Mobile-First SEO - The Marketers Edition #3XEDigitalAleyda Solís
How to target your SEO process to a reality of more people searching on mobile devices than desktop and an upcoming mobile first Google index? Check it out.
Join our #CreditChat every Wednesday at 3 p.m. ET on Twitter and YouTube. This week, we discussed the road to financial wellness. Our #CreditChat panel included Jason Vitug – Founder of Phroogal.com, and Dr. Barbara O’Neill- CFP®, Distinguished Professor, and Specialist in Financial Resource Management, Rutgers Cooperative Extension, Carey Ransom- CMO of Payoff.We were also joined by several influencers in the personal finance community on Twitter. This deck features tips from: @FSAstore, @AFCPE, @OperationHOPE, @dougboneparth, @LeslieHTayneEsq, @SFCUNews, @emergebenefit, @PhiladelphiaF.E.C., @Rod_Griffin, @URMoneyMentor, @UncommonJules, @PiggieBanker, Phroogal, @MoneyCrashers, @Kasasa, @Payoff, @DaHartattack, @firstqfinance, @_MoneySavingPro, @DearDebtBlog, and @Moneytalk1
The document discusses adopting a new mindset for the new year by rejecting your old self and default attitudes, listening to new perspectives, favoring expanded awareness, finding the shortest paths, and transforming your mindset into a gate of freedom.
This document discusses better collaboration between agencies and clients. It notes that historically, agencies did not provide clients with a full understanding of the creative process or ideas, and clients did not know how to properly evaluate work. It advocates that agencies start presentations with the agreed upon creative brief to provide necessary context before presenting ideas. Agencies should tell a story that bridges the brief to the final idea, giving clients a complete understanding. The document also provides models for properly evaluating ideas and ensuring collaborative discussions between agencies and clients.
Using ChatGPT can be helpful in presentations to explain concepts in easy-to-understand terms.
Pairing that with Dall-E 2 can make your slides fun and interesting.
What does the future look like? Is it a dark space where we’re suffering from varying degrees of techamphetamine or are we heading towards a Utopian fantasy of abundance and harmony?
Understanding that our basic human needs and wants barely change, we explore the future state of a range of topics; from our need for physical sustenance through to our age-long fascination of transcending the limitations of our biology.
Looking at the future from a human perspective, our potential for greatness is teetering on a fine line between darkness and hope. We’re banking on the latter.
Fight for Yourself: How to Sell Your Ideas and Crush PresentationsDigital Surgeons
Don't let your blood, sweat, and pixels be overlooked, great creative doesn't sell itself.
Every presentation is a story, an opportunity to sell not just your work, but what people actually buy — YOU.
This presentation will walk viewers through three core aspects of winning at any presentation, Confidence, Comprehension, and Conviction.
These concepts, central to your work as a creative professional, are backed by science and bolstered by thoughts from some of the world’s leading creative professionals.
With everyone claiming to be an expert should you listen to? This list of 103 marketing thought leaders is made to help answer that question. It's also incorporated into Twitter lists so you can easily follow everyone with a single click.
Mobile-First SEO - The Marketers Edition #3XEDigitalAleyda Solís
How to target your SEO process to a reality of more people searching on mobile devices than desktop and an upcoming mobile first Google index? Check it out.
Join our #CreditChat every Wednesday at 3 p.m. ET on Twitter and YouTube. This week, we discussed the road to financial wellness. Our #CreditChat panel included Jason Vitug – Founder of Phroogal.com, and Dr. Barbara O’Neill- CFP®, Distinguished Professor, and Specialist in Financial Resource Management, Rutgers Cooperative Extension, Carey Ransom- CMO of Payoff.We were also joined by several influencers in the personal finance community on Twitter. This deck features tips from: @FSAstore, @AFCPE, @OperationHOPE, @dougboneparth, @LeslieHTayneEsq, @SFCUNews, @emergebenefit, @PhiladelphiaF.E.C., @Rod_Griffin, @URMoneyMentor, @UncommonJules, @PiggieBanker, Phroogal, @MoneyCrashers, @Kasasa, @Payoff, @DaHartattack, @firstqfinance, @_MoneySavingPro, @DearDebtBlog, and @Moneytalk1
The document discusses adopting a new mindset for the new year by rejecting your old self and default attitudes, listening to new perspectives, favoring expanded awareness, finding the shortest paths, and transforming your mindset into a gate of freedom.
This document discusses better collaboration between agencies and clients. It notes that historically, agencies did not provide clients with a full understanding of the creative process or ideas, and clients did not know how to properly evaluate work. It advocates that agencies start presentations with the agreed upon creative brief to provide necessary context before presenting ideas. Agencies should tell a story that bridges the brief to the final idea, giving clients a complete understanding. The document also provides models for properly evaluating ideas and ensuring collaborative discussions between agencies and clients.
Using ChatGPT can be helpful in presentations to explain concepts in easy-to-understand terms.
Pairing that with Dall-E 2 can make your slides fun and interesting.
What does the future look like? Is it a dark space where we’re suffering from varying degrees of techamphetamine or are we heading towards a Utopian fantasy of abundance and harmony?
Understanding that our basic human needs and wants barely change, we explore the future state of a range of topics; from our need for physical sustenance through to our age-long fascination of transcending the limitations of our biology.
Looking at the future from a human perspective, our potential for greatness is teetering on a fine line between darkness and hope. We’re banking on the latter.
