1) The document describes the author's experience taking a class on technology literacy where she learned about many new technologies like Twitter, Tumblr, Gmail, and Google Docs.
2) At first, the author felt ashamed that her knowledge of technologies was not as strong as her classmates' knowledge, but by using the various tools for assignments she became more comfortable with social networking.
3) By the end of the class, the author gained confidence in her understanding of how to use different technologies and how they interconnect, overcoming her initial fears about social media platforms.
This is a power point with tips and suggestions for how people who are not necessarily tech savvy can become more comfortable and knowledgeable with learning new tools and technologies
This is a power point with tips and suggestions for how people who are not necessarily tech savvy can become more comfortable and knowledgeable with learning new tools and technologies
My slides from #cccc09, although during my talk I extemporized about my Twitter experience, further explained how I go about referencing the video clips, and how Palfrey & Gasser’s term “digital natives” is problematic for me, especially having seen students on my own laptop campus fumble with directions. Any questions? Email me!
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
2. Once upon a time, I entered a module called. “Technologies and the Future”, I knew that technology was an important aspect of life. Technology is growing everyday and advancing into new and better things. The many technologies I use in my everyday life is my cell phone, email, camera, and IPod. Without these things I would be lost. I believed I was literate in technology and that this module wouldn’t be difficult for me. Yet to my knowledge
3. Technology and the Future I was all wrong! Actually I wasn't literate compared to most of my fellow classmates. A lot of people have my-space or face-book accounts. I don't have an account with those social networks. I was always skeptical about the privacy and cautious about random people following me. It honestly freaks me out, so I wasn't so happy signing up for a twitter, tumbler, and Gmail account for this module. My eyes were open to so many new technologies, that I felt ashamed of not knowing these advances when most of my fellow classmates did.
4. What did I learn? Twitter Tumblr Gmail Reader Google docs Scribs bit.ly Where, when, and why to use all these sources
5. How did I apply these? Twitter- I blogged about my everyday life and what my tumblr post url. I saw what was going on with my class and classmates. Tumblr- I used this to do my homework blogging and to check on other students blogs. Gmail- I used this to check who was following me. Reader- I used this to copy my all my tweets, follow Mrs. Teston, and was subscribed to the class. Google Docs- I used this for my white paper. Working on a collaborating paper with other, we could all work and edit our paper from our own houses. Scribd- where we posted our white paper bit.ly- wonderful source to shorten your links.
6. What did I get out of this module? I learned so many new technologies and how and where to use them The most important aspect I got out of this class was that I wasn’t uncomfortable anymore. I felt that I overcame the nervousness of random people following me and the creepy men. I am now more socially connected with others and actually enjoy it. To understand technology, you need to understand the materials and tools of the technology.
7. From readings: Moore said, "Auseful metaphor of technology in regard to technology literacy is to think of technology as a container.”- You need to understand not just technology but how and when to use technology but do be able to do other functions as well. Moore said, “To be technology literate one must develop an understanding of the technologies one uses, they must know how they function, how they work and how they interrelate.” – You need to understand fully and not just what the technology is but how they work and connect with one another.
8. My tweets on Gmail Reader I just didn’t learn how to tweet but took it further, I learned how to save all my tweets on Google reader, so I can always go back to them.
9. My Blogs! I learned not only how to blog but how to decorate my page.
10. bit. ly Coolest resource to help you shorten your urls. I used this often to post my blogs on twitter.
11. My twitter page, I designed the background and added a picture of me! I started tweeting a lot more, once I got the hang of it.
12. What did I get out of this? I got so many new resources to use for socializing with others Working with others on projects and using Google docs- love this! Learning how to be updated in life to these advances, maybe will help me help some one else. There are so many advances happening, that I didn’t know about.
13. Happily ever after, I grew as a person in the social network and technologies that are advancing. I learned so much about technology and what I can do with technology on the computer. There are so many materials and tools needed to know to understand the technology. Overall, I feel that I grew so much and that I do enjoy twitter and tumblr. I like seeing what’s going on and connecting with others. I see now what Mrs. Teston was saying about,” finding someone who is in your profession and maybe enjoying what they posted or it helped you.” I have disliked, struggled, learned, overcame, and grew in technology in this module. I realized during this module is that even though some technology can be bad due to people abusing it, there is so much useful technology out there that I can use. I believe that in the beginning I was in between uncritically resistant and passive adoption but now I see myself as Receptive to and can articulate accordance's and constraints. As what Moore said, “To be technology literate one must develop an understanding of the technologies one uses, they must know how they function, how they work and how they interrelate.” I feel and believe that I learned how, where, why, and when to use all the technology I learned in class, not only that but can explain to others how to use them. I helped my boyfriend and explained to my best friend what these different technologies can be used for. Honestly, I am going to keep my twitter, tumbler, and Gmail account and use them. I think Teston, you got to me and I’m understanding why a lot of people are using it and how it’s not all creepy!- lol