Shape the future of the European software community by joining the conversation and sharing your feedback today. Start the discussion now!

Welcome to the Online SW-Forum!

This is an online discussion environment where you can contribute your ideas and feedback to the European software initiative. Join us in shaping the future of software development and innovation in Europe.

Why take an active role in the Online SW-Forum?

Taking an active role in the European software forum allows you to contribute to shaping the future of the software industry in Europe. By participating in discussions and sharing your insights, experiences, and feedback, you can help identify challenges, propose solutions, and drive positive change. You can also connect with like-minded professionals, expand your network, and stay up-to-date on the latest trends and advancements in the industry. In addition, actively participating in the forum can enhance your professional reputation and demonstrate your thought leadership to others in the industry.

What you can do?
  • Start a new discussion
  • Share your news, blogs, reports, questionnaires, survey, events and results
  • Engage in meaningful discussions with other professionals in your field and have your say!
Where to start?

You can follow the steps below.
STEP 1. Register and login to the SWForum.eu website
You can use your user, research or organisation to register. After connecting your personal account, update your SWForum.eu profile. 
You can follow the steps below. If your internet is slow, please give time for the .gif files to load. 

STEP 2. Post
Once you have completed the registration process (1. registering using the Social/academic login) and while logged in, you can create new posts or start commenting on existing discussions. You can also filter the discussions based on topics.

 Who is invited to participate?

Representatives from the following organisations are encouraged to provide feedback and input:

  • Software technology and digital infrastructure communities
  • EC-funded H2020 and Horizon Europe projects
  • Policymakers and decision-makers
  • Software Engineering Experts
  • SMEs and Large industries
Rules
  1. No Spam / Advertising / Self-promotion in the forums
    This forum defines spam as unsolicited advertisement for goods, services and/or other websites, or posts with little, or completely unrelated content. Do not spam the forum with links to your site or product, or use it to self-promote your website, business or forums etc. Spamming also includes posting the same content repeatedly. DO NOT ASK for email addresses or phone numbers. Failure to do so will result in your account being banned permanently and your posts being deleted.
  2. Don't post copyright-infringing material
    Providing or asking for information on how to illegally obtain copyrighted materials is forbidden.
  3. Do not post “offensive” posts, links or images
    Any material which constitutes defamation, harassment, or abuse is strictly prohibited. Material that is sexually or otherwise obscene, racist, or otherwise overly discriminatory is not permitted on these forums. This includes user pictures. Use common sense while posting.
  4. Remain respectful of other members at all times
    All posts should be professional and courteous. You have every right to disagree with your fellow community members and explain your perspective.
    However, you are not free to attack, degrade, insult, or otherwise belittle them or the quality of this community. It does not matter what title or power you hold in these forums, you are expected to obey this rule.
  5. Posts are moderated by the SWForum.eu team
    The SWForum.eu team retains the right to moderate posts on this forum and to remove content that infringes the rules of the forum.

In case you should encounter any issue or bug related to the Online SW-Forum or if you need support on its use, please contact info@swforum.eu.

If you want to suggest the inclusion of other tags to the Online SW-Forum, please contact info@swforum.eu.

Up
0
Down
Posted in Digital Infrastructure

Edge Computing in AI: Why It Matters for IoT Devices

The combination of Edge Computing and Artificial Intelligence (AI) is set to reshape how data is processed in today's rapidly evolving technological environment, particularly in the context of Internet of Things (IoT) devices. But why is this combination so important, and how will it affect technology in the future?

Up
0
Down
Posted in Software Technology

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E15)

S1/E15: Bonus Episode # 2 – The EU Ninth Framework Programme for Research and Innovation: Horizon Europe

Up
0
Down
Posted in Cybersecurity

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E14)

S1/E14: Bonus Episode – The EU Cybersecurity Resilience Act

Up
0
Down
Posted in Software Technology
interview

Harnessing OSS Communities for Effective Hiring

In our highly digitalized and globally networked era, software development has grown to be a central pillar of the business world and broader society. This growth has consequently resulted in an escalating demand for proficient software developers, making talent acquisition a challenge in this competitive field.

