We use AppEco to simulate Apple’s iOS app ecosystem and investigate the effectiveness of common publicity strategies such as viral marketing, mass broadcast, targeted broadcast, and recurring broadcast, having your apps appear on the top apps chart, and having your apps appear on the new apps chart.
Jan-Erik Sandberg - Succeeding with Large Scale AgileAgile Lietuva
Implementing Agile in small, short lived projects is easy. The real challenge comes when the project becomes long-running, and it gets even harder when spanning into multiple large projects. Add the challenge of distribution of resources and different cultures and it becomes almost impossible.
Jan-Erik Sandberg is an international veteran on successfully implementing Agile in large organizations. You will get insights into some of his hard earned experiences and this hour will be packed with proven techniques and real life examples. The goal of the session is to help you to reduce risk and increase your chances of succeeding with implementing agile at a large scale. Project and product-developments that utilize offshore resources will be the main focus for this session.
Jan-Erik Sandberg - Succeeding with Large Scale AgileAgile Lietuva
Implementing Agile in small, short lived projects is easy. The real challenge comes when the project becomes long-running, and it gets even harder when spanning into multiple large projects. Add the challenge of distribution of resources and different cultures and it becomes almost impossible.
Jan-Erik Sandberg is an international veteran on successfully implementing Agile in large organizations. You will get insights into some of his hard earned experiences and this hour will be packed with proven techniques and real life examples. The goal of the session is to help you to reduce risk and increase your chances of succeeding with implementing agile at a large scale. Project and product-developments that utilize offshore resources will be the main focus for this session.
Creative Biolabs is skilled in NGS-based cancer research. We support one-stop cancer research services based on a variety of sequencing technologies. Our whole gene sequencing (WGS) and whole exome sequencing (WES) platforms enable us to comprehensively analyze and identify known and unknown cancer gene mutations. Besides, we also provide high-quality target sequencing services, allowing us to analyze several or even hundreds of target gene mutations economically and effectively. Our services will facilitate our customers’ cancer research including cancer diagnosis and treatment.
https://www.creative-biolabs.com/suprecision/genetic-testing-for-cancer.htm
The Kenya Ushahidi Evaluation Project was 9-month Ushahidi evaluation project in partnership with the Harvard Humanitarian Initiative supported by the Knight Foundation. Jennifer Chan and Melissa Tully conducted research which lead to the creation of case studies and toolboxes. (2011) This is Toolbox #3: Real-Time Evaluation.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Creative Biolabs is skilled in NGS-based cancer research. We support one-stop cancer research services based on a variety of sequencing technologies. Our whole gene sequencing (WGS) and whole exome sequencing (WES) platforms enable us to comprehensively analyze and identify known and unknown cancer gene mutations. Besides, we also provide high-quality target sequencing services, allowing us to analyze several or even hundreds of target gene mutations economically and effectively. Our services will facilitate our customers’ cancer research including cancer diagnosis and treatment.
https://www.creative-biolabs.com/suprecision/genetic-testing-for-cancer.htm
The Kenya Ushahidi Evaluation Project was 9-month Ushahidi evaluation project in partnership with the Harvard Humanitarian Initiative supported by the Knight Foundation. Jennifer Chan and Melissa Tully conducted research which lead to the creation of case studies and toolboxes. (2011) This is Toolbox #3: Real-Time Evaluation.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
How to market your app
1. App
Epidemics
Modelling
the
Effects
of
Publicity
in
a
Mobile
App
Ecosystem
Soo
Ling
Lim
and
Peter
J.
