The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 91 to 105.
NASA International Open Data Challenge 2015
http://editors.cis-india.org/openness/events/nasa-international-open-data-challenge-2015
<b>As part of the initial NASA Open Government 2.0 plan, the NASA International Open Data challenge brings together the FOSS community, citizen scientists, open data practitioners , open hardware enthusiasts and students for collaborative problem solving with the goal of producing relevant open-source solutions to address global needs applicable to both life on Earth and life in Space.</b>
<p style="text-align: justify; ">On April 11 and 12, 2015 2015, the event will be organized by the Centre for Internet and Society in collaboration with mentors from Team Indus, one of India's leading Space Technology Start-Ups. The event will start off with the following keynote and workshops at 9am on Saturday, April 11th, 2015:</p>
<div style="text-align: justify; "><b>Pre-Hackathon Workshop: 9 a.m., Saturday, April 11, 2015</b></div>
<div style="text-align: justify; ">IBM Blue Mix Team + OpenCube Labs</div>
<div style="text-align: justify; ">(Big Data Analytics using Cloud Services like Bluemix/Heroku, with node.js implementation and Android APIs)</div>
<div style="text-align: justify; "></div>
<div style="text-align: justify; ">
<div><b>Keynote: Amar Sharma, 12 p.m., April 11, 2015</b></div>
<div>Amar is credited as being the youngest and first Indian amateur astronomer to have an Asteroid named after him in 2014 at the age of 29. <b>(380607 Sharma)</b> He will talk about CCD Astro Imaging and his travails and journey as a self-made astronomer and comet hunter.</div>
<div></div>
<div>We will then break off into teams to commence the hackathon that will end on Sunday,April 12, 2015 at 6pm, after which teams will upload and present their solutions for Local and Global Nominations.</div>
<div></div>
<div>Registration is free and you are required to confirm participation at the below link:</div>
<div><a href="https://2015.spaceappschallenge.org/location/bangalore/">https://2015.spaceappschallenge.org/location/bangalore/</a></div>
</div>
<div style="text-align: justify; "></div>
<div style="text-align: justify; ">Participants are requested to bring their own laptop/computing devices.</div>
<hr />
<p> </p>
<div style="text-align: justify; ">Please see last year's event's focus on Open Science and Big data, and the various Open Data solutions developed at CIS, to get an idea of what the event is about:</div>
<div style="text-align: justify; "><a href="https://2014.spaceappschallenge.org/location/bangalore/">https://2014.spaceappschallenge.org/location/bangalore/</a> This year, we will have a workshop on Big Data Analytics conducted by IBM BlueMix Labs followed by Heroku implementation and Android Programming by friends of CIS from OpenCubeLabs, that will follow a very special Keynote speaker who is first amateur astronomer to have an asteroid named after him, to join the likes of Ramanujan and Vikram Sarabhai.</div>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/nasa-international-open-data-challenge-2015'>http://editors.cis-india.org/openness/events/nasa-international-open-data-challenge-2015</a>
</p>
No publishersharathOpen DataEventBig DataOpenness2015-04-27T01:08:27ZEventCybersecurity and the Internet of Things
http://editors.cis-india.org/internet-governance/events/talk-on-cybersecurity-and-internet-of-things
<b>US Consulate Chennai formally Invite you for a talk by David F.Heyman on March 19, 2015 in Hotel Atria, Palace Road, Bangalore. The event is being organized by the US Consulate, Chennai, Cyber Security & Privacy Foundation (CSPF) and the Centre for Internet & Society (CIS).</b>
<p><b>Note: Please register to come to the event, if you are not attending please inform us. </b></p>
<hr />
<p style="text-align: justify; ">David Heyman, former Assistant Secretary for Policy at the U.S. Department of Homeland Security and retired Software Engineer Reimagining and Transforming Cities, Governments, and Lives with the Internet of Things For the first time in human history more people live in cities than anywhere else.</p>
<p style="text-align: justify; ">By 2050 three-fourths of the world’s population will live in cities. As more and more people move to cities, more of the world’s challenges, from emerging infectious diseases, crime, economic growth, and environmental degradation, will be concentrated in cities. Citizens will expect and demand more from their leaders; and governments will face greater pressure to provide services better, faster, cheaper to more and more, potentially with less and less resources.</p>
<p style="text-align: justify; ">More than any other force driving change over the horizon, the Internet of Things (IoT) holds the potential to connect and infuse devices, business assets, infrastructures, and other elements of a city with greater intelligence and efficiencies to drive a new era of innovation and performance. And yet, this potential is juxtaposed against a backdrop of an explosion in cybercrimes and threats facilitated by the increased linkages between the physical and cyber world that is at the heart of IoT, and which affords malicious actors anywhere in the world the potential to disrupt services and lives on a far more consequential level than ever before.</p>
<p style="text-align: justify; ">In his remarks, David Heyman, former Assistant Secretary for Policy at the U.S. Department of Homeland Security, and retired software engineer, will discuss the extraordinary potential of the IoT, the barriers to adoption, and how governments and businesses can navigate this new frontier, work together, and re-imagine and transform cities—and nations—for tomorrow.</p>
<h3 style="text-align: justify; ">David F. Heyman</h3>
<p style="text-align: justify; ">David F. Heyman has over two decades of experience as a leader in spurring innovation, risk management, and strategy development in the public and private sector. He is a leading expert in national security and international affairs, counterterrorism, cybersecurity, building resilience, and critical infrastructure protection, with broad experience in the U.S., Europe, Middle East and Asia. Heyman’s career includes service at the highest levels of the U.S. government, working in senior positions at the White House, the U.S. Department of Energy, the U.S. Department of Homeland Security, as well as in the private sector.</p>
<p style="text-align: justify; ">Most recently, Heyman concluded five years of service as Assistant Secretary of Policy (operating as an Under Secretary equivalent) at the U.S. Department of Homeland Security (DHS). As a member of the senior management team at DHS, Heyman was responsible for the Department’s strategic planning, risk and decision analysis, policy development, and thought leadership across all five departmental mission areas: counterterrorism, border security, immigration,<br />cybersecurity, and building resilience to disasters. During his tenure, Heyman helped transform the Department from a budget-driven to a strategydriven organization, and instituted an enterprise risk-management architecture for managing the Department’s $60 billion budget. He oversaw and initiated the Department’s largest expansion in global engagement, and in this role, led efforts to build new strategic partnerships with the World Customs Organization, the World Economic Forum, and some of the most consequential and complicated geopolitical relationships facing the United Stated today, including China, India, the European Union, and others. Heyman designed and launched multiple domestic, bilateral, and global initiatives to bolster U.S. security and prosperity. He was the chief architect of the nation’s first National Strategy for Homeland Security—the Quadrennial Homeland Security Review—which elevated and established cyber security and building national resilience as core homeland security missions. He led efforts around five Presidential Initiatives<br />to: empower communities to counter violent extremism; strengthen global supply chain security; expand travel and tourism to the United States; streamline and modernize the U.S. import and export system; and develop and implement a new perimeter approach to North American Security which resulted in the Beyond the Border Initiative signed by President Obama and Canadian Prime Minister Carper.</p>