Up
0
Down
Posted in Software Technology
wave crasher

From Urban Resilience to Open Source Software Resilience

Open Source Software (OSS) projects are widely used and contribute to various domains of the digital world. However, as they evolve, OSS projects also face a lot of challenges, such as technical (i.e. accumulation of technical debt), community (i.e. community members move to another OSS project), business (i.e. finding the right business models that lead to sustainability) or legal (i.e. choosing the right licensing scheme). These challenges, among others, can impact the resilience of an OSS project.

Up
0
Down
Posted in Software Technology

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E13)

S1/E13: Wrapping up

Here we are! All good things come to an end. Time to bid farewell…

Up
0
Down
Posted in Software Technology

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E12)

S1/E12: AI: You’d better do no harm

Up
0
Down
Posted in Software Technology

Adversarial Attacks on Machine Learning Models: What Software Developers Need to Know

Machine learning and artificial intelligence have emerged as powerful tools in several domains, bringing huge changes to software development. LLMs are now used by developers to help write code and are integrated into apps and services. Similarly, other machine learning models are commonly integrated into websites and apps, either being developed and trained from scratch using proprietary data, or leveraging third party machine learning tools.

Up
0
Down
Posted in Software Technology

Prompt injection attacks in LLMs and how to defend against them

In recent months, large language models (LLMs) have gained great popularity thanks to their ability to generate human-like text and code, and tools based on them are being implemented in more and more systems. However, with such impressive capabilities comes the potential for abuse and misuse: for instance, when Microsoft originally released Bing Chat, an AI-powered chatbot somewhat similar to OpenAI’s ChatGPT, it didn’t take long until users found ways to break it.

Up
0
Down
Posted in Software Technology

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E11)

S1/E11: The European Union's Artificial Intelligence Act: Let the fight, I mean, the negotiations begin

Welcome to Part 3 of the European Union’s Artificial Intelligence (AI) Act in this blog series!

In this episode I’ll give you hints about the official positions taken by the Council of the European Union (EU), or the EU Council, on one side, and by the European Parliament (EP), on the other side, with respect to the European Commission’s (EC) proposal for the AI Act.

Up
0
Down
Posted in AI Machine Learning

On open and close machine learning models

In the ever-evolving landscape of artificial intelligence, it’s easy to assume that tech giants like OpenAI and Google hold a competitive advantage that will never fade away.

Up
0
Down
Posted in Software Technology
library

Discussions: Training the next generation of software engineers using Open Source Software

Raise your hand if you have heard this one before. “College education is disconnected from industry”. Very often, there are discussions on whether college education is effectively preparing young professionals for the challenges they are going to face when they enter the industry.

Up
0
Down
Posted in Software Development Lifecycle

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E10)

S1/E10: The European Union’s Artificial Intelligence Act – The EC proposal

Up
0
Down
Posted in Software Technology
Climbers heading for the top of the mountain

Discussions: Leading software projects in the Open Source world

Technology has been evolving rapidly over the last years. When the COVID-19 pandemic emerged, we experienced a huge digitalization wave, impacting software related to almost every aspect of a citizen's everyday life. Telecommunications, education, government applications, e-commerce, project management, productivity suites, are only some parts of the software industries that grew rapidly lately. Open Source Software has been a catalyst for over two decades in the software evolution globally.

Up
0
Down
Posted in Software Technology
An open market; a bazaar

Doing business at “the bazaar”. How open source software is [still] changing software engineering globally

Free/Libre Open Source Software (FLOSS) is a software development and distribution model that allows users to freely access, use, modify, and redistribute the source code and other, complementary, assets of software. FLOSS began to emerge in the late 1970s and early 1980s, with the development of the GNU project by Richard Stallman and the creation of the Free Software Foundation (FSF) in 1985.

Up
0
Down
Posted in Software Technology

Five ways in which large language models can make you a better software developer

The development and widespread use of large language models, such as the constantly mentioned GPT-4 and Bard, have the capabilities to revolutionise a variety of domains, and software development is at the forefront of this.

Up
0
Down
Posted in Software Technology

Correctness by construction in software development

Ensuring the correctness of code is a top priority. Traditionally, the dominant approach has been test-driven development (TDD), which consists in writing tests to validate the code after it has been written. The core idea is to provide examples of desired behaviour (in the form of tests), and check the code output against them.

Up
0
Down
Posted in Software Technology
Person and code

Discussions: How to deal with Technical Debt in Open-Source Software?

