A Cypher Indigenous Manifesto - the Rights of Indigenous Peoples in the Digital Era, September 13, 2022 and its interpretation by the Oyxabaten & Mycelia Collective.
(EN) A Cypher Indigenous Manifesto & InterpretationMycelia1
A Cypher Indigenous Manifesto - the Rights of Indigenous Peoples in the Digital Era, September 13, 2022 and its interpretation by the Oyxabaten & Mycelia Collective.
(EN) A Cypher-Indigenous Manifesto & InterpretationMycelia1
A Cypher-Indigenous Manifesto acknowledges the importance of privacy and decentralized technologies for Indigenous Peoples and calls for a collective action with the international community to protect and expand their right to self-determination as stated in the United Nations Declaration of 2007 (UNDRIP).
A Cypher-Indigenous Manifesto & InterpretationMyceliaUni
A Cypher-Indigenous Manifesto acknowledges the importance of privacy and decentralized technologies for Indigenous Peoples and calls for a collective action with the international community to protect and expand their right to self-determination as stated in the United Nations Declaration of 2007 (UNDRIP).
A Cypher-Indigenous Manifesto is an invitation to create a Collaborative Framework between Indigenous Peoples and the Cypherpunk Community to protect and expand the right to self-determination of Indigenous Peoples as stated in the UN Declaration of 2007 (UNDRIP).
This document outlines a Cypher-Indigenous Manifesto asserting the rights of indigenous peoples in the digital era. It summarizes that as indigenous peoples, they have the rights to self-determination and autonomy over their internal affairs and cultural development. It states that digital and decentralized technologies can help protect indigenous cultures from repression by allowing them to preserve and strengthen their traditions while maintaining control and privacy over their institutions and cultural heritage in this new digital realm. The manifesto calls for support of projects that help indigenous peoples protect and expand their rights through privacy-preserving and decentralized technologies to ensure indigenous self-determination and the preservation of their ways of life into the future.
This document presents a civil society declaration regarding their vision for information and communication societies. It discusses their vision for societies that are people-centered, inclusive, and equitable where all individuals can freely access, use, share and disseminate information to improve quality of life. It identifies several core principles and challenges, including the need for social justice, poverty eradication, gender justice, access to information, respect for human rights and cultural diversity. The document provides detailed discussion of these principles and challenges over multiple sections and pages.
Human rights are a philosophical and political concept which, taken as a juridical basis by modern constitutions, describes the inalienable rights that every person possesses.
CRO Cyber Rights Organization’s mission to create a world where digital rights are respected and protected according to the principles of the European Declaration on Digital Rights.
(EN) A Cypher Indigenous Manifesto & InterpretationMycelia1
A Cypher Indigenous Manifesto - the Rights of Indigenous Peoples in the Digital Era, September 13, 2022 and its interpretation by the Oyxabaten & Mycelia Collective.
(EN) A Cypher-Indigenous Manifesto & InterpretationMycelia1
A Cypher-Indigenous Manifesto acknowledges the importance of privacy and decentralized technologies for Indigenous Peoples and calls for a collective action with the international community to protect and expand their right to self-determination as stated in the United Nations Declaration of 2007 (UNDRIP).
A Cypher-Indigenous Manifesto & InterpretationMyceliaUni
A Cypher-Indigenous Manifesto acknowledges the importance of privacy and decentralized technologies for Indigenous Peoples and calls for a collective action with the international community to protect and expand their right to self-determination as stated in the United Nations Declaration of 2007 (UNDRIP).
A Cypher-Indigenous Manifesto is an invitation to create a Collaborative Framework between Indigenous Peoples and the Cypherpunk Community to protect and expand the right to self-determination of Indigenous Peoples as stated in the UN Declaration of 2007 (UNDRIP).
This document outlines a Cypher-Indigenous Manifesto asserting the rights of indigenous peoples in the digital era. It summarizes that as indigenous peoples, they have the rights to self-determination and autonomy over their internal affairs and cultural development. It states that digital and decentralized technologies can help protect indigenous cultures from repression by allowing them to preserve and strengthen their traditions while maintaining control and privacy over their institutions and cultural heritage in this new digital realm. The manifesto calls for support of projects that help indigenous peoples protect and expand their rights through privacy-preserving and decentralized technologies to ensure indigenous self-determination and the preservation of their ways of life into the future.
