How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfsMarketingProfs
You know your company's story, but what's the right voice to use in telling it? Find out how to craft your company's storytelling voice. Ann Handley, chief content officer of MarketingProfs and author of "Content Rules" shares tips and ideas for crafting your brand's storytelling voice.
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
The Complete Starter Guide To Tumblr MarketingViraltag Inc.
Everything you ever wanted to know about Tumblr but were afraid to ask. In this guide you'll learn how to create a Tumblr account and drive business from the social network.
Winners Circle Real Estate Marketing Real Estate Lead GenRoland Frasier
Big Block Realty Winner's Circle presentation on growth mindset for growing my real estate business, how to scale my real estate business, get real estate listings, facebook for real estate, messenger for real estate and more.
How to Craft Your Company's Storytelling Voice by Ann Handley of MarketingProfsMarketingProfs
You know your company's story, but what's the right voice to use in telling it? Find out how to craft your company's storytelling voice. Ann Handley, chief content officer of MarketingProfs and author of "Content Rules" shares tips and ideas for crafting your brand's storytelling voice.
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
In an ever-changing landscape of one digital disruption after another, companies and organisations are looking for new ways to understand their target markets and engage them better. Increasingly they invest in user experience (UX) and customer experience design (CX) capabilities by working with a specialist UX agency or developing their own UX lab. Some UX practitioners are touting leaner and faster ways of developing customer-centric products and services, via methodologies such as guerilla research, rapid prototyping and Agile UX. Others seek innovation and fulfilment by spending more time in research, being more inclusive, and designing for social goods.
Experience is more than just an interface. It is a relationship, as well as a series of touch points between your brand and your customer. Here are our top 10 highlights and takeaways from the recent UX Australia conference to help you transform your customer experience design.
For full article, continue reading at https://yump.com.au/10-ways-supercharge-customer-experience-design/
The Complete Starter Guide To Tumblr MarketingViraltag Inc.
Everything you ever wanted to know about Tumblr but were afraid to ask. In this guide you'll learn how to create a Tumblr account and drive business from the social network.
Winners Circle Real Estate Marketing Real Estate Lead GenRoland Frasier
Big Block Realty Winner's Circle presentation on growth mindset for growing my real estate business, how to scale my real estate business, get real estate listings, facebook for real estate, messenger for real estate and more.
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of WorkThumbtack, Inc.
Thumbtack's newest economic report describes how skilled professionals are using new platforms to find new work and build their business – and their lives. Called “Beyond the Gig Economy: How New Technologies Are Reshaping the Future of Work,” this report explores how technology enables buyers and sellers of services to connect, moving the conversation beyond a one dimensional discussion of the so-called gig economy.
The attention of the consumer has changed, so why hasn't the attention of the marketers? Learn to communicate with your consumers like the year that it actually is...
Three business basics to always remember! People don't care about your brand. They care about what you can do for them. Back to basics... Give people what they want, do it consistently and do it better than your competition.
WTF - Why the Future Is Up to Us - pptx versionTim O'Reilly
This is the talk I gave January 12, 2017 at the G20/OECD Conference on the Digital Future in Berlin. I talk about fitness landscapes as applied to technology and business, the role of unchecked financialization in the state of our politics and economy, and why technology really wants to create jobs, not destroy them. (There is a separate PDF version, but some readers said the notes were too fuzzy to read.)
In this update of his past presentations on Mobile Eating the World -- delivered most recently at The Guardian's Changing Media Summit -- a16z’s Benedict Evans takes us through how technology is universal through mobile. How mobile is not a subset of the internet anymore. And how mobile (and accompanying trends of cloud and AI) is also driving new productivity tools.
In fact, mobile -- which encompasses everything from drones to cars -- is everything.
In the keynote 2022 Digital Asset Outlook report, we performed a deep dive into the 12 + 1 key themes, which will have the most significant disruptive effect and incremental delta in 2022. The report features exclusive insights from pioneers in digital assets, blockchain investing, NFT, metaverse and gaming, legal and cybersecurity.
