A Cypher-Indigenous Manifesto acknowledges the importance of privacy and decentralized technologies for Indigenous Peoples and calls for a collective action with the international community to protect and expand their right to self-determination as stated in the United Nations Declaration of 2007 (UNDRIP).
A Cypher-Indigenous Manifesto & InterpretationMyceliaUni
A Cypher-Indigenous Manifesto acknowledges the importance of privacy and decentralized technologies for Indigenous Peoples and calls for a collective action with the international community to protect and expand their right to self-determination as stated in the United Nations Declaration of 2007 (UNDRIP).
(EN) A Cypher-Indigenous Manifesto & Interpretation.pdfMycelia1
A Cypher Indigenous Manifesto - the Rights of Indigenous Peoples in the Digital Era, September 13, 2022 and its interpretation by the Oyxabaten & Mycelia Collective.
(EN) A Cypher Indigenous Manifesto & InterpretationMycelia1
A Cypher Indigenous Manifesto - the Rights of Indigenous Peoples in the Digital Era, September 13, 2022 and its interpretation by the Oyxabaten & Mycelia Collective.
A Cypher-Indigenous Manifesto is an invitation to create a Collaborative Framework between Indigenous Peoples and the Cypherpunk Community to protect and expand the right to self-determination of Indigenous Peoples as stated in the UN Declaration of 2007 (UNDRIP).
This document outlines a Cypher-Indigenous Manifesto asserting the rights of indigenous peoples in the digital era. It summarizes that as indigenous peoples, they have the rights to self-determination and autonomy over their internal affairs and cultural development. It states that digital and decentralized technologies can help protect indigenous cultures from repression by allowing them to preserve and strengthen their traditions while maintaining control and privacy over their institutions and cultural heritage in this new digital realm. The manifesto calls for support of projects that help indigenous peoples protect and expand their rights through privacy-preserving and decentralized technologies to ensure indigenous self-determination and the preservation of their ways of life into the future.
Human rights are a philosophical and political concept which, taken as a juridical basis by modern constitutions, describes the inalienable rights that every person possesses.
CRO Cyber Rights Organization’s mission to create a world where digital rights are respected and protected according to the principles of the European Declaration on Digital Rights.
This document presents a civil society declaration regarding their vision for information and communication societies. It discusses their vision for societies that are people-centered, inclusive, and equitable where all individuals can freely access, use, share and disseminate information to improve quality of life. It identifies several core principles and challenges, including the need for social justice, poverty eradication, gender justice, access to information, respect for human rights and cultural diversity. The document provides detailed discussion of these principles and challenges over multiple sections and pages.
A Cypher-Indigenous Manifesto & InterpretationMyceliaUni
A Cypher-Indigenous Manifesto acknowledges the importance of privacy and decentralized technologies for Indigenous Peoples and calls for a collective action with the international community to protect and expand their right to self-determination as stated in the United Nations Declaration of 2007 (UNDRIP).
(EN) A Cypher-Indigenous Manifesto & Interpretation.pdfMycelia1
A Cypher Indigenous Manifesto - the Rights of Indigenous Peoples in the Digital Era, September 13, 2022 and its interpretation by the Oyxabaten & Mycelia Collective.
(EN) A Cypher Indigenous Manifesto & InterpretationMycelia1
A Cypher Indigenous Manifesto - the Rights of Indigenous Peoples in the Digital Era, September 13, 2022 and its interpretation by the Oyxabaten & Mycelia Collective.
A Cypher-Indigenous Manifesto is an invitation to create a Collaborative Framework between Indigenous Peoples and the Cypherpunk Community to protect and expand the right to self-determination of Indigenous Peoples as stated in the UN Declaration of 2007 (UNDRIP).
This document outlines a Cypher-Indigenous Manifesto asserting the rights of indigenous peoples in the digital era. It summarizes that as indigenous peoples, they have the rights to self-determination and autonomy over their internal affairs and cultural development. It states that digital and decentralized technologies can help protect indigenous cultures from repression by allowing them to preserve and strengthen their traditions while maintaining control and privacy over their institutions and cultural heritage in this new digital realm. The manifesto calls for support of projects that help indigenous peoples protect and expand their rights through privacy-preserving and decentralized technologies to ensure indigenous self-determination and the preservation of their ways of life into the future.
