifiers on what is relevant versus irrelevant. The proposed solution involves normalizing logs, acquiring labels, training models, and then classifying and enhancing new logs. It suggests this could be done at scale using tools like Spark.
We know there are many challenges around User Experience (UX) for end-users who are trying to use decentralized applications but what about the developers who build those applications? Their experience is often under appreciated.
In this meetup, we'll dig deeper into what developer experience (DevX) really means, the state of it on today's platforms and how we can improve it in the future. We'll survey the landscape and tear down a couple of existing platforms.
Following the talk, we'll move to a panel discussion with developers of apps on multiple different platforms about the pros and cons of development on each platform.
Learn more about NEAR Protocol, a scalable blockchain and smart contract platform, at https://nearprotocol.com
This document discusses private browsing mode and the potential for forensic analysis of private browsing activity. It begins with background on digital forensics and browser architecture. Private browsing is designed to leave no traces after a session, but browser implementations vary. The document then analyzes Internet Explorer 10's "InPrivate" browsing mode, finding that activity records are stored in databases but marked as private and deleted after sessions. However, some records may remain recoverable from log files. The conclusion is that private browsing does leave opportunities for forensic analysis to discover browsing activity.
NEAR Protocol at Future of Blockchain Hackathon London 2019Erik Trautman
Erik Trautman introduces himself as the CEO of NEAR Foundation and describes NEAR Protocol as a community-run blockchain platform that allows developers to easily build decentralized applications using TypeScript. It uses proof-of-stake consensus and dynamic sharding to scale. Developers can write both front-end and back-end code together and deploy applications within 60 seconds through the NEAR studio. The NEAR wallet and explorer are also introduced.
The Design of Blockchain-Based Apps (DApps)Erik Trautman
Decentralized apps are still apps but there are key differences as well which any app designer needs to understand. Onboarding into a token-based ecosystem. Requesting permission for transactions. Handling wait times and confirmation finality. All of these are unexpected for users and, thus, represent key friction points in their interactions.
In this event, we'll cover the full spectrum of what a designer or product person or developer needs to understand about the unique world of creating decentralized applications. We'll start high level and then make our way into more specific case studies of design interactions.
**About the Blockchain Onramp Series**
Blockchain Onramp is a series of events covering the full spectrum of knowledge necessary to operate effectively within the blockchain ecosystem as a designer, developer or product person. After participating in these events, you should be able to take your functional expertise in any of these areas and apply them to blockchain projects.
We are doing this to provide a key -- and currently missing -- plain-English onramp for people of all functional experience who are interested in building real businesses on this new technology.
The format of each event may differ slightly but they will be a combination of expert talks and discussions with industry practitioners.
How do Blockchain and IOT work together? The focus of this presentation is to provide an introduction to Blockchain, review why IOT is critical to blockchain success and identify the leading projects you should be using
Decentralized applications 101: How and why to build a DAppErik Trautman
You're already well familiar with the design, interaction and development patterns of "normal" web and mobile apps. In this meetup, we'll shift the focus to describe what a decentralized app (DApp) actually is from the very top to the nuts and bolts below the surface.
This is intended to help the full spectrum of designers, developers and product people to understand why they might create a DApp in the first place and how that is different than working with web 2 applications. We'll cover the high level user-facing aspects (like interactions and flows) down to the low-level of the stack (the actual blockchain) so you understand what you're getting into.
We assume you know what a blockchain is.
Learn more about NEAR, the scalable developer-friendly blockchain, at https://nearprotocol.com
The document discusses the benefits of exercise for mental health. It states that regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise has also been shown to enhance self-esteem and quality of life.
The document summarizes the establishment of a Whānau Ora policy framework in New Zealand to improve social services for Māori families. It outlines that the framework aims to strengthen family capabilities through an integrated approach, collaborative relationships between agencies, and cost-effective services shaped by Māori values. The government agreed to establish an independent trust to govern and implement Whānau Ora services, appoint a minister, and commit multiple agencies to the approach.
