I conduct workshops on The Art of Data Analysis for corporate clients and at conferences. I recently did the workshop at the Fifth Elephant, a conference on Data in Bangalore. These are the slides I used for that workshop.
For corporate clients, I custom develop case studies that are relevant to their company/industry. For more details, contact me at
karthik DOT shashidhar AT gmail DOT com
2012 Rapid Response Vision and Innovation (NYATEP)Timothy Theberge
Workshop provided by the Boston Regional Office of ETA at NYATEP's Spring Conference. The workshop provides the audience ETA's vision for Rapid Response services in the workforce development system. The presentation also includes examples of innovative activities and services that can be funded through Rapid Response.
Description
"How much will it cost? When will it be done". These questions echo much too often in the corridors of the PMO. The need for better predictability in the world of ever-increasing complexity has surfaced tensions in the existing "siloed, protectionist" business-IT dynamics. We continue to behave as a separate entities within an organization instead of navigating through the unpredictability together because of various systemic challenges – one of them being estimation.
This workshop is intended to help you with tools that will necessitate collaboration and transparency between business and IT teams with the goal of generating better estimates. We will bring together well established principles such as relative estimation, cone of uncertainty, and a risk-reduction strategy to enable better estimates. You can use this tool to then schedule program dates, generate insights for stakeholders, and prioritize your teams investments – together with your stakeholders.
------------------------------------------------------------------------------------------------
Bio:
Vinayak is a systems thinker with a with a successful track record of helping organizations achieve Agility. He believes that there is immense power in the humanistic approach of Agile to transform our way of working - trust over control, goals over tasks, and dialogue over discussions.
Connect with Vinny on:
linkedIn- https://www.linkedin.com/in/nvinayak/ and Twitter: @dj_vinayak
2012 Rapid Response Vision and Innovation (NYATEP)Timothy Theberge
Workshop provided by the Boston Regional Office of ETA at NYATEP's Spring Conference. The workshop provides the audience ETA's vision for Rapid Response services in the workforce development system. The presentation also includes examples of innovative activities and services that can be funded through Rapid Response.
Description
"How much will it cost? When will it be done". These questions echo much too often in the corridors of the PMO. The need for better predictability in the world of ever-increasing complexity has surfaced tensions in the existing "siloed, protectionist" business-IT dynamics. We continue to behave as a separate entities within an organization instead of navigating through the unpredictability together because of various systemic challenges – one of them being estimation.
This workshop is intended to help you with tools that will necessitate collaboration and transparency between business and IT teams with the goal of generating better estimates. We will bring together well established principles such as relative estimation, cone of uncertainty, and a risk-reduction strategy to enable better estimates. You can use this tool to then schedule program dates, generate insights for stakeholders, and prioritize your teams investments – together with your stakeholders.
------------------------------------------------------------------------------------------------
Bio:
Vinayak is a systems thinker with a with a successful track record of helping organizations achieve Agility. He believes that there is immense power in the humanistic approach of Agile to transform our way of working - trust over control, goals over tasks, and dialogue over discussions.
Connect with Vinny on:
linkedIn- https://www.linkedin.com/in/nvinayak/ and Twitter: @dj_vinayak
Scenario Analysis Use Case: 3G/4G Wireless DataAugust Jackson
What does the future hold for the wireless telecommunications industry and which players will extract maximum value from providing services, equipment and applications?
This is a version of the presentation that I delivered at the China Institute of Competitive Intelligence conference in Shanghai, November 2009. I used the question of the future of 3G/4G wireless as a use case for using comprehensive scenario analysis to help firms maintain strategic dexterity in the face of uncertainty.
在此課程中將帶領對資料分析感到陌生卻又充滿興趣的您,完整地學會運用 R 語言從最初的蒐集資料、探索性分析解讀資料,並進行文字探勘,發現那些肉眼看不見、隱藏在資料底下的意義。此課程主要設計給對於 R 語言有基本認識,想要進一步熟悉實作分析的朋友們,希望在課程結束後,您能夠更熟悉 R 語言這個豐富的分析工具。透過蘋果日報慈善捐款的資料集,了解如何從頭解析網頁,撰寫爬蟲自動化收集資訊;取得資料後,能夠靈活處理資料,做清洗、整合及探索;並利用現成的套件進行文字探勘、文本解析;我們將一步步實際走一回資料分析的歷程,處理、觀察、解構資料,試著看看人們在捐款的決策過程中,究竟是什麼因素產生了影響,以及這些結果又是如何從資料中挖掘而出的呢?
Short overview of how to identify a problem, gather buy-in, develop consensus and plan a meaningful project... too short for the amount of material... Much leveraged from LEI
Scenario Analysis Use Case: 3G/4G Wireless DataAugust Jackson
What does the future hold for the wireless telecommunications industry and which players will extract maximum value from providing services, equipment and applications?