This document presents a civil society declaration regarding their vision for information and communication societies. It discusses their vision for societies that are people-centered, inclusive, and equitable where all individuals can freely access, use, share and disseminate information to improve quality of life. It identifies several core principles and challenges, including the need for social justice, poverty eradication, gender justice, access to information, respect for human rights and cultural diversity. The document provides detailed discussion of these principles and challenges over multiple sections and pages.
Human rights are a philosophical and political concept which, taken as a juridical basis by modern constitutions, describes the inalienable rights that every person possesses.
CRO Cyber Rights Organization’s mission to create a world where digital rights are respected and protected according to the principles of the European Declaration on Digital Rights.
Mycelia is a disruptive project that connects indigenous peoples to the Web3 community in order to preserve future generations. To this end, Mycelia aims to enable and accelerate the creation of global, digital, and decentralized indigenous institutions based on the United Nations Declaration on the Rights of Indigenous Peoples (UNDRIP), using cutting-edge web3 technologies.
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
We often talk about privacy but don’t seem to really understand it in all its complexity. We are concerned about giving up our right to it but are unclear about what it is exactly that worries us. Going Luddite is not really an option but we would still like to understand how technology is intruding into spaces that were previously off limits.
Security of the young Roma women and men in KrusevacRomaniCikna
This document summarizes a study on the security of young Roma women and men in Krusevac, Serbia. It begins by introducing the concept of security and defining it in terms of both national security and individual human security. It then describes Serbia's security sector and legal framework regarding international agreements and national laws related to human rights and security. The study findings are presented regarding the participants' understanding of security concepts and their perspectives on threats to their personal and collective security.
ARTICLE 19 trained over 2,000 activists, journalists, and public officials around the world in 2014 on issues related to freedom of expression and information. Key areas of training included physical and digital security, freedom of expression laws, media regulation, the right to information, and working in risky environments. Trainings were conducted in multiple countries and regions, focusing on local and national challenges to civic participation, access to information, and protection for those defending human rights.
Internet rights are the rights that individuals have using the Internet.
They are an extension of human rights in the online world.
These rights include freedom of expression, privacy, access to information, and non-discrimination.
The 'journalism club' is one that everyone think they can get in to. From bloggers, to anyone else with an opinion, everyone thinks they are a journalist. This presentation lets you know the difference between the professional and the amateur.
The Right to Share: Principles on Freedom of Expression and Copyright in th...Karlos Svoboda
This document provides a summary of the key principles from the document "The Right to Share: Principles on Freedom of Expression and Copyright in the Digital Age" published by ARTICLE 19 in 2013.
The document outlines 15 principles regarding balancing copyright with freedom of expression online. It affirms that freedom of expression is a fundamental human right and that copyright restrictions must comply with international law. It also stresses that limitations on copyright such as fair use must be interpreted broadly. Finally, it argues that measures like website blocking and disconnection from the internet for copyright infringement are disproportionate restrictions on freedom of expression.
Principles on Freedom of Expression and Copyright in the Digital AgeKarlos Svoboda
This document provides a summary of the key principles from the document "The Right to Share: Principles on Freedom of Expression and Copyright in the Digital Age".
The document establishes 15 principles to ensure that the right to freedom of expression and ability to share knowledge and culture are protected in the digital age, while also ensuring that copyright interests do not unduly restrict these rights. It discusses general principles of freedom of expression and copyright, protection of the public domain, exceptions to copyright like fair use, and measures to promote access to knowledge. It also covers enforcement of copyright in the digital environment and principles of transparency and accountability in copyright policymaking.
PLSI 120/.DS_Store
__MACOSX/PLSI 120/._.DS_Store
PLSI 120/articles/Annan In Larger Freedom FA 2005.pdf
"In Larger Freedom": Decision Time at the UN
Author(s): Kofi Annan
Reviewed work(s):
Source: Foreign Affairs, Vol. 84, No. 3 (May - Jun., 2005), pp. 63-74
Published by: Council on Foreign Relations
Stable URL: http://www.jstor.org/stable/20034350 .