`The impacts of online word-of-mouth on consumer purchasing decisions: An emp...mindspop
The document outlines a research study on the effects of online word-of-mouth (WOM) on consumer purchasing decisions. It examines the independent variables of WOM direction (positive or negative) and type (literal or numeric), and the dependent variable of purchasing decision. Twelve hypotheses are tested regarding the impact of WOM direction and type on perceived informativeness, perceived popularity, and purchasing decision. The results found support for five of the hypotheses. Recommendations include managing negative WOM and emphasizing numeric WOM ratings to influence purchasing decisions. The study provided valuable research experience and insights to improve future studies.
Joshua Barrios is a college student seeking a degree in Business Management and Information Technology. He has experience in customer service roles such as an office assistant at a print shop and video game advisor at GameStop. He is highly organized with strong communication skills and a drive to complete tasks.
The document summarizes information about orifice plates used for flow measurement. It describes the basic principles of how orifice plates work using Bernoulli's principle to create a pressure drop for measurement. It provides details on different types of orifice plates as well as factors to consider in design. Orifice plates offer benefits of being cheap and reliable but have limitations for clean fluids only and require maintenance. The company discussed provides custom orifice plate solutions and has supplied plates to major oil and gas companies in India.
Slides from "101 Workshop for Startups: Boards and Advisors" in Launch 22, co presented by Simon Barry, entrepreneur and Chris Barnes of Barnes CoSec on 16 September 2015.
Medicare and End-of-Life Care in California - SlideshowKFF
Four out of five Californians who died in 2014 were covered by Medicare. Medicare spending was significantly higher for those who died ($42,048 per person) compared to other Medicare beneficiaries in California ($9,466 per person). While the share of total Medicare spending on those at end of life has decreased slightly in recent years, hospice use and spending has increased substantially in California from 2000 to 2014. Most physicians in California report not having received training on how to discuss end-of-life care with patients.
Re-Evaluating the Value and Market Positioning of Industrial CobotsLizzie Uhl
As one of the largest integrators in the nation, JR Automation sees nearly every type of request for automation. Because of that, we have gained a unique perspective on what cobot features end consumers are actually asking for and are willing to spend money on.
This presentation focuses on where cobots are being applied, where they can bring the most value to a business, and how their value can be fully realized.
1. The document discusses the ADEPT research project by IBM which aims to enable autonomous transactions between devices using blockchain, smart contracts, and decentralized peer-to-peer networks.
2. In the ADEPT system, devices like a washer would be able to order detergent autonomously when supplies run low, negotiate energy use with other appliances, and request service all without human intervention.
3. The document outlines some of the technical challenges with the decentralized approach like scaling, privacy, and achieving consensus but provides examples of how the prototype washer device demonstrated autonomous functionality.
Practical Applications of Block Chain Technologies Priyanka Aash
The document discusses blockchain technology and its potential practical uses. It begins by defining blockchain as a distributed digital ledger that allows participants in a network to securely record transactions without a central authority. It then provides examples of how blockchain could be used in healthcare to securely store electronic health records, enable smart contracts to automatically pay providers, and track medical devices to prevent counterfeiting. The document concludes by describing a hypothetical example where blockchain is used to give healthcare providers access to a patient's complete medical history from various sources to improve treatment while reducing redundant tests.
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)Giles Greenway
Here are the slides from our presentation given at the 2014 EMF camp. We discuss our MobileMiner app, why we wrote it, how it works and who helped. It's tracked the behaviour of other apps on the phones of 20 young coders from Young Rewired State.
The Internet of Things: We've Got to ChatDuo Security
BSides SF, February 2014: http://www.securitybsides.com/w/page/70849271/BSidesSF2014
Duo's Zach Lanier (@quine) & Mark Stanislav (@markstanislav) on IoT (Internet of Things) security, announcing http://BuildItSecure.ly
Using Eclipse and Lua for the Internet of Things - JAX2013Benjamin Cabé
Using Eclipse & Lua for the Internet of Things discusses using the Eclipse IDE and Lua programming language for developing Internet of Things applications. Lua is presented as a simple yet powerful scripting language that is well-suited for embedded and M2M programming. The Koneki LDT Eclipse plugin provides an IDE for developing, debugging, and deploying Lua-based IoT applications. Mihini is introduced as an open source framework and agent for building IoT applications in a portable and language-agnostic way.
