I gave this talk at Barcamp Liverpool, which was to briefly explain how I worked out how to send and receive SMS messages from a PC using a mobile phone, a Bluetooth adaptor and a piece of software for Linux called ser2net.
There's an old joke that goes, “The two hardest things in programming are cache invalidation, naming things, and off-by-one errors.” In this talk, we'll discuss the subtle art of naming things – a practice we do every day but rarely talk about.
This talk was presented to Manchester Free Software, explaining very loosely what the differences are between various µBlogging platforms.
This talk was recorded and is available at http://www.archive.org/details/Manchester.Free.Software.Jon.Spriggs
A few brief slides as presented at Barcamp Manchester explaining how to install GPG. It's only as I'm uploading this presentation now, I realise that I didn't include "how to use it", although many of the linked URLs do.
A brief introduction to "How The Internet Works", from how your LAN uses MAC addresses to talk nic-to-nic, through to what a proxy is, and how that operates, plus a little bit of everything in between. Consider this the leypersons guide to the Internet.
This is the presentation I gave at OggCamp 2009. It is a high level overview of various methods of producing trust and then using them on untrustworthy connections. It was mostly recorded (up to the last slide) at http://qik.ly/m6Be
I gave this talk again on the main stage at BarCamp Manchester 2
There's an old joke that goes, “The two hardest things in programming are cache invalidation, naming things, and off-by-one errors.” In this talk, we'll discuss the subtle art of naming things – a practice we do every day but rarely talk about.
This talk was presented to Manchester Free Software, explaining very loosely what the differences are between various µBlogging platforms.
This talk was recorded and is available at http://www.archive.org/details/Manchester.Free.Software.Jon.Spriggs
A few brief slides as presented at Barcamp Manchester explaining how to install GPG. It's only as I'm uploading this presentation now, I realise that I didn't include "how to use it", although many of the linked URLs do.
A brief introduction to "How The Internet Works", from how your LAN uses MAC addresses to talk nic-to-nic, through to what a proxy is, and how that operates, plus a little bit of everything in between. Consider this the leypersons guide to the Internet.
This is the presentation I gave at OggCamp 2009. It is a high level overview of various methods of producing trust and then using them on untrustworthy connections. It was mostly recorded (up to the last slide) at http://qik.ly/m6Be
I gave this talk again on the main stage at BarCamp Manchester 2
E-commerce primer for newbies. NOT for Dummies!
Are you fairly new to the Net?
Does that term “e-commerce” leave you feeling left out?
Do you want to know all about...
“This Internet thing”
and...
“Can my business get on it?”
or...
“How can I make a business on it?”
Relax, this primer cuts the information down into byte-sized chunks.
This presentation by Eddy Verbruggen was given at PhoneGap Day EU 2016 in Amsterdam. It's about how three Dutch banks have used Cordova to add web content to their apps.
There's quite a few video's in the slides which show as images here, so if you want to see the video's please (also) watch this: http://www.x-services.nl/PGDayEU16-Eddy-720p.m4v (note that PhoneGap will also upload the actual presentation to their YouTube channel at https://www.youtube.com/user/PhoneGap
Shankar Ambady of Session M will give a tutorial on the Python NLTK (Natural Language Tool Kit). Shankar had previously presented a comprehensive overview of the NLTK last December at the Python meetup. The Python NLTK is a very powerful collection of libraries that can be applied to a variety of NLP applications such as sentiment analysis. His presentation from last December may be found here (click on Boston Python Meetup Materials) : http://www.shankarambady.com/
The general direction in which something tends to move.
A general tendency or inclination. Current style. The Internet is a global revolution in communication – as long as You use letters from the Western alphabet.
People want their own domains in their own languages.
Introduction to Docker and Containers- Learning SimpleSandeep Hijam
This small free E-book talks about what docker and containers are. Also I believe every reader can easily understand the underlying principle without technical jargon
It’s a simple concept, a new user is added and an email is triggered to let them know what to do to get started with the application. But is it that simple? There is so much to consider before creating that email. What does the email look like? How do you code the html? Why does it look different in every email client? How do we keep track of all the different emails going out? What is the tone of voice in the copy? What are the other triggers that call for an email to be sent to the user? What about translating the emails? How can we structure templates to make them translated easily?
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
E-commerce primer for newbies. NOT for Dummies!
Are you fairly new to the Net?
Does that term “e-commerce” leave you feeling left out?
Do you want to know all about...
“This Internet thing”
and...
“Can my business get on it?”
or...
“How can I make a business on it?”
Relax, this primer cuts the information down into byte-sized chunks.
This presentation by Eddy Verbruggen was given at PhoneGap Day EU 2016 in Amsterdam. It's about how three Dutch banks have used Cordova to add web content to their apps.