<p style="text-align: justify; ">He led the creation of the Resilient STARTM program and the Rick Rescorla National Award for Resilience, and is wellknown for drafting the policy to eliminate the color-code Homeland Security Advisory System and replace it with a more disciplined National Terrorism Advisory System, now used by the U.S. government. Previously, Heyman founded and directed the Homeland Security Program at the Center for Strategic and International Studies (CSIS), one of the nation’s leading and most influential think tanks in international security and taught security studies and science and technology policy as an adjunct professor at Georgetown University. Heyman also served as a senior advisor to Energy Secretary Bill Richardson and oversaw development and implementation of a number of energy, infrastructure and technology initiatives, including leading and establishing a new portfolio approach to manage DOE’s $7 billion in research and development (R&D) investments.</p>
<p style="text-align: justify; ">Earlier in his career, Heyman was a senior policy advisor in national security and international affairs at the White House Office of Science and Technology Policy (OSTP), and was responsible for providing science, technology, and foreign policy advice to the President’s Science Advisor and the Vice President’s National Security Advisor. Before entering government, Heyman worked for nearly a decade as a computer systems software engineer, and head of international operations for a firm developing and deploying industrial automation, robotics, and supply-chain management systems for Fortune 100 companies. Heyman holds a Bachelor’s degree in biology from Brandeis University and a Master’s in international relations and economics from the Paul H. Nitze School of Advanced International Studies at Johns Hopkins University, where he graduated with the highest level of distinction. He is currently a member of the Aspen Homeland Security Strategy Group, Aspen’s U.S.-India Strategic Dialogue, and serves as co-chair of its Cyber Task Force.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/talk-on-cybersecurity-and-internet-of-things'>http://editors.cis-india.org/internet-governance/events/talk-on-cybersecurity-and-internet-of-things</a>
</p>
No publisherpraskrishnaEventInternet Governance2015-03-13T02:14:59ZEventRAW Lectures #01: Nishant Shah on 'Stories and Histories of Internet in India'
http://editors.cis-india.org/raw/raw-lectures-01-nishant-shah
<b>Dr. Nishant Shah will give a talk on 'Stories and Histories of Internet in India' at the Centre for Internet and Society's office in Bangalore on March 6, 2015 at 6 p.m. Please join us for tea and coffee before the lecture at 5.30 p.m.</b>
<p> </p>
<h4>Update: The video recording of the lecture can be accessed <a href="http://cis-india.org/raw/raw-lecture-01-nishant-shah-video">here</a>.</h4>
<p> </p>
<p>Introducing the first research initiative at the Researchers at Work programme in the Centre for Internet and Society, Professor Nishant Shah wrote:</p>
<blockquote>
“Although many disciplines, organisations and interventions in various areas deal with internet technologies, there has been very little work in documenting the polymorphous growth of internet technologies and their relationship with society in India... We wanted to first propose that the Internet is not a monolithic object that exists in the same way across geographies and social borders. It is necessary to approach the Internets, as plural, available in different forms, practices and experiences to people from different locations and sections of the society... The second proposal was that while the digital and Internet technologies are new, they do not necessarily only produce new things. There is a need to map the histories and pre-histories of Internets.”</blockquote>
<p>The Researchers at Work programme is initiating the RAW Lectures series to take stock, reflect, and chart courses into the studies of Internet in/from India. The lectures will address the experiences and practices of Internet in India as plural and intertwined with longer-duration processes, as foregrounded by Nishant above. The lectures will also critically respond to the questions around the methods of studying Internet in/from India, and the opportunities and challenges of studying Indian society on/through the Internet.</p>
<p>It gives us immense pleasure to invite Nishant to present the first lecture of the series on Friday, March 06, 2015. The title of the lecture is "<strong>Once There was the Internet: Of Stories and Histories of Internet in India</strong>."</p>
<p> </p>
<img src="raw-lectures-01-nishant-shah/leadImage" alt="RAW Lectures #01 - Nishant Shah - Poster" height="400" />
<p> </p>
<h3>Dr. Nishant Shah</h3>
<p>Nishant is the Professor of Culture and Aesthetics of New Media at the Leuphana University Lüneburg, Research Associate at COMMON MEDIA LAB, Affiliate at DIGITAL CULTURES RESEARCH LAB, and International Tandempartner at HYBRID PUBLISHING LAB. He is the co-founder and former-Director-Research at the Centre for Internet and Society, Bangalore, India.</p>
<p>In his varied roles, he has been committed to producing infrastructure, frameworks and collaborations in the global south to understand and analyse the ways in which emergence and growth of digital technologies have shaped the contemporary social, political and cultural milieu. He edited a series of monographs on “Histories of Internet(s) in India” that looks at the complicated relationship that technologies have with questions of gender, sexuality, body, city, governance, archiving and gaming in a country like India. He was also the principal researcher for a research programme that produced the four-volume anthology “Digital AlterNatives With a Cause?” that examines the ways in which young people’s relationship with digital technologies produces changes in their immediate environments.</p>
<p>His Ph.D. thesis titled “The Technosocial Subject: Cities, Cyborgs and Cyberspace” builds a framework to examine the technosocial identities that are produced at the intersection of law, digital technologies and everyday cultural practices in emerging information societies like India. Nishant was an Asia Research fellow looking at the cost and infrastructure of building IT Cities like Shanghai. He is the author of a recent thought-piece titled “Whose Change is it Anyway? – Towards a future of digital technologies and citizen action in emerging information societies” that seeks to revisit the debates around digital activism and change in the global context. His current interests are in critically intervening in debates around Digital Humanities and conditions of change mediated by technologies.</p>
<p>More: <a href="http://cdc.leuphana.com/people/#nishant-shah" target="_blank">http://cdc.leuphana.com/people/#nishant-shah</a></p>
<p>
For more details visit <a href='http://editors.cis-india.org/raw/raw-lectures-01-nishant-shah'>http://editors.cis-india.org/raw/raw-lectures-01-nishant-shah</a>