The document discusses two approaches to social mining from mobile data - NervousNet and MobileMiner. NervousNet collects sensor data from mobile devices and aggregates it on remote proxies. MobileMiner was developed by young coders to record the behavior of other apps on Android smartphones and return the data for analysis. It aims to increase understanding of what personal data apps collect and how frequently they access location, send notifications, or transmit data home.
We issued 20 young coders with smartphones pre-loaded with an app that gathered data on the network activity of the other apps they used. Their data was captured using the Python-based data portal CKAN, analysed with SciKit-Learn, then returned to them using Docker and the Ipython Notebook. Python also played a role in the reverse-engineering of some of the more interesting apps we discovered.
Security challenges for internet of thingsMonika Keerthi
The document discusses security challenges for the Internet of Things (IoT). It begins with an introduction to IoT and then discusses some of the enabling technologies like RFID, sensors, and nanotechnology. It also covers various applications of IoT such as smart cities, smart homes, smart farms, and e-healthcare. The document then outlines why IoT security is difficult due to issues like wireless communication, physical insecurity of devices, lack of standards, and classic internet threats. It also discusses some threats to IoT systems and potential security approaches like designing for security and implementing identity management. In the end, it provides some basic security precautions and thoughts on ongoing development of technologies and protocols for IoT security.
This document discusses T. Rob Wyatt and his work on improving security and building the Internet of Things. It proposes an alternative model for connecting IoT devices that focuses on local connectivity and data ownership rather than requiring devices to connect through proprietary vendor networks. The model emphasizes local functionality, interoperability across devices, and giving users control over their own data.
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
Compiled some Open source and other tools that I that I have used for BEC/EAC protection, security, & training. I had a great time sitting on the panel with other members.
The document discusses the benefits of exercise for mental health. It states that regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise has also been shown to enhance self-esteem and quality of life.
The document summarizes the establishment of a Whānau Ora policy framework in New Zealand to improve social services for Māori families. It outlines that the framework aims to strengthen family capabilities through an integrated approach, collaborative relationships between agencies, and cost-effective services shaped by Māori values. The government agreed to establish an independent trust to govern and implement Whānau Ora services, appoint a minister, and commit multiple agencies to the approach.
`The impacts of online word-of-mouth on consumer purchasing decisions: An emp...mindspop
The document outlines a research study on the effects of online word-of-mouth (WOM) on consumer purchasing decisions. It examines the independent variables of WOM direction (positive or negative) and type (literal or numeric), and the dependent variable of purchasing decision. Twelve hypotheses are tested regarding the impact of WOM direction and type on perceived informativeness, perceived popularity, and purchasing decision. The results found support for five of the hypotheses. Recommendations include managing negative WOM and emphasizing numeric WOM ratings to influence purchasing decisions. The study provided valuable research experience and insights to improve future studies.
Joshua Barrios is a college student seeking a degree in Business Management and Information Technology. He has experience in customer service roles such as an office assistant at a print shop and video game advisor at GameStop. He is highly organized with strong communication skills and a drive to complete tasks.
The document summarizes information about orifice plates used for flow measurement. It describes the basic principles of how orifice plates work using Bernoulli's principle to create a pressure drop for measurement. It provides details on different types of orifice plates as well as factors to consider in design. Orifice plates offer benefits of being cheap and reliable but have limitations for clean fluids only and require maintenance. The company discussed provides custom orifice plate solutions and has supplied plates to major oil and gas companies in India.
Slides from "101 Workshop for Startups: Boards and Advisors" in Launch 22, co presented by Simon Barry, entrepreneur and Chris Barnes of Barnes CoSec on 16 September 2015.