Technical Debt (TD) is one of the most important aspects in today’s software engineering. It needs to be monitored and properly taken care of before it spreads too much within the code base. TD in a software project is more than a need for proper refactoring. It resembles the cost that the company, organization, or team behind a project, is paying to maintain the TD, in the long term.

Up
0
Down
Posted in Software Technology

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E9)

S1/E9: The difficult art of regulating magic. I mean, technology

As Arthur C. Clarke purportedly said, Magic is just science that we don’t understand yet. And as my son, about four years old, once told me, Look dad, I’m super intelligent! 2+2=4!

Up
0
Down
Posted in Digital Infrastructure

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E8)

S1/E8: Data in the European Union – a matter of Knowledge, Intelligence, and Wisdom?

After discussing EU policies and legislation that regulate the Software Industry in areas like personal data processing, cybersecurity, and Big-Tech services and competition, this episode will turn our attention to probably the most essential component of the software world, namely data. Yes, in general.

Up
0
Down
Posted in Software Technology

AI and the Future of Education: Revolutionizing Learning Experiences

Education is a privileged knowledge domain for UNESCO and also an area where Artificial Intelligence is expected to have great impact, but also where much polemic is taking place.

Up
0
Down
Posted in Software Technology

The Coding Saga | An Evolutionary Tale of Programming Languages

Programming is not about typing, it’s about thinking- Rich Hickey

Programming languages, integral to the software that shapes our digital reality, have traversed an impressive journey of evolution. This evolution, marked by remarkable innovation, has significantly reshaped software development. This post will explore the compelling history of programming languages and their profound influence on the software industry.

Up
0
Down
Posted in Software Technology

Individualised tutoring with LLMs

In the current era, technology and artificial intelligence are playing a pivotal role in transforming many industries and domains, and education and the learning landscape are no exceptions.

Up
0
Down
Posted in Digital Infrastructure

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E7)

S1/E7: The Digital Services Act and the new notions of VLOP and VLOSE – Part 2

Greetings for the Part 2 of the Digital Services Act (DSA)!

Up
0
Down
Posted in Software Technology

The Dawn of AI in DevOps

There is no future of IT operations that does not include AIOps. This is due to the rapid growth in data volumes and pace of change (exemplified by rate of application delivery and event-driven business models) that cannot wait on humans to derive insights. -Gartner AIOps Market Guide for AIOps Platforms 2021

Up
0
Down
Posted in Software Technology

Software Documentation: The Silent Hero in Software Development and Best Practices

Documentation is a love letter that you write to your future self. - Damian Conway, a prominent contributor to the Perl community.

When we delve into software development, we often focus on coding, testing, and debugging. However, another crucial player in the development process deserves our undivided attention – a component as vital as the software code itself: software documentation.

Up
0
Down
Posted in Digital Infrastructure

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E6)

S1/E6: The Digital Services Act and the new notions of VLOP and VLOSE – Part 1

Welcome to a new episode or our series, which explains selected European Union (EU) policies and laws that were recent proposed/applied, and which impact the Software Industry! Today I’m going to explore the very recent Digital Services Act, or DSA.

Up
0
Down
Posted in Software Technology

Tackling misinformation with machine learning

In the current age, fake news has become a pervasive issue, spreading misinformation and manipulating public opinion. Social media and online news platforms have always been affected by fake news -- on twitter, it was shown that false news travel faster than true stories -- and this made some form of fake news detection mechanism paramount.

Up
0
Down
Posted in Software Technology

Hope in the Dark: How AI is Unlocking New Possibilities for Rare Disease Patients

Rare diseases affect a significant portion of the population, with over 7000 rare diseases collectively affecting more than 400 million people worldwide. The majority of these diseases fall under the category of neurodevelopmental disorders (NDDs). Patients with rare diseases face numerous challenges, including misdiagnosis, delayed diagnosis, and a lack of available treatment options. These challenges are exacerbated by the limited data and information available about these diseases.

Up
0
Down
Posted in Software Technology

Picture Perfect: The Vital Role of Sophisticated Data Visualization in AI Communication

Some say that “a good image is worth a thousand words” and, either we agree with this or not, data visualization has a very important impact in the communication of otherwise difficult to handle information as, e.g., large tables or multidimensional comparisons. Some could argue that even in the foundations of mathematics, this is an important role of Geometry in its relation to Algebra.

