<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Presentations &#8211; Smals Research</title>
	<atom:link href="https://www.smalsresearch.be/category/publication/presentation/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.smalsresearch.be</link>
	<description></description>
	<lastBuildDate>Tue, 21 Apr 2026 07:28:27 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.smalsresearch.be/wp-content/uploads/2026/01/cropped-cropped-Smals_Research-32x32.png</url>
	<title>Presentations &#8211; Smals Research</title>
	<link>https://www.smalsresearch.be</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Generative AI on your own data &#8211; lessons learned</title>
		<link>https://www.smalsresearch.be/generative-ai-on-your-own-data-lessons-learned/</link>
		
		<dc:creator><![CDATA[Bert Vanhalst]]></dc:creator>
		<pubDate>Wed, 12 Nov 2025 11:15:46 +0000</pubDate>
				<category><![CDATA[Presentations]]></category>
		<guid isPermaLink="false">https://www.smalsresearch.be/generative-ai-on-your-own-data-lessons-learned/</guid>

					<description><![CDATA[Retrieval Augmented Generation (RAG) is d&#233; manier om generatieve AI-toepassingen te bouwen die gevoed worden met je eigen gegevens. Waar standaard taalmodellen vaak blijven hangen in algemene antwoorden, combineert RAG de kracht van een taalmodel met jouw eigen data, zodat de antwoorden betrouwbaar &#233;n contextspecifiek zijn. Tijdens dit webinar delen we onze eigen ervaringen uit [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Retrieval Augmented Generation (RAG) is d&eacute; manier om generatieve AI-toepassingen te bouwen die gevoed worden met je eigen gegevens. Waar standaard taalmodellen vaak blijven hangen in algemene antwoorden, combineert RAG de kracht van een taalmodel met jouw eigen data, zodat de antwoorden betrouwbaar &eacute;n contextspecifiek zijn.</p><p>Tijdens dit webinar delen we onze eigen ervaringen uit de praktijk. Aan de hand van concrete voorbeelden laten we zien wat werkt en waar de valkuilen liggen, welke aandachtspunten cruciaal zijn bij de ontwikkeling van een RAG-toepassing en hoe je beter kan inschatten wat je van deze technologie mag verwachten.</p><p>Of je nu zelf aan de slag wil met RAG of simpelweg beter wil begrijpen hoe deze technologie kan bijdragen aan waardevolle AI-toepassingen: dit webinar geeft je heldere inzichten en direct toepasbare lessen.</p><p>De sessie is tweetalig Frans &#8211; Nederlands, met Engelstalige slides.
</p>


<hr class="wp-block-separator has-alpha-channel-opacity">


<p></p><p>
La G&eacute;n&eacute;ration Augment&eacute;e de R&eacute;cup&eacute;ration (RAG) est le moyen id&eacute;al de cr&eacute;er des applications d&#8217;IA g&eacute;n&eacute;rative aliment&eacute;es par vos propres donn&eacute;es. Alors que les mod&egrave;les de langage standard se limitent souvent &agrave; des r&eacute;ponses g&eacute;n&eacute;riques, la RAG combine la puissance d&#8217;un mod&egrave;le de langage avec vos propres donn&eacute;es, de sorte que les r&eacute;ponses sont fiables et contextualis&eacute;es.</p><p>Au cours de ce webinaire, nous partagerons nos propres exp&eacute;riences pratiques. &Agrave; l&#8217;aide d&#8217;exemples concrets, nous vous montrerons ce qui fonctionne et o&ugrave; se trouvent les pi&egrave;ges, quels sont les points cruciaux &agrave; prendre en compte lors du d&eacute;veloppement d&rsquo;une application RAG et comment mieux &eacute;valuer ce que vous pouvez attendre de cette technologie.</p><p>Que vous souhaitiez vous lancer avec la RAG ou simplement mieux comprendre comment cette technologie peut concourir &agrave; des applications d&#8217;IA utiles, ce webinaire vous apportera des informations claires et des enseignements directement applicables.</p><p>La session est bilingue fran&ccedil;ais et en n&eacute;erlandais, avec des slides en anglais.</p>





