This document outlines libraries' responses to issues around artificial intelligence and digital privacy. It discusses the Declaration of Cities Coalition for Digital Rights that libraries have signed onto, which supports principles like privacy, transparency, and inclusion online. It also lists digital privacy programs that libraries offer, including programs led by libraries on topics like algorithms and bias, as well as external presenter programs on artificial intelligence topics. The document promotes the role of libraries in giving individuals knowledge and confidence to navigate digital spaces without compromising their privacy or security.
Protecting our privacy: The role of information and library professionalsCILIPScotland
This document discusses digital privacy and security in libraries. It notes that libraries provide internet access, but this opens them up to surveillance and data collection. It proposes that libraries ensure they remain safe community spaces without accumulating user data. The document outlines the Investigatory Powers Act's impact on libraries and their obligations. It suggests libraries can support user privacy through education, tools and questioning how data practices might impact choice and access.
This document discusses Lauren Smith's use of social media to address professional issues in library and information science. It provides an overview of her various roles researching education and information literacy. It also outlines some of the organizations and initiatives she supports that aim to advocate for libraries, question practices through a critical lens, protect digital privacy and promote literacy as a human right. These include Voices for the Library, the Radical Librarians Collective and the Library Freedom Project.
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...SOCIAM Project
Paper presentation at the Building Web Observatories Workshop in Bloomington, USA
Presenter: Kieron O'Hara
Authors: Kieron O'Hara, Alistair Sackley, Ian Brown, Ramine Tinati, Thanassis Tiropanis, Xin Wang
Safeguarding Democracy: Innovations in tech for human rightsEmily Jacobi
This weekend I spoke on the panel "Safeguarding Democracy: Innovations in Technology & Human Rights" at Netroots Nation 2012, covering Digital Democracy's process & discussing 2 case studies: Burma/Myanmar & Haiti.
Data sharing in the age of the Social MachineUlrik Lyngs
Social machines generate and consume data. A Web Observatory is proposed as an infrastructure to support data sharing among social machines and the human elements involved in data generation, analysis, and consumption. Key challenges include designing such an infrastructure for generality while addressing ethical, legal, and technological issues around metadata standards, access control, and performance across different computing platforms and stakeholder needs.
Slides from a talk at British Embassy, Paris in March 2014. Using a user-design focused approach to bringing Internet of Things tribes together and going mainstream.
This presentation covers basic knowledge and tips about privacy and security when it comes to protecting oneself online. In this presentation, yone won't be needing any high-technology background as this presentation is meant for people from all walks of life.
Protecting our privacy: The role of information and library professionalsCILIPScotland
This document discusses digital privacy and security in libraries. It notes that libraries provide internet access, but this opens them up to surveillance and data collection. It proposes that libraries ensure they remain safe community spaces without accumulating user data. The document outlines the Investigatory Powers Act's impact on libraries and their obligations. It suggests libraries can support user privacy through education, tools and questioning how data practices might impact choice and access.
This document discusses Lauren Smith's use of social media to address professional issues in library and information science. It provides an overview of her various roles researching education and information literacy. It also outlines some of the organizations and initiatives she supports that aim to advocate for libraries, question practices through a critical lens, protect digital privacy and promote literacy as a human right. These include Voices for the Library, the Radical Librarians Collective and the Library Freedom Project.
Security and Legitimacy in a Web Observatory: Requirements for Data Linkage, ...SOCIAM Project
Paper presentation at the Building Web Observatories Workshop in Bloomington, USA
Presenter: Kieron O'Hara
Authors: Kieron O'Hara, Alistair Sackley, Ian Brown, Ramine Tinati, Thanassis Tiropanis, Xin Wang
Safeguarding Democracy: Innovations in tech for human rightsEmily Jacobi
This weekend I spoke on the panel "Safeguarding Democracy: Innovations in Technology & Human Rights" at Netroots Nation 2012, covering Digital Democracy's process & discussing 2 case studies: Burma/Myanmar & Haiti.
Data sharing in the age of the Social MachineUlrik Lyngs
Social machines generate and consume data. A Web Observatory is proposed as an infrastructure to support data sharing among social machines and the human elements involved in data generation, analysis, and consumption. Key challenges include designing such an infrastructure for generality while addressing ethical, legal, and technological issues around metadata standards, access control, and performance across different computing platforms and stakeholder needs.