Medicare and End-of-Life Care in California - SlideshowKFF
Four out of five Californians who died in 2014 were covered by Medicare. Medicare spending was significantly higher for those who died ($42,048 per person) compared to other Medicare beneficiaries in California ($9,466 per person). While the share of total Medicare spending on those at end of life has decreased slightly in recent years, hospice use and spending has increased substantially in California from 2000 to 2014. Most physicians in California report not having received training on how to discuss end-of-life care with patients.
Re-Evaluating the Value and Market Positioning of Industrial CobotsLizzie Uhl
As one of the largest integrators in the nation, JR Automation sees nearly every type of request for automation. Because of that, we have gained a unique perspective on what cobot features end consumers are actually asking for and are willing to spend money on.
This presentation focuses on where cobots are being applied, where they can bring the most value to a business, and how their value can be fully realized.
1. The document discusses the ADEPT research project by IBM which aims to enable autonomous transactions between devices using blockchain, smart contracts, and decentralized peer-to-peer networks.
2. In the ADEPT system, devices like a washer would be able to order detergent autonomously when supplies run low, negotiate energy use with other appliances, and request service all without human intervention.
3. The document outlines some of the technical challenges with the decentralized approach like scaling, privacy, and achieving consensus but provides examples of how the prototype washer device demonstrated autonomous functionality.
Practical Applications of Block Chain Technologies Priyanka Aash
The document discusses blockchain technology and its potential practical uses. It begins by defining blockchain as a distributed digital ledger that allows participants in a network to securely record transactions without a central authority. It then provides examples of how blockchain could be used in healthcare to securely store electronic health records, enable smart contracts to automatically pay providers, and track medical devices to prevent counterfeiting. The document concludes by describing a hypothetical example where blockchain is used to give healthcare providers access to a patient's complete medical history from various sources to improve treatment while reducing redundant tests.
Our Data, Ourselves: The Data Democracy Deficit (EMF CAmp 2014)Giles Greenway
Here are the slides from our presentation given at the 2014 EMF camp. We discuss our MobileMiner app, why we wrote it, how it works and who helped. It's tracked the behaviour of other apps on the phones of 20 young coders from Young Rewired State.
The Internet of Things: We've Got to ChatDuo Security
BSides SF, February 2014: http://www.securitybsides.com/w/page/70849271/BSidesSF2014
Duo's Zach Lanier (@quine) & Mark Stanislav (@markstanislav) on IoT (Internet of Things) security, announcing http://BuildItSecure.ly
Using Eclipse and Lua for the Internet of Things - JAX2013Benjamin Cabé
Using Eclipse & Lua for the Internet of Things discusses using the Eclipse IDE and Lua programming language for developing Internet of Things applications. Lua is presented as a simple yet powerful scripting language that is well-suited for embedded and M2M programming. The Koneki LDT Eclipse plugin provides an IDE for developing, debugging, and deploying Lua-based IoT applications. Mihini is introduced as an open source framework and agent for building IoT applications in a portable and language-agnostic way.
The document discusses two approaches to social mining from mobile data - NervousNet and MobileMiner. NervousNet collects sensor data from mobile devices and aggregates it on remote proxies. MobileMiner was developed by young coders to record the behavior of other apps on Android smartphones and return the data for analysis. It aims to increase understanding of what personal data apps collect and how frequently they access location, send notifications, or transmit data home.
We issued 20 young coders with smartphones pre-loaded with an app that gathered data on the network activity of the other apps they used. Their data was captured using the Python-based data portal CKAN, analysed with SciKit-Learn, then returned to them using Docker and the Ipython Notebook. Python also played a role in the reverse-engineering of some of the more interesting apps we discovered.