                    <h1 class="wp-block-heading">Recording</h1>
                

                
                <figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
                <iframe title="Generative AI: Beyond the Hype" width="500" height="281" src="https://www.youtube.com/embed/ITqWDGr156U?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
                </div></figure>
                



                <h1 class="wp-block-heading">Presentation</h1>
            
            


            <div data-wp-interactive="core/file" class="wp-block-file">
                <object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://www.smalsresearch.be/wp-content/uploads/2025/11/2025-11-07-Webinar-GenAI-on-your-own-data.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of 2025-11-07-Webinar-GenAI-on-your-own-data."></object>
                <a id="wp-block-file--media-b9799409-7224-4698-b6ca-2c197477438b" href="https://www.smalsresearch.be/wp-content/uploads/2025/11/2025-11-07-Webinar-GenAI-on-your-own-data.pdf">2025-11-07-Webinar-GenAI-on-your-own-data</a><a href="https://www.smalsresearch.be/wp-content/uploads/2025/11/2025-11-07-Webinar-GenAI-on-your-own-data.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-b9799409-7224-4698-b6ca-2c197477438b">Download</a>
                </div>
            ]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Le Dark web, menace ou opportunité pour le secteur public</title>
		<link>https://www.smalsresearch.be/le-dark-web-menace-ou-opportunite-pour-le-secteur-public/</link>
		
		<dc:creator><![CDATA[Vandy Berten]]></dc:creator>
		<pubDate>Tue, 30 Sep 2025 10:10:55 +0000</pubDate>
				<category><![CDATA[Presentations]]></category>
		<guid isPermaLink="false">https://www.smalsresearch.be/le-dark-web-menace-ou-opportunite-pour-le-secteur-public/</guid>

					<description><![CDATA[Vandy Berten d&#233;mystifie le &#8220;dark web&#8221; ou &#8220;web clandestin&#8221; au cours de son webinaire. Il explique pourquoi le navigateur Tor a &#233;t&#233; cr&#233;&#233; et ses avantages pour la protection de la vie priv&#233;e par rapport &#224; un navigateur classique. Gr&#226;ce &#224; de nombreux exemples concrets, vous d&#233;couvrez comment il permet de naviguer sur le dark [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Vandy Berten d&eacute;mystifie le &#8220;dark web&#8221; ou &#8220;web clandestin&#8221; au cours de son webinaire. Il explique pourquoi le navigateur Tor a &eacute;t&eacute; cr&eacute;&eacute; et ses avantages pour la protection de la vie priv&eacute;e par rapport &agrave; un navigateur classique.</p><p>Gr&acirc;ce &agrave; de nombreux exemples concrets, vous d&eacute;couvrez comment il permet de naviguer sur le dark web et quel type de contenu vous y trouvez. Vous comprenez aussi que le dark web pose un certain nombre de menaces pour le secteur public, comme pour la soci&eacute;t&eacute; en g&eacute;n&eacute;ral, mais qu&rsquo;il offre &eacute;galement l&rsquo;opportunit&eacute; &agrave; certaines institutions de suivre des secteurs absents du web classique.</p><p>La session est anim&eacute;e en fran&ccedil;ais, avec des slides anglais. Aucune connaissance sp&eacute;cifique n&#8217;est requise&nbsp;: les aspects techniques sont expliqu&eacute;s suffisamment pour permettre &agrave; chacun de suivre.
</p>


