Agree to Disagree: Improving Disagreement Detection with Dual GRUs. Presentation of our work on disagreement detection at ESSEM 2017. In this work, we show that by using a Siamese inspired architecture to encode the discussions, we no longer need to rely on hand-crafted features to exploit the meta thread structure. The research paper can be found at https://arxiv.org/abs/1708.05582
The slides cover Introduction to Big Data and Data Science, as well as go over our current and future projects @eHarmony.
eHarmony was founded to give people a better chance to find happy, passionate and fulfilling relationships.
During this talk I will describe steps that we go through to create Compatible matches and how we leverage Big Data technologies to accomplish that goal.
I will specifically talk on how we take Billion+ potential matches that we find through MongoDB, store them in Voldemort NoSQL datastore and then run multiple Hadoop jobs to come up with filtered list based on Machine Learned models.
Our hadoop clusters are in-house, high density, low power Seamicro installations and we use Spring Batch and Spring Data Hadoop to orchestrate the hadoop jobs.
Did you know that eHarmony is responsible for 5% of all new US marriages and that more than 600,000 people already got married through us?
Messaging Brokers are intrinsic part of our infrastructure and our experience with HornetQ has not been really great.
We have experienced issues that forced us to perform restarts multiple times a day and sometimes they weren't sufficient to fix the issue and data cleanup was needed resulting in loss of important messages.
Lack of documentation, lack of proper support and lack of stability of HornetQ broker are some of the reasons for looking into new Messaging Brokers.
During this session I will present the path we have taken to Prioritize Features -> Compare Brokers -> Eliminate -> Benchmark and the findings together with recommendations.
This task resulted in implementation of generic messaging broker benchmarking tool in Java, called Benchmark.io which we are intending to open source.
College Basketball Tournament Season is here! Luker On Trends and SSRS have put together an inside look on Tournament Trends over the past two decades. Take a look at our latest infographic and report!
The slides cover Introduction to Big Data and Data Science, as well as go over our current and future projects @eHarmony.
eHarmony was founded to give people a better chance to find happy, passionate and fulfilling relationships.
During this talk I will describe steps that we go through to create Compatible matches and how we leverage Big Data technologies to accomplish that goal.
I will specifically talk on how we take Billion+ potential matches that we find through MongoDB, store them in Voldemort NoSQL datastore and then run multiple Hadoop jobs to come up with filtered list based on Machine Learned models.
Our hadoop clusters are in-house, high density, low power Seamicro installations and we use Spring Batch and Spring Data Hadoop to orchestrate the hadoop jobs.
Did you know that eHarmony is responsible for 5% of all new US marriages and that more than 600,000 people already got married through us?
Messaging Brokers are intrinsic part of our infrastructure and our experience with HornetQ has not been really great.
We have experienced issues that forced us to perform restarts multiple times a day and sometimes they weren't sufficient to fix the issue and data cleanup was needed resulting in loss of important messages.
Lack of documentation, lack of proper support and lack of stability of HornetQ broker are some of the reasons for looking into new Messaging Brokers.
During this session I will present the path we have taken to Prioritize Features -> Compare Brokers -> Eliminate -> Benchmark and the findings together with recommendations.
This task resulted in implementation of generic messaging broker benchmarking tool in Java, called Benchmark.io which we are intending to open source.
College Basketball Tournament Season is here! Luker On Trends and SSRS have put together an inside look on Tournament Trends over the past two decades. Take a look at our latest infographic and report!
Blue Moon - Advertising Plan (Group Project)Sam Cheema
Blue Moon Ad Plan that was a required assessment as part of undertaking my studies in SUNY New Paltz. We devised this plan through research and foresight of implication.
Data Visualizations in Digital Products (ProductCamp Boston 2016)ProductCamp Boston
Visualizations around fixed datasets such as data journalism are very common, you see them in the New York Times every day, but what happens when data visualization is part of a digital product? These visualizations contain data that changes frequently based on user inputs or other sources. This talk covers examples and an approach on how to incorporate data visualization into your digital product, whether it be mobile, web or desktop.
About C. Todd Lombardo
C. Todd recently joined the team at Fresh Tilled Soil as Chief Design Strategist, helping clients solve product, design, and/or strategy problems. He has a Master’s Degree in Data Visualization from Maryland Institute College of Art.
