3D printing is reaching the mainstream market, with the industry growing from $288 million in 2008 to $5.7 billion in 2013. While high prices, lack of content, and quality issues currently inhibit widespread adoption, falling prices, improved applications, and open-source initiatives are driving growth. The author outlines a timeline where 3D printing moves from industrial to eCommerce to local to home use within the next 10 years. He also discusses several important legal questions around patents, copyright, and regulation that will be raised by expanded 3D printing adoption.
Steven was the CEO of Hummingbird Communications, he focused on the enterprise networking, networking security and security detection devices, security software sales, design, development, systems integration, and deployment of network and integration systems for L-3 Communications, Security and Detection Systems whose target market was the aviation industry and private sector companies.
3D Printing - A 2014 Horizonwatching Trend Summary ReportBill Chamberlin
ABOUT 3D PRINTING: Also called Additive Manufacturing, 3D printing has been hailed as a transformative manufacturing technology, 3D printing involves fabrication of physical objects by depositing a material using a nozzle, print head, or any another printer technology. Though initially used for prototyping of products, 3D printing has evolved and is currently capable of customized short-run manufacturing of industrial products, dental implants, and medical devices.
ABOUT THIS TREND REPORT: This report provide information about the 3D Printing trend along with links to additional resources.
Table of Contents
1.Introduction to 3D Printing
2.Marketplace Opportunities and Industry Applications
3.Materials & Technologies
4.Vendor Ecosystem
5.Drivers, Challenges, Implications, Trends to Watch
6.Summary / Recommendations
7.Appendix: Resources for further reading & understanding
Harbor Research: 3D Printing Growth OpportunityHarbor Research
What is The Impact of 3D Printing on IoT?
3D Printing is already changing manufacturing and design processes, but the industry is poised for an even greater shift. Advancement in 3D printing processes will increase speed, complexity of materials, and quality of prints, while decreasing costs.
Though 3D printers have been in development for over 20 years, businesses have shown uneven adoption across commercial and industrial applications. We believe that the forces driving adoption are becoming aligned and 3D printing technology is poised to disrupt diverse sectors across the economy.
Read More on the Opportunity here: https://goo.gl/ZK9mny
Steven was the CEO of Hummingbird Communications, he focused on the enterprise networking, networking security and security detection devices, security software sales, design, development, systems integration, and deployment of network and integration systems for L-3 Communications, Security and Detection Systems whose target market was the aviation industry and private sector companies.
3D Printing - A 2014 Horizonwatching Trend Summary ReportBill Chamberlin
ABOUT 3D PRINTING: Also called Additive Manufacturing, 3D printing has been hailed as a transformative manufacturing technology, 3D printing involves fabrication of physical objects by depositing a material using a nozzle, print head, or any another printer technology. Though initially used for prototyping of products, 3D printing has evolved and is currently capable of customized short-run manufacturing of industrial products, dental implants, and medical devices.
ABOUT THIS TREND REPORT: This report provide information about the 3D Printing trend along with links to additional resources.
Table of Contents
1.Introduction to 3D Printing
2.Marketplace Opportunities and Industry Applications
3.Materials & Technologies
4.Vendor Ecosystem
5.Drivers, Challenges, Implications, Trends to Watch
6.Summary / Recommendations
7.Appendix: Resources for further reading & understanding
Harbor Research: 3D Printing Growth OpportunityHarbor Research
What is The Impact of 3D Printing on IoT?
3D Printing is already changing manufacturing and design processes, but the industry is poised for an even greater shift. Advancement in 3D printing processes will increase speed, complexity of materials, and quality of prints, while decreasing costs.
Though 3D printers have been in development for over 20 years, businesses have shown uneven adoption across commercial and industrial applications. We believe that the forces driving adoption are becoming aligned and 3D printing technology is poised to disrupt diverse sectors across the economy.
Read More on the Opportunity here: https://goo.gl/ZK9mny
The case for 3D printing in the Always-On supply chainMarc-Andre Leger
Case 10-1 in the course book: Turban, Efraim. INFORMATION TECHNOLOGY FOR MANAGEMENT: On-Demand Strategies for Performance, Growth and Sustainability. Eleventh Edition. WILEY, 2018.