Thanks to a partnership with Jumpshot, Moz is presenting data about Google's search growth, click distribution, and more via a panel of millions of US web users.
Tired of losing sales pitches? Look no further, get some timeless advice from high-stakes presentation consultant: Cliff Atkinson on how to throw out your old sales pitch and make your next one count.
Download here: http://www.paywithapost.de/pay?id=80eb8437-7393-4e61-b8a6-175d76d9eb5b
All of us negotiate every day at work, in relationships and with third parties however most of us have never been taught any negotiation theory or some tricks of the trade. Join Samuel Tait for a review of what he learned from top 5 US business school, Wharton from their semester long Negotiation class.
Learn about:
- Negotiating some of the big & small things in life.
- The 3 secrets of principled negotiation and win-win outcomes.
- The top 10 things about negotiation you’ve probably never been taught.
- Understand the 3 elements that drive principled negotiation and win-win outcomes
- Find out what a BATNA and ZOPA are and how they will make you a better negotiator.
An insight is NOT an observation - it explains why, rather than just observing that people do something. Is a new Point of View that’s immediately recognizable. It must be cause AND effect - insights prompt effect. Insights are things that other people think of, then you immediately wish you had!
We held the largest ever Virtual SlideShare Summit a week back, if you missed it here's your chance to hear from the experts once more on some of the takeaways on presentation design and SlideShare Marketing
Social Media Marketing for Health InsuranceSocial Samosa
Health Insurance marketing has always been perceived as a challenging subject. The key players in the Health insurance industry have been dealing with the key issues for consumer trust and category education.
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...Edureka!
** Machine Learning Engineer Masters Program: https://www.edureka.co/masters-program/machine-learning-engineer-training **
This tutorial on Artificial Intelligence gives you a brief introduction to AI discussing how it can be a threat as well as useful. This tutorial covers the following topics:
1. AI as a threat
2. What is AI?
3. History of AI
4. Machine Learning & Deep Learning examples
5. Dependency on AI
6.Applications of AI
7. AI Course at Edureka - https://goo.gl/VWNeAu
For more information, please write back to us at sales@edureka.co
Call us at IN: 9606058406 / US: 18338555775
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Top 5 Deep Learning and AI Stories - October 6, 2017NVIDIA
Read this week's top 5 news updates in deep learning and AI: Gartner predicts top 10 strategic technology trends for 2018; Oracle adds GPU Accelerated Computing to Oracle Cloud Infrastructure; chemistry and physics Nobel Prizes are awarded to teams supported by GPUs; MIT uses deep learning to help guide decisions in ICU; and portfolio management firms are using AI to seek alpha.
Beyond the Gig Economy: How New Technologies Are Reshaping the Future of WorkThumbtack, Inc.
Thumbtack's newest economic report describes how skilled professionals are using new platforms to find new work and build their business – and their lives. Called “Beyond the Gig Economy: How New Technologies Are Reshaping the Future of Work,” this report explores how technology enables buyers and sellers of services to connect, moving the conversation beyond a one dimensional discussion of the so-called gig economy.
The attention of the consumer has changed, so why hasn't the attention of the marketers? Learn to communicate with your consumers like the year that it actually is...
Three business basics to always remember! People don't care about your brand. They care about what you can do for them. Back to basics... Give people what they want, do it consistently and do it better than your competition.
WTF - Why the Future Is Up to Us - pptx versionTim O'Reilly
This is the talk I gave January 12, 2017 at the G20/OECD Conference on the Digital Future in Berlin. I talk about fitness landscapes as applied to technology and business, the role of unchecked financialization in the state of our politics and economy, and why technology really wants to create jobs, not destroy them. (There is a separate PDF version, but some readers said the notes were too fuzzy to read.)