</p>
No publisherpraskrishnaRAW LecturesResearchers at WorkEventRAW Events2016-01-10T08:05:30ZEventTrain the Trainer Program
http://editors.cis-india.org/openness/events/train-the-trainer-program
<b>The Centre for Internet and Society's Access to Knowledge team (CIS-A2K) welcomes you to attend the "Train the Trainer Program" in Bangalore.</b>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<h2></h2>
<p style="text-align: justify; ">Train the Trainer (TTT) is a residential training workshop to groom leadership skills among the Indian Wikimedia community members. CIS-A2K is organizing the Wikipedia Train the Trainer Program 2015 (TTT 2015). This is the second iteration of this program. TTT 2015 will be conducted by CIS-A2K during 26 February to 1 March 2015 in Bangalore, India.</p>
<p style="text-align: justify; ">Note: All selected participants will be expected to reach the event venue the previous night (i.e. February 25) and leave by the evening of March 1, 2015. <b><span>The selected participants are requested to kindly confirm their participation by writing to tanveer<img alt=" at " height="17" src="https://upload.wikimedia.org/wikipedia/commons/thumb/8/88/At_sign.svg/17px-At_sign.svg.png" title=" at " width="17" />cis-india.org. <b><span>Registration for TTT 2015 is closed. Please do not register.</span></b>. Please note that registration does not confirm participation. Selection by CIS-A2K will be final. Before registering here please go through the <a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/Train_the_Trainer_Program#Selection_Criterion" title="India Access To Knowledge/Events/Train the Trainer Program">selection criterion</a>.</span></b></p>
<h2>Programme Schedule</h2>
<h3>Thursday, February 26, 2015</h3>
<table class="grid listing">
<tbody>
<tr>
<th>Timing</th><th>Session</th><th>Topics to be Covered</th><th>Coordinator / Resource Person</th>
</tr>
</tbody>
</table>
<table class="grid listing">
<thead> </thead>
<tbody>
<tr>
<td>
<p align="center">7:30am - 8:30am</p>
</td>
<td colspan="3">
<p align="center">Breakfast</p>
</td>
</tr>
<tr>
<td>
<p align="center">8:30am - 9:00am</p>
</td>
<td colspan="3">
<p align="center">Registration</p>
</td>
</tr>
<tr>
<td>
<p align="center">9:00am - 10.30am</p>
</td>
<td>
<p align="center">Welcome & Introduction</p>
</td>
<td>
<ul type="disc">
<li> Introductions (activity based) Creating name tags for yourself and your friends </li>
<li> Energiser/Activity. Meet and greet Wikimedians </li>
</ul>
</td>
<td>
<p align="center">T. Vishnu Vardhan (VV) and Tanveer Hasan (TH)</p>
</td>
</tr>
<tr>
<td>
<p align="center">10:30am - 11 am</p>
</td>
<td>
<p align="center">Why TTT?</p>
</td>
<td>
<p align="center">Design and Objectives of the TTT</p>
</td>
<td>
<p align="center">VV</p>
</td>
</tr>
<tr>
<td>
<p align="center">11 am - 11.30 am</p>
</td>
<td colspan="3">
<p align="center">☕ Tea/Coffee Break</p>
</td>
</tr>
<tr>
<td>
<p align="center">☼ 11.30 am - 1 pm</p>
</td>
<td>
<p align="center">Participant presentations</p>
</td>
<td>
<p align="center">Individual presentation based on pre-work</p>
</td>
<td>
<p align="center">TTT Participant</p>
</td>
</tr>
<tr>
<td>
<p align="center">1 pm - 2 pm</p>
</td>
<td colspan="3">
<p align="center">Lunch</p>
</td>
</tr>
<tr>
<td>
<p align="center">2 pm - 3.30 pm</p>
</td>
<td>
<p align="center">Participant presentations</p>
</td>
<td>
<p align="center">Individual presentation based on pre work</p>
</td>
<td>
<p align="center">TTT Participant</p>
</td>
</tr>
<tr>
<td>
<p align="center">3.30 pm - 4 pm</p>
</td>
<td colspan="3">
<p align="center">☕ Tea/Coffee Break</p>
</td>
</tr>
<tr>
<td>
<p align="center">4 pm - 5 pm</p>
</td>
<td>
<p align="center">Presenting with impact</p>
</td>
<td>
<ul type="disc">
<li> Effective Communication </li>
<li> Forceful Introduction </li>
<li> Organizing your speech (Opening, Body Closing) </li>
<li> Get to the point (General purpose and specific purpose) </li>
<li> Communicate clearly, accurately and vividly </li>
<li> Body Language (Stance, Movement, Gestures, Facial expression and eye contact) </li>
<li> Vocal Variety (Volume, Pitch, Rate and Quality) </li>
</ul>
</td>
<td>
<p align="center">TH</p>
</td>
</tr>
<tr>
<td>
<p align="center">5.30 pm - 6.30 pm</p>
</td>
<td colspan="3">
<p align="center">Break</p>
</td>
</tr>
<tr>
<td>
<p align="center">6.30 pm - 8 pm</p>
</td>
<td>
<p align="center">Parallel Sessions</p>
</td>
<td>
<ul type="disc">
<li> Personal coaching on Presentation Skills using video recordings of Presentation <br /> or </li>
<li> Multilingual Edit-a-thon (theme - <a href="https://en.wikipedia.org/wiki/Jnanpith_Award" title="en:Jnanpith Award">Jnanpith_Award</a>) </li>
</ul>
</td>
<td>
<ul type="disc">
<li> Sunil Abraham(SA) </li>
<li> VV </li>
<li> TH </li>
<li> Rahmanuddin Shaik (RS) </li>
<li> Subhashish Panigrahi (SP) </li>
<li> U.B. Pavanaja (UBP) </li>
</ul>
</td>
</tr>
<tr>
<td>
<p align="center">8:00 pm - 9:00 pm</p>
</td>
<td colspan="3">
<p align="center">Dinner</p>
</td>
</tr>
</tbody>
</table>
<h3>Friday, February 26, 2015</h3>
<table class="grid listing">
<tbody>
<tr>
<th>Timing</th><th>Session</th><th>Topics to be Covered</th><th>Coordinator / Resource Person</th>
</tr>
</tbody>
</table>
<table class="grid listing">
<tbody>
<tr>
<td>
<p align="center">☾ 8 pm - 9 pm</p>
</td>
<td colspan="3">
<p align="center">Dinner</p>
</td>
</tr>
<tr>
<td>
<p align="center">☼ 10.30 am - 11 am</p>
</td>
<td>
<p align="center">Internet research techniques (Session 2)</p>
</td>
<td>
<p align="center">Information literacy and Internet research techniques for Wikipedia editors <a href="http://www.slideshare.net/muscicapa/information-literacy-and-internet-research-wiki-workshop">slides</a></p>
</td>
<td>
<p align="center">LS</p>
</td>
</tr>
<tr>
<td>
<p align="center">9.15 am - 10 am</p>
</td>
<td>
<p align="center">Internet research techniques (Session 1)</p>
</td>
<td>
<p align="center">Information literacy and Internet research techniques for Wikipedia editors</p>
</td>
<td>
<p align="center">LS</p>
</td>
</tr>
<tr>
<td>
<p align="center">8:30 am - 9.15 am</p>
</td>
<td>
<p align="center">Copyright, CC and Wikimedia</p>
</td>
<td>
<ul type="disc">
<li> Introduction to Copyright and Creative Commons <a href="http://www.slideshare.net/muscicapa/some-basic-ideas-on-copyright-law-for-wikipedia-users">slides</a> </li>
<li> Creative Commons </li>
<li> Wikimedia Applications </li>
</ul>
</td>
<td>
<p align="center">L. Shyamal (LS)</p>
</td>
</tr>
<tr>
<td>
<p align="center">7:30 am - 8:30 am</p>
</td>
<td colspan="3">
<p align="center">Breakfast</p>
</td>
</tr>
<tr>
<td>
<p align="center">7 pm - 8 pm</p>
</td>
<td>
<p align="center">Parallel sessions</p>
</td>
<td>
<ul type="disc">
<li> Personal Coaching </li>
<li> GLAM Projects Do's and Dont's </li>
<li> FOSS Tools Support and Discussion </li>
</ul>
</td>
<td>
<ul type="disc">
<li> CIS-A2K Team </li>
<li> RL </li>
<li> RS </li>
</ul>
</td>
</tr>
<tr>
<td>
<p align="center">6.30 pm - 7 pm</p>
</td>
<td>
<p align="center">GLAM Projects in Indic Wikipedia Context</p>
</td>
<td>
<p align="center">Feasibility, Scalability and Scope</p>
</td>
<td>
<p align="center">Rohini Lakshane(RL)</p>
</td>
</tr>
<tr>
<td>
<p align="center">6 pm - 6.30 pm</p>
</td>
<td colspan="3">
<p align="center">☕ Tea/Coffee Break</p>
</td>
</tr>
<tr>
<td>
<p align="center">5 pm - 6 pm</p>
</td>
<td>
<p align="center">Essential Foss Tools for Wikimedians</p>
</td>
<td>
<p align="center">Hands on Session</p>
</td>
<td>
<p align="center">Rahamanuddin</p>
</td>
</tr>
<tr>
<td>
<p align="center">4.30 pm - 5 pm</p>
</td>
<td>
<p align="center">Essential FOSS Tools</p>
</td>
<td>
<p align="center">Demonstration</p>
</td>
<td>