Course presentation at the John-Molson School of Business of Concordia University (Montréal) on the emergence of 3D printing and how it impacts on business models and the supply chain
EMEA10: Trepidation in Moving to the CloudCompTIA UK
Today’s buzz centres on cloud computing. What is it exactly? Will it dent your revenues or does it have potential to add capabilities to your business? How do you deliver value when you don’t “install” anything? Learn how to use this new approach to delivering IT services in your business, what to consider and where it makes sense – and where it doesn’t! Dave Sobel, CEO of Evolve Technologies, talks to you about how to develop cloud offerings and how you position your business for growth around online services. Strategies come from real life experience, industry data, and collaboration with other solution providers to give you the best way to take on the big, bad cloud.
NTC/362 Week 3
OSI Model, Switching Systems, Network Channel Processors, and Media
1 Write a 200- to 300-word response to the following:
Supporting Activities: Introduction to Network Channels, Processors, and Media
•What are the advantages and disadvantages of network processors, such as hubs, switches, routers, and gateways?
•What are the three main types of network media?
•What is their performance in terms of reliability, speed capabilities, and nominal distance for reliable spans?
2 Write a 200- to 300-word response to the following
Supporting Activity: Introduction to Circuit Switching
• •What are the basic concepts of circuit switching?
•What are the advantages and disadvantages of circuit switching?
3 Write a 200- to 300-word response to the following:
Supporting Activity: Introduction to Packet Switching
•What is a packet? What is packet switching?
•How would you explain the concept of packet switching?
•What are the advantages and disadvantages of packet switching over circuit switching?
4Write a 200- to 300-word response to the following:
NTC/362
Week
3
OSI Model, Switching Systems, Network Channel Processors, and
Media
1
Write
a 200
-
to 300
-
word response to the following:
Supporting Activities:
Introduction to Network Channels, Processors, and Media
•
What are the advantages and disadvantages o
f network processors, such as hubs, switches,
routers, and gateways?
•What are the three main types of network media?
•What is their performance in terms of reliability, speed capabilities, and nominal distance for
reliable spans?
2
Write
a 200
-
to 300
-
word response to the following
Supporting Activity:
Introduction to Circuit Switching
•
•What are the basic concepts of circuit switching?
•What are the advantages and disadvantages of circuit switching?
3
Write
a 200
-
to 300
-
word response to the following:
Supporting Activity:
Introduction to Packet Switching
•What is a packet? What is packet switching?
•How would you explain the concept of pa
cket switching?
•What are the advantages and disadvantages of packet switching over circuit switching?
4
Write
a 200
-
to 300
-
word response to the f
ollowing:
NTC/362 Week 3
OSI Model, Switching Systems, Network Channel Processors, and
Media
1 Write a 200- to 300-word response to the following:
Supporting Activities: Introduction to Network Channels, Processors, and Media
•What are the advantages and disadvantages of network processors, such as hubs, switches,
routers, and gateways?
•What are the three main types of network media?
•What is their performance in terms of reliability, speed capabilities, and nominal distance for
reliable spans?
2 Write a 200- to 300-word response to the following
Supporting Activity: Introduction to Circuit Switching
• •What are the basic concepts of circuit switching?
•What are the advantages and disadvantages of circuit switching?
3 Write a 200- to 300-word response to the follo.
Machine learning and the challenges of digital transformation in the lawSebastian Ko
The adoption of machine-learning (a form of artificial intelligence) by lawyers is shaping the future of law –as a profession and institution. Today, pockets of practice and traditional workflows have undergone massive transformation, viz. legal research and document reviews in discovery, regulatory disclosures, M&A, and contract management. Many alternative legal services providers, “legaltech” vendors, and other “NewLaw” businesses were born in the 2010s. Yet, truly full-service “robo-lawyers” are nowhere in sight. This seminar will examine –from a legaltech industry perspective– the technological influences on emerging industry trends, including the applications of analytics and natural language processing. The discussion will focus on how software encodes the law and legal processes in software, the related technological and ethical challenges, and the adoption barriers in legal practice.
Proliferation of XaaS model based on cloud technologies and explosive growth of Internet of Things bring huge benefits to businesses and governments but also do they present a whole new bunch of cybersecurity problems. Importance of cybersecurity has skyrocketed after recent attacks on the biggest world brands. No one is safe anymore. 82% of U.S. business executives are worried that cyber threats could impact their companies’ growth prospects. Some estimates show that cyber attacks cost businesses as much as $400 billion a year.
This trend opens a wide opportunity window for telecommunication companies. For over a decade CSPs cared about perimeter security only and now they can play a more substantial role securing their large userships in a way more dangerous environment. Fortunately, there are many successful cases when CSP could turn dumb pipes into secure ones.