Security challenges for internet of thingsMonika Keerthi
The document discusses security challenges for the Internet of Things (IoT). It begins with an introduction to IoT and then discusses some of the enabling technologies like RFID, sensors, and nanotechnology. It also covers various applications of IoT such as smart cities, smart homes, smart farms, and e-healthcare. The document then outlines why IoT security is difficult due to issues like wireless communication, physical insecurity of devices, lack of standards, and classic internet threats. It also discusses some threats to IoT systems and potential security approaches like designing for security and implementing identity management. In the end, it provides some basic security precautions and thoughts on ongoing development of technologies and protocols for IoT security.
This document discusses T. Rob Wyatt and his work on improving security and building the Internet of Things. It proposes an alternative model for connecting IoT devices that focuses on local connectivity and data ownership rather than requiring devices to connect through proprietary vendor networks. The model emphasizes local functionality, interoperability across devices, and giving users control over their own data.
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
Compiled some Open source and other tools that I that I have used for BEC/EAC protection, security, & training. I had a great time sitting on the panel with other members.
Application Security session given as part of the Solvay Executive Master in IT Management.
Explaining application security challenges for web, mobile, cloud and internet of things.
Positioning OWASP SAMM as structural and measurable framework to get application security under control in the complete application lifecycle.
This document discusses using information visualization techniques to analyze network security data. It provides examples of visualizing port scan data, vulnerability scanner results, and a wargame scenario. It also outlines several active research areas in network security visualization like visualizing worm propagation and intrusion detection system alerts.
Owasp Mobile Risk Series : M4 : Unintended Data LeakageAnant Shrivastava
This presentation is part of a series focused on OWASP Mobile Top 10 : We discussed about what is data leakage, places where data could be leaked. sample /examples of data leakage and how it differes from M2: Insecure data storage.
This document summarizes a presentation on bridging the gap between penetration testing and red teaming using offensive PowerShell techniques. It introduces Empire, a pure PowerShell post-exploitation agent, and discusses how weak standard images, dirty networks, and domain trusts can be exploited to escalate privileges and move laterally. Various PowerShell modules for tasks like credential dumping, code execution, and lateral movement are demonstrated.
Embedded computing is everywhere. It is in our car engines, refrigerators, and even in the singing greeting cards we send. With improvements in wireless technology, these systems are starting to talk with each other, and they are appearing in places like our shoes and wrists to monitor our athletic activity or health. This emerging Internet of Everything (IoE) has tremendous potential to improve our lives. But like any powerful technology, it also has a dark side: it will observe and implement many of our actions. Security in the IoE is likely to be even more critical than general Internet security. After reviewing some of the challenges in creating a secure IoE, Horowitz will describe a new research program at Stanford to address this issue.
The document provides an overview of iOS application security from the perspective of a penetration tester. It discusses topics such as intercepting communications, reverse engineering apps, hooking the runtime, transport security issues like weak SSL cipher suites, and risks with how apps store data on devices like using plain text. The speaker is a co-founder of a security company and has found vulnerabilities in Apple software and apps in the past.
The document summarizes an Android security workshop that took place on February 24th, 2016 in Poland. The workshop included sessions on Android fundamentals, application component security, and the OWASP top 10 mobile risks. It also covered reverse engineering and malware analysis. The document provides an agenda and summaries of the topics discussed in each session, including details on Android architecture, security features in Android 6.0, application permissions and components, and common mobile risks. It aims to provide attendees with a basic understanding of Android security concepts and methodologies for analyzing mobile applications for security issues.
Decentralized access control with anonymous authentication of data stored in ...LeMeniz Infotech
This document discusses a proposed decentralized access control system for securely storing data in clouds that supports anonymous authentication. The system allows clouds to verify the authenticity of users without knowing their identities, and only allows valid users to decrypt stored data. It prevents replay attacks and supports data creation, modification, and reading while addressing user revocation. The proposed approach is decentralized and robust unlike prior centralized access control systems for clouds.