Slides from a talk at British Embassy, Paris in March 2014. Using a user-design focused approach to bringing Internet of Things tribes together and going mainstream.
This presentation covers basic knowledge and tips about privacy and security when it comes to protecting oneself online. In this presentation, yone won't be needing any high-technology background as this presentation is meant for people from all walks of life.
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Christopher Allen
Presentation by Christopher Allen of Blockstream on self-sovereign decentralized identity, confidentiality, privacy, and human rights at Milan Bitcoin Meetup on April 11, 2017. Video at https://www.youtube.com/watch?v=p0-oXpp6yrM&t=5m7s
This document discusses an ISM 5021 Information and Technology Management course. It lists the names and locations of 6 students in the course. It also discusses how the group worked collaboratively on a wiki project about RFID (radio-frequency identification) technology, with each student researching and writing a section and the group editing each other's work. It emphasizes the importance of the wiki being informative, educational, entertaining, and covering a broad cross-section of the topic in an organized and harmonized manner.
The UTA Libraries offer digital humanities services including consultations and workshops through their Digital Humanities Librarian for both undergraduates and graduate students in collaboration with various programs. They provide subject guides and assistance with platforms like Omeka. Copyright consultations are available to ensure legal compliance when building and using digital collections. The libraries are expanding their digital collections through projects digitizing special collections materials on topics related to the borderlands such as the U.S.-Mexico War and Tejano Voices.
This session explores the concept of identity in today's digital era and what that means to an individual's health, as well as to society's treatment of the individual, including genetic discrimination and universal access to and affordability of medical technology advancements.
Are you interested in finding and using digital tools to enhance your research? In this workshop, Rafia Mirza from the UT Arlington Central Library will introduce you to the many different tools that are available to help you gather, process, and present your research.
This document discusses several aspects of digital literacy. It defines information literacy, data literacy, ICT literacy, web literacy, and media literacy. It also discusses frameworks for digital literacy including DigComp 2.0 and digital intelligence. The document emphasizes that digital literacies involve more than just technical skills, including new behaviors, attitudes, and abilities needed to function in a digital society. It notes that a lack of digital literacy can negatively impact people's agency and opportunities. Finally, it outlines the nine elements of digital citizenship according to ISTE/Ribble, including respecting others online, communicating appropriately, understanding legal and ethical issues, and protecting personal information and well-being.
Think before Clicking! This presentation covers the basics of what We as Common People can do to protect ourselves online. Also, How mozilla products help us do that in an easy and trusted way.
Tracey P. Lauriault gave a presentation on data and technological citizenship. She discussed how data is shaped by social and technical factors and does not exist independently. She framed data in technical, ethical, political, spatial, and philosophical terms. She described two projects she is involved in regarding open smart cities and analyzing big data use in agriculture. She raised questions about the impacts of technologies like smart cities, IoT, and AI on cities and food security. She asked how civic engagement can occur in machine-driven environments and discussed the need for human-centered approaches to technology and issues of governance, ownership, and algorithms.
The document discusses identity on the blockchain and self-sovereign identity. It introduces Christopher Allen and his background working on privacy and cryptography. It notes that Blockstream has no identity product but believes in openness and accountability. While identity on the blockchain could hold the powerful accountable, it could also be used to target the powerless. The document advocates for 10 principles of self-sovereign identity including individual control over one's own identity and data. It promotes further discussion on supporting self-sovereign identity at upcoming United Nations and Rebooting Web of Trust events.
This presentation was provided by William Marden of the New York Public Library during the NISO Virtual Conference, Information Freedom, Ethics and Integrity, held on Wednesday, April 18, 2018
Folksonomy refers to a system of classification created by users to tag and organize online content. It emerged in the early 2000s as sites like Delicious allowed users to tag websites and resources with keywords. The term was coined by Thomas Vander Wal to describe this social or "folk" taxonomy. While tagging provides advantages like easier browsing and self-expression, it also presents disadvantages like potential miscommunication, lack of control over one's tags, and privacy issues.
Folksonomy refers to a system of classification created by users to tag and organize online content. It emerged in the early 2000s as sites like Delicious allowed users to tag websites and resources with keywords. The term was coined by Thomas Vander Wal to describe this social or "folk" taxonomy. While tagging provides advantages like easier browsing and self-expression, it also presents disadvantages like potential miscommunication, lack of control over one's tags, and privacy issues.