His background is grounded in science, engineering, and design. He previously was Innovation Architect at Constant Contact’s InnoLoft, he facilitated product and service design sprints for a wide range of external startups and internal product teams. He is also a member of the adjunct faculty at Madrid’s prestigious IE Business School.
A teacher and speaker at heart, he frequently speaks at conferences and has directed five TEDx events in two countries. His book, Design Sprint was published by O’Reilly Media in the fall of 2015.
Upgrading OpenStack? Avoid these 3 Common PitfallsPlatform9
Upgrading OpenStack has been notoriously difficult for IT teams, with 20 million lines of code to understand and keep up to date.
With our managed OpenStack offering, the Platform9 team has done thousands of upgrades, leveraging DevOps and Cloud-Native principles to overcome common pitfalls.
In this PowerPoint, OpenStack Ambassador Kenneth Hui and DevOps Engineer, Harrison Page, will share:
- Top 3 common pitfalls when upgrading OpenStack
- Ways to avoid these common pitfalls
- Best practices for streamlining the OpenStack upgrade process
- How Platform9 enables painless OpenStack upgrades
Learn how to make OpenStack upgrades painless for you and your team!
iCue - an Intuitive To-Do List Reminder App- Pitch DeckStephanie Lin
MGT 512 Marketing and Consumer Research
Professor Dina Mayzlin
Spring 2014
iCue - an Intuitive To-Do List Reminder App
Presentation Designed by Stephanie Lin
SEO: A Crash Course | What is SEO in 2015? An Ethoseo™ PresentationDamien Wright
This SEO presentation is from Photolush 2015 in Bellingham, WA. Topics include how Google works, on-site optimization, off-site optimization, link earning, and web analytics.
This is seventh chapter, which is intended to help aspirants of various competitive exams and also to faculties in this field to enhance their performance. any suggestion to improve this is always welcomed.
American Marketing Association - Strategy Presentation Sam Cheema
Marketing strategy plan for SUNY New Paltz AMA plan - 2016. This plan was devised for the premise of the degree in Marketing Communications at SUNY New Paltz. This plan was further implemented by the AMA and won an award.
Knowledge and identification of Malware binaries is a crucial part of detection and incident response. There was a time when using MD5s was sufficient to ID binaries. The reverse engineering analysis conducted once would be useful anytime that same MD5 hash was seen again. This has rapidly changed in recent years. Polymorphic samples of the same specimen change the file hash (MD5, SHAx etc) without much effort by the attacker. Also, cyber criminals and advanced adversaries reuse their codebase to create newer versions of their malware, but changes in the file hash disallow any opportunity to connect and leverage previous analyses of similar samples by defenders. This gives them an asymmetric advantage.
In recent years, there has been research into “similarity metrics”― methods that can identify whether, or to what degree, two malware binaries are similar to each other. Imphash, ssdeep and sdhash are examples of such techniques. In this talk, Bhavna will review which of these techniques is more suitable for evaluating similarities in code for APT related samples. This presentation will take a data analytics approach. We will look at binary samples from APT events from Jan- Mar 2015 and create clusters of similar binaries based on each of the three similarity metrics under consideration. We will then evaluate the accuracy of the clusters and examine their implications on the effectiveness of each technique in identifying provenance of an APT related binary. This can aid Incident responders in connecting otherwise disparate infections in their environment to a single threat group and apply past analyses of the abilities and motivations of that adversary to conduct more effective response.
A well-informed C-Suite is the most critical part of an effective cyber risk management program. This presentation provides the essential knowledge every executive must possess about cybersecurity to be effective when discussing the topic.
This presentation, from the July 2020 Bristol SEO webinar, helps take away some of the stress you may encounter when it comes to learning regular expressions (RegEx) and arm you with practical solutions, using everyday SEO tools such as Google Analytics and Screaming Frog.
4 reasons that you cannot engage your team after electionFlora Liu
After election there are always some of the EB or LCP candidates start to disengaged . How can we create an environment to support them passing this tough time ?
Blue Moon - Advertising Plan (Group Project)Sam Cheema
Blue Moon Ad Plan that was a required assessment as part of undertaking my studies in SUNY New Paltz. We devised this plan through research and foresight of implication.
