Conveners
Lightning Talk Plenaries - First Strike
- Charlie van Genuchten (SURF)
- Nicole Harris (GÉANT)
Description
Lightning Talks are 5 minute presentations focusing on one key point. This can be an idea, successful project, a cautionary story, collaboration invitation, quick tip or demonstration. This session is an opportunity for ideas to get the attention they deserve.
The rules for this session are easy: five minutes and only five minutes.
This presentation is about an application running in the public cloud that had high costs, that is, above its planned budget. We had exhausted our technical solutions to refactor it and lower costs. As it didn't lock-in with any cloud technology and therefore could run on any provider, we invited all of them to a “battle for the workload”. Thus, each one of them had the task of proposing a...
‘…sleep never fell upon his eyes; but he kept sure watch always.’
The giant Argus in Greek mythology is just like Argus developed by Sikt. Argus is an alarm aggregator designed for managing alarms from different monitoring systems in one single dashboard. In this lightning talk we will show how Argus allows you to replace the clutter of many screens with one Argus screen...
GDPR has been part of our everyday lives for about five years now. Most related issues are currently solved either on a technical or administrative process level. Nevertheless, it is still a pain point for research infrastructures when they add a new service to their portfolio. GDPR and other policies are important topics for Life Science research infrastructures. Our goal here is to follow...
Since GDPR, followed by the Schrems Rulings, which led to Safe Harbour and the Privacy Shield being invalidated, institutions have become more and more aware that they are responsible for how vendors deal with their data and that they need the right agreements with their vendors to reduce privacy and security risks. If they do not have this in place it will lead to non-compliance, risk of...
Browsers gotta preserve privacy, they be crackin' down on cookies, we get it, now let us use our cookie across several domains - deal? A tale of FedCM.
When you picture an architect at work, how do you see him? Holding a pencil over a drawing board, maybe? How about the architects that designed the Morpheus Hotel in Macau, the Gherkin in London, or the Louvre in Abu Dhabi? Still imagining pencils? Architecture, like many other art forms, frequently mirrors the technological advancements of its time, and these are just some examples of the...
APK Falcon is a tool to assist users in assessing the impact of mobile apps on privacy, improving their knowledge and empowering their decision-making in accordance with the values of the EU Next Generation Internet. APK Falcon will help users understand the permission system, leading to a better permission management, such as revoking highly intrusive permissions or being more careful and...
During the covid crisis, I followed my course using Teams. In many cases the video/audio quality was really bad, and yet none of the speedtests I ran showed any abnormality. What happened ? At that time, all speedtest websides only measure throughput. They measure latency as well, but as idle latency (without load on it). However, when you attend a class/meeting there are always other...
Research shows that Artificial Intelligence (AI) can be an effective tool for automated cyber threat hunting; however, the lack of explainability still prevents its mass deployment into commercial-grade tools. Due to the AI complexity, it is hard to get reasons behind its output, which are crucial for cybersecurity incident handling and response. We thus bring new design principles of AI by...
Incident communication is the process of alerting users that a service is experiencing some kind of unavailability or degraded performance. It is expected that most companies provide 24/7 availability. Poor and slow communication can lead to frustration, a longer time to resolve issues, and unhappy customers.
Incident communication is more complex than just sending an email. There are...
The Ethiopian Education and Research Network (EthERNet) was initiated in 2001 as a part of a national capacity-building program that included projects to provide connectivity and support the public higher education institutes in the way their data, research outputs are organized, preserved, discovered and disseminated to the audiences. HEMIS is one of the successful projects that is hosted at...
As widespread use of the internet continues to grow, the prevalence of security threats it faces follows suit. Quantum Key Distribution (QKD) aims to make the internet a more secure system by providing the possibility to generate perfectly secure keys that can be applied to secure communication soundly. This lightning talk highlights the state of the art in standardisation of QKD equipment,...
The SDGs have become a benchmark to strive towards a better world. Therefore, showcasing that NRENs carry out SDG-tailored activities is key to persuading policy and decision makers of their inherent value to support them in terms of funding and resourcing.
This lightning talk aims to unpack some of the key results of the work done by the AfricaConnect3 communications team on gathering...
Whilst there are established routes such as the European Horizon Programme for funding large multi-year projects such as GÉANT, EOSC, etc., sources of funding for small short-term projects can be difficult to find. The ability to fund small short-term projects is vital in an environment such as the Internet in order that new ideas, nascent technology & proof of concept can be explored quickly....
In February 2023, the inaugural cohort of grant recipients of ORCID’s Global Participation Fund was recognized. This fund is designed to promote accuracy and integrity and further collaboration in scientific research and scholarship, particularly in low- and lower-middle-income economies as categorized by the World Bank. NRENs have always played an important role in enabling research and...
Digitalization in education has and is transforming the existing dynamics within the traditional school ecosystem. The introduction of various software and hardware technologies over the past decade has systematically changed the traditional structure of the school system. In this talk, I share instances of technology choice in the school context in relation to public values and the conflict...