The document discusses challenges facing the Dutch government in providing information to citizens through 1600+ websites run by 1200+ organizations, and efforts to improve findability and access to information through standardizing metadata and developing knowledge models. It describes the Overheid Web Metadata Standard and linked open data initiatives to organize government information according to common properties and allow linking between datasets. The goal is to make information more accessible through semantic linking and queries based on themes, locations, life events or other structured approaches.
Digital citizenship presentation NHS Scotland Webinar, jan 2017Leo Appleton
The document discusses the role of libraries in supporting digital literacy. It defines digital literacy and citizenship, which includes concepts like digital access, communication, profiles, law, rights, security and footprint. Libraries help support digital literacy through providing WiFi, digital resources, coding clubs, and workshops on topics like Minecraft and Arduino. They also help various groups like young people, older adults, and businesses improve their digital skills. Overall, libraries play a key role in developing communities' digital literacy as more activities move online.
The document is a presentation about digital citizenship given at the National Liberty Museum on November 3, 2012. It includes an agenda for the day covering topics such as defining citizenship, digital communication, digital literacy, digital etiquette, digital rights and responsibilities, and creating a plan for teaching digital citizenship. The presentation aims to help educators understand digital citizenship and how to teach their students about it.
Library of Birmingham on the move - be2camp presentationbe2campbrum
The document discusses the Library of Birmingham's (LoB) strategy to become a digital and mobile library through 5 types of libraries - the Connected Library, the Virtual Library, the Logical Library, the Self-Service Library, and the Extended Library. It emphasizes the critical role of ICT and mobility in transforming the LoB and delivering digital services. The LoB aims to unlock its collections for a new digital user community and provide meaningful mobile services that complement online and physical experiences.
From Aspiration to Reality: Open Smart Cities
Open smart cities might become a reality for Canada. Globally there are a number of initiatives, programs, and practices that are open smart city like which means that it is possible to have an open, responsive and engaged city that is both socio-technologically enabled, but also one where there is receptivity to and a willingness to grow a critically informed type of technological citizenship (Feenberg). For an open smart city to exist, public officials, the private sector, scholars, civil society and residents and citizens require a definition and a guide to start the exercise of imagining what an open smart city might look like. There is much critical scholarship about the smart city and there are many counter smart city narratives, but there are few depictions of what engagement, participatory design and technological leadership might be. The few examples that do exist are project based and few are systemic. An open smart city definition and guide was therefore created by a group of stakeholders in such a way that it can be used as the basis for the design of an open smart city from the ground up, or to help actors shape or steer the course of emerging or ongoing data and networked urbanist forms (Kitchin) of smart cities to lead them towards being open, engaged and receptive to technological citizenship.
This talk will discuss some of the successes resulting from this Open Smart Cities work, which might also be called a form or engaged scholarship. For example the language for the call for tender of the Infrastructure Canada Smart City Challenge was modified to include as a requisite that engagement and openness be part of the submissions from communities. Also, those involved with the guide have been writing policy articles that critique either AI or the smart city while also offering examples of what is possible. These articles are being read by proponents of Sidewalk Labs in Toronto. Also, the global Open Data Conference held in Argentina in September of 2018 hosted a full workshop on Open Smart Cities and finally Open North is working toward developing key performance indicators to assess those shortlisted by Infrastructure Canada and to help those communities develop an Open Smart Cities submission. The objective of the talk is to demonstrate that it is actually possible to shift public policy on large infrastructure projects, at least, in the short term.
Leading responsible AI - the role of librarians and information professionalsNicholas Poole
Presentation by CILIP CEO Nick Poole to the global UN Library, Information and Knowledge Network via their event in Doha, Qatar on the role of librarians and information professionals in leading progress towards more responsible approaches to AI.
Forging Self-Sovereign Identity in the Age of the Blockchain - Christopher Al...Christopher Allen
Presentation by Christopher Allen of Blockstream on self-sovereign decentralized identity, confidentiality, privacy, and human rights at Milan Bitcoin Meetup on April 11, 2017. Video at https://www.youtube.com/watch?v=p0-oXpp6yrM&t=5m7s
This document discusses an ISM 5021 Information and Technology Management course. It lists the names and locations of 6 students in the course. It also discusses how the group worked collaboratively on a wiki project about RFID (radio-frequency identification) technology, with each student researching and writing a section and the group editing each other's work. It emphasizes the importance of the wiki being informative, educational, entertaining, and covering a broad cross-section of the topic in an organized and harmonized manner.