Ultralight data movement for IoT with SDC Edge. Guglielmo Iozzia - OptumData Driven Innovation
This document provides an overview and demonstration of Streamsets Data Collector (SDC) and SDC Edge for ingesting data from IoT devices and the edge. It discusses the challenges of ingesting data from distributed edge locations. It then describes the key features of SDC for designing flexible data flows with minimal coding. It also introduces SDC Edge, a lightweight agent for running SDC pipelines on edge devices. The presentation includes demonstrations of using SDC with Kafka and using SDC Edge to ingest and analyze data from Android devices and send it to Elasticsearch. It concludes with discussing additional topics and providing useful links.
This document summarizes a presentation on web application security and the OWASP Top 10. It discusses the motivation for securing web apps, common causes of data breaches, and an overview of the OWASP Top 10 project and the most critical web application security flaws. The presentation recommends ways to address these issues, such as keeping software updated, using automated scanning tools, and implementing input validation and authorization checks. Specific attacks covered include cross-site scripting, insecure direct object references, and broken authentication and session management.
Watch full webinar here: https://bit.ly/2SaBj5l
You will often hear that "data is the new gold". In this context, data management is one of the areas that has received more attention by the software community in recent years. From Artificial Intelligence and Machine Learning to new ways to store and process data, the landscape for data management is in constant evolution. From the privileged perspective of an enterprise middleware platform, we at Denodo have the advantage of seeing many of these changes happen.
In this webinar we will discuss the technology trends that will drive the enterprise data strategies in the years to come. Don't miss it if you want to keep yourself informed about how to convert your data to strategic assets in order to complete the data-driven transformation in your company.
Join us for an exciting session that will cover:
- The most interesting trends in data management
- How to build a logical data fabric architecture?
- How to manage your data integration strategy in the new hybrid world?
- Our predictions on how those trends will change the data management world
- How can companies monetize the data through data-as-a-service infrastructure?
- What is the role of the voice computing in the future of data analytics?
Introduction to the AGILE project: open source modular gateway for the IoT (C...AGILE IoT
This document introduces AGILE, an open source modular IoT gateway that aims to decentralize the IoT. It discusses issues with the current centralized IoT landscape and vendor-specific clouds. AGILE seeks to give users full control of their devices and data by providing a gateway that allows users to control devices, store and manage data, create and run apps, and share data while preserving ownership. The document outlines AGILE's objectives, features, ecosystem of developers, industry, and end users, and funding opportunities to support its open source goals.
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataKiwi Creative
Harness the power of AI-backed reports, benchmarking and data analysis to predict trends and detect anomalies in your marketing efforts.
Peter Caputa, CEO at Databox, reveals how you can discover the strategies and tools to increase your growth rate (and margins!).
From metrics to track to data habits to pick up, enhance your reporting for powerful insights to improve your B2B tech company's marketing.
- - -
This is the webinar recording from the June 2024 HubSpot User Group (HUG) for B2B Technology USA.
Watch the video recording at https://youtu.be/5vjwGfPN9lw
Sign up for future HUG events at https://events.hubspot.com/b2b-technology-usa/
Natural Language Processing (NLP), RAG and its applications .pptxfkyes25
1. In the realm of Natural Language Processing (NLP), knowledge-intensive tasks such as question answering, fact verification, and open-domain dialogue generation require the integration of vast and up-to-date information. Traditional neural models, though powerful, struggle with encoding all necessary knowledge within their parameters, leading to limitations in generalization and scalability. The paper "Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks" introduces RAG (Retrieval-Augmented Generation), a novel framework that synergizes retrieval mechanisms with generative models, enhancing performance by dynamically incorporating external knowledge during inference.
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Discussion on Vector Databases, Unstructured Data and AI
https://www.meetup.com/unstructured-data-meetup-new-york/
This meetup is for people working in unstructured data. Speakers will come present about related topics such as vector databases, LLMs, and managing data at scale. The intended audience of this group includes roles like machine learning engineers, data scientists, data engineers, software engineers, and PMs.This meetup was formerly Milvus Meetup, and is sponsored by Zilliz maintainers of Milvus.
Global Situational Awareness of A.I. and where its headedvikram sood
You can see the future first in San Francisco.