Human rights are a philosophical and political concept which, taken as a juridical basis by modern constitutions, describes the inalienable rights that every person possesses.
CRO Cyber Rights Organization’s mission to create a world where digital rights are respected and protected according to the principles of the European Declaration on Digital Rights.
This document presents a civil society declaration regarding their vision for information and communication societies. It discusses their vision for societies that are people-centered, inclusive, and equitable where all individuals can freely access, use, share and disseminate information to improve quality of life. It identifies several core principles and challenges, including the need for social justice, poverty eradication, gender justice, access to information, respect for human rights and cultural diversity. The document provides detailed discussion of these principles and challenges over multiple sections and pages.
Mycelia is a disruptive project that connects indigenous peoples to the Web3 community in order to preserve future generations. To this end, Mycelia aims to enable and accelerate the creation of global, digital, and decentralized indigenous institutions based on the United Nations Declaration on the Rights of Indigenous Peoples (UNDRIP), using cutting-edge web3 technologies.
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
We often talk about privacy but don’t seem to really understand it in all its complexity. We are concerned about giving up our right to it but are unclear about what it is exactly that worries us. Going Luddite is not really an option but we would still like to understand how technology is intruding into spaces that were previously off limits.
Internet rights are the rights that individuals have using the Internet.
They are an extension of human rights in the online world.
These rights include freedom of expression, privacy, access to information, and non-discrimination.
ARTICLE 19 trained over 2,000 activists, journalists, and public officials around the world in 2014 on issues related to freedom of expression and information. Key areas of training included physical and digital security, freedom of expression laws, media regulation, the right to information, and working in risky environments. Trainings were conducted in multiple countries and regions, focusing on local and national challenges to civic participation, access to information, and protection for those defending human rights.
Relationship between media freedom and development in the nigerian societyAlexander Decker
This document discusses media freedom and its relationship to development in Nigerian society. It begins by defining key terms like media, freedom, and development. It then discusses Nigeria's constitution which guarantees press freedom and the right to disseminate information. The document presents the Libertarian media theory to explain the topic. This theory advocates that the media should be free from government censorship but still follow laws. The brief background section provides historical context on the development of media freedom, noting that early British governments began censoring printing presses to control information flow.
Relationship between media freedom and development in the nigerian societyAlexander Decker
This document discusses media freedom and its relationship to development in Nigerian society. It begins by defining key terms like media, freedom, and development. It then discusses Nigeria's constitution which guarantees press freedom and the right to disseminate information. The document presents the Libertarian media theory to explain the topic. This theory advocates that the media should be free from government censorship but still follow laws. The brief background section provides historical context on the development of media freedom, noting that early British governments began censoring printing presses to control information flow.
PLSI 120/.DS_Store
__MACOSX/PLSI 120/._.DS_Store
PLSI 120/articles/Annan In Larger Freedom FA 2005.pdf
"In Larger Freedom": Decision Time at the UN
Author(s): Kofi Annan
Reviewed work(s):
Source: Foreign Affairs, Vol. 84, No. 3 (May - Jun., 2005), pp. 63-74
Published by: Council on Foreign Relations
Stable URL: http://www.jstor.org/stable/20034350 .
Accessed: 16/08/2012 01:53
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at .
http://www.jstor.org/page/info/about/policies/terms.jsp
.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact [email protected]
.
Council on Foreign Relations is collaborating with JSTOR to digitize, preserve and extend access to Foreign
Affairs.
http://www.jstor.org
http://www.jstor.org/action/showPublisher?publisherCode=cfr
http://www.jstor.org/stable/20034350?origin=JSTOR-pdf
http://www.jstor.org/page/info/about/policies/terms.jsp
n Larger Freec omn
Decision Time at the UN
Kofi Annan
OUR SHARED VULNERABILITY
As K A New York investment banker who walks past Ground Zero
every day on her way to work what today's biggest threat is. Then ask
an illiterate 12-year-old orphan in Malawi who lost his parents to
AIDS. You Will get two very different answers. Invite an Indonesian
fisherman mourning the loss of his entire family and the destruction
of his village from the recent, devastating tsunami to tell you what he
fears most. Then ask a villager in Darfiur, stalked by murderous militias
and fearftil of bombing raids. Their answers, too, are likely to diverge.