<p align="center">RS</p>
</td>
</tr>
<tr>
<td>
<p align="center">4 pm - 4.30 pm</p>
</td>
<td colspan="3">
<p align="center">☕ Tea/Coffee Break</p>
</td>
</tr>
<tr>
<td>
<p align="center">3.30 pm - 4 pm</p>
</td>
<td>
<p align="center">Panel Discussion</p>
</td>
<td>
<p align="center">Importance of NPOV in Indian Languages</p>
</td>
<td>
<p align="center">Participant Panel (TBD)</p>
</td>
</tr>
<tr>
<td>
<p align="center">2.45 pm - 3.30 pm</p>
</td>
<td>
<p align="center">Importance of NPOV</p>
</td>
<td>
<p align="center">NPOV as an essential quality for Wikimedians with English Wikipedia as a case study</p>
</td>
<td>
<p align="center">NVV Char and Tito Dutta</p>
</td>
</tr>
<tr>
<td>
<p align="center">2 pm - 2.45 pm</p>
</td>
<td>
<p align="center">Spectogram</p>
</td>
<td>
<p align="center">Interactive activity to critically discuss the importance of NPOV</p>
</td>
<td>
<p align="center">SA</p>
</td>
</tr>
<tr>
<td>
<p align="center">11.45 am - 1 pm</p>
</td>
<td>
<p align="center">DIY</p>
</td>
<td>
<p align="center">Digitisation Techniques for Wikimedians-Hands on Session</p>
</td>
<td>
<p align="center">Group Activity</p>
</td>
</tr>
<tr>
<td>
<p align="center">11.30 am - 11.45 am</p>
</td>
<td colspan="3">
<p align="center">☕ Tea/Coffee Break</p>
</td>
</tr>
<tr>
<td>
<p align="center">11 am - 11.30 am</p>
</td>
<td>
<p align="center">DIY</p>
</td>
<td>
<p align="center">Digitisation Techniques for Wikimedians</p>
</td>
<td>
<p align="center">Viswa Prabha(VP)</p>
</td>
</tr>
<tr>
<td>
<p align="center">10 am - 10.30 am</p>
</td>
<td colspan="3">
<p align="center">☕ Tea/Coffee Break</p>
</td>
</tr>
<tr>
<td>
<p align="center">1 pm - 2 pm</p>
</td>
<td colspan="3">
<p align="center">Lunch</p>
</td>
</tr>
</tbody>
</table>
<h3>Saturday, February 28, 2015</h3>
<table class="grid listing">
<tbody>
<tr>
<th>Timing</th><th>Session</th><th>Topics to be Covered</th><th>Coordinator / Resource Person</th>
</tr>
</tbody>
</table>
<table class="grid listing">
<tbody>
<tr>
<td>7 am - 7.30am</td>
<td colspan="3">Breakfast</td>
</tr>
<tr>
<td>7:30am</td>
<td colspan="3">Departure to <a href="https://en.wikipedia.org/wiki/Janapada_Loka" title="en:Janapada Loka">Janapada Loka</a></td>
</tr>
<tr>
<td>9 am - 9.30am</td>
<td>Expectations from GLAM Activity</td>
<td>Design,scope and expected outcomes</td>
<td>TH</td>
</tr>
<tr>
<td>9.30am - 1 pm</td>
<td>* GLAM Activity</td>
<td>
<ul>
<li> Interviewing Janapada Loka Staff </li>
<li> Documentation of Janapada Loka exhibits </li>
<li> Resource Collection for Wiki Commons </li>
<li> Material collection for GLAM Edit-a-thon </li>
</ul>
</td>
<td>
<ul>
<li> VP </li>
<li> RL </li>
<li> CIS-A2K </li>
</ul>
</td>
</tr>
<tr>
<td>1 pm - 2 pm</td>
<td colspan="3">Lunch</td>
</tr>
<tr>
<td>2 pm - 3.30 pm</td>
<td>Group Activity</td>
<td>GLAM Editathon in Indian Languages</td>
<td>VP and VV</td>
</tr>
<tr>
<td>3.30 pm - 4 pm</td>
<td colspan="3">☕ Tea/Coffee Break</td>
</tr>
<tr>
<td>4 pm - 4.30 pm</td>
<td>Panel Discussion</td>
<td>Need and importance of GLAM Activities</td>
<td>TBD</td>
</tr>
<tr>
<td>4.30 pm - 5.30 pm</td>
<td>Focused Group Discussion</td>
<td>GLAM Activities to be pursued (Individual and Community)</td>
<td>Participant Groups</td>
</tr>
<tr>
<td>5.30 pm - 6.30 pm</td>
<td colspan="3">Departure to CEO Centre</td>
</tr>
<tr>
<td>☾ 8 pm - 9 pm</td>
<td colspan="3">Dinner at CEO Centre</td>
</tr>
</tbody>
</table>
<h3>Sunday, March 1, 2015</h3>
<table class="grid listing">
<tbody>
<tr>
<th>Timing</th><th>Session</th><th>Topics to be Covered</th><th>Coordinator / Resource Person</th>
</tr>
</tbody>
</table>
<table class="grid listing">
<tbody>
<tr>
<td>
<p align="center">07:30 am - 08:30 am</p>
</td>
<td colspan="3">
<p align="center">Breakfast</p>
</td>
</tr>
<tr>
<td>
<p align="center">08:30am - 9.30 am</p>
</td>
<td>
<p align="center">Media and Social Media Strategies for Wikimedians</p>
</td>
<td>
<ul type="disc">
<li> Mobilizing mainstream media to cover Wikimedia success stories </li>
<li> Best practices of Social Media </li>
</ul>
</td>
<td>
<p align="center">Tinu Cherian</p>
</td>
</tr>
<tr>
<td>
<p align="center">9.30am - 10 am</p>
</td>
<td>
<p align="center">Building Communities for Wikimedia Movement</p>
</td>
<td>
<p align="center">Introduction to WMIN</p>
</td>
<td>
<p align="center">Ravishankar Ayyakkannu (RA)and Yohann Thomas (YT)</p>
</td>
</tr>
<tr>
<td>
<p align="center">10am - 10.30 am</p>
</td>
<td>
<p align="center">Building Communities for Wikimedia Movement</p>
</td>
<td>
<p align="center">CIS-A2K Trials and Success</p>
</td>
<td>
<p align="center">VV</p>
</td>
</tr>
<tr>
<td>
<p align="center">☼ 10.30 am - 11:00 am</p>
</td>
<td colspan="3">
<p align="center">☕ Tea/Coffee Break</p>
</td>
</tr>
<tr>
<td>
<p align="center">11am - 11.30 am</p>
</td>
<td>
<p align="center">Group Discussion</p>
</td>
<td>
<p align="center">Challenges & Opportunities in building an Indian Language Community online</p>
</td>
<td>
<p align="center">Participant Groups</p>
</td>
</tr>
<tr>
<td>
<p align="center">11.30 pm - 12.30 pm</p>
</td>
<td>
<p align="center">Participant Presentation</p>
</td>
<td>
<p align="center">Participant Presentations</p>
</td>
<td><br /></td>
</tr>
<tr>
<td>
<p align="center">12.30 pm - 1 pm</p>
</td>
<td colspan="3">
<p align="center">Lunch</p>
</td>
</tr>
<tr>
<td>
<p align="center">1.30 pm - 2 pm</p>
</td>
<td>
<p align="center">Focused Group Discussion</p>
</td>
<td>
<p align="center">Road Ahead for GLAM activities in India Languages</p>
</td>
<td>
<p align="center">Participant Presentations</p>
</td>
</tr>
<tr>
<td>
<p align="center">2.30 pm - 3.30 pm</p>
</td>
<td>
<p align="center">Participant Presentation</p>
</td>
<td>
<p align="center">Submission of Outreach and GLAM Draft Plans</p>
</td>
<td><br /></td>
</tr>
<tr>
<td>
<p align="center">3.30 pm - 3.45 pm</p>
</td>
<td colspan="3">
<p align="center">Feedback Session</p>
</td>
</tr>
<tr>
<td>
<p align="center">3.45 pm - 4 pm</p>
</td>
<td colspan="3">
<p align="center">Closing Remarks</p>
</td>
</tr>
<tr>
<td>
<p align="center">4:00 pm</p>
</td>
<td colspan="3">
<p align="center">Departures or Visit to CIS</p>
</td>
</tr>
</tbody>
</table>
<p>For any further queries please email—</p>
<ul>
<li>tanveer<img alt=" at " height="17" src="https://upload.wikimedia.org/wikipedia/commons/thumb/8/88/At_sign.svg/17px-At_sign.svg.png" title=" at " width="17" />cis-india.org 09844439247</li>
<li>ajoy <img alt=" at " height="17" src="https://upload.wikimedia.org/wikipedia/commons/thumb/8/88/At_sign.svg/17px-At_sign.svg.png" title=" at " width="17" />cis-india.org 09845492122</li>
<li>vishnu<img alt=" at " height="17" src="https://upload.wikimedia.org/wikipedia/commons/thumb/8/88/At_sign.svg/17px-At_sign.svg.png" title=" at " width="17" />cis-india.org 09845207308</li>
</ul>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/train-the-trainer-program'>http://editors.cis-india.org/openness/events/train-the-trainer-program</a>
</p>
No publisherpraskrishnaAccess to KnowledgeWikimediaWikipediaOpennessEvent2015-02-27T02:37:10ZEventDigital Security Workshop for Journalists
http://editors.cis-india.org/internet-governance/events/digital-security-workshop-for-journalists
<b>The Centre for Internet and Society and the Mumbai Press Club are jointly organizing a workshop for journalists on February 7, 2015, from 9.30 a.m. to 1.30 p.m. at Mumbai Press Club, Azad Maidan.</b>
<h3>Event Flier</h3>
<table class="listing">
<tbody>
<tr>
<th><img src="http://editors.cis-india.org/home-images/DigitalSecurity.png" alt="Digital Security" class="image-inline" title="Digital Security" /></th>
</tr>
</tbody>
</table>
<p>The event would cover these topics:</p>
<ol>
<li>Why should journalists care about digital security?</li>
