The document outlines the schedule and content for a Digital Training Day hosted by Encounters Digital. The schedule is broken into sections covering topics such as social media, audience development, tools, websites/blogs, and multimedia production. Each section provides an overview of the topic and related concepts to be covered. For example, the social media section discusses different platforms like Twitter and Facebook, while audience development gives examples of how to define objectives and find new audiences. The overall purpose is to educate participants on various digital marketing and content creation strategies.
Our CEO performed a presentation in WHD at 2016.
If you're interested you can watch the presentation on youtube. :)
https://www.youtube.com/watch?v=fomS_3Q7520&feature=youtu.be
Collaborating over Paper and Digital Media - Interactive Paper Applications @...Beat Signer
油
This document summarizes research into interactive paper applications conducted at ETH Zurich. It describes how digital pens can link physical paper to digital content. Projects are discussed that combine paper and digital media in areas like museum annotation, medical imaging, document editing, and remote collaboration. The goal is to support collaborative work across paper and digital formats through tools and applications that bridge the two media.
Digital Media in Public Space - Towards Bottom-Up Initiatives in Changing Urb...Niels Wouters
油
Presentation at Connecting Cities Urban Media Lab Symposium at iMal (Brussels, Belgium)
In recent years, various digital media have been introduced in public space to facilitate communication with and among citizens. Typical examples include public displays, but extends to more abstract forms such as integrated media facades. While most media are introduced to serve commercial, cultural or economic interests, the social and societal values are often undervalued. This talk discusses the qualities and challenges of involving citizens in the design of media interventions in the urban environment, and situates itself across research, design and practice.
This document discusses using visuals for research. It introduces Alvin Chua and Niels Wouters from KU Leuven Design Lab who explore visual research methods. They reference quotes about ambiguity and attraction. The document also includes links to videos about mnemonics, reflection, and contradiction that showcase using visuals for exploring research topics.
Revealing the Architectural Quality of Media ArchitectureAndrew Vande Moere
油
This document discusses revealing the architectural quality of media architecture through a survey of architects.
A survey was conducted of 22 architects to rate images of 24 global media architecture projects on physical integration, experience quality, and communication quality. The highest rated projects aligned with architectural design, created atmosphere, and communicated meaningful messages. The lowest rated projects seemed disconnected from context or building function.
The results suggest evaluating media architecture based on new terminology like physical quality, experience quality, and communication quality rather than just media quality. Media should amplify architectural design, augment spatial experiences, and contextualize messages through architectural expression to achieve high architectural quality.
Virtual Machine Introspection in a Hyberid Honeypot ArchitectureTamas K Lengyel
油
This document discusses a hybrid honeypot architecture that combines low and high interaction honeypots using virtual machine introspection. It aims to provide the benefits of both types of honeypots while avoiding their limitations. The proposed system, called VMI-Honeymon, uses virtualization and memory scanning techniques to monitor high interaction honeypots running inside virtual machines without in-guest agents. This allows it to detect malware attempts to alter its behavior and subvert monitoring. An evaluation found it captured malware binaries from high interaction honeypots with fewer sessions than a low interaction honeypot alone. Future work plans to support concurrent high interaction honeypots across different Windows versions and automate analyses of malware footprints.
Information Visualization: Analysis and Communication of InsightsAndrew Vande Moere
油
1) The document discusses data visualization as exploration, communication, research, and as a medium. It provides examples in each category, including visualization tools, techniques, and specific projects.
2) Research in data visualization is discussed, with references to papers on the role of design. Specific projects from the author's work on visualizing social media data are also mentioned.
3) Aesthetic and meaningful aspects of data visualization are explored, with examples that combine beauty, storytelling, interaction, and social sharing.
BSA2016 - Honeypots for Network Security Monitoringchrissanders88
油
At the BSides Augusta 2016 conference, I presented the economic challenges of defensive security and how honeypots can be used for cost effective network security monitoring.
Using Canary Honeypots for Network Security Monitoringchrissanders88
油
In this presentation I talk about how honeypots that have more traditionally been used for research purposes can also be used as an effective part of a network security monitoring strategy.