Up
0
Down
Posted in Software Technology

Navigating the Complex World of AI Development with Agile

As we hurtle forward into a future where Artificial Intelligence (AI) is becoming omnipresent, our conventional project management methods are being tested. These traditional systems, designed for a simpler time, are often found wanting in the face of AI projects' dynamic and exploratory nature. Here, Agile methodology steps in, bridging the gap and bringing a new level of efficiency and adaptability.

Up
0
Down
Posted in Digital Infrastructure

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E5)

S1/E5: The Digital Markets Act and the new notion of Gatekeepers

In this episode and the next, we’ll talk about a set of very recent twin EU legislations: The Digital Markets Act and the Digital Services Act, which also have a large impact on the Software Industry, more specifically on the so-called Big-Tech and their relationships with consumers and competitors.

Up
0
Down
Posted in Software Technology

A Layman's Guide to Understanding Deep Learning

As technology advances, we often hear terms like 'Artificial Intelligence,' 'Machine Learning,' and 'Deep Learning' thrown around in discussions. While these words might seem daunting for a layperson, fear not! This post aims to demystify deep learning, breaking it down in an easily digestible way for everyone.

Up
0
Down
Posted in Software Technology

Large Language Models and the Quest for Artificial General Intelligence

“Tracking progress is getting increasingly hard, because progress is accelerating. This progress is unlocking things critical to economic and national security –and if you don’t skim [papers] each day, you will miss important trends that your rivals will notice and exploit.” ​Jack Clarke Cofounder at Anthropic, Former Policy Director at OPENAI​

Up
0
Down
Posted in Software Technology

Uncovering the Hidden Biases: Diving Into The Complex Relationship Between Bias and AI

Associated with the overwhelming digital transformation of most industries, artificial intelligence (AI) is transforming our world in numerous ways, from healthcare and transportation to entertainment and education. However, the sense of losing the Human common sense to the automation of the machine brings up one issue that has arisen with the increasing use of AI: the problem of bias.

Up
0
Down
Posted in Software Technology
floods

Riding the Storm: How AI is Can Contribute to A More Efficient Response to Extreme Weather

Extreme weather events such as hurricanes, floods, and wildfires are becoming more frequent and severe due to climate change. These disasters can cause extensive damage to infrastructure, loss of life, and disrupt economic and social systems. In such situations, early detection and rapid response are critical for mitigating the impact of these events. But it is also useful to use data-driven methods to have an early overall assessment of the impact caused by the natural event.

Up
0
Down
Posted in Software Technology

Discovering the Power Couple - How AI and Big Data Empower Each Other

There were 5 exabytes of information created between the dawn of civilization through 2003, but that much information is now created every two days. -Eric Schmidt, Executive Chairman at Google

Up
0
Down
Posted in Software Technology

Privacy-preserving machine learning

In today's digital age vast amounts of data are constantly being generated and processed, for every action we complete on our devices, and this has made privacy a paramount concern. Indeed, machine learning algorithms thrive on large datasets, and it was often the case that user privacy was ignored for the sake of having more advanced algorithms and models.

Up
0
Down
Posted in Software Technology

The Evolution of Artificial Intelligence: From ELIZA to GPT-4

Artificial Intelligence (AI) has evolved remarkably since its conceptual beginnings in the mid-20th century. From ELIZA, the first Natural Language Processing (NLP) program developed in the 1960s, to today's advanced models like GPT-4, AI's journey is a testament to human innovation. The birth of AI can be traced back to the 1950s and 60s. At this time, AI was a fledgling field, exploring the possibilities of machines that could mimic human intelligence.

Up
0
Down
Posted in Software Technology

A/B testing in software Development

Picture this scenario: you have just made some changes on your web application, and would like to know how effective they are in improving the users' experience. One option is to wait until a satisfactory number of users have interacted with the new version of the web application and compare their behaviour with the average user behaviour before the changes were implemented, but this raises two issues:

Up
0
Down
Posted in Cybersecurity

Defence Against Phishing Attacks

Phishing attacks are a type of cyber attack that involve tricking a victim into divulging sensitive information, such as passwords, usernames, or credit card numbers. There are several different types of phishing attacks, each with its own unique characteristics and methods of operation. In this article, we'll explore the most common types of phishing attacks and how to recognize and avoid them.

