SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
(far) beyond the
      edge…




    Magdalena, Kurnik
“second brain”




      ?
“second brain”
“second brain”
ENS
ENS
Braak’s Hipothesis




--- Braak H. et al. Idiopathic Parkinson’s disease: possible routes by which vulnerableneuronal types my be subject to
neuroinvasion by an unknown pathogen, 2003 ---
---Hawkes C.H. et al. Review: Parkinson’s disease: a dual hit hypothesis, 2007 ---
Hacker (?)
Hacker (computer security) or cracker, who accesses
 a computer system by circumventing its security
 system
Hacker (hobbyist), who makes innovative
 customizations or combinations of retail electronic
 and computer equipment
Hacker (programmer subculture), who shares an anti-
 authoritarian approach to software development
 now associated with the free software movement



                      --- Wikipedia ---
Confidence
 is generally described as a state of being certain either
 that a hypothesis or prediction is correct or that a
 chosen course of action is the best or most effective




                       --- Wikipedia ---
Safety
 the condition of being protected against physical, social,
 spiritual, financial, political, emotional, occupational,
 psychological, educational or other types or
 consequences of failure, damage, error, accidents,
 harm or any other event which could be considered
 non-desirable
  the control of recognized hazards to achieve an
 acceptable level of risk. This can take the form of being
 protected from the event or from exposure to something
 that causes health or economical losses



                       --- Wikipedia ---
Health

The World Health Organization (1946)
"a state of complete physical, mental, and
  social well-being and not merely the
  absence of disease or infirmity"
-  In 2000, an estimated 9.6 million children aged less
   than 5 years died worldwide, from pneumonia,
   prematurity, diarrhoeal disease, malaria, measles. By
   2010, annual child deaths had been reduced to 7.6
   million.
-  Somewhere in the world every two minutes, a woman
   dies from pregnancy or childbirth- related causes. One
   third of all these maternal deaths take place in just two
   countries: India with 20% and Nigeria with 14% of the
   global total deaths.
-  Worldwide, 2.8 million people die each year as a result
   of being overweight or obese. Between 1980 and
   2008, the worldwide prevalence of obesity (body mass
   index ≥30 kg m2) almost doubled.
A new report on the Health Behaviour in School-aged
Children (HBSC) study, published by the WHO Regional
            Office for Europe (May, 2012)

http://www.euro.who.int/en/what-we-publish/
  information-for-the-media/sections/latest-press-
  releases/who-report-reveals-teenagers-do-not-
  get-a-fair-deal-on-health




                       --- WHO ---
Cancer – key facts
- Cancer is a leading cause of death worldwide,
accounting for 7.6 million deaths (around 13% of all
deaths) in 2008.
- Lung, stomach, liver, colon and breast cancer cause
the most cancer deaths each year.
- About 70% of all cancer deaths in 2008 occurred in
low- and middle-income countries.
- Deaths from cancer worldwide are projected to
continue rising, with an estimated 13.1 million deaths
in 2030.
Risk factors for cancer
- tobacco use
 - chronic infections with viruses such as hepatitis B
(liver cancer) and human papilloma (cervical cancer)
- being overweight or obese
- radiation
- some dietary factors
- physical inactivity
- harmful use of alcohol
- some occupational exposures
- various environmental chemicals

                        --- WHO ---
-  In 2009, average per capita expenditures varied
   substantially from US$ 25 in low-income countries to
   US$ 4692 in high-income countries.
-  The High Level Taskforce on Innovative International
   Financing for Health Systems suggested that, on
   average, a low-income country would have to spend a
   minimum of US$ 44 per capita to ensure all people
   had access to a set of essential health services.
   However, 29 countries spent less than this minimum
   recommended amount…




                        --- WHO ---
…concusions?!


          …perspectives?!


