The document provides a professional summary and experience details of Reddappa Naidu. He has 6 months of experience as a trainer in hyper-mesh V12 at Cadd Centre Training Solutions. He is looking for opportunities in design and analysis where he can use his technical skills. He has expertise in FEA modeling, meshing, applying boundary conditions and performing various analyses like static, modal and non-linear contact using Optistruct. He has worked on meshing of sheet metal, plastic and casting components maintaining quality parameters.
Ganesh K has over 8 years of experience in IT with expertise in Citrix administration. He is currently a Citrix Administrator at IBM India where he manages the Citrix environment for Henkel, including XenApp, XenDesktop, and NetScaler. Previously, he held Citrix Administrator roles at HCL Technologies and Sutherland Global Services where he supported Citrix environments for clients such as Ericsson and Total Defense. He has extensive experience deploying and managing XenDesktop, XenApp, and Citrix Provisioning Services.
La notificación, Desistimiento, Reprogramacion de audienciaa de conciliacionRafael Medina Rospigliosi
Este documento describe varios aspectos del proceso de notificación en la conciliación, incluyendo las formalidades requeridas para las notificaciones, los plazos de notificación, y cómo se manejan situaciones como la reprogramación de audiencias o las reconvenciones.
1. O documento defende uma mudança no modelo tradicional de ensino para tornar os alunos protagonistas de seu próprio aprendizado.
2. Isso seria feito por meio de flexibilização no horário, espaços e composição das turmas, além de estimular a interdisciplinaridade e projetos individuais e coletivos.
3. O uso de tecnologia e recursos digitais também é defendido para dar mais autonomia aos professores e atender melhor as necessidades de cada aluno.
Método de análise de conteúdo para estruturar um modelo de boas práticas soci...Luísa Alvim
Este documento apresenta um método para analisar como as bibliotecas públicas podem usar as redes sociais como o Facebook para cumprir sua missão social. Os autores discutem vários modelos de análise de conteúdo e propõem a construção de um modelo para observar como as bibliotecas usam o Facebook para engajar a comunidade. O objetivo final é estruturar um modelo de boas práticas sociais para bibliotecas públicas 2.0.
Public Libraries, the crisis of the Welfare State and the social networks: th...Luísa Alvim
1. This document discusses the history and challenges facing Portugal's national public libraries network. It was established in the 1980s but faced budget cuts after the 2008 financial crisis.
2. Many Portuguese public libraries have turned to social media like Facebook to engage with communities and reduce social exclusion during times of high unemployment and poverty. Over 40% of public libraries have Facebook pages where they provide services and community events.
3. The document analyzes the social media activities of Portuguese public libraries, finding that most aim to create a sense of community, improve library services, and support lifelong learning. It demonstrates how libraries are adapting to social and economic challenges.
Procurement fraud, bribery, and corruption have moved beyond a perceived risk and become a real issue for many organizations. This paper highlights the need for organizations to put the necessary processes in place to protect against procurement fraud. It also serves as a warning that the absence of any visible instances of bribery, fraud, and corruption should be no cause for complacency as instances of successful perpetration may remain hidden for long periods of time.
The document provides a professional summary and experience details of Reddappa Naidu. He has 6 months of experience as a trainer in hyper-mesh V12 at Cadd Centre Training Solutions. He is looking for opportunities in design and analysis where he can use his technical skills. He has expertise in FEA modeling, meshing, applying boundary conditions and performing various analyses like static, modal and non-linear contact using Optistruct. He has worked on meshing of sheet metal, plastic and casting components maintaining quality parameters.
Ganesh K has over 8 years of experience in IT with expertise in Citrix administration. He is currently a Citrix Administrator at IBM India where he manages the Citrix environment for Henkel, including XenApp, XenDesktop, and NetScaler. Previously, he held Citrix Administrator roles at HCL Technologies and Sutherland Global Services where he supported Citrix environments for clients such as Ericsson and Total Defense. He has extensive experience deploying and managing XenDesktop, XenApp, and Citrix Provisioning Services.
La notificación, Desistimiento, Reprogramacion de audienciaa de conciliacionRafael Medina Rospigliosi
Este documento describe varios aspectos del proceso de notificación en la conciliación, incluyendo las formalidades requeridas para las notificaciones, los plazos de notificación, y cómo se manejan situaciones como la reprogramación de audiencias o las reconvenciones.