<li>The threat model: assessing digital security risks and responses.</li>
<li>Security measures and solutions: alternatives to unsecure software and tools, good security practices, computer hygiene etcetera.</li>
</ol>
<hr />
<h3>Event Pictures</h3>
<table class="listing">
<tbody>
<tr>
<th><img src="http://editors.cis-india.org/home-images/copy_of_Pics01.JPG" alt="Pics 01" class="image-inline" title="Pics 01" /></th>
</tr>
<tr>
<td><img src="http://editors.cis-india.org/home-images/Pic2.jpg" alt="Pics 02" class="image-inline" title="Pics 02" /></td>
</tr>
</tbody>
</table>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/digital-security-workshop-for-journalists'>http://editors.cis-india.org/internet-governance/events/digital-security-workshop-for-journalists</a>
</p>
No publisherpraskrishnaDigital SecurityWorkshopEventInternet Governance2015-03-08T05:25:34ZEventPoesis in the Information Age: Language and its Limit[ation]s
http://editors.cis-india.org/a2k/events/poesis-in-the-information-age
<b>Alec Schachner, an independent scholar, translator, multi-genre musician and sound artist will give a talk on the limits/limitations of languages at the Centre for Internet & Society's office on January 30, 2015 at 5 p.m.</b>
<h3 style="text-align: justify; ">The Talk</h3>
<p style="text-align: justify; ">An examination of the limits/limitations of language(s) through the lens of contemporary Vietnamese poetics and print culture, aiming to open a deeper dialogue on the nature of self/state expression and censorship in the age of internet connectivity.</p>
<h3 style="text-align: justify; ">Alec Schachner</h3>
<p style="text-align: justify; ">Alec graduated from Columbia College with a degree in Sociocultural Anthropology, English & Comparative Literature, Creative Writing and Music Theory/Composition. Alec currently resides in Vietnam, where he has served as lecturer on literature for 5 years with the Faculty of English Linguistics and Literature at the Vietnam National University of Social Sciences and Humanities HCMC. He is working on English translations of several anthologies of Vietnamese poetry, one of which - <i>the purification festival in April</i> - just went to print across VN earlier this month. He is also pursuing research into contemporary Saigonese print culture and the social/cyber mileus surrounding literary circles/movements in the post-Socialist cultural sphere.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/a2k/events/poesis-in-the-information-age'>http://editors.cis-india.org/a2k/events/poesis-in-the-information-age</a>
</p>
No publisherpraskrishnaWikipediaEventAccess to Knowledge2015-01-26T13:57:34ZEventCode As Communication
http://editors.cis-india.org/openness/events/code-as-communication
<b>Gene Kogan will give a talk at the Centre for Internet & Society's Bangalore office on February 2, 2015. The talk will be from 5 p.m. to 7 p.m. Gene's talk will draw analogies between software, communication, creativity, and expressivity. Programming has a long history of comparison to other written media, with inevitable consequences on our legal policy over authorship and ownership.</b>
<p style="text-align: justify; ">With the emergence of free "creative coding" and "live coding" platforms like Processing, OpenFrameworks, PureData, vvvv, and SuperCollider, the boundaries between code and creative expression have further eroded, initiating inquiry as to its overlap with "traditional" creative writing. We are confronted with old questions within new contexts. As existing institutions incorporate emerging technologies into their creative programs and new ones take root and solidify, how do we make an infrastructure which most effectively and transparently fosters the development of creative technology? How do we ensure that this process is fair and democratic, and at greatest benefit and lowest cost to the public? What rights should users and developers receive? As the distinction between art and technology becomes blurry, what relevance does the FOSS movement have in cultivating cultural production?</p>
<h2 style="text-align: justify; ">Gene Kogan</h2>
<p style="text-align: justify; ">Gene Kogan is a programmer and artist who writes free software for new and emerging technologies. He creates tools for live music, dance, theatre, and performance art. He contributes to numerous open-source software projects, and frequently gives workshops and demonstrations on topics related to code and art.</p>
<p style="text-align: justify; ">Follow Gene Kogan elsewhere:</p>
<ul>
<li>Website: <a class="moz-txt-link-rfc2396E" href="http://www.genekogan.com">http://www.genekogan.com</a> </li>
</ul>
<ul>
<li>Vimeo: <a class="moz-txt-link-rfc2396E" href="http://www.vimeo.com/genekogan">http://www.vimeo.com/genekogan</a> </li>
</ul>
<ul>
<li>Soundcloud: <a class="moz-txt-link-rfc2396E" href="http://www.soundcloud.com/genekogan">http://www.soundcloud.com/genekogan</a> </li>
</ul>
<ul>
<li>Flickr: <a class="moz-txt-link-rfc2396E" href="http://www.flickr.com/genekogan">http://www.flickr.com/genekogan</a> </li>
</ul>
<ul>
<li>Github: <a class="moz-txt-link-rfc2396E" href="http://www.github.com/genekogan">http://www.github.com/genekogan</a> </li>
</ul>
<ul>
<li>Twitter: <a class="moz-txt-link-rfc2396E" href="http://www.twitter.com/genekogan">http://www.twitter.com/genekogan</a></li>
</ul>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/code-as-communication'>http://editors.cis-india.org/openness/events/code-as-communication</a>
</p>
No publisherpraskrishnaOpennessCodingEvent2015-01-23T03:12:15ZEventWorkshop on Digital Security for Journalists
http://editors.cis-india.org/internet-governance/events/workshop-on-digital-security-for-journalists
<b>The Foundation for Media Professionals and the Centre for Internet and Society (CIS) are jointly hosting a workshop on 'Digital Security for Journalists' in New Delhi on January 16, 2015.</b>
<p style="text-align: justify; "><span class="fsl">This workshop will be a hands-on training — so all journalists are strongly encouraged to bring their laptops and smartphones — on how to assess security threats, how to protect your sources, how to prevent your ISP from snooping on your communications, and how to harden your computer's security.</span></p>
<p style="text-align: justify; "><span class="fsl"><span class="fsl"><span class="text_exposed_show">This workshop furthers CIS's work as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, and the space for this workshop has been provided by the Times of India.</span></span></span></p>
<p style="text-align: justify; "><span class="fsl"><br /></span></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/workshop-on-digital-security-for-journalists'>http://editors.cis-india.org/internet-governance/events/workshop-on-digital-security-for-journalists</a>
</p>
No publisherpraskrishnaDigital SecurityEventInternet Governance2015-01-15T14:07:16ZEventSecurity, Governments, and Data: Technology and Policy
http://editors.cis-india.org/internet-governance/events/security-governments-data-technology-policy
<b>The Centre for Internet & Society and the Observer Research Foundation invite you to a one day conference on January 8, 2015 in New Delhi. </b>
<h3 style="text-align: justify; "></h3>
<h3 style="text-align: justify; "></h3>
<h3 style="text-align: justify; ">About the Conference</h3>
<p style="text-align: justify; ">The conference will focus on the technologies, policies, and practices around cyber security and surveillance. The conference will reach out to a number of key stakeholders including civil society, industry, government, and academia and explore the present scenario in India to reflect on ways forward.</p>
