EU-Legislation demands 'accessible' websites, often leaving details or exact specifications on what that means out. In this session, we will have a look at the most often cited 'specifications', the Web Content Accessibility Guidelines (WCAG) 1.0 and 2.0 and how to interpret them. I will show a few free tools that can help a Notes Developer to asses what needs to be done to make a website 'compliant'. And of course I will offer quick tips and easy to implement 'hacks' to make an existing web application more 'accessible', sharing along the way a few best practices and experiences from the work I have done so far.
What do you do when you need to fix your WordPress website and there's no developer around to help? Here are the tools you need, the steps to take, and how to call in the cavalry.
Staying Connected: Securing Your WordPress WebsiteRaymund Mitchell
The popularity of WordPress has made it a tempting and lucrative target for hackers, crooks and assorted bad guys. With some common sense and a few, relatively easy to use tools, business owners who use WordPress can make their site more challenging for those looking to compromise vulnerable websites.
A presentation that I used on stage in Web technology seminar at Mahidol University (Salaya), Thailand.
Created by Teerasej Jiraphatchandej.
All great photo credited to whoever linked to with the link under the photo.
Front End Best Practices: A Selection of Best Practices, Tips, Tricks & Good Advice For Today’s Front End Development. Practices mentioned in this presentation range from basic principles to more advanced tools and techniques. By Holger Bartel for WomenWhoCodeHK 23/07/2014
Site Manager rocks! This presentation goes up to 11.
Presentation I gave at the T44U conference in Dublin (12-13 November 2009).about our tops tips for using the Site Manager Web content management system (http://www.terminalfour.com/)
Released under a Creative Commons Attribution-Share Alike 2.5 UK: Scotland Licence.
http://creativecommons.org/licenses/by-sa/2.5/scotland/
Web components are the new hotness. Fact. Already there are frameworks like Google’s Polymer and X-Tag from Mozilla that are set to make building websites with web components much easier. But you should really learn the foundation that these frameworks are built on before exploring how they make your life easier. That’s what a responsible developer would do. You’re a responsible developer, right? I’m not either but even if you’re not, come anyway and see what one looks like. I’m sure at least one will show up. In this session we will take a good long look at some basic features of native web components. We will discuss and demo the use of HTML5’s new template tag, create our own custom html elements without using a framework, explore the spookily named Shadow DOM, and bundle it all up using HTML5 imports. Bring your laptop, a modern browser (Chrome, bring Chrome), and your JavaScript skills and let’s make a thing with web components!
In this session, learn how to build and maintain standards-based sites that work great in IE7. Learn how to take advantage of new capabilties such as better HTML and CSS standards support, RSS and Search integration, and new security features.
What do you do when you need to fix your WordPress website and there's no developer around to help? Here are the tools you need, the steps to take, and how to call in the cavalry.
Staying Connected: Securing Your WordPress WebsiteRaymund Mitchell
The popularity of WordPress has made it a tempting and lucrative target for hackers, crooks and assorted bad guys. With some common sense and a few, relatively easy to use tools, business owners who use WordPress can make their site more challenging for those looking to compromise vulnerable websites.
A presentation that I used on stage in Web technology seminar at Mahidol University (Salaya), Thailand.
Created by Teerasej Jiraphatchandej.
All great photo credited to whoever linked to with the link under the photo.
Front End Best Practices: A Selection of Best Practices, Tips, Tricks & Good Advice For Today’s Front End Development. Practices mentioned in this presentation range from basic principles to more advanced tools and techniques. By Holger Bartel for WomenWhoCodeHK 23/07/2014
Site Manager rocks! This presentation goes up to 11.
Presentation I gave at the T44U conference in Dublin (12-13 November 2009).about our tops tips for using the Site Manager Web content management system (http://www.terminalfour.com/)
Released under a Creative Commons Attribution-Share Alike 2.5 UK: Scotland Licence.
http://creativecommons.org/licenses/by-sa/2.5/scotland/
Web components are the new hotness. Fact. Already there are frameworks like Google’s Polymer and X-Tag from Mozilla that are set to make building websites with web components much easier. But you should really learn the foundation that these frameworks are built on before exploring how they make your life easier. That’s what a responsible developer would do. You’re a responsible developer, right? I’m not either but even if you’re not, come anyway and see what one looks like. I’m sure at least one will show up. In this session we will take a good long look at some basic features of native web components. We will discuss and demo the use of HTML5’s new template tag, create our own custom html elements without using a framework, explore the spookily named Shadow DOM, and bundle it all up using HTML5 imports. Bring your laptop, a modern browser (Chrome, bring Chrome), and your JavaScript skills and let’s make a thing with web components!