Fight for Yourself: How to Sell Your Ideas and Crush PresentationsDigital Surgeons
Don't let your blood, sweat, and pixels be overlooked, great creative doesn't sell itself.
Every presentation is a story, an opportunity to sell not just your work, but what people actually buy — YOU.
This presentation will walk viewers through three core aspects of winning at any presentation, Confidence, Comprehension, and Conviction.
These concepts, central to your work as a creative professional, are backed by science and bolstered by thoughts from some of the world’s leading creative professionals.
With everyone claiming to be an expert should you listen to? This list of 103 marketing thought leaders is made to help answer that question. It's also incorporated into Twitter lists so you can easily follow everyone with a single click.
Top Productivity Working Hacks by Jan RezabJan Rezab
This document provides productivity tips from Jan Rezab, a serial entrepreneur. Some key points include:
- Manage time by thinking in "blocks" of one hour and maximizing productivity in each block.
- Use tools like Wunderlist, Podio and Slack for communication and organization in addition to email.
- Design meetings purposefully with clear agendas and action items. Follow up immediately.
- Find ways to be productive during activities like driving or flights by taking calls or responding to emails.
- Hiring an excellent assistant can help optimize schedules and respond to urgent requests so the entrepreneur's time is freed up.
The document discusses best practices for libraries to embrace social media and online engagement. It recommends that libraries 1) listen to their communities online, 2) use basic online communication tools like adding pictures and being conversational, and 3) get involved in doing community events with less control and more interaction. The goal is to transform libraries into places that have more face-to-face interactions and connections by being present online.
Design for Startups - Build Better Products, Not More FeaturesVitaly Golomb
Pre-order Vitaly's book "Accelerated Startup – The New Business School" http://golomb.net/book
Apple owes the title of the world’s most valuable company to its genius in design. Good design is never accidental and at the core of a successful product is an elegant solution to a painful problem. Design has earned a very important seat at the table with today’s companies especially in the world of software and apps. In this highly engaging presentation, Vitaly covers principles and business value of good design, design disciplines, how to hire and work with designers, and the design success formula.
ChatGPT and RPA (Robotic Process Automation) can indeed be combined to create a new tech revolution. RPA is a technology that allows for the automation of repetitive tasks by using software robots, freeing up human employees to focus on more complex and creative work.
When combined with ChatGPT, which is an advanced language processing model, the automation possibilities become even greater. ChatGPT can be used to understand and respond to natural language input, allowing RPA bots to interact with users in a more human-like manner. Read this presentation to know more.
This document discusses different types of hackers - white hat hackers who use their skills ethically for security purposes, black hat hackers who hack illegally such as for credit card theft, and grey hat hackers who sometimes act ethically and sometimes not. It defines ethical hacking as using programming skills to test vulnerabilities in computer systems through penetration testing. The document outlines different hacking methods like website, email, and password hacking and computer hacking. It notes both advantages of ethical hacking for security and disadvantages of unethical hacking.
Will you fly for food? The best way to explore a new city is to eat your way through it! BayAreaEats shares the best spots to indulge in your love for food- from New York, Austin, Seattle, Chicago and more. Hotel tips and restaurant recommendations included!
For more: www.sfbayareaeats.com
This document summarizes the key findings of a study conducted by Newsworks and PwC on attention to different media types. The study found that traditional print and broadcast media receive more focused attention from consumers compared to digital media. Specifically, newspaper readers were more likely to regularly set time aside for newspapers, feel personally connected to them, and trust their content more than most other media. The sustained attention received made newspaper readers more likely to discuss issues they read about and be influenced regarding purchases. Overall, the study showed that traditional media with higher attention levels can have a more powerful impact on consumers than digital media with less focused attention.
Habits at Work - Merci Victoria Grace, Growth, Slack - 2016 Habit SummitHabit Summit
Presented at the 2016 Habit Summit at Stanford (see: www.HabitSummit.com)
Merci Victoria Grace leads the Growth team at Slack.
Prior to joining Slack, she started a venture-backed game company, designed The Sims Social at Electronic Arts, and worked at a range of consumer, mobile and enterprise startups.
Here she shares insights on putting "Habits to Work at Work".
This document provides a summary of fundraising rounds for AI and data startups in Europe in 2016. Some key findings include:
- Over 270 startups raised $774 million in 2016, up from $583 million in 2015.
- The average funding round was $3.7 million.
- France and the UK led fundraising totals, with 108 startups in the UK raising $188 million and 37 startups in France raising $118 million.
- Early stage investments boomed, with $215 million invested in 170 early stage startups.
- In 2016, focus shifted from marketing applications to technologies using natural language processing, speech recognition and other AI techniques, as well as applications in healthcare, agriculture and other industries
This document provides tips to avoid common mistakes in PowerPoint presentation design. It identifies the top 5 mistakes as including putting too much information on slides, not using enough visuals, using poor quality or unreadable visuals, having messy slides with poor spacing and alignment, and not properly preparing and practicing the presentation. The document encourages presenters to use fewer words per slide, high quality images and charts, consistent formatting, and to spend significant time crafting an engaging narrative and rehearsing their presentation. It emphasizes that an attractive design is not as important as being an effective storyteller.
Going in for your next big creative pitch? Here are 8 secrets (inspired by the "best closer", Harvey Specter from Suits) that will help you get the "YES"!