Accessed: 16/08/2012 01:53
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at .
http://www.jstor.org/page/info/about/policies/terms.jsp
.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact [email protected]
.
Council on Foreign Relations is collaborating with JSTOR to digitize, preserve and extend access to Foreign
Affairs.
http://www.jstor.org
http://www.jstor.org/action/showPublisher?publisherCode=cfr
http://www.jstor.org/stable/20034350?origin=JSTOR-pdf
http://www.jstor.org/page/info/about/policies/terms.jsp
n Larger Freec omn
Decision Time at the UN
Kofi Annan
OUR SHARED VULNERABILITY
As K A New York investment banker who walks past Ground Zero
every day on her way to work what today's biggest threat is. Then ask
an illiterate 12-year-old orphan in Malawi who lost his parents to
AIDS. You Will get two very different answers. Invite an Indonesian
fisherman mourning the loss of his entire family and the destruction
of his village from the recent, devastating tsunami to tell you what he
fears most. Then ask a villager in Darfiur, stalked by murderous militias
and fearftil of bombing raids. Their answers, too, are likely to diverge.
Different perceptions of what is a threat are often the biggest
obstacles to international cooperation. But I believe that in the twenty
first century they should not be allowed to lead the world's governments
to pursue very different priorities or to work at cross-purposes. Today's
threats are deeply interconnected, and they feed off of one another. The
misery of people caught in unresolved civil conflicts or of populations
mired in extreme poverty, for example, may increase their attraction
to terrorism. The mass rape of women that occurs too often in today's
conflicts makes the spread of HIV and AIDS all the more likely.
In fact, all of us are vulnerable to what we think of as dangers that
threaten only other people. Millions more of sub-Saharan Africa's
inhabitants would plunge below the poverty line if a nuclear terrorist
attack against a financial center in the United States caused a massive
downturn in the global economy. By the same token, millions ofAmer
icans could quickly become infected if, naturally or through malicious
KOFI ANNAN is Secretary-General of the United Nations.
[63]
Kofi Ann.
The document discusses the evolution of human rights throughout history. It outlines some early legal codes and documents from 2000 BC to the 15th century that promoted justice and protected certain rights. It then focuses on the creation of the Universal Declaration of Human Rights in 1948 by the UN as a response to the human rights violations during World War 2. The UDHR established 30 basic human rights that all people are entitled to regardless of race, religion, or nationality.
DIGITAL CITIZENSHIP VS. GLOBAL CITIZENSHIP.pptxAnnBeatrizPales
The document discusses digital citizenship and global citizenship. It defines digital citizenship as having civic rights and responsibilities when using the internet, focusing on safe, savvy and ethical technology use. Global citizenship sees the world as an interconnected community. The perfect combination is a global digital citizen who leverages technology to foster global community through compassion and connection. The document also outlines five tenets of citizenship: personal responsibility, global citizenship, digital citizenship, altruistic service, and environmental stewardship. It defines nine elements of digital citizenship: digital access, digital commerce, digital communication, digital literacy, digital etiquette, digital law, digital rights and responsibilities, digital health and wellness, and digital security.
The document discusses the Workshop on E-inclusion and Media and Indigenous Peoples. It summarizes the objectives of the Indigenous ICT Taskforce, which include continuing the work started at the WSIS in Tunis to develop an international indigenous portal. It provides context on the WSIS, noting it aimed to reduce the digital divide and recognize the special situation of indigenous peoples. It describes the vision for an indigenous portal as endorsed at WSIS - to be a focal point for indigenous content and sharing traditions, values, and aspirations in indigenous voices.
HUMAN RIGHT EDUCATION AND GOOD CITIZENSHIPRhon Paigao
This document discusses human rights education. It defines human rights education as all learning that develops knowledge, skills and values of human rights. It explains that human rights education grew in recognition as a tool for social change and increasing awareness of rights for all. The document outlines that the UN declared a decade for human rights education to strengthen respect for human rights and promote understanding between groups. It discusses models of human rights education including values and awareness, accountability, and transformational models. The importance of teaching human rights and citizenship in formal education is also addressed.