In this session, learn how to build and maintain standards-based sites that work great in IE7. Learn how to take advantage of new capabilties such as better HTML and CSS standards support, RSS and Search integration, and new security features.
Welcome to IE8 - Integrating Your Site With Internet Explorer 8Lachlan Hardy
Damian Edwards (http://damianpedwards.spaces.live.com/) and I delivered a presentation on IE8 at Remix Australia. We took the opportunity to outline the whys and wherefores of standards-based design as well.
A presentation for Dundee University's Hack Day explaining the technologies to use and how to hack your own APIs by using Yahoo! Pipes and scraping RSS feeds.
Internal training presentation about how I go about advocating Yahoo to the outside world and what gets me pretty excited about our developer offers at the moment.
Widgets: Making Your Site Great and Letting Others Help - WordCamp VictoriaJeff Richards
A brief presentation that works through the basics of Wordpress Widgets, looks into the benefits of widgets and then transitions to how to start building your own widget.
Best And Worst Practices Building Ria with Adobe and MicrosoftJosh Holmes
Come listen to leading Rich Internet Applications (RIA) experts from Microsoft and Adobe discuss many of the best and worst practices when building RIAs. RIAs provide a similar user experience to traditional desktop applications combined with the ease of deployment of web/browser based applications. This produces a fair amount of confusion because there are a number of potentially conflicting practices depending on whether you approach your RIA as a desktop or a web application. This session dives into the definition of RIA and walks through the best and worst practices that have appeared over and over again. We will explore architectural patterns and practices such as state management, fault tolerance, service composition, communications protocols and message formats and goes into details on how RIAs can be developed using runtime environments such as Adobe AIR or Microsoft Silverlight.
For more read our blogs at
http://www.jamesward.com
http://www.joshholmes.com
Similar to Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event, March 30th, 2010 (20)
Feed me, Seymour! Supplemental User Data For IBM Connections ProfilesMartin Leyrer
Presentation given at ICONUK 2016-09-15 in London
If you have tried to map a long office name and adress into the officeName of the PEOPLEDB, you probably stumbled upon the chapter "Supplemental user data for Profiles" in the IBM Connections documentation. What is described as "supplemental tables within the Profiles database" are in fact rather essential tables that can help you with adoption by providing more data within a users profile. Also, their use cuts down on the number of customizations needed as well as providing more information to the Cognos reports.
I will talk you through the countries, departments, organization, enmployee and worklocation tables, how the can be filled with data either through csv files as well as custom assembly lines and how to reference them efficiently. Also we will take a look on what is necessary to expose the additional data in search, business cards and the profile pages.
After this session you should be able to easily and quickly add more data to your IBM Connections profiles.
Buzzword Bingo for this session: fill-scripts, profiles, tdi, csv workplace, address, department, reports, cognos, search.
In many organizations, users are still faced with entering multiple passwords and even some configuration data to gain access to their Notes Client, Sametime Client and Connections Plugins.
In this session I will show you how you can provide a secure IBM Notes Client experience without the user entering any configuration data or passwords at all.
Buzzword Bingo for this session: ID Vault, SSO, LTPA, SPNEGO, SAML, Domino Policies, Account Documents, Citrix
One think that gets often overlooked in an IBM Connections project is the user lifecycle inside an organisation.
People leave for various reasons, maybe come back as a part-timer and then later switch back to a full-time employment. All this gets handled differently in different companies having sometimes desasterous effects on Connections, causing data loss and confusion amongst users.
We will show you what issues to look out for, how to migitate certain issues and how to design the user lifecycle with your customers, before you install Connections and configure the TDI Usersync.
Buzzword Bingo for this session: user management, duplicate users, data loss, user resync, GUID, UID, email address.
The latest, ultimative final version, current release, approved, last minute...Martin Leyrer
To offer your customers the best IBM Connections install possible, there are quite a few thing you should at least think about activating. The range of options you should think about spans from enabling the file sync through URL previews to assigning ToDos to multiple people.
We will take you on a tour of free features that you could enable for your users to give them a better Connections experience. You will leave this session with a checklist and links to documentation so you can start implementing right after the session.
Buzzword Bingo for this session: free, hidden settings, free, checlist, additional functionality, free, best practice
Debugging IBM Connections for the Impatient Admin - Social Connections VIIMartin Leyrer
With relational databases, LDAP servers, files shares and a lot of Java components, IBM Connections is a complex environment to install and operate. A diverse set of settings and tools is needed in case something does not work as expected.