1. O documento defende uma mudança no modelo tradicional de ensino para tornar os alunos protagonistas de seu próprio aprendizado.
2. Isso seria feito por meio de flexibilização no horário, espaços e composição das turmas, além de estimular a interdisciplinaridade e projetos individuais e coletivos.
3. O uso de tecnologia e recursos digitais também é defendido para dar mais autonomia aos professores e atender melhor as necessidades de cada aluno.
Método de análise de conteúdo para estruturar um modelo de boas práticas soci...Luísa Alvim
Este documento apresenta um método para analisar como as bibliotecas públicas podem usar as redes sociais como o Facebook para cumprir sua missão social. Os autores discutem vários modelos de análise de conteúdo e propõem a construção de um modelo para observar como as bibliotecas usam o Facebook para engajar a comunidade. O objetivo final é estruturar um modelo de boas práticas sociais para bibliotecas públicas 2.0.
Public Libraries, the crisis of the Welfare State and the social networks: th...Luísa Alvim
1. This document discusses the history and challenges facing Portugal's national public libraries network. It was established in the 1980s but faced budget cuts after the 2008 financial crisis.
2. Many Portuguese public libraries have turned to social media like Facebook to engage with communities and reduce social exclusion during times of high unemployment and poverty. Over 40% of public libraries have Facebook pages where they provide services and community events.
3. The document analyzes the social media activities of Portuguese public libraries, finding that most aim to create a sense of community, improve library services, and support lifelong learning. It demonstrates how libraries are adapting to social and economic challenges.
Procurement fraud, bribery, and corruption have moved beyond a perceived risk and become a real issue for many organizations. This paper highlights the need for organizations to put the necessary processes in place to protect against procurement fraud. It also serves as a warning that the absence of any visible instances of bribery, fraud, and corruption should be no cause for complacency as instances of successful perpetration may remain hidden for long periods of time.
ISCRAM 2013: Supporting multi-level situation awareness in crisis managementISCRAM Events
Authors: Michael E. Stiso, SINTEF ICT,
Aslak Wegner Eide, SINTEF ICT
Ragnhild Halvorsrud, SINTEF ICT
Erik G. Nilsson, SINTEF ICT
Jan Håvard Skjetne, SINTEF ICT
ISCRAM 2013: Smartphones as an Alerting, Command and Control System for the P...ISCRAM Events
Smartphones as an Alerting, Command and Control System for the Preparedeness Groups and Civilians: Results of Preliminary Tests with the Finnish Police
Author: Kuula Jaana, Kauppinen Olli, Auvinen Vili, Kettunen Pauli, Viitanen Santtu /
University of Jyväskylä, Dept. Of Mathematical Information Technology
Korhonen Tuomo / Central Finland Police Department
ISCRAM 2013: Social media in C2 Proof-of-principle experimentISCRAM Events
The document describes a proof-of-principle experiment to test the use of social media in command and control (C2). The experiment was designed to raise the technology readiness level from a theoretical concept to an analytical proof of concept. It compared using traditional email (Condition A) to using Twitter and CrowdMap (Condition B) in a scenario of transporting aid from Sudan to Darfur. Results found that Condition B facilitated self-synchronization across the hierarchy and completed the task 30 minutes faster, supporting the theoretical framework. However, the study had limitations as a proof of concept and further research is needed.
ISCRAM 2013: Leading Cats: How to Effectively Command CollectivesISCRAM Events
This document discusses effective command of collectives. It explores defining commands at both a higher conceptual level, considering interactions between commands, and a lower level looking at individual command elements. Command by intent aims to express the purpose and desired outcome without dictating how to achieve it, allowing for flexibility and novel behavior. Successful command of collectives requires understanding the interplay between different commands, flexibility to adapt to situations, and awareness of organizational cultures. Hurricane Katrina response failures demonstrate the need for these elements.
This document summarizes a research project called COBACORE that aims to close collaboration gaps in urban disaster recovery through two innovation pathways: 1) improving community-wide collaboration building through methods and technologies to facilitate information sharing and joint work; and 2) stimulating a comprehensive needs assessment approach through systematic exploration and joint sensemaking to understand recovery environments from different perspectives. The COBACORE project will develop a collaborative workspace to support common needs assessment in humanitarian recovery operations, complementing existing approaches while enhancing accountability and participation. It will be tested in a large-scale experiment on the Dutch-German border in mid-2015.