Up
0
Down
Posted in Cybersecurity

Buffer overflow attacks and how to defend against them.

A buffer overflow is a type of cyber attack that occurs when a program or system tries to store more data in a buffer than it was designed to handle. This type of attack is often used by hackers to gain unauthorized access to a system, execute malicious code, or crash a system. In this article, we will discuss buffer overflow cyber attacks in detail, including how they work, common attack vectors, and how to prevent them.

What is a Buffer Overflow?

Up
0
Down
Posted in Software Technology

Greening the Supply Chain: How Computer Vision is Transforming Logistics for a Sustainable Future

As the world becomes more aware of the impacts of climate change, there is a growing need for businesses to adopt more sustainable practices. One area where the ecological transition is particularly important is logistics, where companies can significantly reduce their carbon footprint by optimizing their supply chains and transportation networks. More than 90% of the transport of goods is made by sea, something to think about whenever we are about to finalize an online shopping that most probably will require international shipping.

Up
0
Down
Posted in Software Technology

The Doctor Will See You Now: How AI is Empowering Public Health Decision-Making

The COVID-19 pandemic has had a profound impact on public health, with millions of people worldwide affected by the virus. In response, governments, healthcare providers, and researchers have been using a range of tools and technologies that were built on innovation that was often refocused from the original objectives or assembled from existing tools and libraries, to provide insight on the evolution of the pandemic, manage the spread of the virus and improve public health outcomes.

Up
+1
Down
Posted in Cybersecurity

Gas Networks as Targets for Cyber Attackers

Cybersecurity is of utmost importance for gas networks, as they are critical infrastructure systems that can have serious consequences if compromised. Here are some key considerations for cybersecurity in gas networks:

  1. Risk assessment: Gas networks should perform a comprehensive risk assessment to identify all potential vulnerabilities and risks associated with their systems. This should include an evaluation of their hardware, software, and network infrastructure.

Up
0
Down
Posted in Cybersecurity

Navigating the nexus of Policy, Digital Technologies, and Futures (S1/E4)

S1/E4: The European Cybersecurity Competence Centre and the Network of National Coordination Centres

As a continuation of our series about EU policies and regulations that heavily impact the art of software design and the businesses of software development and deployment, today we’re going to read about the European Cybersecurity Competence Centre.

Up
0
Down
Posted in Cybersecurity

Cyber-Security Concerns for Industrial Manufacturing

As industries become more reliant on technology and interconnected devices, cyber security has become an increasingly important concern for industrial manufacturing companies. The potential impact of a cyber attack on a manufacturing facility can be significant, including downtime, loss of production, reputational damage, and even physical harm to employees.

Up
0
Down
Posted in Software Technology

Transparency is Key: Exploring the Promise and Potential of Explainable AI

If you’ve been following the news or at least reading our posts in this SWForum.eu discussion, you’ve noticed that Artificial intelligence (AI) is rapidly transforming our world in a variety of ways, from healthcare and transportation to finance and entertainment. The drivers of change are often deep learning algorithms with enormous potential.  However, as AI becomes more advanced, it is also becoming more complex and difficult to understand.

Up
0
Down
Posted in Digital Infrastructure

Human Factors in Cyber-Security

In today's digital age, cybersecurity has become an essential part of every organization's operations. Cyber-attacks have the potential to cause massive damage to organizations, both in terms of financial losses and damage to reputation. While most organizations invest heavily in cybersecurity tools and technologies to protect their systems and data, human factors in cybersecurity are often overlooked. Human factors refer to the role that human behavior and psychology play in cybersecurity.

Human Factors in Cybersecurity

Up
0
Down
Posted in Digital Infrastructure

The potential dangers of AI

Artificial Intelligence (AI) has the potential to revolutionize the way we live and work. It has already made significant advances in areas such as medicine, finance, and transportation. However, as with any powerful technology, there are potential dangers associated with the development and use of AI.

Up
0
Down
Posted in Software Technology

On the importance of AI literacy

Artificial Intelligence (AI) is rapidly changing the world around us. It is already being used – and it has been used for several years – in a variety of domains and on a variety of tasks, from education to medical diagnosis, from personalized recommendations to content creation.