In this update of his past presentations on Mobile Eating the World -- delivered most recently at The Guardian's Changing Media Summit -- a16z’s Benedict Evans takes us through how technology is universal through mobile. How mobile is not a subset of the internet anymore. And how mobile (and accompanying trends of cloud and AI) is also driving new productivity tools.
In fact, mobile -- which encompasses everything from drones to cars -- is everything.
In the keynote 2022 Digital Asset Outlook report, we performed a deep dive into the 12 + 1 key themes, which will have the most significant disruptive effect and incremental delta in 2022. The report features exclusive insights from pioneers in digital assets, blockchain investing, NFT, metaverse and gaming, legal and cybersecurity.
Thanks to a partnership with Jumpshot, Moz is presenting data about Google's search growth, click distribution, and more via a panel of millions of US web users.
Tired of losing sales pitches? Look no further, get some timeless advice from high-stakes presentation consultant: Cliff Atkinson on how to throw out your old sales pitch and make your next one count.
Download here: http://www.paywithapost.de/pay?id=80eb8437-7393-4e61-b8a6-175d76d9eb5b
All of us negotiate every day at work, in relationships and with third parties however most of us have never been taught any negotiation theory or some tricks of the trade. Join Samuel Tait for a review of what he learned from top 5 US business school, Wharton from their semester long Negotiation class.
Learn about:
- Negotiating some of the big & small things in life.
- The 3 secrets of principled negotiation and win-win outcomes.
- The top 10 things about negotiation you’ve probably never been taught.
- Understand the 3 elements that drive principled negotiation and win-win outcomes
- Find out what a BATNA and ZOPA are and how they will make you a better negotiator.
An insight is NOT an observation - it explains why, rather than just observing that people do something. Is a new Point of View that’s immediately recognizable. It must be cause AND effect - insights prompt effect. Insights are things that other people think of, then you immediately wish you had!
We held the largest ever Virtual SlideShare Summit a week back, if you missed it here's your chance to hear from the experts once more on some of the takeaways on presentation design and SlideShare Marketing
Social Media Marketing for Health InsuranceSocial Samosa
Health Insurance marketing has always been perceived as a challenging subject. The key players in the Health insurance industry have been dealing with the key issues for consumer trust and category education.
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...Edureka!
** Machine Learning Engineer Masters Program: https://www.edureka.co/masters-program/machine-learning-engineer-training **
This tutorial on Artificial Intelligence gives you a brief introduction to AI discussing how it can be a threat as well as useful. This tutorial covers the following topics:
1. AI as a threat
2. What is AI?
3. History of AI
4. Machine Learning & Deep Learning examples
5. Dependency on AI
6.Applications of AI
7. AI Course at Edureka - https://goo.gl/VWNeAu
For more information, please write back to us at sales@edureka.co
Call us at IN: 9606058406 / US: 18338555775
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Top 5 Deep Learning and AI Stories - October 6, 2017NVIDIA
Read this week's top 5 news updates in deep learning and AI: Gartner predicts top 10 strategic technology trends for 2018; Oracle adds GPU Accelerated Computing to Oracle Cloud Infrastructure; chemistry and physics Nobel Prizes are awarded to teams supported by GPUs; MIT uses deep learning to help guide decisions in ICU; and portfolio management firms are using AI to seek alpha.
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017Carol Smith
What is machine learning? Is UX relevant in the age of artificial intelligence (AI)? How can I take advantage of cognitive computing? Get answers to these questions and learn about the implications for your work in this session. Carol will help you understand at a basic level how these systems are built and what is required to get insights from them. Carol will present examples of how machine learning is already being used and explore the ethical challenges inherent in creating AI. You will walk away with an awareness of the weaknesses of AI and the knowledge of how these systems work.