Different perceptions of what is a threat are often the biggest
obstacles to international cooperation. But I believe that in the twenty
first century they should not be allowed to lead the world's governments
to pursue very different priorities or to work at cross-purposes. Today's
threats are deeply interconnected, and they feed off of one another. The
misery of people caught in unresolved civil conflicts or of populations
mired in extreme poverty, for example, may increase their attraction
to terrorism. The mass rape of women that occurs too often in today's
conflicts makes the spread of HIV and AIDS all the more likely.
In fact, all of us are vulnerable to what we think of as dangers that
threaten only other people. Millions more of sub-Saharan Africa's
inhabitants would plunge below the poverty line if a nuclear terrorist
attack against a financial center in the United States caused a massive
downturn in the global economy. By the same token, millions ofAmer
icans could quickly become infected if, naturally or through malicious
KOFI ANNAN is Secretary-General of the United Nations.
[63]
Kofi Ann.
Westby the role of science and technology as empowermentDr Lendy Spires
This document discusses how information and communication technologies (ICTs) like the internet and social media have empowered individuals and shaped political events. It provides examples of how ICTs helped spark protests during the Arab Spring uprisings in countries like Tunisia and Egypt. Social media allowed information about injustices and corruption to spread rapidly, fueling public anger and demonstrations. Wikileaks releases of documents also weakened governments and emboldened protesters. While empowering individuals, ICTs can also strengthen governments that control communication systems and media outlets.
The role of science and technology as empowerment of person and stateDr Lendy Spires
This document discusses how information and communication technologies (ICTs) both empower individuals and strengthen nation states. ICTs allow individuals to exercise self-determination, impact elections and governments outside their own countries, and disclose information that impacts global events. However, ICTs also represent a powerful tool that governments can leverage through controlling communication gateways and broadcast licenses to extend their influence. Recent examples of both individual empowerment and government control include the Arab Spring uprisings, which were organized using social media but were met with threats from governments to restrict social media access in some countries. The interests of individuals and nation states in asserting control over communication are now in conflict.
The role of science and technology as empowerment of person and stateDr Lendy Spires
This document discusses how information and communication technologies (ICTs) like the internet and social media have empowered individuals and shaped political events. It provides examples of how ICTs helped spark protests during the Arab Spring uprisings in countries like Tunisia and Egypt. Social media allowed information about injustices and corruption to spread rapidly, fueling public anger and demonstrations. Wikileaks releases of documents also weakened governments and emboldened protesters. While empowering individuals, ICTs can also strengthen governments that control communication systems and media outlets.
Security of the young Roma women and men in KrusevacRomaniCikna
This document summarizes a study on the security of young Roma women and men in Krusevac, Serbia. It begins by introducing the concept of security and defining it in terms of both national security and individual human security. It then describes Serbia's security sector and legal framework regarding international agreements and national laws related to human rights and security. The study findings are presented regarding the participants' understanding of security concepts and their perspectives on threats to their personal and collective security.
The Right to Share: Principles on Freedom of Expression and Copyright in th...Karlos Svoboda
This document provides a summary of the key principles from the document "The Right to Share: Principles on Freedom of Expression and Copyright in the Digital Age" published by ARTICLE 19 in 2013.
The document outlines 15 principles regarding balancing copyright with freedom of expression online. It affirms that freedom of expression is a fundamental human right and that copyright restrictions must comply with international law. It also stresses that limitations on copyright such as fair use must be interpreted broadly. Finally, it argues that measures like website blocking and disconnection from the internet for copyright infringement are disproportionate restrictions on freedom of expression.
Principles on Freedom of Expression and Copyright in the Digital AgeKarlos Svoboda
This document provides a summary of the key principles from the document "The Right to Share: Principles on Freedom of Expression and Copyright in the Digital Age".
The document establishes 15 principles to ensure that the right to freedom of expression and ability to share knowledge and culture are protected in the digital age, while also ensuring that copyright interests do not unduly restrict these rights. It discusses general principles of freedom of expression and copyright, protection of the public domain, exceptions to copyright like fair use, and measures to promote access to knowledge. It also covers enforcement of copyright in the digital environment and principles of transparency and accountability in copyright policymaking.
