The document presents a vision for a computing environment suited for the Web 2.0 era. It discusses enabling technologies like Web 2.0, grid/cloud computing, and software as a service. As an example use case, it describes a probabilistic performance assessment of a structure. Key aspects of the envisioned environment include harnessing collective intelligence, incorporating user-generated content, and utilizing distributed computing resources.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
This article is all about what AI trends will emerge in the field of creative operations in 2024. All the marketers and brand builders should be aware of these trends for their further use and save themselves some time!
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
During this webinar, Anand Bagmar demonstrates how AI tools such as ChatGPT can be applied to various stages of the software development life cycle (SDLC) using an eCommerce application case study. Find the on-demand recording and more info at https://applitools.info/b59
Key takeaways:
• Learn how to use ChatGPT to add AI power to your testing and test automation
• Understand the limitations of the technology and where human expertise is crucial
• Gain insight into different AI-based tools
• Adopt AI-based tools to stay relevant and optimize work for developers and testers
* ChatGPT and OpenAI belong to OpenAI, L.L.C.
A vision of a computing environment for the Web 2.0 era
1. University
of Ljubljana
Faculty
of civil and geodetic
engineering
A vision of a computing
environment for the Web 2.0 era
PARENG 2009 Matevž Dolenc
Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
2. University
of Ljubljana
Faculty
of civil and geodetic
Outline engineering
‣ Introduction
‣ Enabling technologies
- Web 2.0
- Grid/Cloud/Volunteer computing
- Software as a service
‣ Use case
- A probabilistic performance assessment of a structure
‣ Summary
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
3. University
of Ljubljana
Faculty
of civil and geodetic
engineering
A vision of a computing environment for the Web 2.0 era
Pronunciation: ˈvi-zhən
Function: noun
Etymology: Middle English, from Anglo-French, from Latin vision-, visio,
from vidēre to see — more at wit
Date: 14th century
a: something seen in a dream, trance, or ecstasy ; especially : a
supernatural appearance that conveys a revelation b: a thought, concept,
or object formed by the imagination c: a manifestation to the senses of
something immaterial
vision. (2009). In Merriam-Webster Online Dictionary.
Retrieved April 5, 2009, from http://www.merriam-webster.com/dictionary/vision
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
4. University
of Ljubljana
Faculty
of civil and geodetic
engineering
A vision of a computing environment for the Web 2.0 era
Main entry: com·pute
Pronunciation: kəm-ˈpyüt
Function: verb
Inflected Form(s): com·put·ed; com·put·ing
Etymology: Latin computare — more at count
Date: 1616
transitive verb
: to determine especially by mathematical means ; also : to determine or
calculate by means of a computer
intransitive verb
1: to make calculation 2: to use a computer
compute. (2009). In Merriam-Webster Online Dictionary.
Retrieved April 5, 2009, from http://www.merriam-webster.com/dictionary/compute
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
5. University
of Ljubljana
Faculty
of civil and geodetic
engineering
A vision of a computing environment for the Web 2.0 era
Pronunciation: in-ˈvī-rə(n)-mənt, -ˈvī(-ə)r(n)-
Function: noun
Date: 1827
1: the circumstances, objects, or conditions by which one is
surrounded 2 a: the complex of physical, chemical, and biotic factors (as
climate, soil, and living things) that act upon an organism or an ecological
community and ultimately determine its form and survival b: the aggregate
of social and cultural conditions that influence the life of an individual or
community 3: the position or characteristic position of a linguistic element
in a sequence 4: a computer interface from which various tasks can be
performed <a programming environment>
environment. (2009). In Merriam-Webster Online Dictionary.
Retrieved April 5, 2009, from http://www.merriam-webster.com/dictionary/environment
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
6. University
of Ljubljana
Faculty
of civil and geodetic
engineering
A vision of a computing environment for the Web 2.0 era
“Web 2.0 is the business revolution in the computer industry caused by the
move to the internet as platform, and an attempt to understand the rules
for success on that new platform. Chief among those rules is this: Build
applications that harness network effects to get better the more
people use them.” ... in other words harness collective intelligence.