2017 holiday survey: An annual analysis of the peak shopping seasonDeloitte United States
Holiday retail spending is bucking trends this season with only one-third of holiday budgets going toward gifts. Online spending is expected to exceed in-store for the first time. In addition to gifts for others this year, spending on experiences and self-gifting increased. Explore more consumer spending trends in our 32nd annual holiday survey. For more: http://deloi.tt/2yH1VAn.
Lee Rainie, director of internet and technology research at Pew Research Center, presented these findings at the International Monetary Fund/World Bank’s Youth Dialogue and its program, “A World Without Work?” The findings tie to several pieces of research at the Center, including reports on the state of American jobs, automation in everyday life, and the future of jobs training programs.
Infrastructure as code: running microservices on AWS using Docker, Terraform,...Yevgeniy Brikman
This is a talk about managing your software and infrastructure-as-code that walks through a real-world example of deploying microservices on AWS using Docker, Terraform, and ECS.
Lee Rainie, director of internet and technology research at Pew Research Center, discussed recent findings about the prevalence and impact of online harassment at the Cyber Health and Safety Virtual Summit: 41% of American adults have been harassed online and 66% have witnessed harassment. The findings come from the Center’s recent report on these issues.
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
Thinking about your sales team's goals for 2017? Drift's VP of Sales shares 3 things you can do to improve conversion rates and drive more revenue.
Read the full story on the Drift blog here: http://blog.drift.com/sales-team-tips
Taming the ever-evolving Compliance Beast : Lessons learnt at LinkedIn [Strat...Shirshanka Das
Just when you think you have your Kafka and Hadoop clusters set up and humming and you’re well on your path to democratizing data, you realize that you now have a very different set of challenges to solve. You want to provide unfettered access to data to your data scientists, but at the same time, you need to preserve the privacy of your members, who have entrusted you with their data.
Shirshanka Das and Tushar Shanbhag outline the path LinkedIn has taken to protect member privacy in its scalable distributed data ecosystem built around Kafka and Hadoop.
They also discuss three foundational building blocks for scalable data management that can meet data compliance regulations: a centralized metadata system, a standardized data lifecycle management platform, and a unified data access layer. Some of these systems are open source and can be of use to companies that are in a similar situation. Along the way, they also look to the future—specifically, to the General Data Protection Regulation, which comes into effect in 2018—and outline LinkedIn’s plans for addressing those requirements.
But technology is just part of the solution. Shirshanka and Tushar also share the culture and process change they’ve seen happen at the company and the lessons they’ve learned about sustainable process and governance.
Python as a Replacement for Commercial Stats PackagesHarold Henson
This brief lightening talk introduces the issues to be considered when deciding whether Python is a viable replacement for a commercial statistics package in a quantitative analysis shop
Reining in the Data ITAG tech360 Penn State Great Valley 2015 Andrew Schwabe
Social impact of the privacy crisis in the post snowden era. What we thought was secure has been compromised. We think we want anonymity, but that promotes bad activity.
Cybersecurity Strategies - time for the next generationHinne Hettema
In this talk, presented in June 2016 at KAIST, I argue that it is time for the next generation of cybersecurity strategies. These must have a governance focus, and be based on international laws, declarations and agreements, basic internet rights and public good provisions.
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
#2 Tech Talk on Security @ Refugees on Rails Berlin (Tue 8 Dec 2015)
A Cyber Security walk-through focused on current threats, trends and few predictions for 2016.
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
This presentation will analyze the Information Warfare scenarios, technical and legal backgrounds, highlighting as well the importance of the terminologies and bringing to the audience real-life examples and known incidents. The last part of the talk will focus on two theorical case studies and on one, very special, theorical case study.
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
Unfortunately, in recent years we’ve seen a host of incidences where IoT devices were compromised. Sometimes these have been minor with little coverage, while others like Mirai affected millions around the globe a produced serious economic impact. When attacks like this occur, they not only erode the trust of the users of these devices, but cause those who are looking to adopt this new technology to pause. With any new technology, security must be thought of as a first class citizen and when we are talking about IoT, the data is personal. As the IoT matures, I’ll share some mistakes that have happened in the past, where we are today and how I believe we are now finally seeing a maturity of devices that are remotely updated, fault tolerant and secure. When it comes to building an IoT device, security is personal.