This letter from Latin American civil society organizations expresses support for discussions among MERCOSUR member states regarding mass surveillance practices. It notes concerns about systematic monitoring of communications without oversight or accountability. The letter calls for a transparent, participatory process to regulate the internet in a way that ensures freedom of expression, universal access, an open network structure, privacy protections, and free flow of information. It urges MERCOSUR governments to establish forums for dialogue with civil society and experts to make decisions about internet policy and regulation that preserve these principles while also studying national security systems to ensure compliance with international human rights standards.
The keynote address discusses the important role of communication and media in building and strengthening democracy. It argues that a democracy cannot exist without a viable media to keep citizens informed and hold politicians and government accountable. The media acts as a watchdog to uncover corruption, ensure politicians fulfill promises, and allow governments to address issues. It also plays a role in mobilizing citizens and building social consensus. However, the media must have the proper skills, independence, and environment to fulfill these roles in a democracy. The address praises the Timex School of Communication for providing training to develop media professionals able to strengthen democracy.
The document discusses the history and importance of information literacy. It describes how Paul Zurkowski first proposed universal information literacy training in 1974 to help people learn to search new databases and mainframe computers. It then discusses how a lack of information literacy skills can undermine democracy by allowing misinformation to spread and powerful groups to control information. Finally, it argues that information literacy can create a "New Era of Enlightenment" by empowering citizens to navigate information and make informed decisions about their lives and countries. Zurkowski proposes the Information Action Coalition to extend information literacy training globally.
The document discusses the right to be forgotten and the debates around privacy, free speech, and transparency on the internet. It argues that while search engines currently act as judges in removing personal information, they do so opaquely and are motivated by commercial interests rather than fairness. True freedom of information requires regulation of internet companies and democratic processes for individuals to request accurate contextualization or removal of harmful private details. Extending rights to remove sensitive personal data globally could help address issues like online harassment while respecting both privacy and free speech.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Mais conteúdo relacionado
Semelhante a (EN) A Cypher-Indigenous Manifesto & Interpretation
Mycelia is a disruptive project that connects indigenous peoples to the Web3 community in order to preserve future generations. To this end, Mycelia aims to enable and accelerate the creation of global, digital, and decentralized indigenous institutions based on the United Nations Declaration on the Rights of Indigenous Peoples (UNDRIP), using cutting-edge web3 technologies.
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
We often talk about privacy but don’t seem to really understand it in all its complexity. We are concerned about giving up our right to it but are unclear about what it is exactly that worries us. Going Luddite is not really an option but we would still like to understand how technology is intruding into spaces that were previously off limits.
Internet rights are the rights that individuals have using the Internet.
They are an extension of human rights in the online world.
These rights include freedom of expression, privacy, access to information, and non-discrimination.
ARTICLE 19 trained over 2,000 activists, journalists, and public officials around the world in 2014 on issues related to freedom of expression and information. Key areas of training included physical and digital security, freedom of expression laws, media regulation, the right to information, and working in risky environments. Trainings were conducted in multiple countries and regions, focusing on local and national challenges to civic participation, access to information, and protection for those defending human rights.
Relationship between media freedom and development in the nigerian societyAlexander Decker
This document discusses media freedom and its relationship to development in Nigerian society. It begins by defining key terms like media, freedom, and development. It then discusses Nigeria's constitution which guarantees press freedom and the right to disseminate information. The document presents the Libertarian media theory to explain the topic. This theory advocates that the media should be free from government censorship but still follow laws. The brief background section provides historical context on the development of media freedom, noting that early British governments began censoring printing presses to control information flow.
Relationship between media freedom and development in the nigerian societyAlexander Decker
This document discusses media freedom and its relationship to development in Nigerian society. It begins by defining key terms like media, freedom, and development. It then discusses Nigeria's constitution which guarantees press freedom and the right to disseminate information. The document presents the Libertarian media theory to explain the topic. This theory advocates that the media should be free from government censorship but still follow laws. The brief background section provides historical context on the development of media freedom, noting that early British governments began censoring printing presses to control information flow.