Honeypots are information systems that are intended to be attacked to gather threat intelligence. They can be low-interaction systems that emulate services or high-interaction systems with real operating systems. Honeypots provide benefits like attack analysis, evidence collection, and risk mitigation by luring attackers away from real systems. While they offer insights, honeypots also have disadvantages like only monitoring a limited view and carrying legal and security risks if misused.
This document provides a summary of honeypots and honeynets. It discusses the history of honeypots dating back to 1991 publications. It describes low and high interaction honeypots, concepts like placement of honeypots inside or outside firewalls, and types of honeynets. The document aims to help students understand how to use honeypots and honeynets to track hackers and detect or prevent attacks on networks.
The document discusses honeypots, which are computer systems designed to attract hackers in order to study their behavior. Honeypots come in two types - production honeypots, which directly protect networks, and research honeypots, which are used to gather threat intelligence. They also vary in their level of interaction, from low-interaction honeypots that emulate systems to high-interaction honeypots with fully functional operating systems. The goals of honeypots are to learn about new attacks, build attacker profiles, and identify vulnerabilities. They provide security benefits but also carry risks if compromised.
This document provides an introduction and overview of honeypots including definitions, uses, types, deployment, and legal issues. It defines a honeypot as a resource designed to be attacked in order to gather information about attacks. Honeypots are used for research, understanding blackhat activities, and building better defenses. They come in low, mid, and high interaction varieties depending on how much an attacker can interact with the operating system. Deployment involves running honeypot programs on hardened machines or using unpatched servers protected by firewalls. Legal issues include privacy, entrapment, and liability concerns.
Presentatie van David Lansen over het belang van content tijdens het Content Power Symposium op 16 september 2011 in Delft. http://symposium.contentpower.nl
Traditional urban planning in the Netherlands with top down master plans and large scale area development is over. This is partly due to the financial crisis, demographic change, peak mobility, and the digitization of urban society. The challenge of large future investment projects is to optimize and make better use of existing resources.
Cities will have to adapt in flexible ways to changing circumstances. This implies an important conceptual shift in thinking about city making: it is less about individual possession and more about the question how multiple stakeholders can make use of the various resources that the city offers.
Data Science Leuven's Linde Vloeberghs on how building a community around data in Leuven makes Leuven a smarter city. Or: how Leuven can become a smart city, by collaborating across the quadruple helix, using citizen science and building an open data platform. Talk @ Leuven and& festival 2018.
Digitale geletterdheid in de Bibliotheek (Inspiratiedag Onderwijs Biblionet D...Fers
油
Hoe werken Bibliotheek en school samen aan de 21e-eeuwse vaardigheden van jongeren? Hoe weten docenten hun leerlingen voor lezen te enthousiasmeren? Tijdens de inspiratiedag vo voor medewerkers educatie van Biblionet Drenthe, Biblionet Groningen en Bibliotheekservice Frysl但n hoor je er alles over.
BSA2016 - Honeypots for Network Security Monitoringchrissanders88
油
At the BSides Augusta 2016 conference, I presented the economic challenges of defensive security and how honeypots can be used for cost effective network security monitoring.
Using Canary Honeypots for Network Security Monitoringchrissanders88
油
In this presentation I talk about how honeypots that have more traditionally been used for research purposes can also be used as an effective part of a network security monitoring strategy.
Honeypots are information systems that are intended to be attacked to gather threat intelligence. They can be low-interaction systems that emulate services or high-interaction systems with real operating systems. Honeypots provide benefits like attack analysis, evidence collection, and risk mitigation by luring attackers away from real systems. While they offer insights, honeypots also have disadvantages like only monitoring a limited view and carrying legal and security risks if misused.
This document provides a summary of honeypots and honeynets. It discusses the history of honeypots dating back to 1991 publications. It describes low and high interaction honeypots, concepts like placement of honeypots inside or outside firewalls, and types of honeynets. The document aims to help students understand how to use honeypots and honeynets to track hackers and detect or prevent attacks on networks.
The document discusses honeypots, which are computer systems designed to attract hackers in order to study their behavior. Honeypots come in two types - production honeypots, which directly protect networks, and research honeypots, which are used to gather threat intelligence. They also vary in their level of interaction, from low-interaction honeypots that emulate systems to high-interaction honeypots with fully functional operating systems. The goals of honeypots are to learn about new attacks, build attacker profiles, and identify vulnerabilities. They provide security benefits but also carry risks if compromised.