Data Visualizations in Digital Products (ProductCamp Boston 2016)ProductCamp Boston
Visualizations around fixed datasets such as data journalism are very common, you see them in the New York Times every day, but what happens when data visualization is part of a digital product? These visualizations contain data that changes frequently based on user inputs or other sources. This talk covers examples and an approach on how to incorporate data visualization into your digital product, whether it be mobile, web or desktop.
About C. Todd Lombardo
C. Todd recently joined the team at Fresh Tilled Soil as Chief Design Strategist, helping clients solve product, design, and/or strategy problems. He has a Master’s Degree in Data Visualization from Maryland Institute College of Art.
His background is grounded in science, engineering, and design. He previously was Innovation Architect at Constant Contact’s InnoLoft, he facilitated product and service design sprints for a wide range of external startups and internal product teams. He is also a member of the adjunct faculty at Madrid’s prestigious IE Business School.
A teacher and speaker at heart, he frequently speaks at conferences and has directed five TEDx events in two countries. His book, Design Sprint was published by O’Reilly Media in the fall of 2015.
Upgrading OpenStack? Avoid these 3 Common PitfallsPlatform9
Upgrading OpenStack has been notoriously difficult for IT teams, with 20 million lines of code to understand and keep up to date.
With our managed OpenStack offering, the Platform9 team has done thousands of upgrades, leveraging DevOps and Cloud-Native principles to overcome common pitfalls.
In this PowerPoint, OpenStack Ambassador Kenneth Hui and DevOps Engineer, Harrison Page, will share:
- Top 3 common pitfalls when upgrading OpenStack
- Ways to avoid these common pitfalls
- Best practices for streamlining the OpenStack upgrade process
- How Platform9 enables painless OpenStack upgrades
Learn how to make OpenStack upgrades painless for you and your team!
iCue - an Intuitive To-Do List Reminder App- Pitch DeckStephanie Lin
MGT 512 Marketing and Consumer Research
Professor Dina Mayzlin
Spring 2014
iCue - an Intuitive To-Do List Reminder App
Presentation Designed by Stephanie Lin
SEO: A Crash Course | What is SEO in 2015? An Ethoseo™ PresentationDamien Wright
This SEO presentation is from Photolush 2015 in Bellingham, WA. Topics include how Google works, on-site optimization, off-site optimization, link earning, and web analytics.
This is seventh chapter, which is intended to help aspirants of various competitive exams and also to faculties in this field to enhance their performance. any suggestion to improve this is always welcomed.
American Marketing Association - Strategy Presentation Sam Cheema
Marketing strategy plan for SUNY New Paltz AMA plan - 2016. This plan was devised for the premise of the degree in Marketing Communications at SUNY New Paltz. This plan was further implemented by the AMA and won an award.
Knowledge and identification of Malware binaries is a crucial part of detection and incident response. There was a time when using MD5s was sufficient to ID binaries. The reverse engineering analysis conducted once would be useful anytime that same MD5 hash was seen again. This has rapidly changed in recent years. Polymorphic samples of the same specimen change the file hash (MD5, SHAx etc) without much effort by the attacker. Also, cyber criminals and advanced adversaries reuse their codebase to create newer versions of their malware, but changes in the file hash disallow any opportunity to connect and leverage previous analyses of similar samples by defenders. This gives them an asymmetric advantage.
In recent years, there has been research into “similarity metrics”― methods that can identify whether, or to what degree, two malware binaries are similar to each other. Imphash, ssdeep and sdhash are examples of such techniques. In this talk, Bhavna will review which of these techniques is more suitable for evaluating similarities in code for APT related samples. This presentation will take a data analytics approach. We will look at binary samples from APT events from Jan- Mar 2015 and create clusters of similar binaries based on each of the three similarity metrics under consideration. We will then evaluate the accuracy of the clusters and examine their implications on the effectiveness of each technique in identifying provenance of an APT related binary. This can aid Incident responders in connecting otherwise disparate infections in their environment to a single threat group and apply past analyses of the abilities and motivations of that adversary to conduct more effective response.
A well-informed C-Suite is the most critical part of an effective cyber risk management program. This presentation provides the essential knowledge every executive must possess about cybersecurity to be effective when discussing the topic.
This presentation, from the July 2020 Bristol SEO webinar, helps take away some of the stress you may encounter when it comes to learning regular expressions (RegEx) and arm you with practical solutions, using everyday SEO tools such as Google Analytics and Screaming Frog.