How to Become a Thought Leader in Your NicheLeslie Samuel
Are bloggers thought leaders? Here are some tips on how you can become one. Provide great value, put awesome content out there on a regular basis, and help others.
This document provides a guide to growing your first 10,000 customers through content marketing. It begins with explaining why content marketing is important for startups and e-commerce sites. It then defines content marketing as non-interruptive communication that makes buyers more intelligent without directly selling. Various content types are discussed. Steps are given to create awesome content, including developing a statement of value and ideal customer outcome. Measurement tools are recommended to test strategies and case studies provided. The presentation concludes with a Q&A and additional resources.
Three metaphors in B2B content marketing and how they can lead you astray. Content Marketing is guided by the language we use to describe our activities. So metaphors can really shape our thinking. Three in particular are widely used and can be misleading.
The document appears to be a presentation about ChatGPT and its capabilities. It discusses ChatGPT's uses for writing books, programming, and answering questions. It also covers Microsoft's investments in AI over time, demonstrations of using ChatGPT with Office 365, and the potential impacts of ChatGPT and AI technologies on society.
What Is Insight? The Five Principles of Effective Insight DefinitionJonathan Dalton
As customer experiences take center stage so does the need for more profound and compelling insight definition. Insights form the cornerstone of the design and innovation process, a lighthouse for what you should do next, and a catalyst for creating new value for your customers. Learn how to master the critical process of insight definition with THRIVE's latest Yellow Paper.
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
Author: Dr Sandeep Sood
Password-based authentication is used in online web applications due to its simplicity and convenience. Efficient password-based authentication schemes are required to authenticate the legitimacy of remote users, or data origin over an insecure communication channel. Password-based authentication schemes are highly susceptible to phishing attacks.
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...Edureka!
** Machine Learning Engineer Masters Program: https://www.edureka.co/masters-program/machine-learning-engineer-training **
This tutorial on Artificial Intelligence gives you a brief introduction to AI discussing how it can be a threat as well as useful. This tutorial covers the following topics:
1. AI as a threat
2. What is AI?
3. History of AI
4. Machine Learning & Deep Learning examples
5. Dependency on AI
6.Applications of AI
7. AI Course at Edureka - https://goo.gl/VWNeAu
For more information, please write back to us at sales@edureka.co
Call us at IN: 9606058406 / US: 18338555775
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Google continues to dominate search and increase its share. According to data, Google's core search increased 5.9% from October 2016 to May 2017 while its closest competitors like Yahoo and Bing declined. Google distributes search traffic relatively evenly across sites while Facebook and YouTube tend to concentrate traffic on very large sites. Reddit and YouTube send the majority of their referral traffic to just a handful of top sites.
Top Productivity Working Hacks by Jan RezabJan Rezab
This document provides productivity tips from Jan Rezab, a serial entrepreneur. Some key points include:
- Manage time by thinking in "blocks" of one hour and maximizing productivity in each block.
- Use tools like Wunderlist, Podio and Slack for communication and organization in addition to email.
- Design meetings purposefully with clear agendas and action items. Follow up immediately.
- Find ways to be productive during activities like driving or flights by taking calls or responding to emails.
- Hiring an excellent assistant can help optimize schedules and respond to urgent requests so the entrepreneur's time is freed up.
The document discusses best practices for libraries to embrace social media and online engagement. It recommends that libraries 1) listen to their communities online, 2) use basic online communication tools like adding pictures and being conversational, and 3) get involved in doing community events with less control and more interaction. The goal is to transform libraries into places that have more face-to-face interactions and connections by being present online.
Design for Startups - Build Better Products, Not More FeaturesVitaly Golomb
Pre-order Vitaly's book "Accelerated Startup – The New Business School" http://golomb.net/book
Apple owes the title of the world’s most valuable company to its genius in design. Good design is never accidental and at the core of a successful product is an elegant solution to a painful problem. Design has earned a very important seat at the table with today’s companies especially in the world of software and apps. In this highly engaging presentation, Vitaly covers principles and business value of good design, design disciplines, how to hire and work with designers, and the design success formula.
ChatGPT and RPA (Robotic Process Automation) can indeed be combined to create a new tech revolution. RPA is a technology that allows for the automation of repetitive tasks by using software robots, freeing up human employees to focus on more complex and creative work.
When combined with ChatGPT, which is an advanced language processing model, the automation possibilities become even greater. ChatGPT can be used to understand and respond to natural language input, allowing RPA bots to interact with users in a more human-like manner. Read this presentation to know more.
This document discusses different types of hackers - white hat hackers who use their skills ethically for security purposes, black hat hackers who hack illegally such as for credit card theft, and grey hat hackers who sometimes act ethically and sometimes not. It defines ethical hacking as using programming skills to test vulnerabilities in computer systems through penetration testing. The document outlines different hacking methods like website, email, and password hacking and computer hacking. It notes both advantages of ethical hacking for security and disadvantages of unethical hacking.
Will you fly for food? The best way to explore a new city is to eat your way through it! BayAreaEats shares the best spots to indulge in your love for food- from New York, Austin, Seattle, Chicago and more. Hotel tips and restaurant recommendations included!