Tim O’Reilly (2009). Web 2.0 Compact Definition: Trying Again.
Retrieved April 5, 2009, from http://www.merriam-webster.com/dictionary/environment
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
7. University
of Ljubljana
Faculty
of civil and geodetic
Computing environments today engineering
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
8. University
of Ljubljana
Faculty
of civil and geodetic
Computing environments today engineering
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
9. University
of Ljubljana
Faculty
of civil and geodetic
Computing environments today engineering
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
10. University
of Ljubljana
Faculty
of civil and geodetic
Computing environments today engineering
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
11. University
of Ljubljana
Faculty
of civil and geodetic
Computing environments today engineering
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
12. University
of Ljubljana
Faculty
of civil and geodetic
Computing environments today engineering
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
13. University
of Ljubljana
Faculty
of civil and geodetic
Grid computing environments today engineering
http://inteligrid.eu-project.info
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
14. University
of Ljubljana
Faculty
of civil and geodetic
Grid computing environments today engineering
http://inteligrid.eu-project.info
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
15. University
of Ljubljana
Faculty
of civil and geodetic
Grid computing environments today engineering
http://inteligrid.eu-project.info
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
16. University
of Ljubljana
Faculty
of civil and geodetic
A vision engineering
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
17. University
of Ljubljana
Faculty
of civil and geodetic
A vision engineering
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
18. University
of Ljubljana
Faculty
of civil and geodetic
A vision engineering
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
19. University
of Ljubljana
Faculty
Web 2.0
of civil and geodetic
engineering
‣ Definition by Tim O’Reilly
- “Web 2.0 is the business revolution in the computer
industry caused by the move to the internet as platform,
and an attempt to understand the rules for success on
that new platform. Chief among those rules is this:
Build applications that harness network effects to
get better the more people use them.” ... in other
words harness collective intelligence.
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
20. University
of Ljubljana
Faculty
Web 2.0 vs Web 1.0
of civil and geodetic
engineering
Web 2.0 Web 1.0
Google search engine AltaVista search engine
Blogs and wikis Email
Social networking Rolodexes
Open source Closed source
AJAX/RIA Static websites
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
21. University
of Ljubljana
Faculty
Web 2.0 technologies
of civil and geodetic
engineering
‣ Search
- the ease of finding information through keyword search
which makes the platform valuable.
‣ Links
- guide to important pieces of information. The best
pages are the most frequently linked to.
‣ Authoring
- the ability to create constantly updating content over a
platform that is shifted from being the creation of a few
to being the constantly updated.
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
22. University
of Ljubljana
Faculty
Web 2.0 technologies
of civil and geodetic
engineering
‣ Tags
- categorisation of content by creating tags that are
simple, one-word descriptions to facilitate searching and
avoid rigid, pre-made categories.
‣ Extensions
- automation of some of the work and pattern matching
by using algorithms (e.g. recommendations).
‣ Signals
- the use of RSS (Really Simple Syndication) technology
to notify users with any changes of the content.
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
23. University
of Ljubljana
Faculty
Web 2.0 applications
of civil and geodetic
engineering
‣ Rich Internet applications (RIA)
- Desktop class applications (browser plugins, sandboxes,
virtual machines)
- Adobe AIR, Google Gears, Microsoft Silverlight
‣ XML & RSS
- enabling syndication of site content
‣ Web APIs
- REST and SOAP protocols
- enabling meshups, desktop integration, ...