Bentley,
University
College
London
AppEco
Model
Experiments
Developer
agent
App Store We
inves:gated
3
causal
factors
for
epidemics:
• Changes
in
host
exposure
Represents
a
solo
developer
or
a
team
of
• Changes
in
host
suscep:bility
developers
working
together
to
make
an
app
• Changes
in
app
infec:ousness
Uses
an
evolu:onary
strategy
to
build
apps
Developer App User
AHributes:
builds and downloaded by
• Development
dura:on
uploads
• Days
taken
• Probability
inac:ve
Results
App
artefact
Infec=ous
Non-‐infec=ous
Developer agents Strategy
Excellent
App
Good
App
Average
App
Excellent
App
Good
App
Average
App
Built
by
developer
agent
Initialise ecosystem build and upload Update app store No
Exposure
6201.11
(1768.24)
694.58
(707.44)
0.26
(0.81)
3.32
(1.80)
0.77
(0.89)
0.26
(0.54)
apps
Mass
Exposure
5829.48
(1681.26)
935.53
(120.93)
5.19
(4.90)
4188.15
(657.08)
13.26
(24.53)
2.88
(1.69)
AHributes:
Targeted
Exposure
5889.71
(1721.91)
892.86
(319.30)
0.71
(1.27)
53.49
(409.15)
3.78
(1.62)
1.71
(0.71)
• Features
(10x10
grid)
loop for N timesteps Recurring
Exposure
5832.04
(1338.54)
913.66
(515.99)
0.71
(1.27)
6.22
(2.12)
1.51
(1.07)
0.36
(0.66)
• Number
of
downloads
Enhancing
Mode
of
Transmission
5818.77
(1847.14)
623.34
(708.93)
1.29
(0.81)
4.02
(1.88)
1.76
(0.84)
1.23
(0.49)
• Probability
infec:ous
User agents browse
through
Top
Apps
Chart
• Time
uploaded
to
app
store
Increase agent and download apps,
Exit Enhancing
Mode
of
Transmission
5840.05
(1610.12)
1020.07
(67.89)
172.48
(19.50)
4258.01
(517.44)
490.36
(58.39)
123.46
(17.69)
population and recommend
apps to friends through
New
Apps
Chart
User
agent
Total
downloads
averaged
over
100
runs
(standard
devia=on
in
brackets).
One
download
is
equivalent
to
10,000
real
downloads.
Has
preferences
(or
taste
informa:on)
that
determine
the
app
features
that
it
prefers
(a)
(b)
AHributes:
• Preferences
(10x10
grid)
• Days
between
browse
• Days
elapsed
• Number
of
friends
App
store
environment
Shop
front
for
users
to
browse
and
download
apps
Browsing
methods:
• New
Apps
Chart
• Top
Apps
Chart
!
• Keyword
Search
An
epidemic
curve
for
a
good
app
resul=ng
from
Mass
Exposure
in
an
example
run.
The
spread
of
the
excellent
infec=ous
app
through
the
user
network
using
Calibra=ng
AppEco
for
iOS
(a)
the
Mass
Exposure
strategy,
and
(b)
the
Enhancing
Mode
of
Transmission
through
New
Apps
Chart
strategy.
250" 250" 250"
Conclusions
Total&iOS&App&Users&(Million)&
Total&iOS&App&Users&(Million)&
200" 200" 200"
!
150" 150" 150"
• Enhancing
the
mode
of
transmission
through
New
Apps
Chart
results
in
the
highest
chance
of
an
epidemic.
100" Actual" 100" 100"
Actual" Actual" • The
more
suscep:ble
the
users
are
to
the
app
(i.e.,
the
more
users
like
the
app),
the
more
downloads
the
app
receives.
50"
Simulated"
50"
Simulated"
50"
Simulated" Spike
in
app
downloads
as
reported
However,
a
highly
desirable
app
may
s:ll
receive
no
downloads
just
because
users
are
unaware
of
it.
0" 0" 0"
by
Apple
to
the
second
author
for
• Infec:ous
apps
are
more
likely
to
trigger
an
epidemic
and
receive
more
downloads
than
non-‐infec:ous
apps.
his
iStethoscope
Pro
app
aFer
a
• Non-‐infec:ous
apps
can
be
downloaded
at
an
epidemic
propor:on,
but
users
must
be
very
suscep:ble
to
the
apps
and
Q4'08"
Q1'09"
Q2'09"
Q3'09"
Q4'09"
Q1'10"
Q2'10"
Q3'10"
Q4'10"
Q1'11"
Q2'11"
Q3'11"
Q4'08"
Q1'09"
Q2'09"
Q3'09"
Q4'09"
Q1'10"
Q2'10"
Q3'10"
Q4'10"
Q1'11"
Q2'11"
Q3'11"
Q4'08"
Q1'09"
Q2'09"
Q3'09"
Q4'09"
Q1'10"
Q2'10"
Q3'10"
Q4'10"
Q1'11"
Q2'11"
Q3'11"
Quarter&
! Quarter&
! Quarter&
! publicity
event.
the
apps
have
to
be
publicised,
best
by
the
New
Apps
Chart
strategy,
followed
by
Mass
Exposure
and
Targeted
Exposure.