PLSI 120/.DS_Store
__MACOSX/PLSI 120/._.DS_Store
PLSI 120/articles/Annan In Larger Freedom FA 2005.pdf
"In Larger Freedom": Decision Time at the UN
Author(s): Kofi Annan
Reviewed work(s):
Source: Foreign Affairs, Vol. 84, No. 3 (May - Jun., 2005), pp. 63-74
Published by: Council on Foreign Relations
Stable URL: http://www.jstor.org/stable/20034350 .
Accessed: 16/08/2012 01:53
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at .
http://www.jstor.org/page/info/about/policies/terms.jsp
.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact [email protected]
.
Council on Foreign Relations is collaborating with JSTOR to digitize, preserve and extend access to Foreign
Affairs.
http://www.jstor.org
http://www.jstor.org/action/showPublisher?publisherCode=cfr
http://www.jstor.org/stable/20034350?origin=JSTOR-pdf
http://www.jstor.org/page/info/about/policies/terms.jsp
n Larger Freec omn
Decision Time at the UN
Kofi Annan
OUR SHARED VULNERABILITY
As K A New York investment banker who walks past Ground Zero
every day on her way to work what today's biggest threat is. Then ask
an illiterate 12-year-old orphan in Malawi who lost his parents to
AIDS. You Will get two very different answers. Invite an Indonesian
fisherman mourning the loss of his entire family and the destruction
of his village from the recent, devastating tsunami to tell you what he
fears most. Then ask a villager in Darfiur, stalked by murderous militias
and fearftil of bombing raids. Their answers, too, are likely to diverge.
Different perceptions of what is a threat are often the biggest
obstacles to international cooperation. But I believe that in the twenty
first century they should not be allowed to lead the world's governments
to pursue very different priorities or to work at cross-purposes. Today's
threats are deeply interconnected, and they feed off of one another. The
misery of people caught in unresolved civil conflicts or of populations
mired in extreme poverty, for example, may increase their attraction
to terrorism. The mass rape of women that occurs too often in today's
conflicts makes the spread of HIV and AIDS all the more likely.
In fact, all of us are vulnerable to what we think of as dangers that
threaten only other people. Millions more of sub-Saharan Africa's
inhabitants would plunge below the poverty line if a nuclear terrorist
attack against a financial center in the United States caused a massive
downturn in the global economy. By the same token, millions ofAmer
icans could quickly become infected if, naturally or through malicious
KOFI ANNAN is Secretary-General of the United Nations.
[63]
Kofi Ann.
Westby the role of science and technology as empowermentDr Lendy Spires
This document discusses how information and communication technologies (ICTs) like the internet and social media have empowered individuals and shaped political events. It provides examples of how ICTs helped spark protests during the Arab Spring uprisings in countries like Tunisia and Egypt. Social media allowed information about injustices and corruption to spread rapidly, fueling public anger and demonstrations. Wikileaks releases of documents also weakened governments and emboldened protesters. While empowering individuals, ICTs can also strengthen governments that control communication systems and media outlets.
The role of science and technology as empowerment of person and stateDr Lendy Spires
This document discusses how information and communication technologies (ICTs) both empower individuals and strengthen nation states. ICTs allow individuals to exercise self-determination, impact elections and governments outside their own countries, and disclose information that impacts global events. However, ICTs also represent a powerful tool that governments can leverage through controlling communication gateways and broadcast licenses to extend their influence. Recent examples of both individual empowerment and government control include the Arab Spring uprisings, which were organized using social media but were met with threats from governments to restrict social media access in some countries. The interests of individuals and nation states in asserting control over communication are now in conflict.
The role of science and technology as empowerment of person and stateDr Lendy Spires
This document discusses how information and communication technologies (ICTs) like the internet and social media have empowered individuals and shaped political events. It provides examples of how ICTs helped spark protests during the Arab Spring uprisings in countries like Tunisia and Egypt. Social media allowed information about injustices and corruption to spread rapidly, fueling public anger and demonstrations. Wikileaks releases of documents also weakened governments and emboldened protesters. While empowering individuals, ICTs can also strengthen governments that control communication systems and media outlets.