ISCRAM 2013: Designing towards an impact evaluation framework for a collabora...ISCRAM Events
This document proposes an impact evaluation framework for assessing collaborative information supply chains between volunteer and technical communities (V&TC) and humanitarian organizations. It outlines the framework components, including evaluation types, perspectives, scope, measurements, and indicators. A case study example compares how the framework could be applied differently to assess the impact of an information supply system used by an NGO versus one used by a V&TC deployment. The framework is intended to help improve coordination between formal humanitarian systems and loosely organized volunteer groups.
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis ResponseISCRAM Events
The document presents a context ontology for humanitarian assistance in crisis response. It aims to build a knowledge representation system to provide necessary information and recommendation actions for decision makers. The system extracts concepts from online crisis data and maps them to an ontology. It then uses logic rules to infer recommendations based on humanitarian standards and provide explanations of how the recommendations are made. The experiments applied the system to crisis data from Hurricane Wilma and showed it performed better than keyword matching alone.
ISCRAM 2013: Meeting the Sphere Standards a case analysis of earthquake respo...ISCRAM Events
1) The document discusses China's response to the 2008 Wenchuan earthquake and 2010 Yushu earthquake, analyzing them according to the Sphere Project's humanitarian standards.
2) It finds both responses faced difficulties like information isolation, damage to transportation and communication infrastructure, and challenges working with NGOs and volunteers.
3) The response to Yushu earthquake showed some improvements like better use of remote sensing technology, coordinating psychological support earlier, and more focus on recovery operations with NGOs. Comparing the responses helps identify aspects of emergency response that could be strengthened.
ISCRAM 2013: Building robust supply networks for effective and efficient disa...ISCRAM Events
The document discusses building robust supply networks for effective disaster response. It proposes an iterative dynamic approach for decision support involving problem structuring, optimization to generate alternatives, dynamic scenario construction to consider uncertainties, and evaluation. As a use case, it applies the approach to optimize locations for health care centers in Haiti after the 2010 earthquake. The approach aims to identify alternatives that perform relatively well across scenarios to create flexible, effective and efficient supply networks.
This document provides an overview of UNHCR (United Nations High Commissioner for Refugees) including:
- UNHCR was established after WWII to respond to refugees in Europe. It currently assists refugees, asylum seekers, internally displaced persons, and stateless people.
- UNHCR's mandate is to provide protection and seek durable solutions such as repatriation, resettlement, and local integration.
- UNHCR faces challenges in accurately knowing refugee populations, assessing refugee needs, and sharing information with partners. Technology can help address these challenges.
ISCRAM 2013: A CBR Detection Framework Using Fuzzy Logic- WIPISCRAM Events
This document presents a framework for detecting chemical, biological, radiological, nuclear, or explosive incidents using fuzzy logic. The framework aims to aggregate information from various sources to calculate cumulative belief degrees about potential incidents. It accounts for attributes of incidents and the credibility of different information sources. An example shows how belief degrees from multiple experts can be aggregated to assess the existence of a radiological dispersion device. The goal is to help decision making by fusing heterogeneous data with different reliability levels. Future work includes implementing the framework as a web service and modeling other incident types while accounting for variable attribute importance.
ISCRAM 2013: A decision support system for effective use of probability forec...ISCRAM Events
1) The document discusses the development of a decision support system (DSS) to help users effectively utilize probabilistic water level forecasts for risk-based decision making regarding flood management.
2) Current issues include difficulty extracting relevant information from probabilistic forecasts and the need to separate responsibilities of forecasters and decision makers.
3) The proposed DSS would ask targeted questions to help users determine appropriate actions based on forecasted flood probabilities and consequences rather than just water levels.
ISCRAM 2013: A Fine-Grained Sentiment Analysis Approach for Detecting Crisis ...ISCRAM Events
The document presents an approach for fine-grained sentiment analysis to detect crisis-related social media posts. It analyzes tweets using seven sentiment classes (anger, disgust, fear, sadness, surprise, happiness, neutral) and evaluates performance on two tweet datasets labeled for the classes. The approach achieves up to 65% accuracy and outperforms analyses using only positive, negative, neutral classes. It detects crisis-informative tweets expressing fear better than generic negative tweets. The authors conclude fine-grained sentiment analysis shows promise for situational awareness but requires larger training data.