                   …resolutions?!
Thank you

Contenu connexe

En vedette

Manipulating memory for fun and profit
Manipulating memory for fun and profitManipulating memory for fun and profit
Manipulating memory for fun and profitYury Chemerkin
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityYury Chemerkin
 
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Yury Chemerkin
 
Black berry playbook security part two - blackberry bridge
Black berry playbook security   part two - blackberry bridgeBlack berry playbook security   part two - blackberry bridge
Black berry playbook security part two - blackberry bridgeYury Chemerkin
 
Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013Yury Chemerkin
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Appendix d (digital) fqd ns
Appendix d (digital)   fqd nsAppendix d (digital)   fqd ns
Appendix d (digital) fqd nsYury Chemerkin
 
Comment crew indicators of compromise
Comment crew indicators of compromiseComment crew indicators of compromise
Comment crew indicators of compromiseYury Chemerkin
 

En vedette (8)

Manipulating memory for fun and profit
Manipulating memory for fun and profitManipulating memory for fun and profit
Manipulating memory for fun and profit
 
The stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capabilityThe stuxnet computer worm. harbinger of an emerging warfare capability
The stuxnet computer worm. harbinger of an emerging warfare capability
 
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
Security Vulnerability Notice SE-2012-01-PUBLIC [Security vulnerabilities in ...
 
Black berry playbook security part two - blackberry bridge
Black berry playbook security   part two - blackberry bridgeBlack berry playbook security   part two - blackberry bridge
Black berry playbook security part two - blackberry bridge
 
Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013Cyber security regulation strictly regulated by nrc feb 2013
Cyber security regulation strictly regulated by nrc feb 2013
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Appendix d (digital) fqd ns
Appendix d (digital)   fqd nsAppendix d (digital)   fqd ns
Appendix d (digital) fqd ns
 
Comment crew indicators of compromise
Comment crew indicators of compromiseComment crew indicators of compromise
Comment crew indicators of compromise
 

Similaire à Magdalena kurnik. discussion panel – en – hackers. beyond the edge

Alternative mental health therapies in prolonged lockdowns: narratives from C...
Alternative mental health therapies in prolonged lockdowns: narratives from C...Alternative mental health therapies in prolonged lockdowns: narratives from C...
Alternative mental health therapies in prolonged lockdowns: narratives from C...Petar Radanliev
 
COVID-19: What went right, what went wrong and how do we learn from this?
COVID-19: What went right, what went wrong and how do we learn from this?  COVID-19: What went right, what went wrong and how do we learn from this?
COVID-19: What went right, what went wrong and how do we learn from this? John Middleton
 
Harvard global economic burden non communicable diseases 2011
Harvard global economic burden non communicable diseases  2011Harvard global economic burden non communicable diseases  2011
Harvard global economic burden non communicable diseases 2011paulovseabra
 
What is public health?
What is public health? What is public health?
What is public health? John Middleton
 
Medico Economic Correlation- World
Medico Economic Correlation- WorldMedico Economic Correlation- World
Medico Economic Correlation- WorldDr Neelesh Bhandari
 
Mundo Offshore - Coronavirus update - Luigi Wewege article (English)
Mundo Offshore - Coronavirus update - Luigi Wewege article (English)Mundo Offshore - Coronavirus update - Luigi Wewege article (English)
Mundo Offshore - Coronavirus update - Luigi Wewege article (English)Luigi Wewege
 
Stienstra - Cooperation in public health good for global economy
Stienstra - Cooperation in public health good for global economyStienstra - Cooperation in public health good for global economy
Stienstra - Cooperation in public health good for global economyStef Stienstra
 
The practice of predictive analytics in healthcare
The practice of predictive analytics in healthcareThe practice of predictive analytics in healthcare
The practice of predictive analytics in healthcareGopalakrishna Palem
 
Save the planet or save the NHS?
Save the planet  or save the NHS?Save the planet  or save the NHS?
Save the planet or save the NHS?John Middleton
 
The Coronavirus Pandemic as a Modern Morality Play: Challenges for Social Psy...
The Coronavirus Pandemic as a Modern Morality Play: Challenges for Social Psy...The Coronavirus Pandemic as a Modern Morality Play: Challenges for Social Psy...
The Coronavirus Pandemic as a Modern Morality Play: Challenges for Social Psy...Université de Montréal
 