This is a version of the presentation that I delivered at the China Institute of Competitive Intelligence conference in Shanghai, November 2009. I used the question of the future of 3G/4G wireless as a use case for using comprehensive scenario analysis to help firms maintain strategic dexterity in the face of uncertainty.
在此課程中將帶領對資料分析感到陌生卻又充滿興趣的您,完整地學會運用 R 語言從最初的蒐集資料、探索性分析解讀資料,並進行文字探勘,發現那些肉眼看不見、隱藏在資料底下的意義。此課程主要設計給對於 R 語言有基本認識,想要進一步熟悉實作分析的朋友們,希望在課程結束後,您能夠更熟悉 R 語言這個豐富的分析工具。透過蘋果日報慈善捐款的資料集,了解如何從頭解析網頁,撰寫爬蟲自動化收集資訊;取得資料後,能夠靈活處理資料,做清洗、整合及探索;並利用現成的套件進行文字探勘、文本解析;我們將一步步實際走一回資料分析的歷程,處理、觀察、解構資料,試著看看人們在捐款的決策過程中,究竟是什麼因素產生了影響,以及這些結果又是如何從資料中挖掘而出的呢?
Short overview of how to identify a problem, gather buy-in, develop consensus and plan a meaningful project... too short for the amount of material... Much leveraged from LEI
Recorded webinar: http://slidesha.re/1hT5ghk
Subscribe: http://www.ksmartin.com/subscribe
Karen’s Books: http://ksmartin.com/books
For most, problem solving and critical thinking are NOT naturally given talents. But they are skills that can be developed in anyone, with practice and adequate coaching. In this webinar, Karen shares her 12-step model for executing the PDSA (plan-do-study-adjust) cycle and give tips on how to best develop deep capabilities across the entire workforce.
Twelve Heuristics for Solving Tough Problems—Faster and BetterTechWell
As infants, we begin our lives as problem solving machines, learning to navigate a strange and complex world in which others communicate in ways we don’t understand. Initially, we hone our problem solving talents; then many of us find our explorations thwarted and eventually stop using and then begin losing our natural problem solving ability. But it doesn’t have to be that way. Psychologists tell us that people can regain lost skills and learn new ones to become better problem solvers. Payson Hall shares techniques and skills that apply to situations in real life. Specifically, learn techniques to better define problems, and explore twelve heuristics for generating solutions that can help when you and your team are staring at a blank paper and struggling to find candidate solutions for further consideration. Learn when random search is appropriate, how binary search can help with diagnostics, strategies for identifying and overcoming opposition—and when transferring the problem to someone else might be the best strategy of all.
Flevy.com - Structured Problem Solving & Hypothesis GenerationDavid Tracy
This is a partial preview of the document found here:
https://flevy.com/browse/business-document/structured-problem-solving-hypothesis-generation-95
Description:
Training on how to address and solve problems in a structured way. Has a strong focus on hypothesis generation techniques.
The Case Analysis Workbook provides an in-depth analysis of the pre-seen material from the May 2011 exam sitting: including the application of technical models to the case. For each area, advice is given on how to ensure you capture marks in your exam. The Case Analysis Workbook also contains prioritisation exercises, a series of mini-case scenarios and excerpts from sample reports that help build your confidence and hone your techniques before tackling a full exam.
this is a problem-solving toolkit, it's really useful it has different Approaches to solving problems everybody can use organizations, business people even familes
Laurence Rothman from Crown along with panelists Jim Mcintosh, Joe Lekostaj, and Jeff Schlitt present on advanced segmentation in ExactTarget - Audience Builder & IMH Reporting
Is It Worth It? Using A Business Value Model To Guide DecisionsKent McDonald
One trait of an effective business analyst is the ability to ask the right questions. One “right” question that applies to just about every projects can sometimes be difficult to ask, let alone answer: “Is it worth it?” This question is difficult to answer, because the answer will change as you proceed through the project and gain more knowledge about the purpose, considerations, costs, and benefits involved in a project.
In this session, we’ll explore a tool you can use to help organize the necessary information to answer the “is it worth it?” question on a regular basis. This interactive session will demonstrate how you can create a value model to make an initial decision about whether to pursue a project, and then utilize that model as your knowledge grows throughout the project to revisit the question and confirm whether the project is on the right course, or if changes need to be made.
Topics discussed during the session include:
Structuring your value model to make decisions about whether to do a project
How to deal with non-financial benefits in your Cost/Benefit discussion
Where measures such as NPV, ROI, TCO, IRR fit into the Cost/Benefit discussion.
The impact of timing of implementation on the Cost/Benefit discussion.
The Bangalore quiz that I did today for the KQA (with answers). It was a written only quiz, so no separate prelims and finals.
The winning team made 33.5 out of 50
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.