In this ppt I tried to highlight some recent developments in security domain and outline other ideas CSPs could use to force security transformation. As usual I welcome any thoughts and feedback on the matter. Thank you!
Proliferation of XaaS model based on cloud technologies and explosive growth of Internet of Things bring huge benefits to businesses and governments but also do they present a whole new bunch of cybersecurity problems. Importance of cybersecurity has skyrocketed after recent attacks on the biggest world brands. No one is safe anymore. 82% of U.S. business executives are worried that cyber threats could impact their companies’ growth prospects. Some estimates show that cyber attacks cost businesses as much as $400 billion a year.
This trend opens a wide opportunity window for telecommunication companies. For over a decade CSPs cared about perimeter security only and now they can play a more substantial role securing their large userships in a way more dangerous environment. Fortunately, there are many successful cases when CSP could turn dumb pipes into secure ones.
In this ppt I tried to highlight some recent developments in security domain and outline other ideas CSPs could use to force security transformation. As usual I welcome any thoughts and feedback on the matter. Thank you!
IEEE Day Speech - Networking for engineers and some thoughts on IoTAndreas Neumeier
Social Networking is important, and it will increasingly be. In particular with complex and diverse technologies spanning multiple disciplines, like #IoT. In a keynote for the Spanish IEEE Sections celebration I discussed and few thoughts on the importance of social networking for engineers.
Following the Money Behind Intellectual Property LawAram Sinnreich
Presentation made at the #ICA17 conference in San Diego, May 28, 2017. The full draft of the paper (which is based on a forthcoming book for Yale Press) can be downloaded from http://bit.ly/AS-ICA17.
Who Gets Left Behind as Remix Goes Mainstream?Aram Sinnreich
A presentation of a paper by Fernanda Rosa and Aram Sinnreich at #AoIR2016. This paper uses longitudinal survey data to demonstrate the increasingly mainstream nature of "remix" or "configurable" culture, while also examining the lingering social inequities that are reproduced by asymmetric adoption of these emerging cultural trends.
The case for 3D printing in the Always-On supply chainMarc-Andre Leger
Case 10-1 in the course book: Turban, Efraim. INFORMATION TECHNOLOGY FOR MANAGEMENT: On-Demand Strategies for Performance, Growth and Sustainability. Eleventh Edition. WILEY, 2018.
Course presentation at the John-Molson School of Business of Concordia University (Montréal) on the emergence of 3D printing and how it impacts on business models and the supply chain
EMEA10: Trepidation in Moving to the CloudCompTIA UK
Today’s buzz centres on cloud computing. What is it exactly? Will it dent your revenues or does it have potential to add capabilities to your business? How do you deliver value when you don’t “install” anything? Learn how to use this new approach to delivering IT services in your business, what to consider and where it makes sense – and where it doesn’t! Dave Sobel, CEO of Evolve Technologies, talks to you about how to develop cloud offerings and how you position your business for growth around online services. Strategies come from real life experience, industry data, and collaboration with other solution providers to give you the best way to take on the big, bad cloud.
NTC/362 Week 3
OSI Model, Switching Systems, Network Channel Processors, and Media
1 Write a 200- to 300-word response to the following:
Supporting Activities: Introduction to Network Channels, Processors, and Media
•What are the advantages and disadvantages of network processors, such as hubs, switches, routers, and gateways?
•What are the three main types of network media?
•What is their performance in terms of reliability, speed capabilities, and nominal distance for reliable spans?
2 Write a 200- to 300-word response to the following
Supporting Activity: Introduction to Circuit Switching
• •What are the basic concepts of circuit switching?
•What are the advantages and disadvantages of circuit switching?
3 Write a 200- to 300-word response to the following:
Supporting Activity: Introduction to Packet Switching
•What is a packet? What is packet switching?
•How would you explain the concept of packet switching?
•What are the advantages and disadvantages of packet switching over circuit switching?
4Write a 200- to 300-word response to the following:
NTC/362
Week
3
OSI Model, Switching Systems, Network Channel Processors, and
Media
1
Write
a 200
-
to 300
-
word response to the following:
Supporting Activities:
Introduction to Network Channels, Processors, and Media
•
What are the advantages and disadvantages o
f network processors, such as hubs, switches,
routers, and gateways?
•What are the three main types of network media?
•What is their performance in terms of reliability, speed capabilities, and nominal distance for
reliable spans?