A brief on coronavirus
A brief on coronavirusA brief on coronavirus
A brief on coronavirusArsh Singh
 
Neglected Tropical Diseases (NTDs)
Neglected Tropical Diseases (NTDs)Neglected Tropical Diseases (NTDs)
Neglected Tropical Diseases (NTDs)Updesh Yadav
 
Global%20disease
Global%20diseaseGlobal%20disease
Global%20diseasePaul Vidal
 
Review of Recent COVID-19 Science ~ Denis G. Rancourt, PhD
Review of Recent COVID-19 Science ~ Denis G. Rancourt, PhDReview of Recent COVID-19 Science ~ Denis G. Rancourt, PhD
Review of Recent COVID-19 Science ~ Denis G. Rancourt, PhDPandataAnalytics
 

Similaire à Magdalena kurnik. discussion panel – en – hackers. beyond the edge (20)

Alternative mental health therapies in prolonged lockdowns: narratives from C...
Alternative mental health therapies in prolonged lockdowns: narratives from C...Alternative mental health therapies in prolonged lockdowns: narratives from C...
Alternative mental health therapies in prolonged lockdowns: narratives from C...
 
COVID-19: What went right, what went wrong and how do we learn from this?
COVID-19: What went right, what went wrong and how do we learn from this?  COVID-19: What went right, what went wrong and how do we learn from this?
COVID-19: What went right, what went wrong and how do we learn from this?
 
INTG Project (1)
INTG Project (1)INTG Project (1)
INTG Project (1)
 
Harvard global economic burden non communicable diseases 2011
Harvard global economic burden non communicable diseases  2011Harvard global economic burden non communicable diseases  2011
Harvard global economic burden non communicable diseases 2011
 
Health system
Health systemHealth system
Health system
 
IE: Question A
IE: Question AIE: Question A
IE: Question A
 
What is public health?
What is public health? What is public health?
What is public health?
 
Medico Economic Correlation- World
Medico Economic Correlation- WorldMedico Economic Correlation- World
Medico Economic Correlation- World
 
15 Role of epidemiology in public health
15 Role of epidemiology in public health15 Role of epidemiology in public health
15 Role of epidemiology in public health
 
Mundo Offshore - Coronavirus update - Luigi Wewege article (English)
Mundo Offshore - Coronavirus update - Luigi Wewege article (English)Mundo Offshore - Coronavirus update - Luigi Wewege article (English)
Mundo Offshore - Coronavirus update - Luigi Wewege article (English)
 
Fairer world for a healthier and safer world
Fairer world for a healthier and safer worldFairer world for a healthier and safer world
Fairer world for a healthier and safer world
 
Stienstra - Cooperation in public health good for global economy
Stienstra - Cooperation in public health good for global economyStienstra - Cooperation in public health good for global economy
Stienstra - Cooperation in public health good for global economy
 
The practice of predictive analytics in healthcare
The practice of predictive analytics in healthcareThe practice of predictive analytics in healthcare
The practice of predictive analytics in healthcare
 
2020 09 01 Vaccination
2020 09 01 Vaccination2020 09 01 Vaccination
2020 09 01 Vaccination
 
Save the planet or save the NHS?
Save the planet  or save the NHS?Save the planet  or save the NHS?
Save the planet or save the NHS?
 
The Coronavirus Pandemic as a Modern Morality Play: Challenges for Social Psy...
The Coronavirus Pandemic as a Modern Morality Play: Challenges for Social Psy...The Coronavirus Pandemic as a Modern Morality Play: Challenges for Social Psy...
The Coronavirus Pandemic as a Modern Morality Play: Challenges for Social Psy...
 