Up
0
Down
Posted in Software Technology

Recommender systems: benefits and practical guidelines for software professionals

Recommender systems are a type of information filtering system that predict and recommend items that a user may be interested in. These systems are widely used in e-commerce, social media, online content platforms, and other domains where there is a large amount of content to be filtered and personalized recommendations can enhance user experience.

Up
0
Down
Posted in Cybersecurity

Attacks Against Energy Systems with Reference to Ukraine

As technology continues to advance, cyber-attacks have become more prevalent, and the targets of such attacks have expanded to include power systems. A power system is a critical infrastructure that provides electricity to homes, businesses, and industries. A successful cyber attack on a power system could result in significant damage to the infrastructure, loss of life, and even economic collapse. In this post, we will discuss the potential consequences of cyber-attacking a power system and ways to prevent such attacks.

Up
+1
Down
Posted in Cybersecurity

Navigating the nexus of EU Policy, Digital Technologies, and Futures (S1/E3)

S1/E3: A little bit of gossip: Am I paranoid or there is indeed someone behind my laptop camera?

 

Up
0
Down
Posted in Software Technology

Revolutionizing Creativity: How AI is Transforming Art and Performance

Art and performance,  have always been integral to human culture, providing a medium for expression, communication, and entertainment. In the past decades, these art expressions have been impacted by technology, from the digital avatars of the pop music of Gorillaz to the better and better special effects in the cinema, taking also part in circus, theater and dance performances.

Up
0
Down
Posted in Cybersecurity

Ensuring Transparent and Intelligible Machine Learning in Manufacturing: Striking the Balance Between Accuracy and Trust

Machine learning models have the potential to transform manufacturing by predicting equipment failures, optimizing production schedules, and identifying bottlenecks. However, to ensure the success of these applications, stakeholders must trust the models and their recommendations. Transparency and intelligibility are vital to building this trust, as they allow users to understand the rationale behind the model's decisions, ensuring that the AI-driven recommendations are reliable and justifiable.

Up
0
Down
Posted in Software Technology

The Power of Predictive Maintenance: Transforming Asset Management

In today's highly competitive business landscape, organizations continuously seek ways to optimize performance and minimize downtime. Maintenance can be broadly categorized into four main types, each with its unique approach to ensuring equipment efficiency and longevity. These include reactive maintenance, preventive maintenance, predictive maintenance (PdM), and condition-based maintenance. Reactive maintenance, also known as "run-to-failure" maintenance, involves repairing or replacing equipment only after it has failed.

Up
+1
Down
Posted in Cybersecurity

Unbreakable Chains: How AI is Fortifying Cyber Resilience in Supply Chains

Conventional log monitoring solutions rely on manual rule-based analysis, whereas newer AI techniques utilize Natural Language Processing to model log streams and detect normal operating patterns. However, combining the benefits of these dynamic and static monitoring methods can create a powerful automated system capable of identifying anomalous situations and potential security risks without requiring human intervention. In this article we explore the potential benefits of integrating both novel and well-established techniques, in the context of an often conservative domain.

Up
+1
Down
Posted in Cybersecurity

Moving Target Defences

Moving Target Defense (MTD) is a cybersecurity approach that aims to increase the resilience of computer systems and networks by continuously changing the attack surface or defense profile. This approach involves dynamically changing the system's configuration, topology, or behavior to prevent attackers from gaining access, detecting vulnerabilities, or launching successful attacks. The objective of MTD is to make it more difficult and time-consuming for attackers to exploit system weaknesses, thereby reducing the chances of a successful attack.

Up
0
Down
Posted in Software Technology

False Data Injection Attacks

False data injection attacks are a type of cyber attack that targets data systems and networks by introducing malicious or incorrect data into the system. This attack is a form of data poisoning that aims to compromise the integrity of data and can lead to serious consequences such as data loss, theft, and manipulation. False data injection attacks can be carried out in various ways and can target different types of systems, including industrial control systems, financial systems, and healthcare systems.

Up
+1
Down
Posted in Advanced Digital Skills

An introduction to automated Virtual Teaching Assistants and practical guidelines for building one

Virtual assistants have become increasingly popular over the past decade, and are now an integral part of our lives. From Apple’s Siri to Amazon’s Alexa and Google Assistant, the most popular digital assistants are generally voice-activated and can be employed for a variety of purposes, such as managing our calendars, starting playlists, and conducting online searches.