<h3 align="left" class="western"><strong>Conference </strong><strong>Context</strong></h3>
<p align="justify"><span>Ensuring the security of the India’s cyber space is a complex, challenging, and ever changing responsibility that the government is tasked with. Doing so effectively requires a number of factors to come together in a harmonized strategy including: laws & policies, technical capabilities, markets, and a skilled workforce. It also requires collaboration on multiple levels including with foreign governments, domestic and foreign industry, and law enforcement. The first of these is particularly important given the ability of attackers to penetrate across borders and the global nature of data. Any strategy developed by India must be proactive and reactive – evolving defences to prevent a potential threat and applying tactics to respond to a real time threat. To do so, the government of India must legally have the powers to take action and must have the technical capability to do so. Yet, many of these powers and technical capabilities require a degree of intrusion into the lives of citizens and residents of India through means such as surveillance. Thus, such measures must be considered in light of principles of proportionality and necessity, and legal safeguards are needed to protect against the violation of privacy. Furthermore, a principle of optimization must be considered i.e, how much surveillance achieves the most amount of security and how can this security be achieved with the optimal mix of technology, policy and enforcement.</span></p>
<h3 align="left" class="western">Panel Descriptions</h3>
<p align="left"> </p>
<p align="left"><strong>Challenges & Present Scenario</strong></p>
<p align="left"><strong> </strong><span>Protecting and enhancing the cyber security of India is a complex and dynamic responsibility. The challenge of securing cyber space is magnified by the demarcated nature of the internet, the multiplicity of vulnerabilities that can be exploited at the national level, the magnitude of infrastructure damage possible from a cyber attack, and the complexity of application of a jurisdiction’s law to a space that is technologically borderless. A comprehensive ‘cyber security’ ecosystem is required to address such challenges – one that involves technology, skills, and capabilities – including surveillance capabilities. The Government of India has taken numerous steps to address and resolve such challenges. In July 2013, the National Cyber Security Policy was published for the purpose of creating an enabling framework for the protection of India’s cyber security. In February 2014, the 52</span><sup>nd</sup><span> Standing Committee on Information Technology issued a report assessing the implementation of this policy – in which they found that a number of areas needed strengthening. The Government of India has also proposed the establishment of a number of centres focused on cyber security – such as the National Cyber Coordination Center and the National Critical Information Infrastructure Protection Centre. CERT-IN, under the Department of Electronics and Information Technology is presently the body responsible for overseeing and enforcing cyber security in India, while other bodies such as the Resource Centre for Cyber Forensic and TERM cells under the Department of Telecommunications play critical roles in overseeing and undertaking capabilities related to cyber security.</span></p>
<p align="justify"><strong>Law & Policy</strong></p>
<p align="justify"><span>India has five statutes regulating the collection and use of data for surveillance purposes. These laws define circumstances on which the government is justified in accessing and collecting real time and stored data as well as procedural safeguards they must adhere to when doing so. The Department of Telecommunications has also issued the Unified Access License which, among other things, mandates service providers to provide technical support to enable such collection. The Indian judicial system has also provided a number of Rulings that set standards for the access, collection, and use of data as well as defining limitations and safeguards that must be respected in doing so. The draft Privacy Bill 2011, released by the Department of Personnel and Training, also contained provisions addressing surveillance in the context of interception and the use of electronic video recording devices. In the Report of the Group of Experts on Privacy, the AP Shah Committee found that the legal regime for surveillance in India was not harmonized and lacked safeguards. Furthermore, in the era where the direct collection of large volumes of data is easily possible, there is a growing need to re-visit questions about the legitimate and proportionate collection and use (particularly as evidence) of such data. Questions are also arising about the applicability of standards and safeguards to the state. At a global level, catalyzed by the leaks by Edward Snowden, there has been a strong push for governments to review and structure their surveillance regimes to ensure that they are in line with international human rights standards.</span></p>
<p align="justify"><strong>Architecture & Technology</strong></p>
<p align="justify"><span>India is in the process of architecting a number of initiatives that seek to enable the collection and sharing of intelligence such as the CMS, NATGRID, and NETRA. At a regional level, the Ministry of Home Affairs is in the process of implementing ‘Mega Policing Cities’ which include the instalment of CCTV’s and centralized access to crime related information. Globally, law enforcement and governments are beginning to take advantage of the possibilities created by ‘Big Data’ and ‘open source’ policing. The architecture and technology behind any surveillance and cyber security initiative are key to its success. Intelligently and appropriately designed projects and technology can also minimize the possibility of intrusions into the private lives of citizens. Strong access controls, decentralized architecture, and targeted access are all principles that can be incorporated into the architecture and technology behind a project or initiative. At the same time, the technology or process around a project can serve as the ‘weakest link’ – as it is vulnerable to attacks and tampering. Such possibilities raise concerns about the use of foreign technology and dependencies on foreign governments and companies.</span></p>
<p align="justify"><strong>International and Domestic Markets</strong></p>
<p align="justify"><strong> </strong><span>Globally, the security market is growing – with companies offering a range of services and products that facilitate surveillance and can be used towards enhancing cyber security. In India, the security market is also growing with studies predicting that it will reach $1.06 billion by 2015. Recognizing the potential threat posed by imported security and telecom equipment, India also develops its own technologies through the Centre for Development of Telematics –attached to the Department of Telecommunications, and the Centre for Development of Advanced Computing – attached to the Department of Electronics and Information Technology. At times India has also imposed bans on the import of technologies believed to be compromised. Towards this end, the Government of India has a number of bodies responsible for licensing, auditing, and certifying the use of security and telecommunication equipment. Though India has recognized the security vulnerabilities posed by these technologies, as of yet it has not formally recognized the human rights violations that are made possible. Indeed, though India has submitted a request to be a signing member of the </span><span>Wassenaar agreement, they have yet to be accepted.</span></p>