This letter from Latin American civil society organizations expresses support for discussions among MERCOSUR member states regarding mass surveillance practices. It notes concerns about systematic monitoring of communications without oversight or accountability. The letter calls for a transparent, participatory process to regulate the internet in a way that ensures freedom of expression, universal access, an open network structure, privacy protections, and free flow of information. It urges MERCOSUR governments to establish forums for dialogue with civil society and experts to make decisions about internet policy and regulation that preserve these principles while also studying national security systems to ensure compliance with international human rights standards.
Westby the role of science and technology as empowermentDr Lendy Spires
This document discusses how information and communication technologies (ICTs) like the internet and social media have empowered individuals and shaped political events. It provides examples of how ICTs helped spark protests during the Arab Spring uprisings in countries like Tunisia and Egypt. Social media allowed information about injustices and corruption to spread rapidly, fueling public anger and demonstrations. Wikileaks releases of documents also weakened governments and emboldened protesters. While empowering individuals, ICTs can also strengthen governments that control communication systems and media outlets.
The role of science and technology as empowerment of person and stateDr Lendy Spires
This document discusses how information and communication technologies (ICTs) both empower individuals and strengthen nation states. ICTs allow individuals to exercise self-determination, impact elections and governments outside their own countries, and disclose information that impacts global events. However, ICTs also represent a powerful tool that governments can leverage through controlling communication gateways and broadcast licenses to extend their influence. Recent examples of both individual empowerment and government control include the Arab Spring uprisings, which were organized using social media but were met with threats from governments to restrict social media access in some countries. The interests of individuals and nation states in asserting control over communication are now in conflict.
Mycelia is a disruptive project that connects indigenous peoples to the Web3 community in order to preserve future generations. To this end, Mycelia aims to enable and accelerate the creation of global, digital, and decentralized indigenous institutions based on the United Nations Declaration on the Rights of Indigenous Peoples (UNDRIP), using cutting-edge web3 technologies.
Privacy Transparency Secrecy - The PRactice April 2017 issueThe PRactice
We often talk about privacy but don’t seem to really understand it in all its complexity. We are concerned about giving up our right to it but are unclear about what it is exactly that worries us. Going Luddite is not really an option but we would still like to understand how technology is intruding into spaces that were previously off limits.
Security of the young Roma women and men in KrusevacRomaniCikna
This document summarizes a study on the security of young Roma women and men in Krusevac, Serbia. It begins by introducing the concept of security and defining it in terms of both national security and individual human security. It then describes Serbia's security sector and legal framework regarding international agreements and national laws related to human rights and security. The study findings are presented regarding the participants' understanding of security concepts and their perspectives on threats to their personal and collective security.
ARTICLE 19 trained over 2,000 activists, journalists, and public officials around the world in 2014 on issues related to freedom of expression and information. Key areas of training included physical and digital security, freedom of expression laws, media regulation, the right to information, and working in risky environments. Trainings were conducted in multiple countries and regions, focusing on local and national challenges to civic participation, access to information, and protection for those defending human rights.
Internet rights are the rights that individuals have using the Internet.
They are an extension of human rights in the online world.
These rights include freedom of expression, privacy, access to information, and non-discrimination.
The 'journalism club' is one that everyone think they can get in to. From bloggers, to anyone else with an opinion, everyone thinks they are a journalist. This presentation lets you know the difference between the professional and the amateur.
The Right to Share: Principles on Freedom of Expression and Copyright in th...Karlos Svoboda
This document provides a summary of the key principles from the document "The Right to Share: Principles on Freedom of Expression and Copyright in the Digital Age" published by ARTICLE 19 in 2013.
The document outlines 15 principles regarding balancing copyright with freedom of expression online. It affirms that freedom of expression is a fundamental human right and that copyright restrictions must comply with international law. It also stresses that limitations on copyright such as fair use must be interpreted broadly. Finally, it argues that measures like website blocking and disconnection from the internet for copyright infringement are disproportionate restrictions on freedom of expression.