ISCRAM 2013: Social Media-based Event Detection for Crisis Management in the ...ISCRAM Events
The document discusses using social media to analyze events and monitor conditions in the Za'atari refugee camp in Jordan. It finds that around 20 relevant tweets per day can be identified from 50,000 daily tweets in the region by filtering for location and keywords. Key topics identified from tweets include refugee numbers, diseases, security issues, riots, infrastructure problems and daily life. Videos and first-hand accounts are also sometimes posted, providing live documentation of camp visits and events like a large fire in March 2013.
ISCRAM 2013: Lessons Learnt from the 2011 Great East Japan Earthquake and Tsu...ISCRAM Events
1) The 2011 Great East Japan Earthquake and Tsunami was one of the largest earthquakes ever recorded at magnitude 9.0. It caused widespread damage including over 15,000 deaths from tsunami waves as high as 40 meters.
2) The earthquake damaged nuclear power plants in Fukushima and caused meltdowns. This revealed flaws in assuming that risks beyond design standards were improbable. It showed the importance of considering lower probability higher impact events and increasing infrastructure flexibility.
3) Early warning systems helped reduce losses from the earthquake and tsunami. The earthquake early warning was issued only 8 seconds after shaking was detected, allowing some trains to stop safely. Updated tsunami warnings were issued as data came in.
ISCRAM 2013: Analysis of a German First Responder Exercise: Requirements for ...ISCRAM Events
This document analyzes a German first responder exercise to identify requirements for exercise support and simulation tools. It summarizes the key findings from observing the exercise and subsequent interviews. Real-life exercises have limitations like lack of control over scenarios and inability to repeat them. The analysis identified three relevant phases - spatial planning, triage and transportation, and transportation to hospitals. For each phase, it outlines the type of output data collected, potential uses of simulation tools, and how those tools could support exercises. The conclusion is that an exercise support software solution and region-specific simulation tools could improve training, future exercises, and resource planning.
ISCRAM 2013: Impact of the distribution and enrichment of information on the ...ISCRAM Events
1) This document describes a study on the impact of information distribution and enrichment on crisis management coordination.
2) An experiment was conducted with 100 crisis management professionals across 4 groups responding to simulated crises under different information conditions.
3) The results showed that enriching information for coordinators had a strong impact on their situation awareness and decision making, but also increased risks of coordination neglect and role neglect, especially with more centralized information management.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
ISCRAM 2013: Supporting multi-level situation awareness in crisis managementISCRAM Events
Authors: Michael E. Stiso, SINTEF ICT,
Aslak Wegner Eide, SINTEF ICT
Ragnhild Halvorsrud, SINTEF ICT
Erik G. Nilsson, SINTEF ICT
Jan Håvard Skjetne, SINTEF ICT
ISCRAM 2013: Smartphones as an Alerting, Command and Control System for the P...ISCRAM Events
Smartphones as an Alerting, Command and Control System for the Preparedeness Groups and Civilians: Results of Preliminary Tests with the Finnish Police
Author: Kuula Jaana, Kauppinen Olli, Auvinen Vili, Kettunen Pauli, Viitanen Santtu /
University of Jyväskylä, Dept. Of Mathematical Information Technology
Korhonen Tuomo / Central Finland Police Department
ISCRAM 2013: Social media in C2 Proof-of-principle experimentISCRAM Events
The document describes a proof-of-principle experiment to test the use of social media in command and control (C2). The experiment was designed to raise the technology readiness level from a theoretical concept to an analytical proof of concept. It compared using traditional email (Condition A) to using Twitter and CrowdMap (Condition B) in a scenario of transporting aid from Sudan to Darfur. Results found that Condition B facilitated self-synchronization across the hierarchy and completed the task 30 minutes faster, supporting the theoretical framework. However, the study had limitations as a proof of concept and further research is needed.
ISCRAM 2013: Leading Cats: How to Effectively Command CollectivesISCRAM Events
This document discusses effective command of collectives. It explores defining commands at both a higher conceptual level, considering interactions between commands, and a lower level looking at individual command elements. Command by intent aims to express the purpose and desired outcome without dictating how to achieve it, allowing for flexibility and novel behavior. Successful command of collectives requires understanding the interplay between different commands, flexibility to adapt to situations, and awareness of organizational cultures. Hurricane Katrina response failures demonstrate the need for these elements.