The UTA Libraries offer digital humanities services including consultations and workshops through their Digital Humanities Librarian for both undergraduates and graduate students in collaboration with various programs. They provide subject guides and assistance with platforms like Omeka. Copyright consultations are available to ensure legal compliance when building and using digital collections. The libraries are expanding their digital collections through projects digitizing special collections materials on topics related to the borderlands such as the U.S.-Mexico War and Tejano Voices.
This session explores the concept of identity in today's digital era and what that means to an individual's health, as well as to society's treatment of the individual, including genetic discrimination and universal access to and affordability of medical technology advancements.
Are you interested in finding and using digital tools to enhance your research? In this workshop, Rafia Mirza from the UT Arlington Central Library will introduce you to the many different tools that are available to help you gather, process, and present your research.
This document discusses several aspects of digital literacy. It defines information literacy, data literacy, ICT literacy, web literacy, and media literacy. It also discusses frameworks for digital literacy including DigComp 2.0 and digital intelligence. The document emphasizes that digital literacies involve more than just technical skills, including new behaviors, attitudes, and abilities needed to function in a digital society. It notes that a lack of digital literacy can negatively impact people's agency and opportunities. Finally, it outlines the nine elements of digital citizenship according to ISTE/Ribble, including respecting others online, communicating appropriately, understanding legal and ethical issues, and protecting personal information and well-being.
Think before Clicking! This presentation covers the basics of what We as Common People can do to protect ourselves online. Also, How mozilla products help us do that in an easy and trusted way.
Tracey P. Lauriault gave a presentation on data and technological citizenship. She discussed how data is shaped by social and technical factors and does not exist independently. She framed data in technical, ethical, political, spatial, and philosophical terms. She described two projects she is involved in regarding open smart cities and analyzing big data use in agriculture. She raised questions about the impacts of technologies like smart cities, IoT, and AI on cities and food security. She asked how civic engagement can occur in machine-driven environments and discussed the need for human-centered approaches to technology and issues of governance, ownership, and algorithms.
The document discusses identity on the blockchain and self-sovereign identity. It introduces Christopher Allen and his background working on privacy and cryptography. It notes that Blockstream has no identity product but believes in openness and accountability. While identity on the blockchain could hold the powerful accountable, it could also be used to target the powerless. The document advocates for 10 principles of self-sovereign identity including individual control over one's own identity and data. It promotes further discussion on supporting self-sovereign identity at upcoming United Nations and Rebooting Web of Trust events.
This presentation was provided by William Marden of the New York Public Library during the NISO Virtual Conference, Information Freedom, Ethics and Integrity, held on Wednesday, April 18, 2018
Folksonomy refers to a system of classification created by users to tag and organize online content. It emerged in the early 2000s as sites like Delicious allowed users to tag websites and resources with keywords. The term was coined by Thomas Vander Wal to describe this social or "folk" taxonomy. While tagging provides advantages like easier browsing and self-expression, it also presents disadvantages like potential miscommunication, lack of control over one's tags, and privacy issues.
Folksonomy refers to a system of classification created by users to tag and organize online content. It emerged in the early 2000s as sites like Delicious allowed users to tag websites and resources with keywords. The term was coined by Thomas Vander Wal to describe this social or "folk" taxonomy. While tagging provides advantages like easier browsing and self-expression, it also presents disadvantages like potential miscommunication, lack of control over one's tags, and privacy issues.
The document discusses challenges facing the Dutch government in providing information to citizens through 1600+ websites run by 1200+ organizations, and efforts to improve findability and access to information through standardizing metadata and developing knowledge models. It describes the Overheid Web Metadata Standard and linked open data initiatives to organize government information according to common properties and allow linking between datasets. The goal is to make information more accessible through semantic linking and queries based on themes, locations, life events or other structured approaches.