Over the past year, the talk of the town has shifted from $10 billion compute clusters to $100 billion clusters to trillion-dollar clusters. Every six months another zero is added to the boardroom plans. Behind the scenes, there’s a fierce scramble to secure every power contract still available for the rest of the decade, every voltage transformer that can possibly be procured. American big business is gearing up to pour trillions of dollars into a long-unseen mobilization of American industrial might. By the end of the decade, American electricity production will have grown tens of percent; from the shale fields of Pennsylvania to the solar farms of Nevada, hundreds of millions of GPUs will hum.
The AGI race has begun. We are building machines that can think and reason. By 2025/26, these machines will outpace college graduates. By the end of the decade, they will be smarter than you or I; we will have superintelligence, in the true sense of the word. Along the way, national security forces not seen in half a century will be un-leashed, and before long, The Project will be on. If we’re lucky, we’ll be in an all-out race with the CCP; if we’re unlucky, an all-out war.
Everyone is now talking about AI, but few have the faintest glimmer of what is about to hit them. Nvidia analysts still think 2024 might be close to the peak. Mainstream pundits are stuck on the wilful blindness of “it’s just predicting the next word”. They see only hype and business-as-usual; at most they entertain another internet-scale technological change.
Before long, the world will wake up. But right now, there are perhaps a few hundred people, most of them in San Francisco and the AI labs, that have situational awareness. Through whatever peculiar forces of fate, I have found myself amongst them. A few years ago, these people were derided as crazy—but they trusted the trendlines, which allowed them to correctly predict the AI advances of the past few years. Whether these people are also right about the next few years remains to be seen. But these are very smart people—the smartest people I have ever met—and they are the ones building this technology. Perhaps they will be an odd footnote in history, or perhaps they will go down in history like Szilard and Oppenheimer and Teller. If they are seeing the future even close to correctly, we are in for a wild ride.
Let me tell you what we see.
The Building Blocks of QuestDB, a Time Series Databasejavier ramirez
Talk Delivered at Valencia Codes Meetup 2024-06.
Traditionally, databases have treated timestamps just as another data type. However, when performing real-time analytics, timestamps should be first class citizens and we need rich time semantics to get the most out of our data. We also need to deal with ever growing datasets while keeping performant, which is as fun as it sounds.
It is no wonder time-series databases are now more popular than ever before. Join me in this session to learn about the internal architecture and building blocks of QuestDB, an open source time-series database designed for speed. We will also review a history of some of the changes we have gone over the past two years to deal with late and unordered data, non-blocking writes, read-replicas, or faster batch ingestion.
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Aggregage
This webinar will explore cutting-edge, less familiar but powerful experimentation methodologies which address well-known limitations of standard A/B Testing. Designed for data and product leaders, this session aims to inspire the embrace of innovative approaches and provide insights into the frontiers of experimentation!
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Toward a Mobile Data Commons
1. Towards a Mobile Social Data
Commons
Giles Greenway, Tobias Blanke, Mark Cote, (KCL) Leonard Mack
& Tom Heath (ODI)
Department of Digital Humanities
@KingsBSD
http://big-social-data.net/
2. A “mobile-data commons”?
• Most of us leave behind a data-trail
created by our mobile devices.
• Usually, it returns to us as targeted
adverts (See Private Eye's
“Malgorithms”...)
• How aware of this are mobile device
users?
• How else might this data be used?
• Can we build a “mobile data
commons”?
3. MobileMiner: App Data
• Android allows development without specific hardware or licenses.
• Cannot depend on mobile devices being rooted. (Normal users don't
have access to apps' SQLite databases.)
• Encouraging users to root devices can leave them vulnerable to malware.
(http://tinyurl.com/weidmandroid)
• Be conservative in what data we collect, to enable sharing.
• Can probe network sockets by polling /proc/<pid>/net/tcp. -Not
always reliable, but gives information about TCP ports, e.g. http on 80,
https on 443.
• Poll the Android network traffic API. -More (not totally) reliable, but
yields no other information.
• Record when apps send notifications to the user.