This document summarizes a research project called COBACORE that aims to close collaboration gaps in urban disaster recovery through two innovation pathways: 1) improving community-wide collaboration building through methods and technologies to facilitate information sharing and joint work; and 2) stimulating a comprehensive needs assessment approach through systematic exploration and joint sensemaking to understand recovery environments from different perspectives. The COBACORE project will develop a collaborative workspace to support common needs assessment in humanitarian recovery operations, complementing existing approaches while enhancing accountability and participation. It will be tested in a large-scale experiment on the Dutch-German border in mid-2015.
ISCRAM 2013: Designing towards an impact evaluation framework for a collabora...ISCRAM Events
This document proposes an impact evaluation framework for assessing collaborative information supply chains between volunteer and technical communities (V&TC) and humanitarian organizations. It outlines the framework components, including evaluation types, perspectives, scope, measurements, and indicators. A case study example compares how the framework could be applied differently to assess the impact of an information supply system used by an NGO versus one used by a V&TC deployment. The framework is intended to help improve coordination between formal humanitarian systems and loosely organized volunteer groups.
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis ResponseISCRAM Events
The document presents a context ontology for humanitarian assistance in crisis response. It aims to build a knowledge representation system to provide necessary information and recommendation actions for decision makers. The system extracts concepts from online crisis data and maps them to an ontology. It then uses logic rules to infer recommendations based on humanitarian standards and provide explanations of how the recommendations are made. The experiments applied the system to crisis data from Hurricane Wilma and showed it performed better than keyword matching alone.
ISCRAM 2013: Meeting the Sphere Standards a case analysis of earthquake respo...ISCRAM Events
1) The document discusses China's response to the 2008 Wenchuan earthquake and 2010 Yushu earthquake, analyzing them according to the Sphere Project's humanitarian standards.
2) It finds both responses faced difficulties like information isolation, damage to transportation and communication infrastructure, and challenges working with NGOs and volunteers.
3) The response to Yushu earthquake showed some improvements like better use of remote sensing technology, coordinating psychological support earlier, and more focus on recovery operations with NGOs. Comparing the responses helps identify aspects of emergency response that could be strengthened.
ISCRAM 2013: Building robust supply networks for effective and efficient disa...ISCRAM Events
The document discusses building robust supply networks for effective disaster response. It proposes an iterative dynamic approach for decision support involving problem structuring, optimization to generate alternatives, dynamic scenario construction to consider uncertainties, and evaluation. As a use case, it applies the approach to optimize locations for health care centers in Haiti after the 2010 earthquake. The approach aims to identify alternatives that perform relatively well across scenarios to create flexible, effective and efficient supply networks.
This document provides an overview of UNHCR (United Nations High Commissioner for Refugees) including:
- UNHCR was established after WWII to respond to refugees in Europe. It currently assists refugees, asylum seekers, internally displaced persons, and stateless people.
- UNHCR's mandate is to provide protection and seek durable solutions such as repatriation, resettlement, and local integration.
- UNHCR faces challenges in accurately knowing refugee populations, assessing refugee needs, and sharing information with partners. Technology can help address these challenges.
ISCRAM 2013: A CBR Detection Framework Using Fuzzy Logic- WIPISCRAM Events
This document presents a framework for detecting chemical, biological, radiological, nuclear, or explosive incidents using fuzzy logic. The framework aims to aggregate information from various sources to calculate cumulative belief degrees about potential incidents. It accounts for attributes of incidents and the credibility of different information sources. An example shows how belief degrees from multiple experts can be aggregated to assess the existence of a radiological dispersion device. The goal is to help decision making by fusing heterogeneous data with different reliability levels. Future work includes implementing the framework as a web service and modeling other incident types while accounting for variable attribute importance.
ISCRAM 2013: A decision support system for effective use of probability forec...ISCRAM Events
1) The document discusses the development of a decision support system (DSS) to help users effectively utilize probabilistic water level forecasts for risk-based decision making regarding flood management.
2) Current issues include difficulty extracting relevant information from probabilistic forecasts and the need to separate responsibilities of forecasters and decision makers.
