Share2B is an enterprise social network (ESN) software that combines social networking features with traditional business applications like CRM to allow knowledge workers to better collaborate across locations. The document discusses how ESNs can address limitations of email and separate collaboration tools by integrating social features into existing business processes. It provides statistics on enterprise adoption of ESNs and describes the SugarCRM connector that allows SugarCRM users to connect their CRM data and activities to Share2B's social networking and collaboration features.
Using Social Media for Continuity & Emergency ManagementGeorges Cowan
Use Enterprise Secured Social Media for Continuity and Emergency Management presented at BCI Saskatchewan Forum on 2011-03-14 webinar (second part following introduction on same subject) by Georges Cowan
Socialite Engage, a social media engagement platform designed specifically for those in the financial services industry. Given the strict rules and federal regulations that govern the financial services sector, Socialite Engage has been built to flexibly manage inbound and outbound content and conversations via popular social media channels such as LinkedIn, Facebook, and Twitter while providing message archiving controls to maintain compliance.
Internal presentation for the Enterprise 2.0 Observatory (October 2007). Topics: Enterprise 2.0, Open Innovation, Mobility, Crowdsourcing, Social Network, and more...
Using Social Media for Continuity & Emergency ManagementGeorges Cowan
Use Enterprise Secured Social Media for Continuity and Emergency Management presented at BCI Saskatchewan Forum on 2011-03-14 webinar (second part following introduction on same subject) by Georges Cowan
Socialite Engage, a social media engagement platform designed specifically for those in the financial services industry. Given the strict rules and federal regulations that govern the financial services sector, Socialite Engage has been built to flexibly manage inbound and outbound content and conversations via popular social media channels such as LinkedIn, Facebook, and Twitter while providing message archiving controls to maintain compliance.
Internal presentation for the Enterprise 2.0 Observatory (October 2007). Topics: Enterprise 2.0, Open Innovation, Mobility, Crowdsourcing, Social Network, and more...
The Social CEO - Getting Your Executives Online. Presentation to Pacific Con...Walter Jennings
Consumers are online and companies are following - but are CEOs? This presentation covers the business case for high profile management to engage in social media, then has a few case studies. Finally are "baby steps" anyone can take to get online. Feel free to ping questions!
Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Peter k...EY Finland
Turvallinen ja tehokas sosiaalinen media, Social media’s impact on a company’s operations, Peter Katko, Partner, Head of IP/IT Law, Ernst & Young Germany
Life has dramatically changed in the last few years: while initially many had thought that only access and bits of information would be subject to digital transformation, we are now facing the fact that a growing part of our own life has become digital.
Cloudforce Sydney 2012 - Social Enterprise for Financial Services Scott Gunther
Gavin Jones and Lee Marshall of Salesforce's Financial Services Team present on how FinServ businesses need to transform into Social Enterprises. This deck also has some excellent case studies by Andrew Murrell of Commonwealth Bank of Australia (CBA) who is the General Manager Digital and Social Marketing, Scott Gunther, the Senior Manager, Proposition
2020 Social Decoding Employee Communities2020 Social
Slides from the 2020 Social workshop on Decoding Employee Communities.
This deck has been used for the following workshops:
- Talk at CII Connect Coimbatore 2010.
Update history:
- March 2010
SocialGrow Round Two Pitch Slides - 2010 MassChallenge Global Startup Competi...Ken Herron
On July 13, 2010, SocialGrow President Marsh Sutherland and Chief Marketing Officer Ken Herron pitched SocialGrow as part of round two of the 2010 MassChallenge Startup Competition at Fan Pier Boston.
The slides have been annotated to include the talking points used for each slide.
Learn more about Microsoft BizSpark SocialGrow and the SocialGrow software application at http://socialgrow.com, and keep up with the latest social media best practices by following SocialGrow on Twitter at http://twitter.com/socialgrow.