Security of the young Roma women and men in KrusevacRomaniCikna
This document summarizes a study on the security of young Roma women and men in Krusevac, Serbia. It begins by introducing the concept of security and defining it in terms of both national security and individual human security. It then describes Serbia's security sector and legal framework regarding international agreements and national laws related to human rights and security. The study findings are presented regarding the participants' understanding of security concepts and their perspectives on threats to their personal and collective security.
The Right to Share: Principles on Freedom of Expression and Copyright in th...Karlos Svoboda
This document provides a summary of the key principles from the document "The Right to Share: Principles on Freedom of Expression and Copyright in the Digital Age" published by ARTICLE 19 in 2013.
The document outlines 15 principles regarding balancing copyright with freedom of expression online. It affirms that freedom of expression is a fundamental human right and that copyright restrictions must comply with international law. It also stresses that limitations on copyright such as fair use must be interpreted broadly. Finally, it argues that measures like website blocking and disconnection from the internet for copyright infringement are disproportionate restrictions on freedom of expression.
Principles on Freedom of Expression and Copyright in the Digital AgeKarlos Svoboda
This document provides a summary of the key principles from the document "The Right to Share: Principles on Freedom of Expression and Copyright in the Digital Age".
The document establishes 15 principles to ensure that the right to freedom of expression and ability to share knowledge and culture are protected in the digital age, while also ensuring that copyright interests do not unduly restrict these rights. It discusses general principles of freedom of expression and copyright, protection of the public domain, exceptions to copyright like fair use, and measures to promote access to knowledge. It also covers enforcement of copyright in the digital environment and principles of transparency and accountability in copyright policymaking.
This letter from Latin American civil society organizations expresses support for discussions among MERCOSUR member states regarding mass surveillance practices. It notes concerns about systematic monitoring of communications without oversight or accountability. The letter calls for a transparent, participatory process to regulate the internet in a way that ensures freedom of expression, universal access, an open network structure, privacy protections, and free flow of information. It urges MERCOSUR governments to establish forums for dialogue with civil society and experts to make decisions about internet policy and regulation that preserve these principles while also studying national security systems to ensure compliance with international human rights standards.
The keynote address discusses the important role of communication and media in building and strengthening democracy. It argues that a democracy cannot exist without a viable media to keep citizens informed and hold politicians and government accountable. The media acts as a watchdog to uncover corruption, ensure politicians fulfill promises, and allow governments to address issues. It also plays a role in mobilizing citizens and building social consensus. However, the media must have the proper skills, independence, and environment to fulfill these roles in a democracy. The address praises the Timex School of Communication for providing training to develop media professionals able to strengthen democracy.
The document discusses the history and importance of information literacy. It describes how Paul Zurkowski first proposed universal information literacy training in 1974 to help people learn to search new databases and mainframe computers. It then discusses how a lack of information literacy skills can undermine democracy by allowing misinformation to spread and powerful groups to control information. Finally, it argues that information literacy can create a "New Era of Enlightenment" by empowering citizens to navigate information and make informed decisions about their lives and countries. Zurkowski proposes the Information Action Coalition to extend information literacy training globally.
The document discusses the right to be forgotten and the debates around privacy, free speech, and transparency on the internet. It argues that while search engines currently act as judges in removing personal information, they do so opaquely and are motivated by commercial interests rather than fairness. True freedom of information requires regulation of internet companies and democratic processes for individuals to request accurate contextualization or removal of harmful private details. Extending rights to remove sensitive personal data globally could help address issues like online harassment while respecting both privacy and free speech.
Semelhante a (EN) A Cypher-Indigenous Manifesto & Interpretation (20)
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on automated letter generation for Bonterra Impact Management using Google Workspace or Microsoft 365.
Interested in deploying letter generation automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
2. A Cypher-Indigenous Manifesto
The Rights of Indigenous Peoples in the Digital Era
September 13, 2022
We, the indigenous peoples, in virtue of the UN Declaration on the Rights of Indigenous Peoples
adopted by the General Assembly on 13 September 2007, have the right to self-determination.
By virtue of that right we freely determine our political status and freely pursue our economic,
social and cultural development and have the right to autonomy or self-government in
matters relating to our internal and local affairs, as well as ways and means for financing our
autonomous functions.