For more: www.sfbayareaeats.com
This document summarizes the key findings of a study conducted by Newsworks and PwC on attention to different media types. The study found that traditional print and broadcast media receive more focused attention from consumers compared to digital media. Specifically, newspaper readers were more likely to regularly set time aside for newspapers, feel personally connected to them, and trust their content more than most other media. The sustained attention received made newspaper readers more likely to discuss issues they read about and be influenced regarding purchases. Overall, the study showed that traditional media with higher attention levels can have a more powerful impact on consumers than digital media with less focused attention.
Habits at Work - Merci Victoria Grace, Growth, Slack - 2016 Habit SummitHabit Summit
Presented at the 2016 Habit Summit at Stanford (see: www.HabitSummit.com)
Merci Victoria Grace leads the Growth team at Slack.
Prior to joining Slack, she started a venture-backed game company, designed The Sims Social at Electronic Arts, and worked at a range of consumer, mobile and enterprise startups.
Here she shares insights on putting "Habits to Work at Work".
This document provides a summary of fundraising rounds for AI and data startups in Europe in 2016. Some key findings include:
- Over 270 startups raised $774 million in 2016, up from $583 million in 2015.
- The average funding round was $3.7 million.
- France and the UK led fundraising totals, with 108 startups in the UK raising $188 million and 37 startups in France raising $118 million.
- Early stage investments boomed, with $215 million invested in 170 early stage startups.
- In 2016, focus shifted from marketing applications to technologies using natural language processing, speech recognition and other AI techniques, as well as applications in healthcare, agriculture and other industries
This document provides tips to avoid common mistakes in PowerPoint presentation design. It identifies the top 5 mistakes as including putting too much information on slides, not using enough visuals, using poor quality or unreadable visuals, having messy slides with poor spacing and alignment, and not properly preparing and practicing the presentation. The document encourages presenters to use fewer words per slide, high quality images and charts, consistent formatting, and to spend significant time crafting an engaging narrative and rehearsing their presentation. It emphasizes that an attractive design is not as important as being an effective storyteller.
Going in for your next big creative pitch? Here are 8 secrets (inspired by the "best closer", Harvey Specter from Suits) that will help you get the "YES"!
How to Become a Thought Leader in Your NicheLeslie Samuel
Are bloggers thought leaders? Here are some tips on how you can become one. Provide great value, put awesome content out there on a regular basis, and help others.
This document provides a guide to growing your first 10,000 customers through content marketing. It begins with explaining why content marketing is important for startups and e-commerce sites. It then defines content marketing as non-interruptive communication that makes buyers more intelligent without directly selling. Various content types are discussed. Steps are given to create awesome content, including developing a statement of value and ideal customer outcome. Measurement tools are recommended to test strategies and case studies provided. The presentation concludes with a Q&A and additional resources.
Three metaphors in B2B content marketing and how they can lead you astray. Content Marketing is guided by the language we use to describe our activities. So metaphors can really shape our thinking. Three in particular are widely used and can be misleading.
The document appears to be a presentation about ChatGPT and its capabilities. It discusses ChatGPT's uses for writing books, programming, and answering questions. It also covers Microsoft's investments in AI over time, demonstrations of using ChatGPT with Office 365, and the potential impacts of ChatGPT and AI technologies on society.
What Is Insight? The Five Principles of Effective Insight DefinitionJonathan Dalton
As customer experiences take center stage so does the need for more profound and compelling insight definition. Insights form the cornerstone of the design and innovation process, a lighthouse for what you should do next, and a catalyst for creating new value for your customers. Learn how to master the critical process of insight definition with THRIVE's latest Yellow Paper.
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
How can we take UX and Data Storytelling out of the tech context and use them to change the way government behaves?
Showcasing the truth is the highest goal of data storytelling. Because the design of a chart can affect the interpretation of data in a major way, one must wield visual tools with care and deliberation. Using quantitative facts to evoke an emotional response is best achieved with the combination of UX and data storytelling.
Author: Dr Sandeep Sood
Password-based authentication is used in online web applications due to its simplicity and convenience. Efficient password-based authentication schemes are required to authenticate the legitimacy of remote users, or data origin over an insecure communication channel. Password-based authentication schemes are highly susceptible to phishing attacks.
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...Edureka!
** Machine Learning Engineer Masters Program: https://www.edureka.co/masters-program/machine-learning-engineer-training **
This tutorial on Artificial Intelligence gives you a brief introduction to AI discussing how it can be a threat as well as useful. This tutorial covers the following topics:
1. AI as a threat
2. What is AI?
3. History of AI
4. Machine Learning & Deep Learning examples
5. Dependency on AI
6.Applications of AI
7. AI Course at Edureka - https://goo.gl/VWNeAu
For more information, please write back to us at sales@edureka.co
Call us at IN: 9606058406 / US: 18338555775
Facebook: https://www.facebook.com/edurekaIN/
Twitter: https://twitter.com/edurekain
LinkedIn: https://www.linkedin.com/company/edureka
Google continues to dominate search and increase its share. According to data, Google's core search increased 5.9% from October 2016 to May 2017 while its closest competitors like Yahoo and Bing declined. Google distributes search traffic relatively evenly across sites while Facebook and YouTube tend to concentrate traffic on very large sites. Reddit and YouTube send the majority of their referral traffic to just a handful of top sites.
Top 5 Deep Learning and AI Stories - October 6, 2017NVIDIA
Read this week's top 5 news updates in deep learning and AI: Gartner predicts top 10 strategic technology trends for 2018; Oracle adds GPU Accelerated Computing to Oracle Cloud Infrastructure; chemistry and physics Nobel Prizes are awarded to teams supported by GPUs; MIT uses deep learning to help guide decisions in ICU; and portfolio management firms are using AI to seek alpha.