<hr class="wp-block-separator has-alpha-channel-opacity">


<p></p><p>
Vandy Berten ontrafelt het mysterie van het &ldquo;dark web&rdquo; of &ldquo;ondergrondse web&rdquo; tijdens zijn webinar. Hij licht toe waarom de Tor-browser is ontwikkeld en welke voordelen deze browser biedt op het vlak van privacybescherming in vergelijking met een klassieke browser.</p><p>Aan de hand van talrijke concrete voorbeelden ontdek je hoe het dark web werkt en wat voor soort inhoud je er kunt vinden. Je leert ook dat het dark web een aantal bedreigingen vormt voor de publieke sector en de samenleving in het algemeen, maar dat het bepaalde instellingen ook de kans biedt om sectoren te volgen die niet op het klassieke web aanwezig zijn.</p><p>De sessie verloopt in het Frans, met Engelstalige slides. Er is geen specifieke kennis vereist: de technische aspecten worden voldoende uitgelegd zodat iedereen kan volgen.</p>





                    <h1 class="wp-block-heading">Recording</h1>
                

                
                <figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
                <iframe title="The dark web: a threat or an opportunity for the public sector?" width="500" height="281" src="https://www.youtube.com/embed/JXAH_YqAwDE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
                </div></figure>
                



                <h1 class="wp-block-heading">Presentation</h1>
            
            


            <div data-wp-interactive="core/file" class="wp-block-file">
                <object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://www.smalsresearch.be/wp-content/uploads/2025/09/2025-09-Webinaire-Dark-Web.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of 2025-09-Webinaire-Dark-Web."></object>
                <a id="wp-block-file--media-cbd4ec73-bcdf-43e7-8f29-3dba9a004359" href="https://www.smalsresearch.be/wp-content/uploads/2025/09/2025-09-Webinaire-Dark-Web.pdf">2025-09-Webinaire-Dark-Web</a><a href="https://www.smalsresearch.be/wp-content/uploads/2025/09/2025-09-Webinaire-Dark-Web.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-cbd4ec73-bcdf-43e7-8f29-3dba9a004359">Download</a>
                </div>
            ]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>bePelias, un géocodeur local basé sur BeSt Address</title>
		<link>https://www.smalsresearch.be/bepelias-un-geocodeur-local-base-sur-best-address-2/</link>
		
		<dc:creator><![CDATA[Vandy Berten]]></dc:creator>
		<pubDate>Thu, 25 Sep 2025 08:26:22 +0000</pubDate>
				<category><![CDATA[Presentations]]></category>
		<category><![CDATA[GIS]]></category>
		<guid isPermaLink="false">https://www.smalsresearch.be/bepelias-un-geocodeur-local-base-sur-best-address-2/</guid>

					<description><![CDATA[Slides de la pr&#233;sentation effectu&#233;e &#224; FOSS4G 2025 (https://www.foss4g.be/) G&#233;ocoder (standardiser + localiser) un grand volume d&#8217;adresses avec un outil commercial am&#233;ricain est un probl&#232;me dans beaucoup de situations. D&#8217;une part parce que cela n&#233;cessite d&#8217;envoyer ses adresses en dehors de l&#8217;Europe, d&#8217;autre part parce que le r&#233;sultat ne sera pas conforme &#224; BeSt Address, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Slides de la pr&eacute;sentation effectu&eacute;e &agrave; FOSS4G 2025 (https://www.foss4g.be/)</p><p>G&eacute;ocoder (standardiser + localiser) un grand volume d&#8217;adresses avec un outil commercial am&eacute;ricain est un probl&egrave;me dans beaucoup de situations. D&#8217;une part parce que cela n&eacute;cessite d&#8217;envoyer ses adresses en dehors de l&#8217;Europe, d&#8217;autre part parce que le r&eacute;sultat ne sera pas conforme &agrave; BeSt Address, le standard administratif de BOSA pour les adresses en Belgique. Avec bePelias, une version am&eacute;lior&eacute;e du g&eacute;ocodeur open-source Pelias adapt&eacute; aux donn&eacute;es de BeSt Address, nous proposons une solution on-premise de g&eacute;ocodage, ayant des performances comparables aux grandes solutions commerciales.</p>







                <h1 class="wp-block-heading">Presentation</h1>
            
            