Up
0
Down
Posted in Cybersecurity

Navigating the nexus of EU Policy, Digital Technologies, and Futures (S1/E2)

S1/E2: The General Data Protection Regulation of the European Union – It’s good to be a EU citizen

Up
0
Down
Posted in Ethical Computing

Empowering Citizen Developers: The Future of No-Code/Low-Code Platforms

The most damaging phrase in the language is “It’s always been done this way.”

Grace Hopper

Up
+1
Down
Posted in Open Source

Watering the Future: How AI is Reshaping the Way We Manage Our Most Precious Resource

Water is a vital resource essential for life and indispensable for many industrial and agricultural activities, determining one of the UN/s sustainable development goals being a priority for most governments worldwide. Preceding the UN Congress on Water we discuss how the management of water resources has become a critical concern, and AI and business intelligence have emerged as powerful tools for improving water management.

Up
+1
Down
Posted in AI Machine Learning

Learning to Unlearn: The Importance of Machine Unlearning in the Age of Big Data

 

"The Time we learn what to unlearn is the time we grow up." - Bishmeet Singh

Most of the time, we think that big data is better data. This can be correct in some cases, but we all know the importance of quality data and how hard to obtain it. Even though we cleaned our data, the dataset could still contain inaccurate entries. As a result, they reduce the performance of our machine-learning models. This is an unwanted situation, but there could be worse.

Up
0
Down
Posted in Software Operations

Navigating the nexus of EU Policy, Digital Technologies, and Futures

(S1/E1)

Why (and how) everyone and their neighbour in the Software Sector should be aware of European Union legislation

Up
0
Down
Posted in Computing Continuum

Post Quantum Encryption

Quantum computers are a type of computing technology that uses quantum mechanics principles to perform computations. Unlike classical computers, which use binary digits (bits) to represent information as either 0 or 1, quantum computers use quantum bits (qubits) that can be in superposition, meaning they can represent both 0 and 1 at the same time. The development of a fully functional quantum computer is an active area of research, and while significant progress has been made, it is difficult to predict exactly when a working quantum computer will be available.

Up
0
Down
Posted in Cybersecurity

Cyber-Security for Power Systems

Cybersecurity has become one of the most critical aspects of modern-day technology. With the increasing reliance on technology in power systems, cyber-attacks pose a significant risk to the reliability and security of the power grid. Cybersecurity threats have become more sophisticated and complex, leading to significant damages, including blackouts, financial losses, and theft of sensitive information. Therefore, there is a need to understand the cyber security concerns for power systems to develop effective measures to mitigate cyber-attacks.

Up
+1
Down
Posted in Open Source

Transforming education with ChatGPT and large language models

Artificial Intelligence (AI) has transformed many industries, and the possibilities of what it can achieve continue to expand.

Up
+1
Down
Posted in Open Source

The Moral Compass of AI: Navigating the Ethics of Artificial Intelligence

With the rapid digital transformation across industries, AI is rapidly transforming workflows and competences, from healthcare and finance to manufacturing and transportation. However, as AI becomes more advanced and widespread, there are growing concerns about the ethical implications of its use. In recent years, there has been a significant focus on the current state of AI and ethics, with many experts highlighting the need for ethical guidelines and standards to ensure that AI is used in a responsible and fair manner.

Up
+1
Down
Posted in Big Data and HPC

Should I trust my data?

Should i trust my data

 

"Data is like garbage. You'd better know what you are going to do with it before you collect it." - Mark Twain

Up
0
Down
Posted in Cybersecurity

Cyber-Security Concerns in the Medical Device Domain

Cybersecurity in the medical device industry is a growing concern as technology continues to advance and devices become more interconnected. While medical devices have brought about significant improvements in patient care and outcomes, they are also vulnerable to cyberattacks, which could have severe consequences for patients and healthcare providers alike. In this article, we will explore some of the major cybersecurity concerns in the medical device sector and discuss some potential solutions to address them.

Up
+1
Down
Posted in Cyber-physical systems

The importance of Cyber-Security in Autonomous Vehicles (AVs) and some potential methods of enhancing security.

Self-driving cars, also known as autonomous vehicles (AV), are the future of transportation. They offer convenience, safety, and efficiency to their users. However, as with any technology that is connected to the internet, self-driving cars are vulnerable to cyber-attacks. Cybersecurity is essential for self-driving cars to be safe and reliable. In this post, we will discuss self-driving car cybersecurity and the measures that can be taken to ensure the safety of these vehicles.