AI and Machine Learning Demystified by Carol Smith at Midwest UX 2017Carol Smith
What is machine learning? Is UX relevant in the age of artificial intelligence (AI)? How can I take advantage of cognitive computing? Get answers to these questions and learn about the implications for your work in this session. Carol will help you understand at a basic level how these systems are built and what is required to get insights from them. Carol will present examples of how machine learning is already being used and explore the ethical challenges inherent in creating AI. You will walk away with an awareness of the weaknesses of AI and the knowledge of how these systems work.
2017 holiday survey: An annual analysis of the peak shopping seasonDeloitte United States
Holiday retail spending is bucking trends this season with only one-third of holiday budgets going toward gifts. Online spending is expected to exceed in-store for the first time. In addition to gifts for others this year, spending on experiences and self-gifting increased. Explore more consumer spending trends in our 32nd annual holiday survey. For more: http://deloi.tt/2yH1VAn.
The document summarizes 10 key facts about the future of work: 1) Jobs are becoming more knowledge-based, requiring skills like analytical thinking. 2) Employment has grown most in healthcare, education, and professional services. 3) Automation is replacing many traditional jobs, with estimates that 47-50% of current jobs could be automated. 4) People see other jobs as more at risk of automation than their own. 5) More people express worry than optimism about automation's impact. 6) Workers see technology as more positively impacting their careers. 7) Higher-educated workers report greater benefits from technology. 8) Skills in technology, communication, and lifelong learning are seen as most important for the future. 9)
Infrastructure as code: running microservices on AWS using Docker, Terraform,...Yevgeniy Brikman
This is a talk about managing your software and infrastructure-as-code that walks through a real-world example of deploying microservices on AWS using Docker, Terraform, and ECS.
Lee Rainie, director of internet and technology research at Pew Research Center, discussed recent findings about the prevalence and impact of online harassment at the Cyber Health and Safety Virtual Summit: 41% of American adults have been harassed online and 66% have witnessed harassment. The findings come from the Center’s recent report on these issues.
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
Thinking about your sales team's goals for 2017? Drift's VP of Sales shares 3 things you can do to improve conversion rates and drive more revenue.
Read the full story on the Drift blog here: http://blog.drift.com/sales-team-tips
Taming the ever-evolving Compliance Beast : Lessons learnt at LinkedIn [Strat...Shirshanka Das
Just when you think you have your Kafka and Hadoop clusters set up and humming and you’re well on your path to democratizing data, you realize that you now have a very different set of challenges to solve. You want to provide unfettered access to data to your data scientists, but at the same time, you need to preserve the privacy of your members, who have entrusted you with their data.
Shirshanka Das and Tushar Shanbhag outline the path LinkedIn has taken to protect member privacy in its scalable distributed data ecosystem built around Kafka and Hadoop.
They also discuss three foundational building blocks for scalable data management that can meet data compliance regulations: a centralized metadata system, a standardized data lifecycle management platform, and a unified data access layer. Some of these systems are open source and can be of use to companies that are in a similar situation. Along the way, they also look to the future—specifically, to the General Data Protection Regulation, which comes into effect in 2018—and outline LinkedIn’s plans for addressing those requirements.
But technology is just part of the solution. Shirshanka and Tushar also share the culture and process change they’ve seen happen at the company and the lessons they’ve learned about sustainable process and governance.
Natural Frequencies and Mode shape vectors for 10 Mass-Spring systemAkshay Mistri
The document lists the natural frequencies and mode shapes obtained from a program that analyzed 10 blocks. The natural frequencies are given for each of the 10 blocks, ranging from 0.1230 to 0.8553. The mode shapes are provided as 10 vectors that describe the behavior of each block at the different natural frequencies.
The document summarizes an interview with Dana Butler, an LMFT who volunteers with OutFront Minnesota, an organization established in 1987 to advocate for LGBTQ rights. OutFront Minnesota focuses on community organizing, public policy, anti-violence initiatives, legal work, and education. Butler graduated from Louisville Presbyterian Theological Seminary and currently works as a private practice counselor in Minnesota while advocating for LGBTQ issues since the 1990s. Butler discussed the progress made in LGBTQ rights in recent decades but also remaining safety concerns for the community and covert forms of discrimination. The current political climate is also a source of concern for LGBTQ individuals.
La web 1.0 se refería a la web comercial que surgió en la década de 1990, cuando las páginas tenían como objetivo principal informar de forma vertical, lo que significa que los propietarios publicaban información una sola vez para que los lectores pudieran acceder a ella de forma permanente.
The document discusses the importance of the LGBT Community Center in New York City. It provides a safe space for the LGBT community and preserves the history of the gay rights movement. The center was founded in 1983 and has served as a meeting place for major activist groups like ACT-UP that helped drive the AIDS movement. It also hosts support groups, houses an LGBT library and archive, and allows over 400 community groups to meet annually. The center remains historically significant as the starting point for many influential LGBT activist organizations and continues to support the LGBT community.