4. MobileMiner: Other Data.
• None of the content that apps transmit is
available.
• Can reason about data apps might transmit,
given their purpose and the permissions they
request. (e.g. location, wireless networks,
sensors...)
• Cannot detect when these permissions are used.
• Collect some of this data ourselves, in order to
reason about what apps are capable of.
• OpenCellId allows cell tower locations to be a de-
focussed proxy for user locations.
(http://opencellid.org/)
5. Storing Data: CKAN
• http://www.ckan.org
• App communicates via a custom
plugin.
• Users are identified only by a
randomly chosen ID, not associated
with an email address or any other
personal details.
• Access to the data granted on an
individual basis.
• Could be granted on the basis of roles
and institutions via the Shibboleth
plugin.
• Is this a social-data commons?
6. MobileMiner: Giving the Data Back,
●
App was installed on 20 Android
smartphones given to Young
Rewired State Volunteers.
(http://www.yrs.io/)
●
The app copies its SQLite
database to mass-storage where it
can be queried using other apps
or moved off-device.
●
The entire CKAN instance was
containerized and shared with the
YRS volunteers at a “datathon” .
Machine-learning tools provided
via Ipython Notebook / Jupyter.
7. MobileMiner: Analysing Data.
• Raw data is aggregated by a series
of Celery tasks to produced
derivate tables in the CKAN
instance.
• Aggregate daily app usage.
• Cluster trails of cell towers by k-
means with lat, long and their rates
of change forming the feature
vectors.
8. Is MobileMiner invasive? ODI Risk Assement
• The socket and network data are the “most novel
data” classes, but are unlikely to betray identity.
• App choice can still reveal information about
users. (KCL has its own timetable app. There are
Muslim call-to-prayer-apps.)
• Only connected cell-towers are recorded, so
triangulation is impossible. Resolution at least >
100m.
• Wireless networks, are more problematic, could
pin-point home addresses. Hash these in a future
release.
• Avoid collecting demographic information.
9. Other Attempts at a “Data Commons”
●
http://www.ubiquitouscommons.org/
●
Demo code exists:
https://github.com/xdxdVSxdxd/UbiquitousCommons-Plugin
●
Collects activity of common web-apps.
●
Stores data on a block-chain. (https://www.ethereum.org/)
●
Works as a Chrome browser plug-in.
●
Firefox for Android is the only pluggable mobile browser.
●
Use of the block-chain network is paid for by validating the
transactions of others. Is this feasible for the volume of data?
“Ubiquitous Commons”
10. Other Attempts at a “Data Commons”
●
http://www.nervousnet.ethz.ch/
●
Cross-platform peer-to-peer data collection
and sharing.
●
“Quantified self” type data...
●
Code exists: https://github.com/nervousnet
●
Live trial at CCC Congress 2014:
http://tinyurl.com/nervousnet-ccc2014
“Nervous Net”
11. An existing solution? -openPDS.
●
http://openpds.media.mit.edu/
●
Each user has their own instance of the
Personal Data Store (PDS) web
application.
●
Users authorize apps to write to their own
PDS via a registry server.
●
Mobile app gathers data using the Funf
framework.
●
The app transmits data to the user's PDS.
●
Third parties can request answers to pre-
defined questions about the data framed as
Celery tasks.
●
Docker container for the servers:
github.com/kingsBSD/odopds-dev
12. Using the Funf framework.
●
http://funf.org/
●
Many Funf “probes” are available, many
far more invasive than anything
collected by MobileMiner.
●
Trivial to re-write MobileMiner's data
collection as a set of custom Funf
probes.
●
Funf pipeline is completely specified by
a JSON string referred to in
AndroidManifest.xml.
●
Fund/openPDS integration is provided.
●
Re-implement tables derived from raw
data as PDS “questions”.
87. module.)
>>> # How to call sys.exit() without mentioning it.
>>> import sys
>>> s = sys
>>> s.__dict__[''.join([chr(i-13) for i in [114, 133, 118, 129]])]()