By 2023, cell phones will replace home computers and become the primary means of communication. Cell phones will have advanced voice control and break from their traditional shape. Televisions will also evolve to allow internet access, video chatting, and social media from home. Cars will be equipped with superior computer systems and internet access to allow users to stay connected while driving. Technologies will continue advancing based on how people use communication devices and what features they demand. Companies will study these usage patterns to determine what to incorporate into future products.
What does the world look like in the year 2025? Digital living evangelist, Lindsay Smith, explores the communications and technology journey that has revolutionized the 21st century.
Are you ready for the changes that will come in this lifetime?
A presentation on what communication technology will look like in the year 2026. A review of where we came from with technology and a look into the future of whats still to come.
MY LAST 25 YEARS INTERNET PAPERS MODELS - NEXT INTERNET MODELS FOR WORLD OF TECHNOLOGY AND INTERNET FOR GROWTH ONE WORLD ONE INTERNET ONE LOCAL ECONOMY AND INNOVATION
Golden years of IT: Past Present and FutureAltaf Rehmani
Golden Years of IT, Past Present and Future: A keynote presentation by Altaf Rehmani from redbytes software to 350 students of computer science in Sinhgad university
What does the world look like in the year 2025? Digital living evangelist, Lindsay Smith, explores the communications and technology journey that has revolutionized the 21st century.
Are you ready for the changes that will come in this lifetime?
A presentation on what communication technology will look like in the year 2026. A review of where we came from with technology and a look into the future of whats still to come.
MY LAST 25 YEARS INTERNET PAPERS MODELS - NEXT INTERNET MODELS FOR WORLD OF TECHNOLOGY AND INTERNET FOR GROWTH ONE WORLD ONE INTERNET ONE LOCAL ECONOMY AND INNOVATION
Golden years of IT: Past Present and FutureAltaf Rehmani
Golden Years of IT, Past Present and Future: A keynote presentation by Altaf Rehmani from redbytes software to 350 students of computer science in Sinhgad university
This presentation, from the Aug 8 GoToMeeting, covers four already existing design processes, and a hybrid design process that will be used by Conrad Creative Collaboration.
This presentation describes how communication technology is going to be in 2026 and how it is going to influence devices like phones, watches, vehicles and education and medical care.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
2. Cell Phones
• 1983-the public is introduced to cell phones.
• 1989- first flip phone
• 1993- text messaging is developed.
• 2002- first smart phone and camera phone is developed.(No
microphone or speakerphone, could only send and receive emails.)
3. Cell phones
• Cell phones now have endless capabilities, whether its accessing the web, video
chatting someone, or taking suggestion from your phone (siri).
• Its amazing to see how far the cellphone has come, from a 3lb brick to
something that can fit in the palm of your hand. Its hard to imagine where the
technology can go from here.
• By the time 2023 I think cell phones will replace the home computer. Every
phone will have the video talk feature and it will be the main means of
communications. I can also see cell phones braking away from their traditional
shape, maybe there will be a special eye piece the accompanies an ear piece
and the entire system will be voice controlled. Seeing the leaps and bounds
companies have made over the last 10 years, its endless to think of the things
we will have access to in the next 10 years.
5. Critical Mass Theory
• Requires innovators and early adopters willing to take the risk
of trying new technology.
• These users are the “critical mass,” small segment of
population that choose to make big contributions to the public
good.
• Any social process involving actions by individuals that benefit
others is know as “collective action”.
• Technologies become more useful if everyone in the system is
using this technology, this is known as universal access.
(Grant, 29)
6. Cell phones and The Critical Mass Theory
• Cell phone usage had its “critical mass” testing out this new technology.
• As more people were using cell phones others began to see the ease and
convenience of communication the popularity began to grow. With more people
using them companies had more money to invest in improving their
products, which allowed cell phones to improve. There’s a direct correlation in
cell phone popularity and the improvements.
• With these two growing together, cell phone usage shifted from select few to
the most common form of communication. Today there are billions of cell
phone users.
• Since cell phone usage has grown to the proportion it has, cell phone
technology is forever growing and improving. Cell phones have grown from
large objects that are simply used for calling into handheld computers. You can
run your life and business from your cell phone. Seeing the improvements in
technology we have in the last 10 years its hard to picture what else they could
incorporate into these devices.
7. • By 2023 television will evolve to service our every
communication needs.
• Every television will be equipped with internet
access.
• Having that access will allow users to talk, video
chat and access social media, all from their
television.
• I believe there will be technology that allows a TV.
to project a 3D image so when you talk with
someone it will almost be like that person is with
you.
• Just like cell phones televisions will soon
Be the only object needed to access the internet
And make calls. The home computer and phone.
Television
8. Television Cont……
• The amount of control one has of the T.V. will be limitless in 2023.
• I feel companies will stray away from the use of remote controls.
There will be voice activation and motion sensors that allow you to
interact with the television.
• You would be able to touch what things you want to click on.
9. Automobiles 2023
• I think in the next 10 years cars will be used more for communication. Every car
will be equipped with internet access and a more interactive computer system.
• Cars computer system will not only take commands but will also be able to
relay information to you, for example reading text messages and
emails, allowing the driver to focus on driving.
• With internet access people can stay in touch with one another sending
messages via email, social media, and text.
• Cars now have started incorporating voice command features into its
design, but
• There are flaws. Those systems are not always user friendly and sometimes
has trouble recognizing the action your wanting it
to take.
• All of that will be eliminated by 2023.
11. Uses and Gratifications
• “Uses and Gratifications is a descriptive approach that give insight into
what people do with technology” (Grant 31)
• I feel this theory gives the best insights into how companies produce
communication products. By studying the uses individuals have for
technology you can decide what features to include into your products.
For example cars being equipped with a superior computer system and
internet access. People want to be able to access the web and stay
connected with friends so cars can give them those features.
• This theory will allow products to grow with its users. People want to
be able to access the internet, social media, emails, and talk with
others so majority of products in 2023 will have those features.
12. The Principal of Relative Constancy
• “Do people just keep adding new entertainment
media, or do they adjust by dropping one form for
another” (Grant, 33)
• This theory focuses on technology and how people
decide what form to use and when to jump from one
technology to another.
• “Is that new technology compelling enough to make
the user want to switch” (Grant, 33)
13. The Principle of Relative Constancy
• This theory is extremely important when deciding what
technology you want to spend your money on.
• As time progresses technology will change and people will
be struck with the decision to switch. When automobiles add
the new improvements, like computer system and internet
access, people will have to decide if its worth spending
money to purchase that technology.
• This theory will cause competition in the technology
industry and help advance technology into what it will be in
2023.
14. Continued…..
• I feel that as companies add new technology to their
products all products will soon start adding those features.
Pretty soon the only thing people will have to decide on is
what brand they want to purchase.
• People being what they are, everyone will purchase all of
the communication mediums just to have them. Regardless
if the television can access the web and serve that
purpose, they will still purchase that new car and fancy cell
phone, just to have the toys they want.
15. Citation
• Soft Schools (n.d.). Cell phone timeline. Retrieved from
http://www.softschools.com/timelines/cell_phone_timelin
e/28/
• Meadows, J. H. (2012). Understanding communication
technology. In A. Grant & J. Meadows (Eds.), Communication
Technology Update and FundamentalsWaltham, Ma: Focal
Press.