Apresentação do curso de auxiliares de bibliotecas da UFRJsibi_ufrj
O documento fornece informações sobre a Divisão Centro Referencial do Sistema de Bibliotecas e Informação da Universidade Federal do Rio de Janeiro (SiBI-UFRJ), incluindo sua diretora, bibliotecários multiplicadores e contato. Ele também resume os principais serviços e recursos informacionais disponibilizados pelo SiBI-UFRJ.
Python as a Replacement for Commercial Stats PackagesHarold Henson
This brief lightening talk introduces the issues to be considered when deciding whether Python is a viable replacement for a commercial statistics package in a quantitative analysis shop
The document provides tips and guidelines for proper email etiquette. It discusses keeping messages short with concise paragraphs and summaries. Proper formatting is important, including structure, grammar, spelling and links. When replying or forwarding, address all questions and only reply to relevant parties. Consider sensitivity when discussing others or expressing emotions. Email has limitations so alternative communication may be needed in some situations.
The document discusses various components of electronic communication, including chatting, blogs, podcasting, discussion boards, text messaging, and email. It provides details on each type such as how chatting and text messaging work in real-time, how blogs are online journals, and how podcasts and discussion boards allow sharing of audio/video files and messages with feedback. Examples are given for different chat programs, podcasts on iTunes, and moderated vs unmoderated discussion boards.
The document contains a collection of short sayings or words of wisdom about various topics. Some of the quotes discuss the importance of giving encouragement to others, being mindful of what you say, and not worrying about things you can't control. Other quotes focus on the value of laughter, kindness, love and friendship in making life more meaningful. A few of the sayings emphasize having courage to pursue your dreams and using patience and caring about others.
The document discusses the erosion of privacy and civil liberties due to increased government surveillance post 9/11. It notes that fear was used to justify greater surveillance powers through laws like the Patriot Act. While terrorism is a real threat, the level of threat is exaggerated to gain public support for intrusive surveillance. Mass surveillance has grown exponentially with programs like PRISM capturing data from tech companies. The document argues that smartphones and social media have enabled unprecedented government and private sector access to people's personal data and location information. It calls for stronger encryption tools to protect privacy and reclaim control over personal data and communications.
HES2011 - Raould Chiesa - Hackers Cybercriminals from Wargames to the Undergr...Hackito Ergo Sum
This document provides a summary of a presentation by Raoul Chiesa on cybercrime trends from the past to present. It discusses how hacking has evolved from curiosity-driven activities by bored teens to profit-motivated crimes by adults. Reasons for the rise of cybercrime include the increasing number of internet users and victims, economic incentives, availability of hacking tools, recruitment of inexperienced people, and lack of consequences. The presentation also notes how media portrayal has changed perceptions of who hackers are.
Reining in the Data ITAG tech360 Penn State Great Valley 2015 Andrew Schwabe
Social impact of the privacy crisis in the post snowden era. What we thought was secure has been compromised. We think we want anonymity, but that promotes bad activity.
The document discusses a presentation given by Raoul Chiesa on auditing the mind of hackers and profiling different types of hackers. It provides an overview of Chiesa's background and work with the United Nations on issues related to cybercrime. The presentation outlines the Hackers Profiling Project which aims to better understand hackers through technical and criminological approaches in order to differentiate between various types of hackers.
Cybersecurity Strategies - time for the next generationHinne Hettema
In this talk, presented in June 2016 at KAIST, I argue that it is time for the next generation of cybersecurity strategies. These must have a governance focus, and be based on international laws, declarations and agreements, basic internet rights and public good provisions.
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
1. Edward Snowden's NSA leaks from 2013 increased public awareness of privacy issues and prompted tech companies to improve privacy protections for users.
2. Major security breaches in 2014-2015 exposed vulnerabilities like Heartbleed and compromised user data from companies like Ashley Madison, TalkTalk, and VTech.
3. The growing Internet of Things introduces new security threats as more devices become connected, and human error remains a major weak point that can undermine other security defenses. Basic security practices like strong unique passwords and two-factor authentication are recommended.
Last i t talk. L t minute t lk about underground economy and cybercrime. The speaker discussed the evolution of hacking from curiosity to money motivated crimes and the rise of underground economies that facilitate cybercrimes like identity theft and banking fraud.
Simon Harrison RWE - Chain of Things 010616 finalSimon Harrison
This document discusses the need for security in the Internet of Things (IoT). It provides background on IoT, including key events in its development over time. It then discusses some of the security risks associated with IoT, including risks to confidentiality, integrity, availability and non-repudiation. Potential threat actors like criminals, mischief-makers, terrorists and discontented individuals are also outlined. The document argues that as more things become connected, security needs to be a higher priority early in the design process.
ASFWS 2012 - Cybercrime to Information Warfare & “Cyberwar”: a hacker’s persp...Cyber Security Alliance
This presentation will analyze the Information Warfare scenarios, technical and legal backgrounds, highlighting as well the importance of the terminologies and bringing to the audience real-life examples and known incidents. The last part of the talk will focus on two theorical case studies and on one, very special, theorical case study.
This Time, It’s Personal: Why Security and the IoT Is DifferentJustin Grammens
Unfortunately, in recent years we’ve seen a host of incidences where IoT devices were compromised. Sometimes these have been minor with little coverage, while others like Mirai affected millions around the globe a produced serious economic impact. When attacks like this occur, they not only erode the trust of the users of these devices, but cause those who are looking to adopt this new technology to pause. With any new technology, security must be thought of as a first class citizen and when we are talking about IoT, the data is personal. As the IoT matures, I’ll share some mistakes that have happened in the past, where we are today and how I believe we are now finally seeing a maturity of devices that are remotely updated, fault tolerant and secure. When it comes to building an IoT device, security is personal.
Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)SERVICE DESIGN DAYS
The document discusses concerns around voice-enabled internet technologies and how they could impact society. It notes that a growing percentage of searches and device commands are now done by voice. Two potential nightmare scenarios are described: 1) the internet of things enables dystopian surveillance and control as depicted in fiction, and 2) it enables real-world concerns about data exploitation expressed by Noam Chomsky to come true. The retreat aims to have discussions around building a healthier voice-enabled future and addressing issues of privacy, consent, control and the true costs and impacts of new technologies.
The document discusses the challenges of securing the Internet of Things (IoT) as more physical objects are connected to the internet. It notes that IPv6 will enable assigning IP addresses to physical things, interconnecting the virtual and physical worlds. Security challenges include packet spoofing, device spoofing, encryption, key distribution, and privacy protection as things are constantly evolving and globally distributed. Professional challenges include anticipating problems for a world of networked physical objects and preparing security strategies now rather than reacting later.
The term “Internet of Things” refers to all those objects or
devices of everyday life that are connected to the Internet
and that have some kind of intelligence.
1) The document discusses the dark net, which makes up 96% of the internet that is not accessible through traditional search engines and browsers.
2) To access the dark net, one must use the Tor project browser, which conceals a user's location and usage through a worldwide network of volunteers.
3) The dark net contains sites for hacking, weapons, drugs, child exploitation, and hitmen. Many users access it to buy drugs or hire hackers, while others engage in more illegal activities like murder.
The document discusses the dark web and privacy. It begins with an overview of the dark web, including that it goes beyond just illegal activities and can be used to protect privacy. It then outlines the agenda, which includes exploring the origins of the dark web, anonymous browsing tools like Tor, how to navigate the dark web and its pitfalls, and tools that hackers use. The document provides background on topics like dial-up networks, bulletin board systems, the evolution to broadband, and the history of Tor and onion routing. It also covers navigating anonymously, such as through VPNs and Tor, and common hacker tools.
Cyber is one of our areas that we also promote in Must HighTech Expo. We invite you to participate in our virtual exhibitions, on different high tech thematic and especially on cybersecurity.
Corporate security should protect a company's resilience, governance, and legal compliance, but often devolves into outsourcing questionable activities or serving political agendas. Intelligence agencies aim to gather information for national security through espionage, signals intelligence, and public sources, then analyze and propagate insights to support crisis management, defense planning, and covertly guiding events in a country's interests, while also counteracting foreign espionage. However, the lines between these purposes can blur, as evidenced by the following case studies.
Similaire à Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013 (20)
This document discusses privacy and how individuals freely provide their personal data to companies in exchange for free services and lower prices. It notes that companies then use this data for targeted advertising, retargeting, and other purposes to generate billions in revenue without compensating individuals. The document suggests ideas like personal clouds and data cooperatives to give consumers more control over their own data and ensure they benefit from its use and sale.
The "Virtual Coaching Institute"-Pitch during Hack for Health weekend! (May 0...Cain Ransbottyn
The second edition of #HackforHealth in MIC office @ Kortrijk was big fun! After 48 hours of hacking we had to pitch our idea: ViCoins, the virtual health currency! Including a complete working prototype platform connecting to many many many API's!
The live pitch can be viewed @ youtube: https://www.youtube.com/watch?v=_XNBh-OR2A0
Let's Google My Audience - Privacy is for Losers!Cain Ransbottyn
The document discusses various social media experiments and failures of privacy. It describes experiments where the speaker gained access to people's Facebook accounts, connected to strangers on Foursquare, and threatened to reveal private information to audiences. It then lists examples where privacy failed, such as personal records being publicly released and telecom operators selling customer data to marketers. Throughout, it asserts that privacy no longer exists in the digital world.
#Smc040 @ransbottyn's Experiment: Social Media Product PlacementCain Ransbottyn
A good example was the provoking presentation by Cain Ransbottyn (@ransbottyn), famous in Belgium because his life is a ‘soap on social media’ which is well sponsored using product placement. With 85,000 followers on Twitter he is sure that each message he ‘dumps’ there is picked up one way or the other – and it doesn’t matter what way! His lifestyle is covered by his activities in social media, which usually are well planned and analysed. Of course there are many tricks and it is up to you if you like to use ‘white hat’ or ‘black hat’…
From spamming to profiled targetting! Spamming is easy! Convert your data to knowledge by using email! Know your customer! Personnalisation, relevance, social marketing
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Infrastructure Challenges in Scaling RAG with Custom AI models
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
1. privacy is an illusion
and you’re all losers
or how 1984 was a manual for our panopticon society
!
By Cain Ransbottyn - @ransbottyn
2. End of privacy
•
9/11 attacks invigorated the
concept of terrorist threats
•
Post 9/11 there was a strong
and understandable argument
to prioritise security
3. End of civil liberties
•
New word: “asymmetrical
threats”
•
Actually means: “please give
up your civil liberties”, in 2001
55% US citizens were pro; in
2011 only 40% (and
declining).