4 reasons that you cannot engage your team after electionFlora Liu
After election there are always some of the EB or LCP candidates start to disengaged . How can we create an environment to support them passing this tough time ?
We aren’t surprised by facial recognition at security checkpoints. But how do you feel about face-scanning toilet roll dispensers? What if they don’t just find criminals but try to detect “criminality”? Laws and policies almost always lag technology so data scientists and machine learning experts are among the first line of ethical defense. The argument in this talk is that to be ethical, any system that classifies human beings has to consider the goals of the people affected by the system, not just the builders’ goals. This is not particularly convenient, but there are concrete ways to put goal-oriented design into practice. Doing so puts us in a better position to practice ethical behavior and attempt to address problems of power and the reproduction of inequality.
The Ethics of Everybody Else | Wrangle Conference 2017Cloudera, Inc.
We aren’t surprised by facial recognition at security checkpoints. But how do you feel about face-scanning toilet roll dispensers? What if they don’t just find criminals but try to detect “criminality”? Laws and policies almost always lag technology so data scientists and machine learning experts are among the first line of ethical defense. The argument in this talk is that to be ethical, any system that classifies human beings has to consider the goals of the people affected by the system, not just the builders’ goals. This is not particularly convenient, but there are concrete ways to put goal-oriented design into practice. Doing so puts us in a better position to practice ethical behavior and attempt to address problems of power and the reproduction of inequality.
Data Modelling is an important tool in the toolbox of a developer. By building and communicating a shared understanding of the domain they're working with, their applications and APIs are more useable and maintainable. However, as you scale up your technical teams, how do you keep these benefits whilst avoiding time-consuming meetings every time something new comes along? This talk reminds ourselves of key data modelling technique and how our use of Kafka changes and informs them. It then examines how these patterns change as more teams join your organisation and how Kafka comes into its own in this world.
Criteria for open access publishing and indexing in DOAJClara Armengou
DOAJ uses a carefully selected set of criteria to assess 3 different kinds of quality of open access journals:
1) quality of the publishing process , 2) quality of open access conditions, 3) quality of scientific content
From Content Strategy to Drupal Site Building - Connecting the dotsRonald Ashri
Content strategy is, undoubtedly, a hot topic these days. A lot is being said that spans the range from concerns regarding the ability to display content on any device to the ability to drive engagement and increase traffic through better content creation and social media strategies. In this presentation we will connect the dots between these issues and practical Drupal site-building concerns with tools that are readily available now.
We will show, through specific examples and references to available modules, how different approaches to content strategy can be practically implemented on Drupal sites. The aim is to equip Drupal site-builders with a handy toolkit that will allow them to both implement a content strategy for their sites as well as better exchange information with content strategists.
The examples will include:
- Different approaches to building content types so as to empower content creators to create a range of different structures.
- Best practices in using vocabularies (fixed, open, user-generated, moderated, etc) or where alternative categorization methods may be relevant.
We will also discuss:
- Editorial calendars and scheduling.
- The true benefit of workflows (and how, sometimes, they can be a disadvantage).
- Analytics and how the ability to measure the effects of any strategy is as important as defining the strategy itself.
Attendees will go away with practical examples and techniques that they can apply to their sites as well as a better understanding of what content strategy really is and how they can use it to improve their sites.
The examples are a result of our own experiences in helping both clients develop their content strategy as well as applying it on italymagazine.com, an in-house product of ours. We grew italymagazine.com to a relevant online digital brand with a strong community by expressing our content strategy ideas through the tools that Drupal 7 made available to us. The resulting ~250% increase in traffic over 3 months is a testament to both the value of a content strategy as well as the power of Drupal to allow you to flexibly and iteratively support it.
From Content Strategy to Drupal Site Building - Connecting the DotsRonald Ashri
The actual presentation is available on YouTube here:
https://www.youtube.com/watch?v=agcQsQfCFow
Content strategy is, undoubtedly, a hot topic these days. A lot is being said that spans the range from concerns regarding the ability to display content on any device to the ability to drive engagement and increase traffic through better content creation and social media strategies. In this presentation we will connect the dots between these issues and practical Drupal site-building concerns with tools that are readily available now.