A brief on coronavirus
A brief on coronavirusA brief on coronavirus
A brief on coronavirus
 
Neglected Tropical Diseases (NTDs)
Neglected Tropical Diseases (NTDs)Neglected Tropical Diseases (NTDs)
Neglected Tropical Diseases (NTDs)
 
Global%20disease
Global%20diseaseGlobal%20disease
Global%20disease
 
Review of Recent COVID-19 Science ~ Denis G. Rancourt, PhD
Review of Recent COVID-19 Science ~ Denis G. Rancourt, PhDReview of Recent COVID-19 Science ~ Denis G. Rancourt, PhD
Review of Recent COVID-19 Science ~ Denis G. Rancourt, PhD
 

Plus de Yury Chemerkin

Red october. detailed malware description
Red october. detailed malware descriptionRed october. detailed malware description
Red october. detailed malware descriptionYury Chemerkin
 
Appendix g iocs readme
Appendix g iocs readmeAppendix g iocs readme
Appendix g iocs readmeYury Chemerkin
 
Appendix f (digital) ssl certificates
Appendix f (digital)   ssl certificatesAppendix f (digital)   ssl certificates
Appendix f (digital) ssl certificatesYury Chemerkin
 
Appendix e (digital) md5s
Appendix e (digital)   md5sAppendix e (digital)   md5s
Appendix e (digital) md5sYury Chemerkin
 
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f6016071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f601Yury Chemerkin
 
Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Yury Chemerkin
 
Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Yury Chemerkin
 
Stuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesStuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesYury Chemerkin
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedYury Chemerkin
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirusYury Chemerkin
 
Six months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesSix months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesYury Chemerkin
 
Security configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesSecurity configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesYury Chemerkin
 
Render man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisRender man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisYury Chemerkin
 
Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...Yury Chemerkin
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchYury Chemerkin
 
Krzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comesKrzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comesYury Chemerkin
 
John “captain crunch” draper. history of hacking
John “captain crunch” draper. history of hackingJohn “captain crunch” draper. history of hacking
John “captain crunch” draper. history of hackingYury Chemerkin
 
How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsYury Chemerkin
 

Plus de Yury Chemerkin (20)

Red october. detailed malware description
Red october. detailed malware descriptionRed october. detailed malware description
Red october. detailed malware description
 
Appendix g iocs readme
Appendix g iocs readmeAppendix g iocs readme
Appendix g iocs readme
 
Appendix f (digital) ssl certificates
Appendix f (digital)   ssl certificatesAppendix f (digital)   ssl certificates
Appendix f (digital) ssl certificates
 
Appendix e (digital) md5s
Appendix e (digital)   md5sAppendix e (digital)   md5s
Appendix e (digital) md5s
 
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f6016071f3f4 40e6-4c7b-8868-3b0b21a9f601
6071f3f4 40e6-4c7b-8868-3b0b21a9f601
 
Jp3 13
Jp3 13Jp3 13
Jp3 13
 
Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...Zane lackey. security at scale. web application security in a continuous depl...
Zane lackey. security at scale. web application security in a continuous depl...
 
Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...Windows 8. important considerations for computer forensics and electronic dis...
Windows 8. important considerations for computer forensics and electronic dis...
 
Stuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realitiesStuxnet. analysis, myths, realities
Stuxnet. analysis, myths, realities
 
Stuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learnedStuxnet redux. malware attribution & lessons learned
Stuxnet redux. malware attribution & lessons learned
 
Sophos ransom ware fake antivirus
Sophos ransom ware fake antivirusSophos ransom ware fake antivirus
Sophos ransom ware fake antivirus
 
Six months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sitesSix months later – a report card on google’s demotion of pirate sites
Six months later – a report card on google’s demotion of pirate sites
 
Security configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devicesSecurity configuration recommendations for apple i os 5 devices
Security configuration recommendations for apple i os 5 devices
 
Render man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of thisRender man. hacker + airplanes = no good can come of this
Render man. hacker + airplanes = no good can come of this
 
Msft oracle brief
Msft oracle briefMsft oracle brief
Msft oracle brief
 
Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...Mario heiderich. got your nose! how to steal your precious data without using...
Mario heiderich. got your nose! how to steal your precious data without using...
 
Luiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitchLuiz eduardo. introduction to mobile snitch
Luiz eduardo. introduction to mobile snitch
 
Krzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comesKrzysztof kotowicz. something wicked this way comes
Krzysztof kotowicz. something wicked this way comes
 
John “captain crunch” draper. history of hacking
John “captain crunch” draper. history of hackingJohn “captain crunch” draper. history of hacking
John “captain crunch” draper. history of hacking
 
How stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systemsHow stuxnet spreads – a study of infection paths in best practice systems
How stuxnet spreads – a study of infection paths in best practice systems
 

Dernier

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Magdalena kurnik. discussion panel – en – hackers. beyond the edge

  • 1. (far) beyond the edge… Magdalena, Kurnik
  • 5. ENS
  • 6. ENS
  • 7. Braak’s Hipothesis --- Braak H. et al. Idiopathic Parkinson’s disease: possible routes by which vulnerableneuronal types my be subject to neuroinvasion by an unknown pathogen, 2003 --- ---Hawkes C.H. et al. Review: Parkinson’s disease: a dual hit hypothesis, 2007 ---
  • 8. Hacker (?) Hacker (computer security) or cracker, who accesses a computer system by circumventing its security system Hacker (hobbyist), who makes innovative customizations or combinations of retail electronic and computer equipment Hacker (programmer subculture), who shares an anti- authoritarian approach to software development now associated with the free software movement --- Wikipedia ---
  • 9. Confidence is generally described as a state of being certain either that a hypothesis or prediction is correct or that a chosen course of action is the best or most effective --- Wikipedia ---
  • 10. Safety the condition of being protected against physical, social, spiritual, financial, political, emotional, occupational, psychological, educational or other types or consequences of failure, damage, error, accidents, harm or any other event which could be considered non-desirable the control of recognized hazards to achieve an acceptable level of risk. This can take the form of being protected from the event or from exposure to something that causes health or economical losses --- Wikipedia ---
  • 11. Health The World Health Organization (1946) "a state of complete physical, mental, and social well-being and not merely the absence of disease or infirmity"
  • 12. -  In 2000, an estimated 9.6 million children aged less than 5 years died worldwide, from pneumonia, prematurity, diarrhoeal disease, malaria, measles. By 2010, annual child deaths had been reduced to 7.6 million. -  Somewhere in the world every two minutes, a woman dies from pregnancy or childbirth- related causes. One third of all these maternal deaths take place in just two countries: India with 20% and Nigeria with 14% of the global total deaths. -  Worldwide, 2.8 million people die each year as a result of being overweight or obese. Between 1980 and 2008, the worldwide prevalence of obesity (body mass index ≥30 kg m2) almost doubled.
  • 13. A new report on the Health Behaviour in School-aged Children (HBSC) study, published by the WHO Regional Office for Europe (May, 2012) http://www.euro.who.int/en/what-we-publish/ information-for-the-media/sections/latest-press- releases/who-report-reveals-teenagers-do-not- get-a-fair-deal-on-health --- WHO ---
  • 14. Cancer – key facts - Cancer is a leading cause of death worldwide, accounting for 7.6 million deaths (around 13% of all deaths) in 2008. - Lung, stomach, liver, colon and breast cancer cause the most cancer deaths each year. - About 70% of all cancer deaths in 2008 occurred in low- and middle-income countries. - Deaths from cancer worldwide are projected to continue rising, with an estimated 13.1 million deaths in 2030.
  • 15. Risk factors for cancer - tobacco use - chronic infections with viruses such as hepatitis B (liver cancer) and human papilloma (cervical cancer) - being overweight or obese - radiation - some dietary factors - physical inactivity - harmful use of alcohol - some occupational exposures - various environmental chemicals --- WHO ---
  • 16. -  In 2009, average per capita expenditures varied substantially from US$ 25 in low-income countries to US$ 4692 in high-income countries. -  The High Level Taskforce on Innovative International Financing for Health Systems suggested that, on average, a low-income country would have to spend a minimum of US$ 44 per capita to ensure all people had access to a set of essential health services. However, 29 countries spent less than this minimum recommended amount… --- WHO ---
  • 17. …concusions?! …perspectives?! …resolutions?!