Up
+1
Down
Posted in Open Source

Unleashing the Power of Generative AI: A Game-Changer for Our Lives

Once again the disruptive advances of scientific and technological innovation make the headlights. And like an information avalanche, it fills most communication channels, from blogs and social media to youtube tutorials and webinars, with the fantastic potential of Artificial Intelligence (AI) and how it can change our lives forever. In fact, AI has been between us for a while now, optimizing the operations we do every day at home, at work, and in our cars (even though they are not yet flying or driving on their own, but that has little to do with AI).

Up
+1
Down
Posted in Software Technology
Reserve your seat for the upcoming SWForum.eu Webinar on 21 February 2023 - 15:00-16:30 CET

Reserve your seat for the upcoming SWForum.eu Webinar on 21 February 2023 - 15:00-16:30 CET

Reserve your seat for the upcoming SWForum.eu Webinar "Software Technologies and Standards: Enabling Interoperability and Innovation" on 21 February 2023 at 15:00-16:30 CET. 
Up
0
Down
Posted in Open Source

10 October: SWForum.eu Webinar: Leveraging OSS technologies for better services in the European software ecosystem

We are organising a webinar on 10 October 2022 at 14:30 CEST and will focus on leveraging open source technologies for better services in the European software ecosystem.


SWForum.eu works to enhance the visibility and increase the competitiveness of research and innovation in the field of software technologies, digital infrastructure and cybersecurity, especially European-funded Research and Innovation Action (RIA) projects. Moreover, the project aims to introduce best practices and technology transfer opportunities to cross-synergise European excellence.

Up
0
Down
Posted in Advanced Digital Skills

CTO for WeBuust - Significant equity compensation

About the role on offer:

We are looking for an experienced software developer, who will both write code and own the development roadmap and technology choices of WeBuust going forward. The position offers significant equity compensation for a multi-year engagement as a WeBuust core team member (CTO) among other WeBuust owners. Passion and willingness for writing code is a must, as is a clear view for designing and planning of platform architecture.

CONTACT: info@webuust.com

About WeBuust:

Up
0
Down
Posted in Open Source

HomeForUkraine: a project for supporting war refugees

Hello to everybody, I'm a web developer.

I'm working on a no-profit project called HomeForUkraine that should work like an Airbnb for war refugees, where people are the hoster and the "customers" are the no-profit organizations that have to find a temporary homes for war refugees.

Up
+1
Down
Posted in Software Technology

Challenges in Software Quality

The IEEE Software editorial argues that maybe we can achieve software quality without the concessions to “good enough” that we have become used to making in our work, despite the advances in software technology in recent years.

Can it be done? What are your thoughts on the challenges in software quality we are facing?

Read the full article here

Let us know what you think by replying to this post!

Up
0
Down
Posted in Computing Continuum

European Alliance for Industrial Data, Edge and Cloud

Important alliance in the Computing Continuum. Consider joining!

https://ec.europa.eu/growth/industry/strategy/industrial-alliances/european-alliance-industrial-data-edge-and-cloud_en

 

Up
+1
Down
Posted in Open Source

OSOR Country Intelligence Reports and Factsheets

The Open Source Observatory (OSOR) has the mission of promoting Free and Open Source Software in public administrations across and beyond Europe.

Up
+1
Down
Posted in Software Technology

Try DECODER software tools and get rewarded for your efforts

The DECODER project is building a software project intelligence platform. We are now offering two beta-testing campaigns for recent open source utilities:

Up
+1
Down
Posted in Software Technology

University of Oxford Hiring Research Software Engineer for SWForum.eu Project

The Department of Engineering Science at Oxford University is looking for a full-time Research Software Engineer to lead their participation in the SWForum.eu Horizon 2020 project.

Up
0
Down
Posted in Cybersecurity

Join the Cyberwatching.eu Project Clustering activity now!

The Cyberwatching.eu is pleased to share with you the Project Clustering page, where you could find and collaborate with the existing project clustering  around the cybersecurity and privacy community. Cyberwatching.eu has supported collaboration and mini-clusters between R&I projects focusing on cybersecurity solutions and best practices in vertical sectors and horizontal topics.