We will show, through specific examples and references to available modules, how different approaches to content strategy can be practically implemented on Drupal sites. The aim is to equip Drupal site-builders with a handy toolkit that will allow them to both implement a content strategy for their sites as well as better exchange information with content strategists.
The examples will include:
- Different approaches to building content types so as to empower content creators to create a range of different structures.
- Best practices in using vocabularies (fixed, open, user-generated, moderated, etc) or where alternative categorization methods may be relevant.
- Building menus and navigation.
We will also discuss:
- Editorial calendars and scheduling.
- The true benefit of workflows (and how, sometimes, they can be a disadvantage).
- Analytics and how the ability to measure the effects of any strategy is as important as defining the strategy itself.
Attendees will go away with practical examples and techniques that they can apply to their sites as well as a better understanding of what content strategy really is and how they can use it to improve their sites.
The examples are a result of our own experiences in helping both clients develop their content strategy as well as applying it on italymagazine.com, an in-house product of ours. We grew italymagazine.com to a relevant online digital brand with a strong community by expressing our content strategy ideas through the tools that Drupal 7 made available to us. The resulting ~250% increase in traffic over 3 months is a testament to both the value of a content strategy as well as the power of Drupal to allow you to flexibly and iteratively support it.
Talk given at neo4j conference "Graph Connect" - discussing some graph theory (old and new), and why knowing your stuff can come in handy on a software project.
Creative Reflection: The Critical Practice of Stepping Backchar booth
Reflective practice is the process of actively observing, understanding, and shaping pedagogy. Its associated skills include developing individual insight into the impact and practice of education through critical analysis, instructional design, theoretical grounding, and dialogue with peer educators. Also integral is gathering insight into the learner experience through meaningful assessment. Less often discussed is the role of creativity, experimentation, learner engagement, and the disruption of ingrained teaching habits and/or narratives; this keynote will explore strategies for cultivating a more holistic reflective practice in service of enriching and diversifying one’s teaching.
In November 2016, Liz Russell and Ksenia Dynkin of Bluecadet presented the STC-PMC with a case study about best practices learned from a project their company did for the Hoover Mason Trestle, a historical landmark inBethlehem, Pennsylvania. They spoke about the research that needed to be done, the content development process, the storytelling strategy and framework they devised, and how they translated the content strategy for user-friendly kiosks and apps for visitors' mobile devices when visiting the Hoover Mason Trestle.
Conférence - Du bon usage d'une charte graphiqueDavid Endico
Créer une charte graphique ? Rien de plus facile ! Un petit coup de Times New Roman, du rouge pour faire plaisir à ma femme... Au pire, le petit neveu connait Photoshop, non ? Malgré son apparente simplicité, créer une charte graphique ne s’improvise pas. Qu’est-ce qu’une bonne charte graphique ? De quoi est-elle composée et quels sont les pièges à éviter ? Autant de mystères que nous allons ensemble élucider, pour le bien de votre identité !
Conférence animée par David Endico le 8 novembre 2017 à Now Coworking.
Hbase and phoenix usage at eHarmony. Presented the lambda architecture and implementation of HBase and phoenix usage in eharmony at Apache PhoenixCon 2016.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