From this acknowledgment, and in order to preserve the integrity of these rights, and to maintain,
control, protect and develop our cultural heritage, traditional knowledge and traditional cultural
expressions, we claim that digital and decentralized technologies may be critical to protect
us, the indigenous peoples, from repression, extortion and intrusion, while preserving and
strengthening our traditions.
We admit that the digital realm tends to be an extension of the physical one, therefore the privacy,
autonomy and decentralization inherent to indigenous cultures must be extended into the
digital realm to preserve our integrity.
Privacy empowers us, the indigenous peoples, to express our right of self-determination, to
maintain, control, protect, develop our cultures and to preserve the autonomy of our
institutions from external actors who are not explicitly allowed to interfere with them.
Decentralized technologies empower us, the indigenous peoples, to integrate our cultural,
social, and economical institutions in the digital era as an extension and expansion of our
traditional institutions.
Therefore, we the indigenous peoples give our support to humans who protect and build
privacy and decentralized technologies fundamental to the preservation of our rights and,
by extension, to the freedom of all humanity.
This manifesto is a call to projects that want to help us protect and expand our rights in the
digital era. In this respect, we propose to work together in the creation of digital indigenous
institutions, opening beneficial reciprocity for the development of free and protective rights,
as stated in the UN Declaration on the Rights of Indigenous Peoples, to provide global solutions
for planet Earth and all its inhabitants.
We, the indigenous peoples, are dedicated to the expansion of life, and we believe that it is
through the union of all our efforts, knowledge and technologies that we will find real solutions
for the preservation and evolution of humanity.
We, the indigenous peoples, see freedom as the expression of life itself, and now more than
ever, we must come together to protect its full expression as a legacy for future generations.
The United Peoples
By Oyxabaten Collective
Translation by Mycelia
3. I N T E R P R E T A T I O N
From the Oyxabaten & Mycelia Collective
A Cypher-Indigenous Manifesto acknowledges the importance of privacy and
decentralized technologies for Indigenous Peoples and calls for a collective action with
the international community to protect and expand their right to self-determination as
stated in the United Nations Declaration of 2007 (UNDRIP).
Note that A Cypher-Indigenous Manifesto can be interpreted in many ways, and this short paper
is only intended to give a first interpretation from the perspective of the Oyxabaten & Mycelia
Collective.
Why
Cypher
?
'Cypher' as mentioned in the title A Cypher-Indigenous Manifesto is a reference to the
importance of cryptography [1] and mathematics to defend the rights of Indigenous Peoples in
the digital era, especially their right to self-determination.
By labelling ‘Cypher’, the manifesto creates a link to the Cypherpunk Community [2] who
promotes the use of strong cryptography to defend the right to self-determination on the Internet
— a fundamental human right endangered by the increasing loss of sovereignty over our digital
tools, not only for Indigenous Peoples, but for all of us.
A Cypher-Indigenous Manifesto is also a direct reference to A Cypherpunk Manifesto
published by the renowned cypherpunk Eric Hughes on Mars 9, 1993.
In his manifesto, Hughes wrote that "privacy is the power to selectively reveal oneself to the
world". For Cypherpunk, privacy is fundamental to create an open and free society as it ensures
not only freedom of speech, but also freedom after speech, in the sense that privacy allows
each of us to decide when, where and how to reveal our unique expression to the world.
The need of strong cryptography for Indigenous Peoples are obvious when we know that they
have almost no power over how their culture is communicated on the Internet. In its current use,
the Internet is a new form of colonialism as it's often unilaterally imposed by third parties
who are not aligned with the indigenous mindset and this trend is accelerating with the
rise of AI. This means that the use of cryptography provided by the Cypherpunks is a
fundamental agent of autonomy, self-determination and cultural emancipation in the
digital age.
This is the reason why it is of the utmost importance for digital communities to use
cryptography and decentralised technologies, as they allow them to protect their diversity
and autonomy while belonging simultaneously to the global network of Internet citizens —
diversity within unity.
[1] Cryptography is ‘the practice and study of techniques for secure communication in the presence of
adversarial behaviour. More generally, cryptography is about constructing and analysing protocols that prevent
third parties from reading private messages. The Core concepts related to information security, data
confidentiality, data integrity, authentication, and non-repudiation' (source: Wikipedia).