2
Write
a 200
-
to 300
-
word response to the following
Supporting Activity:
Introduction to Circuit Switching
•
•What are the basic concepts of circuit switching?
•What are the advantages and disadvantages of circuit switching?
3
Write
a 200
-
to 300
-
word response to the following:
Supporting Activity:
Introduction to Packet Switching
•What is a packet? What is packet switching?
•How would you explain the concept of pa
cket switching?
•What are the advantages and disadvantages of packet switching over circuit switching?
4
Write
a 200
-
to 300
-
word response to the f
ollowing:
NTC/362 Week 3
OSI Model, Switching Systems, Network Channel Processors, and
Media
1 Write a 200- to 300-word response to the following:
Supporting Activities: Introduction to Network Channels, Processors, and Media
•What are the advantages and disadvantages of network processors, such as hubs, switches,
routers, and gateways?
•What are the three main types of network media?
•What is their performance in terms of reliability, speed capabilities, and nominal distance for
reliable spans?
2 Write a 200- to 300-word response to the following
Supporting Activity: Introduction to Circuit Switching
• •What are the basic concepts of circuit switching?
•What are the advantages and disadvantages of circuit switching?
3 Write a 200- to 300-word response to the follo.
Machine learning and the challenges of digital transformation in the lawSebastian Ko
The adoption of machine-learning (a form of artificial intelligence) by lawyers is shaping the future of law –as a profession and institution. Today, pockets of practice and traditional workflows have undergone massive transformation, viz. legal research and document reviews in discovery, regulatory disclosures, M&A, and contract management. Many alternative legal services providers, “legaltech” vendors, and other “NewLaw” businesses were born in the 2010s. Yet, truly full-service “robo-lawyers” are nowhere in sight. This seminar will examine –from a legaltech industry perspective– the technological influences on emerging industry trends, including the applications of analytics and natural language processing. The discussion will focus on how software encodes the law and legal processes in software, the related technological and ethical challenges, and the adoption barriers in legal practice.
Proliferation of XaaS model based on cloud technologies and explosive growth of Internet of Things bring huge benefits to businesses and governments but also do they present a whole new bunch of cybersecurity problems. Importance of cybersecurity has skyrocketed after recent attacks on the biggest world brands. No one is safe anymore. 82% of U.S. business executives are worried that cyber threats could impact their companies’ growth prospects. Some estimates show that cyber attacks cost businesses as much as $400 billion a year.
This trend opens a wide opportunity window for telecommunication companies. For over a decade CSPs cared about perimeter security only and now they can play a more substantial role securing their large userships in a way more dangerous environment. Fortunately, there are many successful cases when CSP could turn dumb pipes into secure ones.
In this ppt I tried to highlight some recent developments in security domain and outline other ideas CSPs could use to force security transformation. As usual I welcome any thoughts and feedback on the matter. Thank you!
Proliferation of XaaS model based on cloud technologies and explosive growth of Internet of Things bring huge benefits to businesses and governments but also do they present a whole new bunch of cybersecurity problems. Importance of cybersecurity has skyrocketed after recent attacks on the biggest world brands. No one is safe anymore. 82% of U.S. business executives are worried that cyber threats could impact their companies’ growth prospects. Some estimates show that cyber attacks cost businesses as much as $400 billion a year.
This trend opens a wide opportunity window for telecommunication companies. For over a decade CSPs cared about perimeter security only and now they can play a more substantial role securing their large userships in a way more dangerous environment. Fortunately, there are many successful cases when CSP could turn dumb pipes into secure ones.
In this ppt I tried to highlight some recent developments in security domain and outline other ideas CSPs could use to force security transformation. As usual I welcome any thoughts and feedback on the matter. Thank you!
IEEE Day Speech - Networking for engineers and some thoughts on IoTAndreas Neumeier
Social Networking is important, and it will increasingly be. In particular with complex and diverse technologies spanning multiple disciplines, like #IoT. In a keynote for the Spanish IEEE Sections celebration I discussed and few thoughts on the importance of social networking for engineers.
Following the Money Behind Intellectual Property LawAram Sinnreich
Presentation made at the #ICA17 conference in San Diego, May 28, 2017. The full draft of the paper (which is based on a forthcoming book for Yale Press) can be downloaded from http://bit.ly/AS-ICA17.
Who Gets Left Behind as Remix Goes Mainstream?Aram Sinnreich
A presentation of a paper by Fernanda Rosa and Aram Sinnreich at #AoIR2016. This paper uses longitudinal survey data to demonstrate the increasingly mainstream nature of "remix" or "configurable" culture, while also examining the lingering social inequities that are reproduced by asymmetric adoption of these emerging cultural trends.