Social BPM - Combining social Web and BPM for improving enterprise performanceemanuelemolteni
Social BPM fuses BPM practices with social networking applications, with the aim of enhancing the enterprise performance by means of a controlled participation of external stakeholders to process design and enactment. The purpose of this participation is the exploitation of the operational value of the company, hidden within the personal behaviours and relations. In the presentation we address three main points:
- The motivation and requirements associated with Social BPM
- The concrete objectives that organizations can earn in terms of efficiency improvement, including: exploitation of weak ties and implicit knowledge; increase of transparency in process execution; user participation and engagement; distribution of decision and activity execution; feedback collection; and knowledge sharing
- The status of the Social BPM offer and the coverage of the above objectives
For each objective, pros and cons of the various solutions are discussed and concrete examples are used for describing the problem. Practical and innovative techniques are introduced too (e.g., crowdsearching, gamification, social network analysis, extended BP modeling notations, agile cycles for process improvement).
Intro to Convofy for Consultancies and Agencieststaley
Convofy is a private social network app that goes farther that the rest, adding true on-the-page collaboration, even markup of web pages, as well as instant messaging.
The introduction slides to the CPD Programme entitled 'Web 2.0. The Times They Are a Changing' by Jim Hamill from Strathclyde University. They present a brief overview and introduction to Web 2.0 and Social Media.
More information about this program on the page:
http://www.strath.ac.uk/business/cee/cpd/web2
ASZ-3034 Build a WebSphere Linux Cloud on System z: From Roll-Your-Own to Pre...WASdev Community
Do you need the most reliable, secure, and cost-effective on-premise cloud platform? Look no further: a cloud based on WebSphere and Linux on System z is the answer. This presentation traces the evolution of successful server consolidation to Linux on System z, from brute-force physical moves to virtual topology to sophisticated workload placement. We'll cover techniques and considerations to ensure a rich, dense, enterprise environment. The material is derived from interactions with our enterprise mainframe customers running world-class data centers.
We will briefly describe the new Enterprise Cloud System that unites leading IBM software, storage, and server technologies into one simple, flexible, and secure factory-integrated solution.
We will show examples of System z based cloud environments which provide everything you expect from System z: extreme reliability, secure, geo-dispersed, high performance clouds. We will describe application development and deployment patterns that both help and hurt in a virtualized cloud environment. From the admin perspective we will explore heap and GC tuning, idle server tuning, and stacking options. We will also present a very effective performance tuning approach for large scale virtualized environments.
We also present WebSphere Liberty profile performance in a virtualized environment, relative to a traditional WebSphere application server.
The Social CEO - Getting Your Executives Online. Presentation to Pacific Con...Walter Jennings
Consumers are online and companies are following - but are CEOs? This presentation covers the business case for high profile management to engage in social media, then has a few case studies. Finally are "baby steps" anyone can take to get online. Feel free to ping questions!
Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Peter k...EY Finland
Turvallinen ja tehokas sosiaalinen media, Social media’s impact on a company’s operations, Peter Katko, Partner, Head of IP/IT Law, Ernst & Young Germany
Life has dramatically changed in the last few years: while initially many had thought that only access and bits of information would be subject to digital transformation, we are now facing the fact that a growing part of our own life has become digital.
Cloudforce Sydney 2012 - Social Enterprise for Financial Services Scott Gunther
Gavin Jones and Lee Marshall of Salesforce's Financial Services Team present on how FinServ businesses need to transform into Social Enterprises. This deck also has some excellent case studies by Andrew Murrell of Commonwealth Bank of Australia (CBA) who is the General Manager Digital and Social Marketing, Scott Gunther, the Senior Manager, Proposition
2020 Social Decoding Employee Communities2020 Social
Slides from the 2020 Social workshop on Decoding Employee Communities.
This deck has been used for the following workshops:
- Talk at CII Connect Coimbatore 2010.
Update history:
- March 2010
SocialGrow Round Two Pitch Slides - 2010 MassChallenge Global Startup Competi...Ken Herron
On July 13, 2010, SocialGrow President Marsh Sutherland and Chief Marketing Officer Ken Herron pitched SocialGrow as part of round two of the 2010 MassChallenge Startup Competition at Fan Pier Boston.
The slides have been annotated to include the talking points used for each slide.
Learn more about Microsoft BizSpark SocialGrow and the SocialGrow software application at http://socialgrow.com, and keep up with the latest social media best practices by following SocialGrow on Twitter at http://twitter.com/socialgrow.