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
24. University
of Ljubljana
Faculty
Web 2.0
of civil and geodetic
engineering
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
25. University
of Ljubljana
Faculty
of civil and geodetic
Wikipedia engineering
community | open encyclopaedia | user value
http://www.wikipedia.org
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
26. University
of Ljubljana
Faculty
of civil and geodetic
Blogger engineering
blog | self publish | tag
http://www.blogger.com
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
27. University
of Ljubljana
Faculty
of civil and geodetic
Digg engineering
links | news | tagging
http://digg.com
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
28. University
of Ljubljana
Faculty
of civil and geodetic
Twitter engineering
web/mobile | community | presence
http://www.twitter.com #pareng09
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
29. University
of Ljubljana
Faculty
of civil and geodetic
Facebook engineering
web/mobile | community | network relations
http://www.facebook.com
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
30. University
of Ljubljana
Faculty
of civil and geodetic
VideoLectures.net engineering
upload | share | video | knowledge
http://www.videolectures.net
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
31. University
of Ljubljana
Faculty
of civil and geodetic
Mashups engineering
http://www.housingmaps.com/
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
32. University
of Ljubljana
Faculty
of civil and geodetic
Mashups engineering
http://earthquake.googlemashups.com
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
33. University
of Ljubljana
Faculty
of civil and geodetic
Grid computing engineering
‣ I. Foster, C. Kesselman (1998), “The Grid: Blueprint
for a New Computing Infrastructure.”
- “A computational grid is a hardware and software
infrastructure that provides dependable, consistent,
pervasive, and inexpensive access to high-end
computational capabilities”
‣ I. Foster, C. Kesselman, S. Tuecke (1998), “ The
Anatomy of the Grid”
- “co-ordinates distributed resources using standard,
open, general-purpose protocols and interfaces to
deliver non-trivial quality of service”
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
34. University
of Ljubljana
Faculty
of civil and geodetic
Grid computing engineering
‣ Grid dream ...
- is to allow users to tap into resources off the Internet as
easily as electrical power can be drawn from a wall
socket.
‣ Grid is like a distributed computer system except ...
- it has better security, it is build on open standards, and it
usually spans across different domains.
‣ Grid service is like a Web Service except ...
- supports grid security infrastructure, and it is usually
stateful.
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
35. University
of Ljubljana
Faculty
of civil and geodetic
Cloud computing engineering
‣ C. Hewitt (2008) defined cloud computing as ...
- “a paradigm in which information is permanently stored
in servers on the Internet and cached temporarily on
clients that include desktops, entertainment centres,
tablet computers, notebooks, wall computers,
handhelds, sensors, monitors, etc.”
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
36. University
of Ljubljana
Faculty
of civil and geodetic
Cloud platforms in context engineering
Software as a service (SaaS) Attached services Cloud platforms
Extra Application
Cloud Application
Functions
Pltaform
Browser /
Local Application Application
Client
Users Users Developers
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
37. University
of Ljubljana
Faculty
of civil and geodetic
SalesForce.com engineering
Software as a Service | thin clients
http://www.salesforce.com
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
38. University
of Ljubljana
Faculty
of civil and geodetic
iTunes engineering
Attached services | extra functions
http://www.apple.com/itunes
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
39. University
of Ljubljana
Faculty
of civil and geodetic
Facebook APIs engineering
Cloud platform | APIs | developers
http://developers.facebook.com
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
40. University
of Ljubljana
Faculty
of civil and geodetic
Amazon AWS engineering
SaaS | Cloud platform | APIs
http://aws.amazon.com
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
41. University
of Ljubljana
Faculty
Cloud computing: barriers for adoption
of civil and geodetic
engineering
1. Availability of a Service
2. Data Lock-In
3. Data Confidentiality and Auditability
4. Data Transfer Bottlenecks
5. Performance Unpredictability
6. Scalable Storage
7. Bugs in Large-Scale Distributed Systems
8. Scaling Quickly
9. Reputation Fate Sharing
10. Software Licensing
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
42. University
of Ljubljana
Faculty
of civil and geodetic
Use case: earthquake engineering engineering
‣ A move from traditional single limit state
deterministic techniques to multiple performance
objectives in terms of probabilities of different
socio-economic decisions variables.