Digital citizenship presentation NHS Scotland Webinar, jan 2017Leo Appleton
The document discusses the role of libraries in supporting digital literacy. It defines digital literacy and citizenship, which includes concepts like digital access, communication, profiles, law, rights, security and footprint. Libraries help support digital literacy through providing WiFi, digital resources, coding clubs, and workshops on topics like Minecraft and Arduino. They also help various groups like young people, older adults, and businesses improve their digital skills. Overall, libraries play a key role in developing communities' digital literacy as more activities move online.
The document is a presentation about digital citizenship given at the National Liberty Museum on November 3, 2012. It includes an agenda for the day covering topics such as defining citizenship, digital communication, digital literacy, digital etiquette, digital rights and responsibilities, and creating a plan for teaching digital citizenship. The presentation aims to help educators understand digital citizenship and how to teach their students about it.
Library of Birmingham on the move - be2camp presentationbe2campbrum
The document discusses the Library of Birmingham's (LoB) strategy to become a digital and mobile library through 5 types of libraries - the Connected Library, the Virtual Library, the Logical Library, the Self-Service Library, and the Extended Library. It emphasizes the critical role of ICT and mobility in transforming the LoB and delivering digital services. The LoB aims to unlock its collections for a new digital user community and provide meaningful mobile services that complement online and physical experiences.
From Aspiration to Reality: Open Smart Cities
Open smart cities might become a reality for Canada. Globally there are a number of initiatives, programs, and practices that are open smart city like which means that it is possible to have an open, responsive and engaged city that is both socio-technologically enabled, but also one where there is receptivity to and a willingness to grow a critically informed type of technological citizenship (Feenberg). For an open smart city to exist, public officials, the private sector, scholars, civil society and residents and citizens require a definition and a guide to start the exercise of imagining what an open smart city might look like. There is much critical scholarship about the smart city and there are many counter smart city narratives, but there are few depictions of what engagement, participatory design and technological leadership might be. The few examples that do exist are project based and few are systemic. An open smart city definition and guide was therefore created by a group of stakeholders in such a way that it can be used as the basis for the design of an open smart city from the ground up, or to help actors shape or steer the course of emerging or ongoing data and networked urbanist forms (Kitchin) of smart cities to lead them towards being open, engaged and receptive to technological citizenship.
This talk will discuss some of the successes resulting from this Open Smart Cities work, which might also be called a form or engaged scholarship. For example the language for the call for tender of the Infrastructure Canada Smart City Challenge was modified to include as a requisite that engagement and openness be part of the submissions from communities. Also, those involved with the guide have been writing policy articles that critique either AI or the smart city while also offering examples of what is possible. These articles are being read by proponents of Sidewalk Labs in Toronto. Also, the global Open Data Conference held in Argentina in September of 2018 hosted a full workshop on Open Smart Cities and finally Open North is working toward developing key performance indicators to assess those shortlisted by Infrastructure Canada and to help those communities develop an Open Smart Cities submission. The objective of the talk is to demonstrate that it is actually possible to shift public policy on large infrastructure projects, at least, in the short term.
Leading responsible AI - the role of librarians and information professionalsNicholas Poole
Presentation by CILIP CEO Nick Poole to the global UN Library, Information and Knowledge Network via their event in Doha, Qatar on the role of librarians and information professionals in leading progress towards more responsible approaches to AI.
Digital competence, digital citizen, digital hygienePirje Meri
This document provides an overview of digital competencies, digital citizenship, digital ethics, and digital hygiene. It discusses:
- The importance of developing digital competencies throughout one's education and career.
- The European Digital Competence Framework which describes digital competence as consisting of 5 areas: information and data literacy, communication and collaboration, digital content creation, safety, and problem solving.
- The concepts of digital citizenship and etiquette (netiquette), including responsibilities and proper online behavior.
- Copyright and intellectual property, the importance of proper referencing, and Creative Commons licensing.
- Digital hygiene and the need for safe online practices like using strong passwords, backing up data, and
How library and information professionals improve digital inclusion.
This statement from the Chartered Institute of Library & Information Professionals explains:
What digital inclusion is
How it benefits people, communities and society
How libraries and staff can support and improve digital inclusion
Librarians, knowledge workers & Information literacyBrano Frk
Librarians are now knowledge workers and information literacy educators in the knowledge society. They curate, create, and promote content using social tools and new technologies like virtual and augmented reality. Librarians filter and connect users to information streams through various apps, tools, and services, helping to navigate the changing information landscape. As facilitators and experimenters, they provide spaces for digital media, networking, and creation using hacker spaces and labs. Overall, librarians act as beacons shining light on the path to the knowledge society by mapping communities and enabling collaboration.