            <div data-wp-interactive="core/file" class="wp-block-file">
                <object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://www.smalsresearch.be/wp-content/uploads/2025/09/2025-09-25-bePelias-FOSS4G.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of 2025-09-25-bePelias-FOSS4G."></object>
                <a id="wp-block-file--media-c01bd3ce-c3b9-4b1a-82b5-a88f1637b8cd" href="https://www.smalsresearch.be/wp-content/uploads/2025/09/2025-09-25-bePelias-FOSS4G.pdf">2025-09-25-bePelias-FOSS4G</a><a href="https://www.smalsresearch.be/wp-content/uploads/2025/09/2025-09-25-bePelias-FOSS4G.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-c01bd3ce-c3b9-4b1a-82b5-a88f1637b8cd">Download</a>
                </div>
            ]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Webinar: Crypto Agility – Prepare for the unexpected</title>
		<link>https://www.smalsresearch.be/webinar-crypto-agility-prepare-for-the-unexpected/</link>
		
		<dc:creator><![CDATA[Kristof Verslype]]></dc:creator>
		<pubDate>Thu, 12 Jun 2025 11:00:14 +0000</pubDate>
				<category><![CDATA[Presentations]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[Quantum]]></category>
		<guid isPermaLink="false">https://www.smalsresearch.be/webinar-crypto-agility-prepare-for-the-unexpected/</guid>

					<description><![CDATA[Cryptography is essential in our society. Much of it is at risk of becoming insecure in the future due to powerful quantum computers. The current cryptography will have to be replaced by quantum-resistant alternatives. And even then, the crypto migrations will continue. Experience has taught us that such migrations are difficult, slow and expensive processes. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Cryptography is essential in our society. Much of it is at risk of becoming insecure in the future due to powerful quantum computers. The current cryptography will have to be replaced by quantum-resistant alternatives. And even then, the crypto migrations will continue.</p><p>Experience has taught us that such migrations are difficult, slow and expensive processes. Organisations must therefore build crypto agility into their systems: the flexibility to deal with this reality quickly and easily.
</p>


<hr class="wp-block-separator has-alpha-channel-opacity">


<p></p><p>
During our free webinar on Thursday 12th of June 2025, Kristof Verslype took a closer look at crypto agility: why is it necessary, what does it mean in practice and where do we stand today? Kristof is a researcher and cryptographer at Smals Research.</p><p>The session was held in English. The webinar is free but reserved for public sector employees and Smals staff.</p>





                    <h1 class="wp-block-heading">Recording</h1>
                

                
                <figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
                <iframe title="Crypto Agility – Prepare for the unexpected" width="500" height="281" src="https://www.youtube.com/embed/ZnzvaTk3_pQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
                </div></figure>
                



                <h1 class="wp-block-heading">Presentation</h1>
            
            


            <div data-wp-interactive="core/file" class="wp-block-file">
                <object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://www.smalsresearch.be/wp-content/uploads/2025/06/20250612_crypto-agility-webinar.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of 20250612_crypto-agility-webinar."></object>
                <a id="wp-block-file--media-cbbc93b9-2289-4f52-a7a6-77dd45887a1d" href="https://www.smalsresearch.be/wp-content/uploads/2025/06/20250612_crypto-agility-webinar.pdf">20250612_crypto-agility-webinar</a><a href="https://www.smalsresearch.be/wp-content/uploads/2025/06/20250612_crypto-agility-webinar.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-cbbc93b9-2289-4f52-a7a6-77dd45887a1d">Download</a>
                </div>
            ]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tech talk Cybersec Europe &#8211; Cryptographic agility in practice</title>
		<link>https://www.smalsresearch.be/tech-talk-cybersec-europe-cryptographic-agility-in-practice/</link>
		
		<dc:creator><![CDATA[Kristof Verslype]]></dc:creator>
		<pubDate>Wed, 21 May 2025 12:30:45 +0000</pubDate>
				<category><![CDATA[Presentations]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[Quantum]]></category>
		<guid isPermaLink="false">https://www.smalsresearch.be/tech-talk-cybersec-europe-cryptographic-agility-in-practice/</guid>