3) The proposed DSS would ask targeted questions to help users determine appropriate actions based on forecasted flood probabilities and consequences rather than just water levels.
ISCRAM 2013: A Fine-Grained Sentiment Analysis Approach for Detecting Crisis ...ISCRAM Events
The document presents an approach for fine-grained sentiment analysis to detect crisis-related social media posts. It analyzes tweets using seven sentiment classes (anger, disgust, fear, sadness, surprise, happiness, neutral) and evaluates performance on two tweet datasets labeled for the classes. The approach achieves up to 65% accuracy and outperforms analyses using only positive, negative, neutral classes. It detects crisis-informative tweets expressing fear better than generic negative tweets. The authors conclude fine-grained sentiment analysis shows promise for situational awareness but requires larger training data.
ISCRAM 2013: Social Media-based Event Detection for Crisis Management in the ...ISCRAM Events
The document discusses using social media to analyze events and monitor conditions in the Za'atari refugee camp in Jordan. It finds that around 20 relevant tweets per day can be identified from 50,000 daily tweets in the region by filtering for location and keywords. Key topics identified from tweets include refugee numbers, diseases, security issues, riots, infrastructure problems and daily life. Videos and first-hand accounts are also sometimes posted, providing live documentation of camp visits and events like a large fire in March 2013.
ISCRAM 2013: Lessons Learnt from the 2011 Great East Japan Earthquake and Tsu...ISCRAM Events
1) The 2011 Great East Japan Earthquake and Tsunami was one of the largest earthquakes ever recorded at magnitude 9.0. It caused widespread damage including over 15,000 deaths from tsunami waves as high as 40 meters.
2) The earthquake damaged nuclear power plants in Fukushima and caused meltdowns. This revealed flaws in assuming that risks beyond design standards were improbable. It showed the importance of considering lower probability higher impact events and increasing infrastructure flexibility.
3) Early warning systems helped reduce losses from the earthquake and tsunami. The earthquake early warning was issued only 8 seconds after shaking was detected, allowing some trains to stop safely. Updated tsunami warnings were issued as data came in.
ISCRAM 2013: Analysis of a German First Responder Exercise: Requirements for ...ISCRAM Events
This document analyzes a German first responder exercise to identify requirements for exercise support and simulation tools. It summarizes the key findings from observing the exercise and subsequent interviews. Real-life exercises have limitations like lack of control over scenarios and inability to repeat them. The analysis identified three relevant phases - spatial planning, triage and transportation, and transportation to hospitals. For each phase, it outlines the type of output data collected, potential uses of simulation tools, and how those tools could support exercises. The conclusion is that an exercise support software solution and region-specific simulation tools could improve training, future exercises, and resource planning.
ISCRAM 2013: Impact of the distribution and enrichment of information on the ...ISCRAM Events
1) This document describes a study on the impact of information distribution and enrichment on crisis management coordination.
2) An experiment was conducted with 100 crisis management professionals across 4 groups responding to simulated crises under different information conditions.
3) The results showed that enriching information for coordinators had a strong impact on their situation awareness and decision making, but also increased risks of coordination neglect and role neglect, especially with more centralized information management.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
ISCRAM 2013: Tweet4act: Using Incident-Specific Profiles for Classifying Crisis-Related Messages
1. Tweet4act: Using Incident-Specific Profiles for
Classifying Crisis-Related Messages
Soudip Roy Chudary, Muhammad Imran, Muhammad Rizwam Asghar,
Sihem Amer-Yahia, Carlos Castillo
3. Virtual Collaboration, Information Sharing
• Valuable information
• Contribute to situational awareness
• Highly useful, if analyzed timely and
effectively(Starbird et al., 2010; Latonero and Shklovski, 2010)
5. Disaster Management, Crisis Informatics
- Caution, warnings
- Alerts etc.
- Damage
- Causalities etc.
- Request for help
- Donations etc.
• The main goals of our research:
1. Identify messages related to an incident.
2. Classify incident-messages with the corresponding period
(PRE, DURING, POST).