Agree to Disagree
1. A G R E E T O D I S A G R E E
I M P R O V I N G D I S A G R E E M E N T D E T E C T I O N W I T H D U A L G R U S
S U S H A N T H I R AY, V E N K AT E S H D U P PA D A
F I R S T N A M E . L A S T N A M E @ S E E R N E T. I O
S E E R N E T T E C H N O L O G I E S
E S S E M 2 0 1 7
2. A G R E E M E N T A N D
D I S A G R E E M E N T
• Global: Overall stance
towards the topic
• Local: Between sentences,
posts in forums
Duty Calls
https://xkcd.com/386/
3. W H Y ?
• Detect presence of disputes
• Understand ideological stance of participants
• Detect sub-groups
5. R E L AT E D W O R K : S P E E C H
• Galley et al 2014, Hillard et al 2003, Hahn et al 2006
• Datasets: ICSI, AMI Meeting Corpus
• Features*: sentiments, n-grams, prosodic features
* The models use hand-transcribed or ASR based annotations as well
6. R E L AT E D W O R K : T E X T
• Yin et al 2012, Abott et al 2011, Misra and Walker 2013,
Mukherjee and Lui 2012, Rosenthal and McKeown
2015
• 2/3/5-way (dis)agreement detection
• Datasets: ABCD, AWTP, IAC, US Message Board,
AAWD, Political Forums
• Features: thread structure, lexical, style, sentiment,
polarity, durational features etc
7. R E L AT E D D O M A I N S
• Stance Detection: Task of identifying whether the author
of the text is in favor, against or neutral towards a target
• Argument Mining: Umbrella category which primarily
focuses on tasks like:
• automatic extraction of arguments from text
• argument proposition classification
• argumentative parsing
9. D ATA D E F I N I T I O N
Quote Response Pairs:
Consider only those tuples where quote(Q) functions
as a "dialogic parent" to the response(R).
10. D ATA S E T S
Internet argument corpus Agreement in Wikipedia Talk Pages
Agreement By Create Debators
11. D ATA S E T S
D ATA S E T
T H R E A D
C O U N T
P O S T
C O U N T
A G R E E D I S A G R E E N O N E
A B C D 9 9 8 1 1 8 5 4 7 9 3 8 1 9 5 6 0 9 9 1 8 6 2 9 3
I A C 1 2 2 0 5 9 4 0 4 2 8 1 2 3 6 4 2 7 6
A W T P 5 0 8 2 2 3 8 1 4 8 6 3 6
12. D ATA S E T S
D ATA S E T
T H R E A D
C O U N T
P O S T
C O U N T
A G R E E D I S A G R E E N O N E
A B C D 9 9 8 1 1 8 5 4 7 9 3 8 1 9 5 6 0 9 9 1 8 6 2 9 3
I A C 1 2 2 0 5 9 4 0 4 2 8 1 2 3 6 4 2 7 6
A W T P 5 0 8 2 2 3 8 1 4 8 6 3 6
3 0 X
L A R G E R
D ATA
13. D ATA A N N O TAT I O N : A B C D
The side information is provided by the participant on
the website createdebate.com
• AGREEMENT: Quote and Response support the same
side and the authors are different
• DISAGREEMENT: Quote and Response support
different sides and the authors are different
• NONE: Quote is Root, however the Quote and
Response have the same author
14. D ATA A N N O TAT I O N : I A C
• Data from 4forums
• Roughly 6000 Q-R pairs annotated for (dis)agreement
on a scale of [-5, 5]
• [-5, -1) disagreement, [-1, 1] none, (1, 5] agreement
• In case of multiple annotators, average annotation
scores are computed after filtering out the none
annotations.
15. D ATA A N N O TAT I O N : A W T P
• Data from Wikipedia and Livejournal
• Cohen’s κ = 0.73 for 3-way classification: agreement,
disagreement, none
• Cohen’s κ = 0.66 for 5-way classification: agreement-
response, agreement-paraphrase, disagreement-
response and disagreement-paraphrase
16. D ATA E X P L O R AT I O N
L A B E L P O S T
N O N E
QUOTE: Is Scientology a real religeon? Or is it a fake money making gimmick?
RESPONSE: All religions are fake, there’s an argument to be made the vast majority are money making
gimmicks. Scien- tology is no more outlandish than any of the more widespread religions.
A G R E E
QUOTE: I am against suicide because you are basically not only harming yourself, but everyone else around
you. Let’s not mention it is a cowards way out. I also have a religious but I CAN explain that reason.
RESPONSE: So true man people only harm the people they love by dying. I am not religious and religiously
and non- religiously suicide is wrong.
D I S A G R E E
QUOTE: The majority of the information learned in school is irrelevant to real world skills. Besides, in a
voluntary setting, most children would go to school via parents demands where school choice would be much
more abundant.
RESPONSE: Children learn math which is relevant, children learn history which is relvant, children learn the
releveant languge to their country, children learn foreign languages which imporoves economic opportunites.
My one friend grew up in Baghdad, Iraq, and they don’t play when it comes to education. He started learning
English in the 3rd grade I think through graduation which helped his economic ooportunities, and he is an
artchitect so the math helped. Please excuse my typos. I have a learning disability.