This document defines digital literacy, technophilia, and digital citizenship.
Digital literacy refers to the skills needed to use digital devices like smartphones and computers for communication, expression, and advocacy. Technophilia is an enthusiasm for technology. Digital citizenship involves appropriate and responsible technology use.
The document outlines the key aspects of digital citizenship, including digital access, communication, literacy, etiquette, law, rights and responsibilities, health and wellness, security, and commerce. It emphasizes principles of respecting oneself and others, educating oneself and connecting with others, and protecting oneself and others when using digital tools and online spaces.
This document discusses digital citizenship and its applications for English language teaching. It defines digital citizenship as the norms of behavior regarding technology use. The 9 elements of digital citizenship are outlined, including digital access, commerce, communication, literacy, etiquette, law, rights and responsibilities, and security. The role of teachers is to foster digital citizenship skills like critical thinking, ethical use, and understanding social reasons for technology policies. Examples of how to teach digital media safety, raise awareness of digital footprints and reputation, and foster literacy competencies like copyright are provided. Developing a culture of online interaction and sharing relevant experiences can help students become safe and effective digital communicators.
This document provides an overview of a conference called Digital Together. It includes:
- The names and roles of three speakers at the conference: Lizzie Hodgson, William Benson, and Jon Pratty.
- A brief summary of Jon Pratty's work developing digital projects.
- Topics that will be covered include mobile culture, how digital is integrated into businesses, data collection, connectivity, skills for the digital economy, new digital economies and products, smart regions versus cities, and the Internet of Place.
- The document encourages attendees to think about how digital impacts different areas and how to better connect places, culture, people and services through digital tools.
Mary Beth Henry - Connecting to Our Future: The Digital Livable City - GCS16KC Digital Drive
The document discusses the role of local governments in promoting digital equity and accessibility. It provides two case studies of cities that have implemented broadband initiatives: Portland, Oregon launched a broadband plan and digital equity action plan to promote affordable high-speed internet access, while Sandy, Oregon started a municipal broadband utility called SandyNet that now provides gigabit speeds to 60% of residents. The document also discusses how cities can become more responsive by using technology to improve services and quality of life, as well as ensuring digital inclusion for all groups like youth and older adults.
An introductory presentation for the Council of Europe INGOs introducing the transversal workig group called Digital Citizen. The group will deal with Education, Humand Rights and Democracy using a forward looking approach to policy making.
Boosting ICT Training in Public LibrariesÅke Nygren
The document discusses boosting digital literacy training in public libraries by taking a more holistic approach. It argues that libraries should embed digital literacy training in all aspects of their services and events, rather than offering standalone ICT courses. Digital literacy is important for helping people engage with online learning that is already happening through peer and interest groups. The document calls on different digital literacy groups within libraries to unite behind a single, connected strategy and emphasizes tools like digital badges that can recognize skills people gain through informal online learning.
This document discusses challenges and opportunities related to artificial intelligence and democratic resilience. It begins by outlining different stakeholders in AI development and noting an unequal dynamic. It then examines principles of AI power and examples of potential threats, such as curtailing freedom and magnifying inequality. The document proposes a framework for democratic resilience centered around the pillars of liberty, fraternity, and equality. It discusses the promise of AI for democratic governance if developed sustainably and humanistically. Specific policy examples and best practices are provided. The document concludes by outlining areas for further cooperation, such as setting a framework to improve citizen communications and path-building from principles to policy.
This document discusses digital rights and responsibilities. It defines digital rights and responsibilities as the privileges and freedoms extended to digital technology users, along with the behavioral expectations that come with those privileges. It then lists some key digital rights, which include rights to freedom of expression, privacy, credit for personal works, digital access, and identity. The document emphasizes that using the internet is a privilege that requires responsible behavior. It provides some technology facts and explains why digital rights and responsibilities are important for communication, knowledge, and understanding basic rights in the digital world.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
3. Declaration of Cities Coalition for Digital Rights
1. Universal and equal access to the internet, and
digital literacy
2. Privacy, data protection and security
3. Transparency, accountability, and non-
discrimination of data, content and algorithms
4. Participatory Democracy, diversity and inclusion
5. Open and ethical digital service standards
https://citiesfordigitalrights.org/declaration
5. To give individuals the knowledge
and confidence they need to
navigate digital spaces without
compromising their privacy and
security.