6. Datasets & Examples
1. Joplin Tornado on May 22, 2011
2. Nesat Typhoon in Philipines on Sep 27, 2011
3. Haiti Earthquake on Jan 12, 2010
• [PRE] New #tropical storm forms in the West #Pacific. #Nesat may hit the #Philippines & #China as a #typhoon
next week
• [DURING] @Yahoo News: Powerful #typhoon with winds up to 106 mph makes landfall in #Philippines as
100,000 odered to fless homes
• [POST] News5 Action center is now accepting donations for the victims of Typhoon “pedring. Drop boxes are
located @ TV5 Office :)
8. 1. Filtering Process
• Normalization: remove “RT @username” and “@username”
prefixes and remove duplicate messages
• Apply the k-mediod method with the manhattan distance
between medoids and messages in each cluster
• Discard all cluster having a negative number or zero as
silhouette coefficient
• Select from each cluster the fraction m messages closer to
the mediod
10. 2. Dictionary Based Period Classification
• Most frequent words across datasets
• “warning” & “alert” typically found in the Pre
• “now”, “sweeps” etc. typically found in During
• “aftermath”, “donate” etc. typically found in Post
11. 3. NLP-Based Period Classification
• Tense of verbs can help identify period. (A. Iyengar et al., 2011)
POS tagging
1. Dictionary based verbs get +1 (ignore below)
2. Aux verbs get +1(e.g., could-PRE, are-DURING, did-POST)
3. If a main verb in future/present/past tense, add +0.5 to
pre/during/post period, respectively.
Ties: PRE > DURING > POST
13. Performance of Tweet4Act
Period Tweet4act SVM MaxEnt Tree RF
P R F1 P R F1 P R F1 P R F1 P R F1
Joplin Tornado
PRE 0.33 0.85 0.48 0.00 0.00 0.00 0.43 0.21 0.28 0 0 0 0 0 0
DURIN
G
0.88 0.89 0.89 0.32 0.91 0.47 0.35 0.55 0.43 0.3 0.73 0.43 0.32 0.1 0.48
POST 0.61 0.84 0.71 0.67 0.20 0.31 0.55 0.6 0.57 0.57 0.4 0.47 1.00 0.1 0.18
AVG. 0.61 0.86 0.69 0.33 0.37 0.39 0.44 0.45 0.42 0.29 0.38 0.45 0.66 0.37 0.33
Haiti Earthquake
PRE 0.63 1.00 0.77 1.00 0.67 0.80 1.00 1.00 1.00 1 0.67 0.8 1.00 0.33 0.5
DURIN
G
0.72 0.97 0.83 0.75 0.6 0.67 0.67 0.80 0.73 0.6 0.6 0.6 1.00 0.4 0.57
POST 0.46 0.82 0.59 0.92 0.97 0.94 0.97 0.95 0.96 0.92 0.95 0.93 0.88 1.00 0.94
AVG. 0.60 0.87 0.71 0.89 0.74 0.80 0.88 0.91 0.89 0.84 0.74 0.78 0.96 0.58 0.67
Nesat Typhoon
PRE 0.36 1.00 0.53 1.00 0.50 0.67 1.00 0.50 0.67 0.33 0.25 0.28 1.00 0.5 0.67
DURIN
G
0.94 0.94 0.94 0.79 1.00 0.88 0.81 1.00 0.90 0.71 0.77 0.74 0.79 1 0.88
POST 0.52 0.85 0.65 1.00 0.2 0.33 1.00 0.40 0.57 0 0 0 1.00 0.2 0.33
AVG. 0.61 0.93 0.71 0.93 0.57 0.62 0.94 0.63 0.71 0.35 0.34 0.51 0.93 0.57 0.63
PRE
PRE
PRE
DURING
DURING
DURING
POST
POST
POST
AVG
AVG
AVG
14. References
• A. Iyengar, T. Finin, and A. Joshi (2011) Content-based prediction of
temporal boundaries for events in Twitter. In Proceedings of the Third IEEE
International Conference on Social Computing.
• K. Starbird, L. Palen, A. Hughes, and S. Vieweg (2010) Chatter on the red:
what hazards threat reveals about the social life of microblogged
information. In Proceedings of the 2010 ACM conference on Computer
supported cooperative work, pages 241–250. ACM.
• Latonero, Mark, and Irina Shklovski. "“Respectfully Yours in Safety and
Service”: Emergency Management & Social Media Evangelism.”
Proceedings of the 7th International ISCRAM Conference– Seattle. Vol. 1.
2010.