18. F E AT U R E S
• Word Vectors: GloVe embeddings of 300 dimensions
• Lexicons [1]
• AFINN : Valence ratings between -5 to 5
• BingLui: Opinion Lexicons
• NRC Affect Intensity: Real valued affect intensity
• NRC Word Emotion Lexicon: 8 sense level associations and 2 sentiment level
associations
• NRC Hashtag Lexicon: Word emotion associations computed on hashtags
• LIWC: Various categorization of words according to thoughts, feelings, motivations
[1] Open source implementation: https://github.com/SEERNET/EmoInt
20. S Y S T E M
D E S C R I P T I O N
• Siamese inspired
architecture
• Using lexical
features as well as
word embeddings
• 3-way classification
Model Architecture
21. S Y S T E M PA R A M E T E R S
• Sequence length: 64
• Word embedding dimension: 300
• Dropout of 0.5
• Relu layer
• Batch Normalization
23. E X P E R I M E N T S : F E AT U R E S U S E D
P R E C I S I O N R E C A L L
W E I G H T E D F 1
S C O R E
L E X I C O N S 0 . 7 8 8 0 0 . 7 9 8 0 . 7 8 9
G R U 0 . 7 9 2 0 . 7 9 8 0 . 7 9 4
G R U + L E X I
C O N S
0 . 8 1 2 0 . 8 1 5 0 . 8 0 4
Analyzing impact of varying features on the model performance on ABCD dataset
24. E X P E R I M E N T S : F E AT U R E S U S E D
P R E C I S I O N R E C A L L
W E I G H T E D F 1
S C O R E
L E X I C O N S 0 . 7 8 8 0 0 . 7 9 8 0 . 7 8 9
G R U 0 . 7 9 2 0 . 7 9 8 0 . 7 9 4
G R U + L E X I
C O N S
0 . 8 1 2 0 . 8 1 5 0 . 8 0 4
Analyzing impact of varying features on the model performance on ABCD dataset
S O TA : 0 . 7 7 6
25. E X P E R I M E N T S : S E Q U E N C E L E N G T H
S E Q U E N C E
L E N G T H S
P R E C I S I O N R E C A L L
W E I G H T E D F 1
S C O R E
3 2 0 . 8 1 0 0 . 8 1 3 0 . 8 0 6
6 4 0 . 8 1 2 0 . 8 1 5 0 . 8 0 4
1 2 8 0 . 8 0 5 0 . 8 0 8 0 . 7 9 6
Investigating impact of varying maximum sequence length on model performance. Results are
on ABCD dataset
26. E X P E R I M E N T S : S E Q U E N C E L E N G T H
Distribution of sequence length in Q-R pairs. The graph shows the number of posts v/s sequence length.
27. E X P E R I M E N T S : T R A N S F E R L E A R N I N G
M O D E L P R E C I S I O N R E C A L L W E I G H T E D F 1 S C O R E
S O TA - - 0 . 5 7 8
D I R E C T 0 . 4 7 3 0 . 3 6 4 0 . 2 8 5
T U N I N G 0 . 5 3 0 0 . 5 7 2 0 . 4 5 0
T R A N S F E R 0 . 5 0 8 0 . 5 5 9 0 . 4 6 5
R E T R A I N L A S T
2 L AY E R S
0 . 5 3 1 0 . 5 7 2 0 . 4 6 0
R E T R A I N L A S T
3 L AY E R S
0 . 5 2 3 0 . 5 7 0 0 . 4 2 8
Tuning Model trained on ABCD for IAC
28. E X P E R I M E N T S : T R A N S F E R L E A R N I N G
M O D E L P R E C I S I O N R E C A L L W E I G H T E D F 1 S C O R E
S O TA - - 0 . 4 4 4
D I R E C T 0 . 4 3 4 0 . 4 4 5 0 . 3 8 9
T U N I N G 0 . 5 1 5 0 . 4 7 0 0 . 4 6 4
T R A N S F E R 0 . 5 2 5 0 . 4 3 7 0 . 4 4 7
R E T R A I N L A S T
2 L AY E R S
0 . 5 3 4 0 . 4 5 7 0 . 4 4 7
R E T R A I N L A S T
3 L AY E R S
0 . 4 7 7 0 . 5 4 6 0 . 4 8 6
Tuning Model trained on ABCD for AWTP
29. E X P E R I M E N T S : T R A N S F E R L E A R N I N G
M O D E L P R E C I S I O N R E C A L L W E I G H T E D F 1 S C O R E
S O TA - - 0 . 4 4 4
D I R E C T 0 . 4 3 4 0 . 4 4 5 0 . 3 8 9
T U N I N G 0 . 5 1 5 0 . 4 7 0 0 . 4 6 4
T R A N S F E R 0 . 5 2 5 0 . 4 3 7 0 . 4 4 7
R E T R A I N L A S T
2 L AY E R S
0 . 5 3 4 0 . 4 5 7 0 . 4 4 7
R E T R A I N L A S T
3 L AY E R S
0 . 4 7 7 0 . 5 4 6 0 . 4 8 6
Tuning Model trained on ABCD for AWTP
C O M P E T I T I V E
P E R F O R M A N C E
30. I S T H E M O D E L
D O M A I N
I N D E P E N D E N T ?