					<description><![CDATA[Due to the threat of powerful quantum computers in the not so distant future, we need to replace our cryptography. We do this migration from old to new cryptography once, and then we are done, right? Not exactly. We have multiple cryptographic migrations behind us and, most likely, multiple in front of us. A more [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Due to the threat of powerful quantum computers in the not so distant future, we need to replace our cryptography. We do this migration from old to new cryptography once, and then we are done, right? Not exactly. We have multiple cryptographic migrations behind us and, most likely, multiple in front of us.</p><p>A more generic approach is needed to make your organization more flexible such that cryptographic migrations cease to be slow and cumbersome. Cryptographic agility is the recommended as principle to increases your cryptographic maturity. But what does this mean in practice?</p><p>This technical talks discusses concrete examples from the Belgian public sector, going from securing communications, to signing documents and even more advanced cryptographic mechanisms. The talk displays cryptographic agility in practice and draws lessons from them. Furthermore, the role and shape of the cryptographic inventory is touched.</p>







                <h1 class="wp-block-heading">Presentation</h1>
            
            


            <div data-wp-interactive="core/file" class="wp-block-file">
                <object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://www.smalsresearch.be/wp-content/uploads/2025/05/20250521-Cybersec-Crypto-Agility-TECH-V3.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of 20250521-Cybersec-Crypto-Agility-TECH-V3."></object>
                <a id="wp-block-file--media-73f2d243-1eb3-4990-9395-e58e5ebe4320" href="https://www.smalsresearch.be/wp-content/uploads/2025/05/20250521-Cybersec-Crypto-Agility-TECH-V3.pdf">20250521-Cybersec-Crypto-Agility-TECH-V3</a><a href="https://www.smalsresearch.be/wp-content/uploads/2025/05/20250521-Cybersec-Crypto-Agility-TECH-V3.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-73f2d243-1eb3-4990-9395-e58e5ebe4320">Download</a>
                </div>
            ]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Keynote Cybersec Europe: Resilience against quantum (and other) threats with crypto agility</title>
		<link>https://www.smalsresearch.be/keynote-cybersec-europe-resilience-against-quantum-and-other-threats-with-crypto-agility/</link>
		
		<dc:creator><![CDATA[Kristof Verslype]]></dc:creator>
		<pubDate>Wed, 21 May 2025 11:30:21 +0000</pubDate>
				<category><![CDATA[Presentations]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[Quantum]]></category>
		<guid isPermaLink="false">https://www.smalsresearch.be/keynote-cybersec-europe-resilience-against-quantum-and-other-threats-with-crypto-agility/</guid>

					<description><![CDATA[Slides of keynote given at Cybersec Europe 2025. Public key cryptography is essential in our society. We use it constantly, for instance to secure digital communication. Powerful quantum computers could break this in the long term and are already a risk today. Someone who intercepts secure communication today may indeed be able to decipher it [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Slides of keynote given at Cybersec Europe 2025.</p><p>Public key cryptography is essential in our society. We use it constantly, for instance to secure digital communication. Powerful quantum computers could break this in the long term and are already a risk today. Someone who intercepts secure communication today may indeed be able to decipher it in the future with a powerful quantum computer.</p><p>We need to replace our cryptography. History has taught us that such a migration path is cumbersome and can take many years. Multiple new migrations may be ahead of us, not only due to the threat of cryptographically relevant quantum computers.</p><p>Cryptographic agility promises to drastically smoothen such migrations. But what does it mean in practice? This talks dives into the topic, inspired by concrete cases from the public sector.</p>







                <h1 class="wp-block-heading">Presentation</h1>
            
            