A presentation give at #AoIR2016 by Pat Aufderheide and Aram Sinnreich sharing survey data reflecting the copyright and fair use practices of people in the visual arts professions
Slides for my "Digital Media and Culture" class, Fall 2016, essentially giving undergrads a quick refresher on what internet culture was about before they first logged on.
ICA 2016: Slicing the Pie: Towards an Equitable Music EconomyAram Sinnreich
Presentation given at the International Communication Association conference in Fukuoka, Japan, June 2016. This paper analyzes the royalties and revenues accrued by recording artists and composers who distribute their work through various online and off-line channels, and considers pending music policy decisions in light of these analyses.
ICA 2016: Resisting Surveillance: Counter Conduct of the IncarceratedAram Sinnreich
Presentation given by Jessa Lingel and Aram Sinnreich at the International Communication Conference in Fukuoka, Japan, June 2016. This presentation focuses on how incarcerated populations resist and mitigate surveillance, and what online populations can learn from their acts of "counter-conduct."
LIDA 2016: COPYRIGHT, MEDIA ETHICS, LIBERTY & PRIVACY AN INTERNATIONAL PERSPE...Aram Sinnreich
Presentation given at "Libraries in the Digital Age", June 2016: COPYRIGHT, MEDIA ETHICS, LIBERTY & PRIVACY
AN INTERNATIONAL PERSPECTIVE. Uses international survey data to examine trends in digital culture, and implications for copyright law and library policy
Ethics Evolved: An International Perspective on Copying in the Networked AgeAram Sinnreich
Analysis of data from surveys from 2006-2015 covering the awareness, consumption, engagement, opinions, ethics and laws surrounding "configurable" culture, such as mashups, remixes, machinima, memes, mods, and anime music videos.
Fair Use and Academic Freedom: Copyright Attitudes and Practices Among Commun...Aram Sinnreich
Presented at the Internet Research 16 conference in Phoenix, AZ, Oct 24, 2015.
Based on:
Sinnreich, A. & Aufderheide, P. (2015). Communication scholars and fair use: The case for discipline-wide education and institutional reform. International Journal of Communication, 9; 818-828.
Abstract:
A survey of 350 communication scholars internationally shows that, although scholars are increasingly aware of fair use and (when aware of it) benefit from the Code of Best Practices in Fair Use for Communication Scholarship, they continue to suffer from confusion and ignorance about how to apply this feature of copyright law that is crucial to their work. Most are not aware of the code, although those who use it report success. The survey results point to the need for discipline-wide education and application of the code’s affordances for institutional reform.
Resisting Sovereign Surveillance: an activist agenda from the IncarceratedAram Sinnreich
Presentation made by Jessa Lingel and Aram Sinnreich at the Internet Research 15 Conference in Daegu, Korea, 10/23/14.
Full draft of the article is available at http://j.mp/incodification.
Presentation audio: https://soundcloud.com/original-sinn/incodification_ir15
Abstract:
This paper reviews penal history in order to consider forms of resistance to mass surveillance. Because experiences of surveillance are endemic to incarcerated life, identifying tactics of resistance among these populations provides valuable insights for potential forms of counter-conduct in other circumstances of ubiquitous monitoring. We focus on three forms of protest: hunger strikes, alternate communication networks and viral dance videos, which we frame through Foucault’s theory of askesis. We introduce the term incodification as a means of describing conditions of continuous surveillance ingrained into infrastructures of everyday life, even as these conditions give rise to tactics of resistance like those identified in this paper. Our objective in introducing this term, and with our analysis as a whole, is to provoke theoretical and activist projects that account for and subvert infrastructures of incodification.
Presentation audio: https://soundcloud.com/original-sinn/posthuman_rights_cornelltech
Abstract:
The rise of digital networks is contributing to profound shifts in the way we work, play, organize, and construct our identities. The "modern individual," a convenient fiction of the 19th and 20th centuries, is giving way to a more fluid understanding of the human condition, and inspiring some thinkers to postulate that we're entering a "posthuman" age. Yet our legal, economic, and institutional systems are still tied to the notion of "individual" rights and responsibilities. How can we update these systems to accommodate such changes, and what are the risks if we don't?