The term “Internet of Things” refers to all those objects or
devices of everyday life that are connected to the Internet
and that have some kind of intelligence.
Cyber is one of our areas that we also promote in Must HighTech Expo. We invite you to participate in our virtual exhibitions, on different high tech thematic and especially on cybersecurity.
The "Virtual Coaching Institute"-Pitch during Hack for Health weekend! (May 0...Cain Ransbottyn
The second edition of #HackforHealth in MIC office @ Kortrijk was big fun! After 48 hours of hacking we had to pitch our idea: ViCoins, the virtual health currency! Including a complete working prototype platform connecting to many many many API's!
The live pitch can be viewed @ youtube: https://www.youtube.com/watch?v=_XNBh-OR2A0
#Smc040 @ransbottyn's Experiment: Social Media Product PlacementCain Ransbottyn
A good example was the provoking presentation by Cain Ransbottyn (@ransbottyn), famous in Belgium because his life is a ‘soap on social media’ which is well sponsored using product placement. With 85,000 followers on Twitter he is sure that each message he ‘dumps’ there is picked up one way or the other – and it doesn’t matter what way! His lifestyle is covered by his activities in social media, which usually are well planned and analysed. Of course there are many tricks and it is up to you if you like to use ‘white hat’ or ‘black hat’…
From spamming to profiled targetting! Spamming is easy! Convert your data to knowledge by using email! Know your customer! Personnalisation, relevance, social marketing
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
1. privacy is an illusion
and you’re all losers
or how 1984 was a manual for our panopticon society
!
By Cain Ransbottyn - @ransbottyn
2. End of privacy
•
9/11 attacks invigorated the
concept of terrorist threats
•
Post 9/11 there was a strong
and understandable argument
to prioritise security
3. End of civil liberties
•
New word: “asymmetrical
threats”
•
Actually means: “please give
up your civil liberties”, in 2001
55% US citizens were pro; in
2011 only 40% (and
declining).
•
Patriot Act changed the world
for good
4. So, terrorism huh ?
•
systematic use of violent
terror as a means of
coercion
•
violent acts which are
intended to create fear
(terror)
•
perpetrated for a religious,
political, or ideological goal
•
deliberately target or
disregard the safety of noncombatants (civilians)
6. Year on year doubling in surveillance
budget since the Patriot Act
Except for 2013, then there was a dark budget of US$ 52,6B
7. Fear. Uncertainty. Doubt.
•
Instilling fear is a premise for
coercion. But to whom ?
•
Mass media works as a
catalyst to bring fear in the
homes of citizens.
•
We all are very shitty at threat
and risk assessments. Pigs or
sharks ?
•
23,589
40
Or terrorist attacks ?
13,200
* 2010 facts and figures worldwide
8. Are we really capable of
understanding the real
threat level ?
Please demonstrate you can spot a rhetorical question when you see one
9. The convenience of circular
logic
•
Gov’t: We’re using
surveillance so we can
prevent terrorist attacks
You: I don’t see any terrorist
threat or attack
Gov’t: Awesome stuff, hey ?
•
Him: I’m using this repellent to
scare away elephants.
You: But I don’t see any
elephants.
Him: Awesome stuff, hey ?
12. PRISM, XKeyScore, Tempora
!
Thank you Microsoft, Facebook, Yahoo!, Google, Paltalk, YouTube, AOL,
Apple, Skype
Snowden leaks the post 2007 surveillance industry is much worse than anyone could have imagined
13. The rise of private
intelligence agencies
•
The welcome gift of “social
networks”
•
The thankful adoption rate of
smart phones
•
The cloud as the ultimate data
gathering extension to
governments
•
The phone operators remain a
loyal friend
•
The overt investment strategy of
In-Q-Tel
14. The In-Q-Tel investment firm
•
Founded 1999 as not-for-profit
venture capital firm
•
So… if you are not looking to make a
profit, what are you looking for then ?