            <div data-wp-interactive="core/file" class="wp-block-file">
                <object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://www.smalsresearch.be/wp-content/uploads/2025/05/20250521-Cybersec-Crypto-Agility-KEYNOTE.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of 20250521-Cybersec-Crypto-Agility-KEYNOTE."></object>
                <a id="wp-block-file--media-b6894a88-e0e3-446e-9e08-1ae9a712eaca" href="https://www.smalsresearch.be/wp-content/uploads/2025/05/20250521-Cybersec-Crypto-Agility-KEYNOTE.pdf">20250521-Cybersec-Crypto-Agility-KEYNOTE</a><a href="https://www.smalsresearch.be/wp-content/uploads/2025/05/20250521-Cybersec-Crypto-Agility-KEYNOTE.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-b6894a88-e0e3-446e-9e08-1ae9a712eaca">Download</a>
                </div>
            ]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Qualité des données dans le processus d’ingestion pour les grands modèles de langage&#160;: pratiques et défis</title>
		<link>https://www.smalsresearch.be/qualite-des-donnees-dans-le-processus-dingestion-pour-les-grands-modeles-de-langage-pratiques-et-defis/</link>
		
		<dc:creator><![CDATA[Katy Fokou]]></dc:creator>
		<pubDate>Wed, 21 May 2025 09:27:05 +0000</pubDate>
				<category><![CDATA[Presentations]]></category>
		<guid isPermaLink="false">https://www.smalsresearch.be/qualite-des-donnees-dans-le-processus-dingestion-pour-les-grands-modeles-de-langage-pratiques-et-defis/</guid>

					<description><![CDATA[(FR) Dans le contexte des grands modèles de langage, la qualité des données joue un rôle crucial dans la performance des modèles et des applications basées sur ces modèles. Cette présentation explore les meilleures pratiques pour assurer la qualité des données tout au long du processus d&#8217;ingestion des données. Nous abordons les défis courants tels [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p><strong>(FR)</strong> Dans le contexte des grands modèles de langage, la qualité des données joue un rôle crucial dans la performance des modèles et des applications basées sur ces modèles. Cette présentation explore les meilleures pratiques pour assurer la qualité des données tout au long du processus d&#8217;ingestion des données. Nous abordons les défis courants tels que la gestion des biais, la détection et la correction des erreurs, la gestion de la diversité des formats de données, etc. En outre, nous discutons des outils et des techniques qui peuvent être intégrés dans le pipeline d&#8217;ingestion pour garantir une qualité optimale. Enfin, nous examinons les implications de la qualité des données sur les résultats des modèles de langage et proposons des stratégies pour surmonter les obstacles rencontrés.</p>



<p>La présentation a été donnée dans le cadre d&#8217;une conférence organisée par le groupe de contact FNRS &#8220;Analyse critique et amélioration de la qualité de l’information numérique&#8221;.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>(NL)</strong> In de context van grote taalmodellen speelt de kwaliteit van de gegevens een cruciale rol in de prestaties van de modellen en de toepassingen die daarop gebaseerd zijn. Deze presentatie verkent de beste praktijken om de kwaliteit van de gegevens te waarborgen gedurende het hele proces van gegevensinvoer. We behandelen veelvoorkomende uitdagingen zoals het omgaan met vooroordelen, het opsporen en corrigeren van fouten, het beheren van de diversiteit aan gegevensformaten, enzovoort. Daarnaast bespreken we de tools en technieken die in de invoerpijplijn kunnen worden geïntegreerd om een optimale kwaliteit te garanderen. Tot slot bekijken we de implicaties van de gegevenskwaliteit op de resultaten van taalmodellen en stellen we strategieën voor om de tegengekomen obstakels te overwinnen.</p>



<p>De presentatie werd gegeven in het kader van een conferentie georganiseerd door de FNRS-contactgroep &#8216;Kritische analyse en verbetering van de kwaliteit van digitale informatie&#8217;.</p>