Principles on Freedom of Expression and Copyright in the Digital AgeKarlos Svoboda
This document provides a summary of the key principles from the document "The Right to Share: Principles on Freedom of Expression and Copyright in the Digital Age".
The document establishes 15 principles to ensure that the right to freedom of expression and ability to share knowledge and culture are protected in the digital age, while also ensuring that copyright interests do not unduly restrict these rights. It discusses general principles of freedom of expression and copyright, protection of the public domain, exceptions to copyright like fair use, and measures to promote access to knowledge. It also covers enforcement of copyright in the digital environment and principles of transparency and accountability in copyright policymaking.
PLSI 120/.DS_Store
__MACOSX/PLSI 120/._.DS_Store
PLSI 120/articles/Annan In Larger Freedom FA 2005.pdf
"In Larger Freedom": Decision Time at the UN
Author(s): Kofi Annan
Reviewed work(s):
Source: Foreign Affairs, Vol. 84, No. 3 (May - Jun., 2005), pp. 63-74
Published by: Council on Foreign Relations
Stable URL: http://www.jstor.org/stable/20034350 .
Accessed: 16/08/2012 01:53
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at .
http://www.jstor.org/page/info/about/policies/terms.jsp
.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact [email protected]
.
Council on Foreign Relations is collaborating with JSTOR to digitize, preserve and extend access to Foreign
Affairs.
http://www.jstor.org
http://www.jstor.org/action/showPublisher?publisherCode=cfr
http://www.jstor.org/stable/20034350?origin=JSTOR-pdf
http://www.jstor.org/page/info/about/policies/terms.jsp
n Larger Freec omn
Decision Time at the UN
Kofi Annan
OUR SHARED VULNERABILITY
As K A New York investment banker who walks past Ground Zero
every day on her way to work what today's biggest threat is. Then ask
an illiterate 12-year-old orphan in Malawi who lost his parents to
AIDS. You Will get two very different answers. Invite an Indonesian
fisherman mourning the loss of his entire family and the destruction
of his village from the recent, devastating tsunami to tell you what he
fears most. Then ask a villager in Darfiur, stalked by murderous militias
and fearftil of bombing raids. Their answers, too, are likely to diverge.
Different perceptions of what is a threat are often the biggest
obstacles to international cooperation. But I believe that in the twenty
first century they should not be allowed to lead the world's governments
to pursue very different priorities or to work at cross-purposes. Today's
threats are deeply interconnected, and they feed off of one another. The
misery of people caught in unresolved civil conflicts or of populations
mired in extreme poverty, for example, may increase their attraction
to terrorism. The mass rape of women that occurs too often in today's
conflicts makes the spread of HIV and AIDS all the more likely.
In fact, all of us are vulnerable to what we think of as dangers that
threaten only other people. Millions more of sub-Saharan Africa's
inhabitants would plunge below the poverty line if a nuclear terrorist
attack against a financial center in the United States caused a massive
downturn in the global economy. By the same token, millions ofAmer
icans could quickly become infected if, naturally or through malicious
KOFI ANNAN is Secretary-General of the United Nations.
[63]
Kofi Ann.
The document discusses the evolution of human rights throughout history. It outlines some early legal codes and documents from 2000 BC to the 15th century that promoted justice and protected certain rights. It then focuses on the creation of the Universal Declaration of Human Rights in 1948 by the UN as a response to the human rights violations during World War 2. The UDHR established 30 basic human rights that all people are entitled to regardless of race, religion, or nationality.
DIGITAL CITIZENSHIP VS. GLOBAL CITIZENSHIP.pptxAnnBeatrizPales
The document discusses digital citizenship and global citizenship. It defines digital citizenship as having civic rights and responsibilities when using the internet, focusing on safe, savvy and ethical technology use. Global citizenship sees the world as an interconnected community. The perfect combination is a global digital citizen who leverages technology to foster global community through compassion and connection. The document also outlines five tenets of citizenship: personal responsibility, global citizenship, digital citizenship, altruistic service, and environmental stewardship. It defines nine elements of digital citizenship: digital access, digital commerce, digital communication, digital literacy, digital etiquette, digital law, digital rights and responsibilities, digital health and wellness, and digital security.