<h3 style="text-align: justify; ">Agenda</h3>
<table class="plain">
<tbody>
<tr>
<td>11.00</td>
<td>Registration & Tea</td>
</tr>
<tr>
<td>11.30</td>
<td>Key Note Speech</td>
</tr>
<tr>
<td>12.00</td>
<td>Challenges & Present Scenario</td>
</tr>
<tr>
<td>13.00</td>
<td>Law & Policy</td>
</tr>
<tr>
<td>14.00</td>
<td>Lunch</td>
</tr>
<tr>
<td>15.00</td>
<td>Architecture & Technology</td>
</tr>
<tr>
<td>16.00</td>
<td>International & Domestic Markets</td>
</tr>
<tr>
<td>17.00</td>
<td>Tea</td>
</tr>
<tr>
<td>17.30</td>
<td>Conclusion & Closing Remarks</td>
</tr>
</tbody>
</table>
<h3></h3>
<ol> </ol>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/security-governments-data-technology-policy'>http://editors.cis-india.org/internet-governance/events/security-governments-data-technology-policy</a>
</p>
No publisherelonnaiEventInternet Governance2014-12-24T08:06:59ZEventSecurity and Surveillance: A public discussion on Optimizing Security while Safeguarding Human Rights
http://editors.cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights
<b>The Centre for Internet and Society (CIS) invites you to a public discussion on optimizing security and safeguarding human rights at its Bangalore office on Friday, December 19th, 2014, 16:00 to 18:00.</b>
<p> </p>
<p>The Centre for Internet and Society, in collaboration with Privacy International UK, has undertaken exploratory research into surveillance, security, and the security market in India.</p>
<p><span>Through this research, we hope to understand and document policy and law associated with security, surveillance, and the security market in India and learn about the regulation of security and related technologies such as encryption, filtering, monitoring software, and interception equipment. We also hope to understand the import and export policy regime for dual use technologies.</span></p>
<p><span>Such findings will be critical in creating evidence based research to inform security policy and regulation in India and work towards enabling regulatory frameworks that optimize the nation’s security while protecting the rights of citizens.</span></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights'>http://editors.cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights</a>
</p>
No publisherpraskrishnaSurveillanceEventInternet GovernancePrivacy2014-12-19T08:46:34ZEventTraining in Use of eSpeak with Malayalam
http://editors.cis-india.org/accessibility/events/training-in-e-speak-malayalam
<b>The Centre for Internet & Society (CIS) in partnership with DAISY Forum of India (DFI) and Chakshumathi Assistive Technology Centre, Trivandrum cordially invites all computer teachers for persons with visual impairment for a two day training in the use of eSpeak Malayalam with NVDA for reading and writing in Malayalam.</b>
<h3>Training in the use of eSpeak with NVDA</h3>
<p style="text-align: justify; ">Training in the use of Open Source Screen readers like NVDA will be a focal element of the event. As NVDA with the help of eSpeak provides support for eight Indian languages it will be promoted as a reading tool. The aim of the training is as follows:</p>
<ul>
<li>The candidate should be able to read e-text using NVDA and eSpeak in any one of the eight Indian languages currently supported.</li>
<li>The candidate should be able to download accessible content from the various platforms and repositories of accessible material.</li>
<li>The candidate should be able to use computers as a knowledge searching tool.</li>
<li>The candidate should be able to type using either phonetic, In script or traditional keyboards. </li>
</ul>
<p>The training will be provided by experts from CIS and DFI.</p>
<h3>Who will benefit?</h3>
<p>The event is targeted at promoting the use of eSpeak with NVDA amongst senior computer teachers for persons with visual impairment.</p>
<h3>Facilities</h3>
<p>Accommodation: Seperate accommodation will be provided for ladies and gents.<br />Food: Breakfast, lunch and dinner will be provided, courtesy Chakshumati.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/accessibility/events/training-in-e-speak-malayalam'>http://editors.cis-india.org/accessibility/events/training-in-e-speak-malayalam</a>
</p>
No publisherpraskrishnaTrainingeSpeakAccessibilityNVDAEvent2014-11-30T11:50:38ZEventIOCOSE's talk at CIS
http://editors.cis-india.org/internet-governance/events/iocose-talk-at-cis
<b>Please join us at the Centre for Internet and Society in Bangalore on Thursday, November 27, 2014 at 7 p.m. for a presentation of the work of the artists group IOCOSE, current artists in residence at T.A.J./SKE Residency. </b>
<p style="text-align: justify; ">What is the life of a drone 'in times of peace'? What are the creative potential of a drone? Drones do not have such a thing as a ‘life’. But what if?</p>
<p style="text-align: justify; ">The title of our project, 'In Times of Peace' refers to Paul Virilio's theory of logistics (Pure War, 1983).</p>
<p style="text-align: justify; ">Quoting an article published by the Pentagon in late '40s, the theorist highlighted the fact that the text presented logistics as the procedure for which the potential of a nation lies in its armed forces, 'in times of peace' as in times of war.</p>
<p style="text-align: justify; ">But what does it mean to live 'in times of peace'? And what does this mean for a drone?”</p>
<p style="text-align: justify; ">The talk will open with the announcement of the winner of the NoTube Contest 2014 which will be held at the Sree Venkateshwara Cyber Cafe in Bangalore on the very same day.</p>
<h3 style="text-align: justify; ">IOCOSE</h3>
<p style="text-align: justify; ">IOCOSE is a collective of four artists who has been working in Italy and Europe since 2006. It organises actions in order to subvert ideologies, practices and processes of identification and production of meanings. It uses pranks and hoaxes as tactical means, as joyful and sound tools. IOCOSE thinks about the streets, internet and word of mouth as a battlefield. Tactics such as mimesis and trickery are used to lead and delude the audience into a semantic pitfall. IOCOSE’s work has been shown internationally, such as at Jeu de Paume (Paris, France; 2011); Tate Modern (London, UK; 2011), Festival Nrmal, (Monterrey, Mexico; 2011); Furtherfield Gallery (London, UK; 2012); Venice Biennal (Italy; 2011), Macro (Rome, Italy; 2012); CLICK Festival (Helsingor, Denmark; 2013); Science gallery (Dublin, Ireland, 2012), <a class="external-link" href="http://www.iocose.org">http://www.iocose.org </a></p>
<h3 style="text-align: justify; ">T.A.J. RESIDENCY & SKE PROJECTS</h3>
<p style="text-align: justify; ">T.A.J. RESIDENCY & SKE PROJECTS is a residency program established in 2013 as a collaborative project between a visual artist and a gallerist. Intended as an interdisciplinary residency, it has already hosted visual artists, curators, academics, scientists, fiction writers and journalists. There is always one visual artist in residence. The residency program is also open to applicants from the fields of architecture, design, music, film, performing arts and education, <a class="external-link" href="http://t-a-j.in">http://t-a-j.in </a></p>
<h3 style="text-align: justify; ">Marialaura Ghidini</h3>
<p style="text-align: justify; ">Marialaura is a curator, researcher and writer. She is the founder director of <a href="http://www.or-bits.com" target="_blank"> <span style="text-decoration: underline;">or-bits.com</span></a> since 2009. Currently she is AHRC-doctoral researcher with <a href="http://www.crumbweb.org" target="_blank"><span style="text-decoration: underline;">CRUMB (Curatorial Upstart Media Bliss)</span></a> at the University of Sunderland. Based in London, UK, from Brescia, Italy. She can be contacted at <a class="mail-link" href="mailto:mlghidini@gmail.com">mlghidini@gmail.com</a></p>