In this talk I will present you the “Best Practices” and debugging settings for Connections that will offer additional information quick, in case something goes wrong. Also, I will offer you recommendations for tools your customer should provide you on the server so you can work out any issues efficiently.
When using Notes, iNotes, Sametime and Connections on either Windows or a mobile device, users are confronted with several different passwords and settings they have to enter. In this session I will show you how to setup and configure Notes & Domino so that users do not have to enter passwords or server settings and still get logged into Notes, Sametime and Connections when starting their Notes Client or Browser.Buzzwords for this talk are: SSO, NSL, LTPA, SAML and SPNEGO.
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...Martin Leyrer
Connections and especially Connections Profiles are very customizable. I will show you, based on the work my colleagues and I did for a customer, why, what and how you can customize the TDI assembly lines and the Connections Profiles user interface to provide your customers with a profiles experience adapted to their expectations (including leading and trailing titles, customized hierarchy trees, additional fields, imported rich text, etc.).
Social Conndections VI -- Debugging IBM Connections During Install And OperationMartin Leyrer
With relational databases, LDAP servers, files shares and a lot of Java components, IBM Connections is a complex environment to install and operate. A diverse set of settings and tools is needed in case something does not work as expected.
In this talk I will present you the debugging settings for Connections that will offer additional information quickly, in case something goes wrong. Also, there will be recommendations for tools your customer should provide you on the server so you can work out any issues efficiently.
"Was, SSH kann auch das?" @ Linuxwochen Wien 2013Martin Leyrer
Tipps zum effizienteren Umgang mit und Empfehlungen zum sicheren Betrieb von ssh(d). Sichere Kommandozeile auch von unterwegs mit Mosh. SSH Zwei-Faktor-Authentifizierung mit “Google Authenticator”.
Slides von den Linuxwochen 2013.
Tipps zum effizienteren Umgang mit und Empfehlungen zum sicheren Betrieb von ssh(d). Sichere Kommandozeile auch von unterwegs mit Mosh. SSH Zwei-Faktor-Authentifizierung mit “Google Authenticator”.
Digitools: Sicherheit im Netz
Sowohl Internet wie auch das World Wide Web werden immer integriertere Bestandteile unseres Lebens. Jedoch sollte man im virtuellen Leben einige grundlegende Details beachten, um problemfrei die Vorteile der Online-Angebote nutzen zu können.
So wie z.B. das regelmäßige Service des Autos oder das Versperren der Haustüre zu den Selbstverständlichkeiten des täglichen Lebens gehören, so sollte man auch seinen Rechner „versperren“ und regelmäßig einer Überprüfung unterziehen.
Um „sicher“ im Netz unterwegs zu sein, genügt es jedoch nicht nur, eine Software zu installieren. Ein prüfender Blick auf die diversen Angebote und deren Nutzungsbedingungen gehören genauso dazu, wie ein kritischer Blick darauf, welche Daten von den verschiedenen Diensten überhaupt gesammelt werden.
Während es in manchen Situationen wichtig ist, genau zu wissen, mit wem man online kommuniziert und wie man dessen Identität - etwa bei signierten E-Mails - überprüfen kann, so ist es – etwa im Rahmen einer Recherche – manchmal von Vorteil, wirklich anonym im Netz unterwegs zu sein.
All diese Themen wollen wir im Rahmen des Workshops „Digitools: Sicherheit im Netz“ aufgreifen und Ihnen praxisorientiert zeigen, wie sie sicher surfen, vertrauliche E-Mails schreiben oder anonym kommunizieren können.
Der dreistündige Workshop ist in drei Teile (mit zwei Pausen zu je 15 Minuten) gegliedert und bietet zwischendurch auch ausreichend Zeit für Fragen und Diskussionen.
Teil 1 – Sicher Online
Firewall, Virenscanner, Einstellungen – Was sollte ich beachten, wenn ich „sicher“ surfen will. Welche Einstellungen sollte ich in meinem Browser ändern, wie schütze ich mich vor Spyware und Drive-By Downloads. Sind Cookies nun gut oder böse, wie kann ich diese einfacher verwalten. Wie kann ich „sicher“ Online-Banking und andere Online-Angebote nutzen.
Teil 2 – Vertrauen ist gut, ...
Wie kann ich mich relativ gefahrlos in Sozialen Netzwerken bewegen. Was sollte ich im Umgang mit den diversen Anwendungen dieser Netzwerke beachten. Wann und wem darf ich meine Passwörter bekannt geben, wer verbirgt sich eigentlich hinter dieser Site, udgl.