The document discusses the Workshop on E-inclusion and Media and Indigenous Peoples. It summarizes the objectives of the Indigenous ICT Taskforce, which include continuing the work started at the WSIS in Tunis to develop an international indigenous portal. It provides context on the WSIS, noting it aimed to reduce the digital divide and recognize the special situation of indigenous peoples. It describes the vision for an indigenous portal as endorsed at WSIS - to be a focal point for indigenous content and sharing traditions, values, and aspirations in indigenous voices.
HUMAN RIGHT EDUCATION AND GOOD CITIZENSHIPRhon Paigao
This document discusses human rights education. It defines human rights education as all learning that develops knowledge, skills and values of human rights. It explains that human rights education grew in recognition as a tool for social change and increasing awareness of rights for all. The document outlines that the UN declared a decade for human rights education to strengthen respect for human rights and promote understanding between groups. It discusses models of human rights education including values and awareness, accountability, and transformational models. The importance of teaching human rights and citizenship in formal education is also addressed.
This letter from Latin American civil society organizations expresses support for discussions among MERCOSUR member states regarding mass surveillance practices. It notes concerns about systematic monitoring of communications without oversight or accountability. The letter calls for a transparent, participatory process to regulate the internet in a way that ensures freedom of expression, universal access, an open network structure, privacy protections, and free flow of information. It urges MERCOSUR governments to establish forums for dialogue with civil society and experts to make decisions about internet policy and regulation that preserve these principles while also studying national security systems to ensure compliance with international human rights standards.
Westby the role of science and technology as empowermentDr Lendy Spires
This document discusses how information and communication technologies (ICTs) like the internet and social media have empowered individuals and shaped political events. It provides examples of how ICTs helped spark protests during the Arab Spring uprisings in countries like Tunisia and Egypt. Social media allowed information about injustices and corruption to spread rapidly, fueling public anger and demonstrations. Wikileaks releases of documents also weakened governments and emboldened protesters. While empowering individuals, ICTs can also strengthen governments that control communication systems and media outlets.
The role of science and technology as empowerment of person and stateDr Lendy Spires
This document discusses how information and communication technologies (ICTs) both empower individuals and strengthen nation states. ICTs allow individuals to exercise self-determination, impact elections and governments outside their own countries, and disclose information that impacts global events. However, ICTs also represent a powerful tool that governments can leverage through controlling communication gateways and broadcast licenses to extend their influence. Recent examples of both individual empowerment and government control include the Arab Spring uprisings, which were organized using social media but were met with threats from governments to restrict social media access in some countries. The interests of individuals and nation states in asserting control over communication are now in conflict.
Semelhante a (EN) A Cypher-Indigenous Manifesto & Interpretation.pdf (20)
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
2. A Cypher-Indigenous Manifesto
The Rights of Indigenous Peoples in the Digital Era
September 13, 2022
We, the indigenous peoples, in virtue of the UN Declaration on the Rights of Indigenous Peoples
adopted by the General Assembly on 13 September 2007, have the right to self-determination.
By virtue of that right we freely determine our political status and freely pursue our economic,
social and cultural development and have the right to autonomy or self-government in
matters relating to our internal and local affairs, as well as ways and means for financing our
autonomous functions.
From this acknowledgment, and in order to preserve the integrity of these rights, and to maintain,
control, protect and develop our cultural heritage, traditional knowledge and traditional cultural
expressions, we claim that digital and decentralized technologies may be critical to protect
us, the indigenous peoples, from repression, extortion and intrusion, while preserving and
strengthening our traditions.
We admit that the digital realm tends to be an extension of the physical one, therefore the privacy,
autonomy and decentralization inherent to indigenous cultures must be extended into the
digital realm to preserve our integrity.