31. D O M A I N I N D E P E N D E N T ?
• Topics in Train, Development, Test are disjoint.
• Ensures model is topic independent and learns
nuances of (dis)agreement rather than specifics of the
domain.
32. D O M A I N I N D E P E N D E N T ?
T O P I C N A M E Q U O T E R E S P O N S E
T R A I N Are guns fun
Berno Guns are weapons that can kill people. If
an adult can find a gun to be fun, then a child
can easily find a gun to be fun. We all know
what happens when children get their hands on
guns.
dtrimble Thats like saying we all
know what happens when kids
get their hands on the car keys!
The debate is not about if they
are safe its about weather they
are fun. yes guns are fun
VA L I D AT I O N
18 years old to date
someone over 18
Safiya Thats illegal for a 16 year old to date a 19
year old the law is you have to be 18 to date
someone that's 18 years old or older
Cuaroc Not in Britain.
T E S T
Are lessons learnt from the
past relevant to today's
world of unprecedented
change
sommonsonata Hasn't germany became a
freed country due to the spread of democracy
which you have just stated?
gyliu15 The example that
Germany has become a freed
country because of the spread
of democracy is not valid.
Nevertheless, the lessons learnt
from the past are still relevant
to today's world of
unprecedented change in the
political arena.
33. D E T E C T I N G ( D I S ) A G R E E M E N T
I S H A R D
34. H A R D E X A M P L E S
L A B E L Q U O T E R E S P O N S E D E S C R I P T I O N
A G R E E
JessHall01 my parents
do not deserve it, they
treat me like shit and
that’s unecessary. NO
parents should even
romotely lay their hands
on a child. EVER.
kamranw I agree with
you there. NO parent
should hit their child. I
completely feel your
pain if that is the case. I
would be curious to
know how they treat you
like shit though. Not
sure how that is relevent
to minors being sexual
active either.
Although the
participants are on the
same side of the debate,
they are agreeing on
some sentences, which
makes it difficult to give
a single label to the
whole post
D I S A G R E E
joecavalry I tell my kids
to hurry up and eat their
breakfast so that we can
get to school on time.
My little one is so slow
that I tell her she eats
breakslow ;)
Morgie7171 AWWW
thats so cute...............
haha-
hahahahahahahahhaaha
hhha
Due to self labeling,
sometimes off topic chit-
chat on debate forums is
erroneously tagged
35. H A R D E X A M P L E S
L A B E L Q U O T E R E S P O N S E D E S C R I P T I O N
D I S A G R E E
Of course guns kill
people, but that doesn't
mean that they should
be banned. Knives kill
people, cars kill people,
Big Macs kill people, but
should they be banned
as well?
Do yourself a favor and
ignore anyone who tells
you to be yourself. Bad
idea in your case. Guns
don't kill people, but
people uses guns to kill
people.
Sarcastic responses are
difficult for the model to
figure out.
37. C O N C L U S I O N
• Model doesn’t need to rely on handcrafted features
for exploiting meta-thread structures
• Model pre-trained on large corpora (ABCD) performs
competitively on much smaller hand annotated
datasets
• Model is available as an API at:
developers.deepaffects.com
39. • Applying recent developments in computational sarcasm
to improve the model’s ability to detect sarcastic responses
• Use attention based models to identify the specific
contexts the model is using to predict. This gives more
visibility in debugging the model output
• Instead of solely relying on self-labelled datasets, use them
as weak labeled datasets for semi-supervised learning and
combine them with hand-labelled datasets for correcting
mislabels.