‣ A probabilistic performance assessment of a
structure
- difficult and time consuming task
- complex non-linear dynamic analyses
- # of analyses: different structural models (loss, capacity,
demand, seismic hazard), several ground motion
records, multiple levels of intensity
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
43. University
of Ljubljana
Faculty
of civil and geodetic
A seismic response database engineering
‣ Develop tools to enable ?*2)/2.$)*-),4) !quot;#$%&'&(&)*)
?*2)/2.$4*)0,-)*$%&'&(&)*
reliable prediction of
seismic risk based on
the best knowledge
regarding earthquakes
‣ Seismic response 6789:$)&2)/2.$4*)0,-)*$;)*4>*4$)2%*=
database E00<2.&'2,-)B
A 8-*<&)'2.$)0*.'4&
- new applications for A F4*.*%*-.*$<2)'$,G$!quot;#
A #2)H$&))*))/*-'$,G$(4,&%$&4*&)
different end-users A$DDD
‣ Use of volunteer
computing technology
- Application is currently @-%A1)*4)B
tested locally at UL- A *-32-**4)
A 3,>*4/*-'
FGG +,-&'*%$.,/01'2-3$4*),14.*)$5$
A 4*)*&4.C*4)
A$DDD
6789:$)*2)/2.$4*)0,-)*$;.<2*-'$)2%*=
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
44. University
A probabilistic performance assessment of Ljubljana
Faculty
of civil and geodetic
engineering
of a structure
‣ A probabilistic performance assessment is de-aggregated into
independent models
‣ Each structural model has to be subjected to several ground
motion records, scaled to multiple levels of intensity
‣ Use of high-throughput computing technology
Numerical modeling Acceleration records The ESD databases
Applications:
- OpenSees
- Matlab
- Excel
- Condor
IDA analysis workflow
Condor (HPC) pool of available computing
resources – local to organisation
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
45. University
of Ljubljana
Faculty
of civil and geodetic
ICE4RISK requirements engineering
‣ Store experimental data
- Earthquake engineering researchers utilises various
types of experimental data, including Internet databases
such as ESD.
‣ Share data
- Researchers need to share data as well as the results of
various analyses in a controlled (user-defined) way with
interested parties.
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
46. University
of Ljubljana
Faculty
of civil and geodetic
ICE4RISK requirements engineering
‣ Search data.
- Search for data that meets some criteria (e.g. all data
accessed and used under particular analysis).
‣ Analyse data.
- It is not possible to define a closed set of services that
will meet researchers needs: they must be able to use
new analysis services that they find or invent.
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
47. University
of Ljubljana
Faculty
of civil and geodetic
Use case: ICE4RISK engineering
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
48. University
of Ljubljana
Faculty
of civil and geodetic
Condor + Amazon EC2/S3 engineering
Amazon Simple Storage Retrieve / Amazon Elastic Compute
Service (Amazon S3) Store Data Cloud (Amazon EC2)
Condor Condor Condor
Storage Storage
worker worker worker
Store / Retrieve Data Report Status / Run User Jobs
Start EC2 virtual computers
Submit Jobs Condor
central
manager
User Condor sumbit host
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
49. University
of Ljubljana
Faculty
Summary: started with a vision
of civil and geodetic
engineering
Open Web 2.0
Blogging
Source Micro-blogging
Research Sharing
Publishing Wiki
Data Collective intelligence
Access Social networking
Standards RSS
APIs
Scalability, On-demand, Cost effective, Green
Grid/Cloud computing
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
50. University
of Ljubljana
Faculty
of civil and geodetic
Hype 2.0 engineering
E. Schonfeld, “Where are we in the hype cycle?”,
http://www.techcrunch.com/2008/08/18/where-are-we-in-the-hype-cycle/
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
51. University
of Ljubljana
Faculty
of civil and geodetic
A future Web engineering
Radar Networks & Novak Spivack (2007), www.radarnetworks.com
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si
52. University
of Ljubljana
Faculty
of civil and geodetic
Trends engineering
A vision of a computing environment for the Web 2.0 era | PARENG 2009, Pécs, Hungary, 6-8 April 2009 mdolenc@itc.fgg.uni-lj.si