Digital Privacy Initiative
10. AI: Library-led Programs
• Algorithmic Literacy 1: Understanding Algorithms and Bias
• Artificial Intelligence (Digital Literacy for Youth series)
• Do-It-Yourself Artificial Intelligence: Image Recognition
• Do-It-Yourself Artificial Intelligence: Voice Recognition
• Is the Internet the Same for Everyone? Understanding Algorithms and
Bias
• Information Gathering, Artificial Intelligence and Behaviour Modification
• Learning Circle: Elements of Artificial Intelligence (AI)
11. AI: External Presenter Programs
• AI, the Internet & Privacy Disobedience during COVID-19
• Artificial Intelligence for all: Making Algorithms Work for a Better Society
• Artificial Intelligence and Society
• Building Trust in Artificial Intelligence
• Does Automation Threaten Democracy?
• How are Algorithms Rewriting the Rules of Work
• Monthly Tech Meet-Up: DeCentralization
• The Future of Work and Death
• The Robot Will See You Now: Artificial Intelligence in Medicine
• The Social Cost of the Information Age
• When Algorithms Disrupt Social Justice
Overview
Strategic and partnership framework and Why Libraries?
Digital Privacy initiative
Algorithmic Literacy program examples
As foundation to where our Digital Privacy Initiative sits:
TPL’s strategic plan is our commitment to building success, resilience and well-being for our city.
We have 5 Strategic Priorities, with Digital Inclusion & Literacy as the 2nd.
Access to technology and the skills to navigate and use it are critical for all Torontonians to be successful, connected and well.
While technology and the internet are available they can be expensive, and ways to understand and use them are not always easy to access.
Our Digital Privacy initiatives are grounded in working to offer programs and services to help Torontonians have the digital literacy skills they need to succeed in the digital world.
All of our strategic priorities are also considered through an Equity Lens. We are committed to helping level the playing field for all Torontonians with a particular focus on equity-seeking groups and vulnerable populations, breaking down barriers to access and increasing inclusion so everyone who wants to use the library feels welcome and represented in our spaces, is able to access our services, and can benefit from the outcomes we’re driving.
We have 3 Enablers, with Partnerships identified as critical to achieving our goals.
Partnerships have been key in enhancing our capacity and in ensuring our Digital Privacy programs are informed or delivered by industry and academic experts.
From the City level, in June 2019, the City of Toronto became a signatory on the declaration of Cities for Digital Rights.
As part of that adoption and in recognition of the work TPL already had begun in this area, City Council funded a new position for TPL to be dedicated to the creation of programming to further digital safety and literacy in support of the declaration’s 5 principles. I’ll highlight the first 3 as they speak to the importance of offering digital privacy programs and services:
1. Universal and equal access to the internet, and digital literacy
Everyone should have access to affordable and accessible internet and digital services on equal terms, as well as the digital skills to make use of this access and overcome the digital divide.
2. Privacy, data protection and security
Everyone should have privacy and control over their personal information through data protection in both physical and virtual places, to ensure digital confidentiality, security, dignity and anonymity, and sovereignty over their data, including the right to know what happens to their data, who uses it and for what purposes.
3. Transparency, accountability, and non-discrimination of data, content and algorithms
Everyone should have access to understandable and accurate information about the technological, algorithmic and artificial intelligence systems that impact their lives, and the ability to question and change unfair, biased or discriminatory systems.
TPL launched our Digital Privacy initiative in 2016 with the aims to empower Torontonians with the knowledge and confidence they need to navigate digital spaces without compromising their privacy and security.
I’ll provide a brief overview of the range of programs and services we’ve offered to help give a flavor of the kinds of initiatives that public libraries can do to support their communities and their understanding of digital privacy and algorithmic literacy issues.
Our initiative has included:
A series of branch and online programs
A Tor Browser Project.