<div class="locked object resizable text" id="index.head.134052969195" style="text-align: center; "></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/events/iocose-talk-at-cis'>http://editors.cis-india.org/internet-governance/events/iocose-talk-at-cis</a>
</p>
No publisherpraskrishnaEventInternet GovernancePrivacy2014-11-25T01:02:24ZEventIndian Women in Science Wiki edit-a-thon
http://editors.cis-india.org/openness/events/india-women-in-science-wiki-edit-a-thon
<b>A Wikipedia edit-a-thon is being held at the Centre for Ecological Sciences, Indian Institute of Science, Bangalore on October 11, 2014 from 10.00 a.m. to 4.00 p.m. The event is being organized by IndiaBioScience in collaboration with the Centre for Internet and Society's Access to Knowledge team. </b>
<p>CIS-A2K will conduct the first three edit-a-thons.</p>
<hr />
<p>In India, Science as a discipline is subject to many of the same gender issues as it is worldwide - women scientists are fewer in number than men, they occupy fewer positions of power, and face distinct issues by virtue of their gender and the accompanying societal pressures. Women Scientists in India also tend to be less visible than their male counterparts, and public awareness of Indian Women Scientists is low.</p>
<p style="text-align: justify; ">IndiaBioScience will be organising a series of public events to raise the profile of women scientists on one of the most-popular online encyclopaedias - Wikipedia. At these events, participants will be encouraged to create and complete profiles of Indian Women in Science.</p>
<p style="text-align: justify; ">To participate sign up below or click here (<a class="free external" href="http://www.indiabioscience.org/content/women-science-wiki-edit-thon" rel="nofollow">http://www.indiabioscience.org/content/women-science-wiki-edit-thon</a></p>
<p style="text-align: justify; ">Contact the IndiaBioScience Team for more details: www.indiabioscience.org & team@indiabioscience.org</p>
<p style="text-align: justify; ">At the venue, the events will begin with a short, hands-on introduction to Wiki editing. Participants can then go on to pick the scientist they would like to work on. There will be an interaction session with a guest Woman Scientist around lunch, with a discussion of issues commonly faced by women in science. In the afternoon session, participants can continue working on the Wiki pages, with a break for tea. Participants are requested to bring their laptops. We have a few desktops available at Saturday's venue for those who cannot do so.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/india-women-in-science-wiki-edit-a-thon'>http://editors.cis-india.org/openness/events/india-women-in-science-wiki-edit-a-thon</a>
</p>
No publisherpraskrishnaAccess to KnowledgeWikimediaWikipediaOpennessEvent2014-10-13T06:17:56ZEventSangeet Baithak: A Hindustani Music Resource Donation Event in Mumbai
http://editors.cis-india.org/openness/events/sangeet-baithak
<b>The Access to Knowledge team from the Centre for Internet and Society (CIS-A2K) and Khayal Trust is organizing a music event on October 7, 2014 in Shivaji Park, Dadar, Mumbai. T.Vishnu Vardhan and Tejaswini Niranjana will be participating.</b>
<p style="text-align: justify; "><a class="external-link" href="https://en.wikipedia.org/wiki/Neela_Bhagwat">Neela Bhagwat</a> will donate her comprehensive textual compilation of <a class="external-link" href="https://en.wikipedia.org/wiki/Gwalior_gharana">Gwalior Gharana</a> bandishes. Gwalior Gharana is one of the old traditions of Hindustani gayaki and like other gayaki's the tradition has been passed on orally in the guru-shishya parampara. Pt. Neela Bhagwat has over a period of 30 years (of learning and teaching music) meticulously compiled most of the Gwalior Gharana bandishes with notations and notes. This comprehensive collection which will be scanned and hosted on Wikisource and made available under CC-BY-SA 4.0. license.</p>
<p>Click to download the event <a href="http://editors.cis-india.org/openness/blog-old/music-event.pdf" class="internal-link">invite here</a>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/openness/events/sangeet-baithak'>http://editors.cis-india.org/openness/events/sangeet-baithak</a>
</p>
No publisherpraskrishnaAccess to KnowledgeWikimediaWikipediaOpennessEvent2014-10-07T04:27:49ZEventConsultation on Figures of Learning in the Digital Context
http://editors.cis-india.org/raw/consultation-on-new-figures-of-learning-in-digital-context
<b>The Centre for Internet and Society welcomes you to a consultation on new figures of learning in the digital context at its office in Bangalore on September 22, 2014 from 2 p.m. to 6 p.m.</b>
<p> </p>
<p>The increasing prevalence of the internet and digital technologies today has engendered a new kind of learning environment, which is connected and collaborative, yet also focussed on the individual, with an emphasis on practice. The pervasive influence of technology in teaching-learning practice has also resulted in new tools, processes and platforms, which have added dimensions to learning, and led to the creation of new bodies of knowledge in the digital context. These new figures, spaces, objects and processes, often challenge and inflate given notions of expertise and authority, increasingly locating them outside the familiar framework of the university and a traditional classroom-based approach to learning.</p>
<p>While the processes of knowledge production have been rapidly changing in the last couple of decades, some examples being data mining, distant reading, cultural mapping and design thinking as new ways of parsing, organising, curating and processing information or knowledge, traditionally the point of reference for authoritative ‘figures’ of learning remains the same. These are that of the teacher, facilitator, reader, student, participant etc. However, with the emergence of such new processes of knowledge-making which are largely located in the digital context, one can see the presence of some non-traditional figures of knowledge as well – such as the geek, hacker, blogger, story-teller, worker, designer, activist etc. There are figures which, consciously or unconsciously subvert and redefine certain conventions of knowledge-making practices, by inventing new terms or redefining old ones. More importantly, the emergence of this nomenclature is symptomatic of a change in the predominant discourse that constitutes a particular kind of ‘digital subject’ or entity that inhabits the digital in a particular way.</p>
<p>The present consultation is an exercise to map these concepts and changes around a set of figures of learning, old and new, to understand the discursive shifts that produce them and locate them in the contemporary moment. Participants from diverse areas of research and practice would be invited to make a short ten minute presentation on one such figure, drawn from their area of interest and work, and examine the concepts or notions behind them. This will be followed by group discussions and a 30 minute writing sprint at the end of the consultation to consolidate the discussion.</p>
<p> </p>
<p>
For more details visit <a href='http://editors.cis-india.org/raw/consultation-on-new-figures-of-learning-in-digital-context'>http://editors.cis-india.org/raw/consultation-on-new-figures-of-learning-in-digital-context</a>
</p>
No publisherpraskrishnaRAW EventsDigital KnowledgeResearchFigures of LearningResearchers at WorkEvent2015-11-13T05:39:00ZEvent