•
Investments in data mining, call
recording, surveillance, crypto,
biotech, …
•
E.g. 2007 AT&T - Narus STA 6400
backdoor = product of In-Q-Tel
funded company
•
Many (many) participations
worldwide (also Belgium)
15. Social networks as a private
intelligence agency
•
Perfect front offices
•
Facebook as the first global
private intelligence agency
•
Otherwise hard to obtain intel
is being shared voluntarily by
everyone (e.g. hobbies, etc.)
•
US$ 12,7M investment by
James Breyer (Accel), former
colleague of Gilman Louie
(CEO In-Q-Tel)
16. Smart-phones as the
ultimate tracking device
•
Device you carry 24/7 with you.
With a GPS on board.
•
Android has remote install/deinstall
hooks in its OS (so has IOS)
•
OTA vulnerabilities allow remote
installs of byte patches (e.g.
Blackberry incident in UAE)
•
Apple incident (“the bug that
stored your whereabouts”)
•
Any idea how many address
books are stored on iCloud ? :p
17. Smart-phones as the
ultimate tracking device
Wi-Fi based positioning has become very accurate and quickly deployed mainstream
18. Cloud providers as the
perfect honeypot
•
There is no company that is so
invasive as Google
•
Records voice calls (Voice),
analyses e-mail (GMail), knows who
you talk to and where you are
(Android), has all your documents
(Drive) and soon will see through
your eyes (Glass)
•
Robert David Steele (CIA) disclosed
Google takes money from US Intel.
community.
•
In-Q-Tel and Google invest in
mutual companies (mutual interest)
19. Cloud providers as the
perfect honeypot
•
Not only Google. The latest
OSX Mavericks actually asked
me to… store my Keychain in
the cloud *sigh*
•
While Apple claims iMessage
cannot be intercepted, we
know it is possible because
Apple is the MITM and no
end-to-end crypto is used nor
certificate pinning.
20. The loyal friend, the phone
operator
•
Needs to be CALEA and ETSI
compliant. Yeah right :-)
•
Operators are both targets of
surveillance stakeholders (e.g.
Belgacom/BICS hack by GCHQ)
and providers of surveillance tactics
(taps, OTA installs, silent SMS, etc.)
•
Does KPN really trust NICE (Israel)
and does Belgacom really trust
Huawei (China) ?
•
Truth of the matter is: you cannot
trust your operator…
21. Privacy is for losers
If you think you have privacy,
you really are a loser
22. #dta
If a government needs to understand
its enemy, and we’re being surveilled.
Then, who exactly is the enemy ?
31. Requirements
•
Must provide strong crypto
•
Must be open source (GitHub)
•
Must be beautiful and easy to use, we
actually don’t want the user to be
confronted with complex crypto issues
•
Provide deniability
•
Provide alerting mechanisms that alert
the user when something is wrong
•
Even when your device is confiscated,
it should be able to withstand forensic
investigation
32. How it’s built
•
Using tor as transport layer for P2P
routing and provide anonymity (no
exit nodes used).
•
Obfuscated as HTTPS traffic to
prevent gov’t filtering.
•
Using OTR v3.1 to ensure perfect
forward secrecy and end-to-end
crypto.
•
Capable of detecting A5/GSM
tactical surveillance attacks.
•
Extremely effective anti forensic
mechanisms and triggers
35. Why use it ?
•
To protect your human right
on privacy
•
To protect your human right
on freedom of speech
•
Because your communication
needs to remain confidential
•
Because excessive
surveillance is a threat to
modern democracy
36. Privacy might be for losers, but
that doesn’t mean you are OK
to give up your human rights…