This document provides an introduction and overview of honeypots including definitions, uses, types, deployment, and legal issues. It defines a honeypot as a resource designed to be attacked in order to gather information about attacks. Honeypots are used for research, understanding blackhat activities, and building better defenses. They come in low, mid, and high interaction varieties depending on how much an attacker can interact with the operating system. Deployment involves running honeypot programs on hardened machines or using unpatched servers protected by firewalls. Legal issues include privacy, entrapment, and liability concerns.
Presentatie van David Lansen over het belang van content tijdens het Content Power Symposium op 16 september 2011 in Delft. http://symposium.contentpower.nl
Traditional urban planning in the Netherlands with top down master plans and large scale area development is over. This is partly due to the financial crisis, demographic change, peak mobility, and the digitization of urban society. The challenge of large future investment projects is to optimize and make better use of existing resources.
Cities will have to adapt in flexible ways to changing circumstances. This implies an important conceptual shift in thinking about city making: it is less about individual possession and more about the question how multiple stakeholders can make use of the various resources that the city offers.
Data Science Leuven's Linde Vloeberghs on how building a community around data in Leuven makes Leuven a smarter city. Or: how Leuven can become a smart city, by collaborating across the quadruple helix, using citizen science and building an open data platform. Talk @ Leuven and& festival 2018.
Digitale geletterdheid in de Bibliotheek (Inspiratiedag Onderwijs Biblionet D...Fers
油
Hoe werken Bibliotheek en school samen aan de 21e-eeuwse vaardigheden van jongeren? Hoe weten docenten hun leerlingen voor lezen te enthousiasmeren? Tijdens de inspiratiedag vo voor medewerkers educatie van Biblionet Drenthe, Biblionet Groningen en Bibliotheekservice Frysl但n hoor je er alles over.
Werelddag 2013. han van de wetering. de agglomeratie als gesamtkunstwerkEls Brouwers
油
In 1913 vond in Gent de Wereldtentoonstelling plaats. Honderd jaar later (12 november 2013) organiseert de Vlaamse Vereniging voor Ruimte en Planning (VRP) de Werelddag van de Stedenbouw in Gent (in de prachtige Bijloke). Wat waren de ruimtelijke issues in 1913 en zijn ze nog relevant nu? Met als thema 'Waar ligt de grens?' bogen experts uit binnen- en buitenland zich over prangende vraagstukken: verdichting, duurzaamheid, betaalbaar en energiezuinig wonen, mobiliteit, ruimtelijk-economische vernieuwing...
33. Betrokkenheid van gezinnen
Aangemoedigd ownership
StreetTalk: Participative Design of Situated Public Displays for Urban Neighborhood Interaction
Wouters et al.,ACM NordiCHI 2014
Weerspiegeling van context
Herinterpretatie van scherm
34. Interactie door de buurt
Individuele interpretatie
StreetTalk: Participative Design of Situated Public Displays for Urban Neighborhood Interaction
Wouters et al.,ACM NordiCHI 2014
Communicatieplatform
Behoud van engagement
35. Lokale berichten
Appreciatie lokale relevantie
StreetTalk: Participative Design of Situated Public Displays for Urban Neighborhood Interaction
Wouters et al.,ACM NordiCHI 2014
Vertrouwen
Beperkte reikwijdte
36. Nieuwe perspectieven
Calm Technology
StreetTalk: Participative Design of Situated Public Displays for Urban Neighborhood Interaction
Wouters et al.,ACM NordiCHI 2014
Contrast met billboard
Media-aandacht
37. Nieuwe perspectieven
StreetTalk: Participative Design of Situated Public Displays for Urban Neighborhood Interaction
Wouters et al.,ACM NordiCHI 2014
Betrokkenheid van gezinnen
Interactie door de buurt
Lokale berichten
Vertrouwensrelatie
Hyperlokale relevantie
Verrijkte stedelijke ervaring
Eigen interpretatie
The Role of Situated Public Displays on the Experience of Place
Wouters et al.,ACMWorkshop Making Places at NordiCHI 2014
39. StreetTalk: Participative Design of Situated Public Displays for Urban Neighborhood Interaction
Wouters et al.,ACM NordiCHI 2014
Betrokkenheid van buurt
Bottom-up initiatief
Gedeeld beheer