<h1 class="wp-block-heading">Presentation</h1>



<div data-wp-interactive="core/file" class="wp-block-file">
                <object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://www.smalsresearch.be/wp-content/uploads/2025/05/data_and_ai.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of data_and_ai."></object>
                <a id="wp-block-file--media-8e8f6863-a1f9-484b-868b-fc8fc6dcffa7" href="https://www.smalsresearch.be/wp-content/uploads/2025/05/data_and_ai.pdf">data_and_ai</a><a href="https://www.smalsresearch.be/wp-content/uploads/2025/05/data_and_ai.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-8e8f6863-a1f9-484b-868b-fc8fc6dcffa7">Download</a>
                </div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Advanced De-identification &#038; Linkage of Personal Data originating from Multiple Sources for Secondary Use</title>
		<link>https://www.smalsresearch.be/advanced-de-identification-linkage-of-personal-data-originating-from-multiple-sources-for-secondary-use/</link>
		
		<dc:creator><![CDATA[Kristof Verslype]]></dc:creator>
		<pubDate>Wed, 02 Apr 2025 08:20:50 +0000</pubDate>
				<category><![CDATA[Presentations]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[EHDS]]></category>
		<category><![CDATA[gdpr]]></category>
		<category><![CDATA[health]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://www.smalsresearch.be/advanced-de-identification-linkage-of-personal-data-originating-from-multiple-sources-for-secondary-use/</guid>

					<description><![CDATA[This presentation discusses two concepts developed by Smals Research to de-identify and link personal data originating from multiple sources, in order to make them available for secondary use such as for scientific research. Presentation]]></description>
										<content:encoded><![CDATA[<p>This presentation discusses two concepts developed by Smals Research to de-identify and link personal data originating from multiple sources, in order to make them available for secondary use such as for scientific research.</p>







                <h1 class="wp-block-heading">Presentation</h1>
            
            


            <div data-wp-interactive="core/file" class="wp-block-file">
                <object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://www.smalsresearch.be/wp-content/uploads/2025/04/20250401_HDA_pseudojoin_final.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of 20250401_HDA_pseudojoin_final."></object>
                <a id="wp-block-file--media-7edd7c48-5cbd-4197-95d2-7a77bcdf2975" href="https://www.smalsresearch.be/wp-content/uploads/2025/04/20250401_HDA_pseudojoin_final.pdf">20250401_HDA_pseudojoin_final</a><a href="https://www.smalsresearch.be/wp-content/uploads/2025/04/20250401_HDA_pseudojoin_final.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-7edd7c48-5cbd-4197-95d2-7a77bcdf2975">Download</a>
                </div>
            ]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Towards Cryptographic Agility in the Public Sector</title>
		<link>https://www.smalsresearch.be/towards-cryptographic-agility-in-the-public-sector/</link>
		
		<dc:creator><![CDATA[Kristof Verslype]]></dc:creator>
		<pubDate>Mon, 13 Jan 2025 13:00:50 +0000</pubDate>
				<category><![CDATA[Presentations]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[Quantum]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.smalsresearch.be/towards-cryptographic-agility-in-the-public-sector/</guid>

					<description><![CDATA[This talks was part of the Webinar &#8220;Safeguarding Communications and Data in the Age of Quantum Computing&#8221;. This event, co-hosted by Beltug, EuroCC, Quantum Circle and the Flemish Supercomputer Centrum (VSC), brought together experts and professionals to deliver insights on the path to safe communications and data in the quantum computing age. This webinar explores [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>This talks was part of the Webinar &#8220;Safeguarding Communications and Data in the Age of Quantum Computing&#8221;. This event, co-hosted by Beltug, EuroCC, Quantum Circle and the Flemish Supercomputer Centrum (VSC), brought together experts and professionals to deliver insights on the path to safe communications and data in the quantum computing age.</p><p>This webinar explores the emerging threat of quantum computing to encryption and its potential impact on data security. It introduces the new Post-Quantum Cryptography (PQC) standards and the concept of cryptographic agility, providing strategies for organizations to adapt to evolving security challenges. A real-world use case from Proximus showcases how a leading company is preparing its communications infrastructure for the quantum era, offering practical insights into future-proofing data and ensuring secure communications.</p>







                <h1 class="wp-block-heading">Presentation</h1>
            
            