•
Patriot Act changed the world
for good
4. So, terrorism huh ?
•
systematic use of violent
terror as a means of
coercion
•
violent acts which are
intended to create fear
(terror)
•
perpetrated for a religious,
political, or ideological goal
•
deliberately target or
disregard the safety of noncombatants (civilians)
6. Year on year doubling in surveillance
budget since the Patriot Act
Except for 2013, then there was a dark budget of US$ 52,6B
7. Fear. Uncertainty. Doubt.
•
Instilling fear is a premise for
coercion. But to whom ?
•
Mass media works as a
catalyst to bring fear in the
homes of citizens.
•
We all are very shitty at threat
and risk assessments. Pigs or
sharks ?
•
23,589
40
Or terrorist attacks ?
13,200
* 2010 facts and figures worldwide
8. Are we really capable of
understanding the real
threat level ?
Please demonstrate you can spot a rhetorical question when you see one
9. The convenience of circular
logic
•
Gov’t: We’re using
surveillance so we can
prevent terrorist attacks
You: I don’t see any terrorist
threat or attack
Gov’t: Awesome stuff, hey ?
•
Him: I’m using this repellent to
scare away elephants.
You: But I don’t see any
elephants.
Him: Awesome stuff, hey ?
12. PRISM, XKeyScore, Tempora
!
Thank you Microsoft, Facebook, Yahoo!, Google, Paltalk, YouTube, AOL,
Apple, Skype
Snowden leaks the post 2007 surveillance industry is much worse than anyone could have imagined
13. The rise of private
intelligence agencies
•
The welcome gift of “social
networks”
•
The thankful adoption rate of
smart phones
•
The cloud as the ultimate data
gathering extension to
governments
•
The phone operators remain a
loyal friend
•
The overt investment strategy of
In-Q-Tel
14. The In-Q-Tel investment firm
•
Founded 1999 as not-for-profit
venture capital firm
•
So… if you are not looking to make a
profit, what are you looking for then ?
•
Investments in data mining, call
recording, surveillance, crypto,
biotech, …
•
E.g. 2007 AT&T - Narus STA 6400
backdoor = product of In-Q-Tel
funded company
•
Many (many) participations
worldwide (also Belgium)
15. Social networks as a private
intelligence agency
•
Perfect front offices
•
Facebook as the first global
private intelligence agency
•
Otherwise hard to obtain intel
is being shared voluntarily by
everyone (e.g. hobbies, etc.)
•
US$ 12,7M investment by
James Breyer (Accel), former
colleague of Gilman Louie
(CEO In-Q-Tel)
16. Smart-phones as the
ultimate tracking device
•
Device you carry 24/7 with you.
With a GPS on board.
•
Android has remote install/deinstall
hooks in its OS (so has IOS)
•
OTA vulnerabilities allow remote
installs of byte patches (e.g.
Blackberry incident in UAE)
•
Apple incident (“the bug that
stored your whereabouts”)
•
Any idea how many address
books are stored on iCloud ? :p
17. Smart-phones as the
ultimate tracking device
Wi-Fi based positioning has become very accurate and quickly deployed mainstream
18. Cloud providers as the
perfect honeypot
•
There is no company that is so
invasive as Google
•
Records voice calls (Voice),
analyses e-mail (GMail), knows who
you talk to and where you are
(Android), has all your documents
(Drive) and soon will see through
your eyes (Glass)
•
Robert David Steele (CIA) disclosed
Google takes money from US Intel.
community.
•
In-Q-Tel and Google invest in
mutual companies (mutual interest)
19. Cloud providers as the
perfect honeypot
•
Not only Google. The latest
OSX Mavericks actually asked
me to… store my Keychain in
the cloud *sigh*
•
While Apple claims iMessage
cannot be intercepted, we
know it is possible because
Apple is the MITM and no
end-to-end crypto is used nor
certificate pinning.
20. The loyal friend, the phone
operator
•
Needs to be CALEA and ETSI
compliant. Yeah right :-)
•
Operators are both targets of
surveillance stakeholders (e.g.
Belgacom/BICS hack by GCHQ)
and providers of surveillance tactics
(taps, OTA installs, silent SMS, etc.)
•
Does KPN really trust NICE (Israel)
and does Belgacom really trust
Huawei (China) ?
•
Truth of the matter is: you cannot
trust your operator…
21. Privacy is for losers
If you think you have privacy,
you really are a loser
22. #dta
If a government needs to understand
its enemy, and we’re being surveilled.
Then, who exactly is the enemy ?
31. Requirements
•
Must provide strong crypto
•
Must be open source (GitHub)
•
Must be beautiful and easy to use, we
actually don’t want the user to be
confronted with complex crypto issues
•
Provide deniability
•
Provide alerting mechanisms that alert
the user when something is wrong
•
Even when your device is confiscated,
it should be able to withstand forensic
investigation
32. How it’s built
•
Using tor as transport layer for P2P
routing and provide anonymity (no
exit nodes used).
•
Obfuscated as HTTPS traffic to
prevent gov’t filtering.
•
Using OTR v3.1 to ensure perfect
forward secrecy and end-to-end
crypto.
•
Capable of detecting A5/GSM
tactical surveillance attacks.
•
Extremely effective anti forensic
mechanisms and triggers
35. Why use it ?
•
To protect your human right
on privacy
•
To protect your human right
on freedom of speech
•
Because your communication
needs to remain confidential
•
Because excessive
surveillance is a threat to
modern democracy
36. Privacy might be for losers, but
that doesn’t mean you are OK
to give up your human rights…