Teil 3 – Black Helicopter Alert
Wirklich anonym über das Internet zu kommunizieren, ist ein Anspruch, den nicht nur die Anhänger von Verschwörungstheorien für sich in Anspruch nehmen können. Auch Anwälte, Unternehmen sowie Personen wie Du und ich wollen oder müssen immer wieder im Web surfen oder kommunizieren können, ohne Spuren zu hinterlassen. Aber auch das Löschen von Accounts in diversen Netzwerken oder Diensten ist nicht immer so einfach, wie man sich das vorstellt.
Im letzten Teil des Workshops widmen wir uns den „schwarzen Künsten“ des Internets wie etwa dem Tor Netzwerk oder jenen „offenen Proxies“ um solche Inhalte sehen zu können, die vor uns verborgen werden.
Effiziente Fehlersuche In Web 2.0 Anwendungen - Graz EditionMartin Leyrer
Moderne Anwendungen bestehen nicht mehr aus ein wenig HTML sowie Code am Server. Cascading Style Sheets (CSS), JavaScript und AJAX machen die Anwendungen einerseits benutzerfreundlicher, andererseits auch schwerer zu entwickeln und zu pflegen. Mit dem Open Source Browser Firefox und einer Handvoll von Open Source Plug-Ins kann sich der Entwickler sein Leben aber deutlich einfacher machen. Diese Session behandelt Firefox-Erweiterungen, die sich in der Praxis bei der Entwicklung großer Web 2.0 Anwendungen bewährt haben. Gezeigt werden "am lebenden Objekt" unter anderem die Webdeveloper Toolbar sowie Firebug. Der Bogen der vorgestellten Tools erstreckt sich aber noch weiter und beinhaltet u.a. Sicherheitschecks, WAI-Tools und noch viel mehr.
Open Source und Free Software unter WindowsMartin Leyrer
Die erste Assoziation zu Open Source und Freier Software ist oft eine GNU/Linux Distribution. Viele Anwender scheuen aber aufgrund der (vermuteten) Komplexität vor einem Wechsel auf das neue Betriebssystem zurück.
In diesem Talk möchte ich zeigen, dass man auch unter Windows eine Vielzahl von Open Source Anwendungen und Freie Software im täglichen Umgang mit dem PC einsetzen und so den sanfteren Wechsel zu einem freien Betriebssystem vorbereiten kann.
Effiziente Fehlersuche in Web 2.0 AnwendungenMartin Leyrer
Moderne Anwendungen bestehen nicht mehr aus ein wenig HTML sowie Code am Server. Cascading Style Sheets (CSS), JavaScript und AJAX machen die Anwendungen einerseits benutzerfreundlicher, andererseits auch schwerer zu entwickeln und zu pflegen. Mit dem Open Source Browser Firefox und einer Handvoll von Open Source Plug-Ins kann sich der Entwickler sein Leben aber deutlich einfacher machen. Diese Session behandelt Firefox-Erweiterungen, die sich in der Praxis bei der Entwicklung großer Web 2.0 Anwendungen bewährt haben. Gezeigt werden "am lebenden Objekt" unter anderem die Webdeveloper Toolbar sowie Firebug. Der Bogen der vorgestellten Tools erstreckt sich aber noch weiter und beinhaltet u.a. Sicherheitschecks, WAI-Tools und noch viel mehr.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
46. Ugly Code Have you read our <a href="javascript:window.open( 'terms.html', 'popup', 'height=500,width=400,toolbar=no' );">terms and conditions</a>?
47. Only Slightly Better Code ... Have you read our <a href="#" onclick="window.open( 'terms.html', 'popup', 'height=500,width=400,toolbar=no' ); return false;" >terms and conditions</a>?
48. Now This Code Is Fine ... Have you read our <a href="terms.html" onclick="window.open( 'terms.html', 'popup', 'height=500,width=400,toolbar=no' ); return false;" >terms and conditions</a>?
49. But This Code Would Be Better Have you read our <a href="terms.html" class="sidenote" >terms and conditions</a>?
50. window.onload = function() { var links = document.getElementsByTagName('a'); for (var i = 0, link; link = links[i]; i++) { if (link.className == 'sidenote') { link.onclick = function() { var href = this.href; window.open(href, 'popup', 'height=500,width=400,toolbar=no'); return false; } } } }
Understanding accessibility requires an awareness of the special needs of multiple user groups, including people with disabilities and mature users with age-related disabilities. A person with a disability may encounter one or more barriers that can be eliminated or minimized by the software or Web developer, the assistive technology, or the underlying operating system software and hardware platform. The four main categories of disabilities are visual, hearing, mobility, and cognitive.
It's about god webdesign. It's about the willingness tp make your website available to everybody.