            <div data-wp-interactive="core/file" class="wp-block-file">
                <object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://www.smalsresearch.be/wp-content/uploads/2025/01/20250113-QC-Crypto-Agility-V03.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of 20250113-QC-Crypto-Agility-V03."></object>
                <a id="wp-block-file--media-d64942b4-fe7d-4fad-aea3-0679459aa8dc" href="https://www.smalsresearch.be/wp-content/uploads/2025/01/20250113-QC-Crypto-Agility-V03.pdf">20250113-QC-Crypto-Agility-V03</a><a href="https://www.smalsresearch.be/wp-content/uploads/2025/01/20250113-QC-Crypto-Agility-V03.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-d64942b4-fe7d-4fad-aea3-0679459aa8dc">Download</a>
                </div>
            ]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Privacy in Practice with Smart Pseudonymization &#8211; Lessons from the Belgian Public Sector</title>
		<link>https://www.smalsresearch.be/privacy-in-practice-with-smart-pseudonymization-lessons-from-the-belgian-public-sector/</link>
		
		<dc:creator><![CDATA[Kristof Verslype]]></dc:creator>
		<pubDate>Thu, 10 Oct 2024 07:30:21 +0000</pubDate>
				<category><![CDATA[Presentations]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[pseudonymisation]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.smalsresearch.be/privacy-in-practice-with-smart-pseudonymization-lessons-from-the-belgian-public-sector/</guid>

					<description><![CDATA[Talk given in 2024 at Devoxx Belgium, the biggest vendor-independent Java conference in the world which takes place in one of the biggest European cinema complexes, the Kinepolis, located in Antwerp, Belgium. Masks are being used for thousands of years, all across the physical world, for reasons such as physical protection, rituals and hiding the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Talk given in 2024 at Devoxx Belgium, the biggest vendor-independent Java conference in the world which takes place in one of the biggest European cinema complexes, the Kinepolis, located in Antwerp, Belgium.</p><p>Masks are being used for thousands of years, all across the physical world, for reasons such as physical protection, rituals and hiding the identity of the bearer. Physical masks are probably the oldest privacy protection technology.</p><p>When writing and printing, authors of books and articles used pseudonyms to hide their identity. Voltaire, Lenin and Banksy are well known pseudonyms: modern, written versions of the physical mask. In the digital age we now replace citizens&rsquo; identifiers by unique codes &ndash; having remarkably powerful and even counter-intuitive properties when based on cryptography.</p><p>The public sector has two seemingly contradictory tasks: protecting citizens and their privacy, while maximizing value and efficiency for individuals and society. So should we minimize or maximize data?</p><p>The Belgian public sector increasingly adopts cryptography for pseudonymization &ndash; a crucial, and yet sufficiently practical element in realizing the seemingly impossible.</p><p>In this talk, Kristof introduces three practical cryptographic systems for pseudonymization. He has designed them, based on specific needs within social security and healthcare. If you live in Belgium, your personal data is probably already protected by one of these systems, today.</p>







                <h1 class="wp-block-heading">Presentation</h1>
            
            


            <div data-wp-interactive="core/file" class="wp-block-file">
                <object data-wp-bind--hidden="!state.hasPdfPreview" hidden class="wp-block-file__embed" data="https://www.smalsresearch.be/wp-content/uploads/2024/10/20241010_Devoxx_pseudonimisatie.pdf" type="application/pdf" style="width:100%;height:600px" aria-label="Embed of 20241010_Devoxx_pseudonimisatie."></object>
                <a id="wp-block-file--media-81420267-2320-4f86-b586-ffbe5895055f" href="https://www.smalsresearch.be/wp-content/uploads/2024/10/20241010_Devoxx_pseudonimisatie.pdf">20241010_Devoxx_pseudonimisatie</a><a href="https://www.smalsresearch.be/wp-content/uploads/2024/10/20241010_Devoxx_pseudonimisatie.pdf" class="wp-block-file__button wp-element-button" download aria-describedby="wp-block-file--media-81420267-2320-4f86-b586-ffbe5895055f">Download</a>
                </div>
            ]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