[2] : 'A Cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing
technologies as a route to social and political change. Originally communicating through the Cypherpunks
electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of
cryptography. Cypherpunks have been engaged in an active movement since at least the late 1980s’, (source:
Wikipedia).
4. Digital Indigenous Institutions
A Mycelia Proposition
Mycelia's objective is to enable and accelerate the creation of digital and decentralised
indigenous institutions based on the UN Declaration on the Rights of Indigenous Peoples
(UNDRIP).
The UNDRIP is the most comprehensive international human rights instrument on
Indigenous Peoples. This declaration was adopted by an overwhelming majority at the United
Nations General Assembly on 13 September 2007 after more than 20 years of negotiations. The
UN Declaration does not create new rights but elaborates on existing ones that are enshrined in
various international human rights treaties and instruments, placing them in the context of
indigenous peoples’ realities.
A Cypher-Indigenous Manifesto is a continuum of this founding text, released the 13
September 13, 2022, exactly 15 years after the UNDRIP first adoption, as a symbol to expand the
rights of Indigenous Peoples into the digital realm, especially the right to self-determination.
Mycelia's mission is to articulate A Cypher-Indigenous Manifesto with the UNDRIP to open a
new realm for Indigenous Peoples and the digital economy. The vision is to build a clear and
open legal framework in which Indigenous Peoples can benefit from a new way of
approaching their own institutions while including the Web3 economy.
To succeed, Mycelia is willing to explore the creation of a digital indigenous jurisdiction
that could provide a new legal approach to the Web3 economy. Its role would be to create
a decentralised legal-framework for this emerging pool of innovators. In other terms, it would
allow any decentralised organizations (DAOs) in situation of jurisdiction arbitrage to
freely orientate their resources, talents, creativity, and economic forces towards a
legitimate, meaningful and legal framework.
By combining the UNDRIP with A Cypher-Indigenous Manifesto, we would unleash the full
potential of a new digital space based on wisdom and global coordination that gives
humanity and its technologies a coherent framework for preserving future generations -
the DNA for an open society.
Article 3:
Indigenous peoples have the right to self-determination. By
virtue of that right they freely determine their political status
and freely pursue their economic, social and cultural
development.
Article 33:
1. Indigenous peoples have the right to determine their own
identity or membership in accordance with their customs and
traditions. This does not impair the right of indigenous
individuals to obtain citizenship of the States
in which they live.
2. Indigenous peoples have the right to determine the
structures and to select the membership of their institutions in
accordance with their own procedures.
5. S E C O N D
Connecting with the web3 community and global makers willing
to contribute to the emergence of new Indigenous Institutions
and an open jurisdiction for decentralised organisations.
R E Q U I R E M E N T S
V I S I O N
Mycelia's vision is really simple: directing capital and
attention towards new Indigenous Institutions that propose
an open and inclusive jurisdiction to the web3 economy. Only
powerful Indigenous Institutions will be able to protect future
generations and we will find the way to make it happen.
T H I R D
Convening all stakeholders and start building this new
ecosystem rooted in ancestral wisdom and universal values
to protect future generations.
Mycelia has identified three
requirements necessary to bring
this vision to life.
F I R S T
Bringing together Indigenous Leaders who are supporting
A Cypher-Indigenous Manifesto and want to defend the
right to self-determination of Indigenous Peoples in the
digital age;
6. Oyxabaten is an Indigenous Collective coming from
the reunion of rival historical tribes, the Brazilian ethnic
groups Paiter Surui and Cinta Larga. The collective is
focused on socio-environmental causes, illustration,
digital art and decentralised finance with goals of
recording culture, traditions and ancestral customs.
They created the 1st Cross-Cultural Indigenous World
Currency.
A
B
O
U
T
U
S
Mycelia is an ongoing Proof of Concept emerging
from the paper, 'Worldwide Indigenous Institutions -
A Seed from the Future'. Its unique objective is to
enable and accelerate the creation of global,
digital and decentralised indigenous institutions to
collectively manage our most precious public good
– future generations.
7. We are a collective of leaders, entrepreneurs,
innovators, and artists coming together to enable and
accelerate the creation of global, digital and
decentralised Indigenous Institutions in capacity to
protect the full expression of future generations and
collectively address the challenges of our times.
Together we become the answer.
Onward.