A digital privacy expo that brought together experts to discuss data and personal security
An interactive art installation
And an instructional video series
And some initiatives focused more on Algorithmic literacy have included:
Algorithmic literacy workshops to help library users understand the complexity of their online environments
Programs with Do-it-Yourself machine learning kits that support self-directed tinkering
A speaker series with leading AI researchers, experts and critics, and a
A stakeholders forum to share AI programming information and identify potential collaborations
Let me run though a few of these examples
Note the positioning of Digital Literacy in TPL’s promotional materials for our Live and Online programming
TPL offers a recurring four courses over four weeks Digital Privacy series that covers how to better understanding the threats - and myths - about online security and knowing how to strengthen your computer and online security.
Curriculum covers a wide-range of in-person and hands-on activities on how to use both public computing environments and personal devices safely; and navigating the internet and social media with privacy in mind
Programs with external presenters have included speakers from the Canadian Civil Liberties Association's Privacy, Surveillance, and Technology Project, the Office of the Information and Privacy Commissioner of Ontario, the Canadian Institute for Advanced Research, and leading academics and legal scholars on a range of topics including Privacy and Freedom, Cyberattacks and Digital Privacy, Privacy Rights, and User Privacy on the Web
In 2018 the TOR browser was installed on TPL learning center computers, the computers we use for our in-person computer education courses.
The TOR browser is a free and open source web browser that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.
Our intention is that in order to help people learn how to protect themselves against online tracking, surveillance, and censorship, we need the tools available for in-person instruction.
TPL’s four-week Digital Privacy course includes instruction on what the TOR browser is and how to download it onto your personal computer or device.
This initiative won a 2019 American Library Association Presidential Citation for Innovative International Library Projects
In partnership with Tor, the CitizenLab at the University of Toronto, and the Digital Justice Lab, TPL hosted a full day in-person Digital Privacy Expo with over 340 attendees and featuring four key sessions:
Privacy and security on the 21st Century Internet
Your Privacy and the Law in Canada
Talking Privacy Tech: a round-table with leading technologists
Spyware and Malware: an insider's perspective
Glass Room Experience IoT (Internet of Things)
TPL hosted the Glass Room Experience, a temporary interactive art installation by Mozilla and Tactical Tech.org
It explores the companies and mechanisms that make our everyday technologies and the connection to the Internet of Things (IoT).
Participants were invited to Play Fake or Real to see how smart they are in knowing about the world of smart devices.
TPL Programs on Artificial Intelligence began in 2019.
Over 35 programs have been offered and through the Covid-19 pandemic period, 7 have been offered online
This list outlines some of the key courses that TPL has developed
We’ve developed a class called: Algorithmic Literacy 1: Understanding Algorithms and Bias. In it, participants:
Explore how decision-making algorithms effect your experience online.
Learn about Algorithmic Bias - how decision-making algorithms can have negative consequences
In Do-It-Yourself Artificial Intelligence: Image Recognition participants explore the foundations of machine learning using Google's AIY Vision kit and get hands on with weighted algorithms and the 'mechanics' of image recognition, and try to answer the question, "Can a computer tell how you are feeling?"
In Do-It-Yourself Artificial Intelligence: Voice Recognition participants explore the foundations of machine learning using Google's AIY Voice kit. They train Google's voice assistant to their voice, and see how it 'learns'!
Just as with Digital Privacy programs, it has been critical to have external experts and partners bring their expertise to TPL programs.
External presenters have included representatives from the Open News Network, Open Data with the City of Toronto, University of Toronto researchers from law, bioethics, and computer science, the Data & Society Research Institute in NYC, as well as a number of authors
One program to highlight is also the result of our partnerships.
TPL has an Innovation Council – an advisory group of leading tech, academic, and private and public sector leaders that advise us on TPL’s program and service directions.
In 2020, we started an Innovation Council Presents series where member of host programs and bring their networks to TPL programs
This example was Women in AI (recorded)
Led by TPL Innovation Council member, Pamela Robinson (Associate Dean, Graduate Studies, Ryerson University); Suzie Dunn (PhD candidate and University of Ottawa professor, Faculty of Law); and Renata Avila (Guatemalan International Human Rights Lawyer and author)
As the use of machine learning and advanced computation/Artificial Intelligence continues to gain attention, the discussion tends to focus on disruption, innovation and threats. Many of the leaders receiving attention are men.
This panel shared the work of women leading efforts using AI and explore issues including gender and racial bias in AI use and how approaching AI through a diversity and inclusion lens can lead to different outcomes.
I’d like to close with encouragement to take on similar programming in your libraries. TPL is happy to share curriculum or talk further if you have questions.