There's quite a few video's in the slides which show as images here, so if you want to see the video's please (also) watch this: http://www.x-services.nl/PGDayEU16-Eddy-720p.m4v (note that PhoneGap will also upload the actual presentation to their YouTube channel at https://www.youtube.com/user/PhoneGap
Shankar Ambady of Session M will give a tutorial on the Python NLTK (Natural Language Tool Kit). Shankar had previously presented a comprehensive overview of the NLTK last December at the Python meetup. The Python NLTK is a very powerful collection of libraries that can be applied to a variety of NLP applications such as sentiment analysis. His presentation from last December may be found here (click on Boston Python Meetup Materials) : http://www.shankarambady.com/
The general direction in which something tends to move.
A general tendency or inclination. Current style. The Internet is a global revolution in communication – as long as You use letters from the Western alphabet.
People want their own domains in their own languages.
Introduction to Docker and Containers- Learning SimpleSandeep Hijam
This small free E-book talks about what docker and containers are. Also I believe every reader can easily understand the underlying principle without technical jargon
It’s a simple concept, a new user is added and an email is triggered to let them know what to do to get started with the application. But is it that simple? There is so much to consider before creating that email. What does the email look like? How do you code the html? Why does it look different in every email client? How do we keep track of all the different emails going out? What is the tone of voice in the copy? What are the other triggers that call for an email to be sent to the user? What about translating the emails? How can we structure templates to make them translated easily?
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
4. Using SMS in your personal projects And programmers all know how to read from databases
5. Using SMS in your personal projects And programmers all know how to read from databases mostly
6. Using SMS in your personal projects So, why not use something which would read SMS messages from a mobile phone, and insert them into a database for processing?
7. Using SMS in your personal projects Of course, I couldn't find one so I wrote one!
8. Using SMS in your personal projects I wanted to help users who like exchanging SMS with microblogging sites (like Twitter or Identi.ca)
9. Using SMS in your personal projects But couldn't because they turned it off
10. Using SMS in your personal projects Or didn't have it in my country for my network
11. Using SMS in your personal projects It also meant I had a project to work on :)
12. Using SMS in your personal projects Enter smsToLaconica
13. Using SMS in your personal projects Crap name huh?
14. Using SMS in your personal projects Laconica is the microblogging software I was writing for initially
15. Using SMS in your personal projects My first draft only took SMS messages and sent them to Laconi.ca based sites e.g. ”Yey! I'm talking at #BarcampLiverpool”
16. Using SMS in your personal projects Next I wanted to also send SMSs back from my direct messages and replies e.g. ”@jontheniceguy I'm loving it so far!”
17. Using SMS in your personal projects (I hope that's what I'll read!)
18. Using SMS in your personal projects So, I had to learn about how to send and receive SMS messages.
19. Using SMS in your personal projects It's actually pretty easy.
21. Using SMS in your personal projects The mobile phone acts like a modem – you talk to it with AT commands
22. Using SMS in your personal projects AT+CMGL=”All” or AT+CMGL=4 These commands retrieve all messages on your phone, depending on the modes your phone will accept – PDU or Text
23. Using SMS in your personal projects Modes in SMS
24. Using SMS in your personal projects PDU is a binary format – it's 7 bit binary, stored in 8 bit chunks converted to hex.
25. Using SMS in your personal projects The messages look like this: 07911326040000F0040B911346610089F600002080629 17314080CC8F71D14969741F977FD07
26. Using SMS in your personal projects I found it really hard to send SMS messages in PDU mode, so I switched my focus to TEXT mode
27. Using SMS in your personal projects I found it really hard to send SMS messages in PDU mode, so I switched my focus to TEXT mode Which is just normal text
28. Using SMS in your personal projects You don't need to know all the detail now, but it does work
29. Using SMS in your personal projects And you don't ACTUALLY need to be working with Laconi.ca or identi.ca to use the code in your own site!
30. Using SMS in your personal projects It's just a PHP script which you run as a daemon!
31. Using SMS in your personal projects (You might need to tweak it a bit!)
32. Using SMS in your personal projects The code is released under the Affero General Public License (v3), but if you contact me directly, I'll consider re-licensing for your project
33. Using SMS in your personal projects Or, you could just look at lib_text.php or lib_pdu.php in the source code
34. Using SMS in your personal projects So, where is the source code?
35. Using SMS in your personal projects Sourceforge of course!
36. Using SMS in your personal projects It's at http://sourceforge.net/projects/laconicatools
37. Using SMS in your personal projects Or http://is.gd/2pad for short!
38. Using SMS in your personal projects What do you need to make it run?
39. Using SMS in your personal projects A mobile phone
40. Using SMS in your personal projects One you can connect to with a data cable or bluetooth
41. Using SMS in your personal projects That exposes the modem as a serial port
42. Using SMS in your personal projects (Nokia's do well on this, and most of us have an old one kicking around)
43. Using SMS in your personal projects I use a Linux daemon called ser2net to expose the serial port via telnet (on port 2000)
44. Using SMS in your personal projects And then you need PHP, and a database that PHP knows how to talk to (which is most of them!)
45. Using SMS in your personal projects And that's it
46. Using SMS in your personal projects Any questions?