Privacy empowers us, the indigenous peoples, to express our right of self-determination, to
maintain, control, protect, develop our cultures and to preserve the autonomy of our
institutions from external actors who are not explicitly allowed to interfere with them.
Decentralized technologies empower us, the indigenous peoples, to integrate our cultural,
social, and economical institutions in the digital era as an extension and expansion of our
traditional institutions.
Therefore, we the indigenous peoples give our support to humans who protect and build
privacy and decentralized technologies fundamental to the preservation of our rights and,
by extension, to the freedom of all humanity.
This manifesto is a call to projects that want to help us protect and expand our rights in the
digital era. In this respect, we propose to work together in the creation of digital indigenous
institutions, opening beneficial reciprocity for the development of free and protective rights,
as stated in the UN Declaration on the Rights of Indigenous Peoples, to provide global solutions
for planet Earth and all its inhabitants.
We, the indigenous peoples, are dedicated to the expansion of life, and we believe that it is
through the union of all our efforts, knowledge and technologies that we will find real solutions
for the preservation and evolution of humanity.
We, the indigenous peoples, see freedom as the expression of life itself, and now more than
ever, we must come together to protect its full expression as a legacy for future generations
The United Peoples
By Oyxabaten Collective
Translation by Mycelia
3. I N T E R P R E T A T I O N
From the Oyxabaten & Mycelia Collective
A Cypher-Indigenous Manifesto is an invitation to create a Collaborative
Framework between Indigenous Peoples and the Cypherpunk Community [1] to
protect and expand the right to self-determination of Indigenous Peoples as
stated in the UN Declaration of 2007 (UNDRIP).
Note that A Cypher-Indigenous Manifesto can be interpreted in many ways, and this
short paper is only intended to give a first interpretation from the perspective of the
Oyxabaten & Mycelia Collective.
Why
Cypher
?
Cypher as mentioned in the title A Cypher-Indigenous Manifesto is a reference to
the importance of cryptography [2] and mathematics to defend the rights of
Indigenous Peoples in the digital era, especially their right to self-determination.
By labelling ‘Cypher’, the manifesto creates a link to the Cypherpunk
Community who promotes the use of strong cryptography to defend the right to
self-determination on the Internet — a fundamental human right endangered by
the increasing loss of sovereignty over our digital tools, not only for Indigenous
Peoples, but for all humanity.
A Cypher-Indigenous Manifesto is also a direct reference to A Cypherpunk
Manifesto published by the renowned cypherpunk Eric Hughes on Mars 9, 1993.
In his manifesto, Hughes wrote that ‘privacy is the power to selectively reveal
oneself to the world’. For Cypherpunk, privacy is fundamental to create an open
and free society as it ensures not only freedom of speech, but also freedom after
speech, in the sense that privacy allows each of us to decide when, where and how
to reveal our unique expression to the world.
The connection with Indigenous Peoples is obvious when we know that they have
almost no power over how their culture is communicated in the digital realm. In this
context, the Internet is becoming a new form of colonialism as its current use is
imposed unilaterally by third parties who are often not aligned with the
indigenous mindset and more broadly with all humans. This means that the use
of cryptography proposed by Cypherpunks becomes a legitimate tool for
autonomy, self-determination and cultural emancipation in the digital age.
This is the reason why it is of the utmost importance for digital communities to
use cryptography and decentralised technologies, as it allows anyone to protect
their diversity while belonging simultaneously to the worldwide network of the Internet
— Diversity within Unity.
[1] : A Cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social
and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and
security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since at least the late 1980s’, source:
Wikipedia.
[2] Cryptography is ‘the practice and study of techniques for secure communication in the presence of adversarial behaviour. More generally,
cryptography is about constructing and analysing protocols that prevent third parties from reading private messages. The Core concepts
related to information security, data confidentiality, data integrity, authentication, and non-repudiation, source: Wikipedia.
4. Digital Indigenous Institutions
A Mycelia Initiative based on the UNDRIP
Mycelia's objective is to enable and accelerate the creation of worldwide, digital and
decentralised indigenous institutions based on the UN Declaration on the Rights of
Indigenous Peoples (UNDRIP).