Social BPM - Combining social Web and BPM for improving enterprise performanceemanuelemolteni
Social BPM fuses BPM practices with social networking applications, with the aim of enhancing the enterprise performance by means of a controlled participation of external stakeholders to process design and enactment. The purpose of this participation is the exploitation of the operational value of the company, hidden within the personal behaviours and relations. In the presentation we address three main points:
- The motivation and requirements associated with Social BPM
- The concrete objectives that organizations can earn in terms of efficiency improvement, including: exploitation of weak ties and implicit knowledge; increase of transparency in process execution; user participation and engagement; distribution of decision and activity execution; feedback collection; and knowledge sharing
- The status of the Social BPM offer and the coverage of the above objectives
For each objective, pros and cons of the various solutions are discussed and concrete examples are used for describing the problem. Practical and innovative techniques are introduced too (e.g., crowdsearching, gamification, social network analysis, extended BP modeling notations, agile cycles for process improvement).
Intro to Convofy for Consultancies and Agencieststaley
Convofy is a private social network app that goes farther that the rest, adding true on-the-page collaboration, even markup of web pages, as well as instant messaging.
The introduction slides to the CPD Programme entitled 'Web 2.0. The Times They Are a Changing' by Jim Hamill from Strathclyde University. They present a brief overview and introduction to Web 2.0 and Social Media.
More information about this program on the page:
http://www.strath.ac.uk/business/cee/cpd/web2
ASZ-3034 Build a WebSphere Linux Cloud on System z: From Roll-Your-Own to Pre...WASdev Community
Do you need the most reliable, secure, and cost-effective on-premise cloud platform? Look no further: a cloud based on WebSphere and Linux on System z is the answer. This presentation traces the evolution of successful server consolidation to Linux on System z, from brute-force physical moves to virtual topology to sophisticated workload placement. We'll cover techniques and considerations to ensure a rich, dense, enterprise environment. The material is derived from interactions with our enterprise mainframe customers running world-class data centers.
We will briefly describe the new Enterprise Cloud System that unites leading IBM software, storage, and server technologies into one simple, flexible, and secure factory-integrated solution.
We will show examples of System z based cloud environments which provide everything you expect from System z: extreme reliability, secure, geo-dispersed, high performance clouds. We will describe application development and deployment patterns that both help and hurt in a virtualized cloud environment. From the admin perspective we will explore heap and GC tuning, idle server tuning, and stacking options. We will also present a very effective performance tuning approach for large scale virtualized environments.
We also present WebSphere Liberty profile performance in a virtualized environment, relative to a traditional WebSphere application server.
Pilbara Pulse 2014 - Small Business Development Corporation - David EatonKDCCI
Small Business Development Corporation CEO and WA Small Business Commissioner, David Eaton, presented at the Karratha and Districts Chamber of Commerce and Industry's fourth annual Pilbara Pulse Economic Summit.
Slide desk on impact of design based thinking when creating. It illustrates that because the world is complex and full of choices, we need passionate, creative and thoughtful approaches in our businesses. Using these approaches delights people, adds a human-ness to it, and creates something inspiring.
This presentation describes the radical changes taking place in today's large corporation. A special emphasis is given toward the role HR can play in driving leadership and organizational change. Case study material is also presented.
Architecting the Building Blocks of Enterprise Social Networking Mike Gotta
Note: Some builds and layouts/colors did not come out with the same fidelity as the PPT.
What are the architectural building blocks that enable social networking? What cultural dynamics should be considered when implementing “social infrastructure”? What research methods aid design efforts? This session will help architects and practitioners understand connections between profiles and identity, social objects and participation, activity streams/micro-blogging and formation of social networks.
This presentation was used to present to volunteers for PSYBT (Prince's Scottish Youth Business Trust) in a webinar for 'Why social media' - check it out!
Social Revolution: Connecting with Today’s CustomerHubSpot
Salesforce.com’s George Hu and HubSpot’s Brian Halligan discuss how your organization can turn the social revolution into a competitive advantage. View the entire webinar: http://www.hubspot.com/new-webinar-revolutionize-sales-and-marketing/
CRM 2.0 - Frameworks for Program StrategyMichael Moir
This presentation reviews several overarching frameworks for guiding CRM strategy and planning efforts. It provides a starting point for many aspects of a holistic CRM approach.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/