Sharing in Spirit: Kopimism and the Digital EucharistAram Sinnreich
Presented at International Communication Association annual Conference, May 22, 2014:
In April, 2012, in a ceremony officiated by an “ops” wearing a Guy Fawkes mask and wielding a talking laptop, the first Kopimist wedding was performed. It marked a significant milestone for this rapidly growing religion, founded in 2010 by a Swedish philosophy student named Isak Gerson and officially recognized by Sweden less than two years later. The religion is based on the principals that copying, disseminating and reconfiguring information are not only ethically right, but are in themselves “sacred” acts of devotion. Kopimist philosophy also holds that “the internet is holy” and that “code is law” (a phrase copied from legal scholar Lawrence Lessig).
Kopimism has already raised some interesting questions and debates in both legal and religious circles. Some have grumbled that the Kopimists are simply a bunch of “pirates” cleverly using religious protection to shield them from liability for copyright infringement. Others have suggested that the religion is little more than a sophomoric rhetorical exercise, the predictable product of a precocious young philosopher. In this article, I consider these viewpoints and suggest that, if we take Kopimist doctrine at its word, we can better understand it as the crystallization of an emerging value system centered around the proliferation of digital, networked information. Like copyright, and monastic Christianity before, it, Kopimism stakes out a socioepistemological vantage point, seeking to reconcile the regulatory demands of the 20th Century’s copyright regime with the cultural ramifications of today’s global digital information infrastructure.
Based on interviews with Kopimist officials and worshippers, as well as a critical reading of the religion’s “constitution” and other doctrinal texts, I delineate the complex ethical boundaries surrounding this new belief system, and examine it in contrast to previous religious and legal systems, evaluating its points of continuity and rupture to illuminate the unique challenges to ethics and morality in an era of information abundance and continuing material and educational inequity.
Why Doesn't the 'Brooklyn Sound' Sound Like Brooklyn?Aram Sinnreich
Presented at the Experience Music Project Pop Conference, April 25, 2014. Audio is available here: http://aramsinnreich.typepad.com/aram_squalls/2014/04/brooklynsound.html
#Kopimism considered: Sophistry, sacrament or scam?Aram Sinnreich
Sweden recently became the first nation officially to recognize a new religion called Kopimism, based on the principal that copying, disseminating and reconfiguring information constitutes a "sacred" act. Some argue that Kopimists are a bunch of "pirates" using religion to shield them from copyright liability. Others see it as an absurd act of political theater. In this article, I suggest that it is the crystallization of an emerging cultural value system centered around digital networks. Like copyright, and monastic Christianity before it, Kopimism represents a socioepistemological solution to the irreconcilability of traditional cultural values and emerging informatic flows.
Slides for a webinar I gave on June 27, 2013 covering the state of webcasting, digital music, and online marketing, with a focus on Pandora and the potential threats presented by Apple's iTunes Radio service. Featuring a significant amount of digital music industry economic data, and mapping out the value chains for digital music distribution.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
3D Printing: Mo' Markets, Mo' Problems
1. 3D Printing:
Mo’ Markets, Mo’ Problems
Aram Sinnreich, Ph.D.
Rutgers University School of Communication & Information
This text is freely available under a Creative Commons 3.0
Attribution-NonCommercial-ShareAlike license.
2. 3D Printers are Reaching the Mainstream
$5.7 billion
$288 million
3. 3D Printing Drivers and Inhibitors
INHIBITORS
High
price
points
Scarce
content
Quality
gap
Patent
landscape
High
stakes
Lack of
standards
Education &
Patent outsourcing
Falling
prices
Better
apps
Open
source
expiry,
Aggressive legislation,
R&D
regulation
DRIVERS
4. 3D Printing Adoption Timeline: 4 Phases
Today
Industrial
2-3 years
10+ years
5-7 years
eCommerce
Local
Home
5. Legal Questions & Considerations
Patent
• SLS/SLA patents expiring 2014
• Secondary patents controlled by 3D Systems & Stratasys
• Will ease of replication undermine the core function of patents?
Copyright
• What constitutes a “useful” article?
• How does merger doctrine apply to digital 3D models?
• Secondary liability for printers and service providers?
Other
• Whither trademark?
• How to avoid the “piracy” battles of 2000s
• DRM?
• DMCA for design?
• Safety regulation & liability?
6. Thank you.
Aram Sinnreich, Ph.D.
sinn@rutgers.edu
Books by Aram Sinnreich
Mashed Up (2010)
www.mashed-up.com
The Piracy Crusade (2013)
www.piracycrusade.com