The UNDRIP is the baselayer of Mycelia as it is the most comprehensive international human
rights instrument on Indigenous Peoples. This declaration was adopted by an overwhelming
majority at the United Nations General Assembly on 13 September 2007 after more than 20 years
of negotiations. The UN Declaration does not create new rights but elaborates on existing ones
that are enshrined in various international human rights treaties and instruments, placing them in
the context of indigenous peoples’ realities.
A Cypher-Indigenous Manifesto is a continuum of this founding text. Released for the first
time on 13 September 2022, exactly 15 years after the UNDRIP first adoption, as a symbol to
expand the rights of Indigenous Peoples into the digital realm, especially the right to self-
determination.
Mycelia's mission is to articulate A Cypher-Indigenous Manifesto with the UNDRIP to open
a new realm for Indigenous Communities and by extension all humanity. Our vision is to
create a clear and open legal framework in which every indigenous community could imagine
its own Digital Indigenous Institutions that respect the beauty and unicity of their
traditions while having the freedom to include different sensibilities of Humanity.
The UNDRIP, in its current form, is a text allowing the creation of Cross-Cultural Indigenous
Institutions that can use cryptography and decentralised technologies to expand their
right to self-determination.
Based on the UNDRIP, Mycelia is also willing to enable free and open Digital Indigenous
Jurisdictions that could serve as a legal cornerstone for the Web3 digital economy. Its role
would be to create a positive framework for this emerging pool of innovations and direct it to the
expansion of life on planet Earth. In other terms, those Institutions would allow anyone from the
digital economy to freely orientate its resources, talents, creations, technologies and
economic forces towards a financial system powered by Life Principles.
By combining A Cypher-Indigenous Manifesto with the UNDRIP, we open the opportunity to
create new international institutions based on wisdom and global cooperation giving
humanity a coherent framework to preserve future generations – The DNA for an Open
Society.
Article 3:
Indigenous peoples have the right to self-determination.
By virtue of that right they freely determine their political
status and freely pursue their economic, social and
cultural development.
Article 33:
1. Indigenous peoples have the right to determine their
own identity or membership in accordance with their
customs and traditions. This does not impair the right of
indigenous individuals to obtain citizenship of the States
in which they live.
2. Indigenous peoples have the right to determine the
structures and to select the membership of their
institutions in accordance with their own procedures.
5. S E C O N D
Connecting with Cypherpunks and Life guardians willing to
contribute to the emergence of Worldwide Digital and
Decentralised Indigenous Institutions;
R E Q U I R E M E N T S
V I S I O N
Mycelia's vision is really simple: directing full power and
attention to Indigenous Peoples by creating Cross-Cultural,
Digital and Decentralised Indigenous Institutions. Only
powerful Indigenous Institutions will be able to protect future
generations.
T H I R D
Connect all stakeholders and start building this new
Indigenous institutional ecosystem anchored in Life
Principles.
Mycelia has identified three
requirements necessary to bring this
vision to life
F I R S T
Gather as many indigenous Leaders as possible from all
around the world to support A Cypher-Indigenous Manifesto
and come with Mycelia to defend the right to self-
determination of Indigenous Peoples in the digital era;
6. Oyxabaten is an Indigenous Collective coming from
the reunion of rival historical tribes, the Brazilian ethnic
groups Paiter Surui and Cinta Larga. The collective is
focused on socio-environmental causes, illustration,
digital art and decentralised finance with goals of
recording culture, traditions and ancestral customs.
They created the 1st Cross-Cultural Indigenous World
Currency.
A
B
O
U
T
U
S
Mycelia, is a Proof of Concept emerging from the
paper, 'Worldwide Indigenous Institution - A Seed
from the Future'. Its unique objective is to enable
and accelerate the creation of global, digital and
decentralised indigenous institutions to collectively
manage our most precious public good – The
Future.
7. We are a collective of leaders, entrepreneurs,
innovators, and artists coming together to enable and
accelerate the creation of global, digital and
decentralised indigenous institutions in capacity to
protect the full expression of future generations and
collectively address the systemic crisis of our times.
Together we are the answer.
Onward.