First of all, you have to do is to install the amazon go app in your smartphone , which it available in ios and android, and log in into your amazon account, simple as that.
Oussama Belarbi
I love PowerPoint (Yes, Really!) and think it is a huge shame that people don't use it to it's full potential ... here are some of my ideas on how to avoid inflicting 'Death By Bullet Point' on an audience ever again.
I love PowerPoint (Yes, Really!) and think it is a huge shame that people don't use it to it's full potential ... here are some of my ideas on how to avoid inflicting 'Death By Bullet Point' on an audience ever again.
Amazon is attracting more sellers than ever before and more recently due to the rise of private labelling which is essentially the aldi way of copying products which are already popular in the market. In our latest London Online Seller Meetup we discussed various factors that affects ranking and that private label is only going to grow.
The Sil Lum Tao of Innovation ——James Andrade, Former VP Research Developme...Simba Events
The Sil Lum Tao of Innovation
——James Andrade, Former VP Research Development & Quality, Mondelez International; Adjunct Professor, Griffith University
Your challenge is not to sell products but to profitably manage products with...Product of Things
These are the slides from Omer Enbar's workshop at Product of Things Conference in Tel Aviv on July 2018:
Who this workshop is for:
This workshop is for those who want to establish a profitable product management environment in their organization
After this workshop you will be able to:
- Know the trigger that will raise your customer’s willingness to pay
- Understand the challenges of each link in your product’s distribution chain
- Use different methods to help your company stay alive and your product profitable
What is covered:
- Design for cost: how to set COGS/BOM and target price for your product
- Know your margin, and deducing your target sales, team size and burn rate
- Make a simple product: how to not over design and make everything simple
- Optimizing online marketing
- Overcoming the distribution and retail challenge
In this workshop, Omer will share his experience as the CEO of Sensibo, presenting some of his insights and unique methods for building and managing profitable IoT products.
just found this presentation I gave back in 2009. If you can live with this stripped down format: enjoy. I still believe that everything I said then is valid today.
The punch line was: "What is your Excuse not to be in Silicon Valley". Well I still have mine.
Apple is undoubtedly one of the leading technological companies in the world. Interestingly the company does not have customers but fans or fanatics. Discover the 5 marketing secrets that took Apple to the top of the food chain
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Amazon is attracting more sellers than ever before and more recently due to the rise of private labelling which is essentially the aldi way of copying products which are already popular in the market. In our latest London Online Seller Meetup we discussed various factors that affects ranking and that private label is only going to grow.
The Sil Lum Tao of Innovation ——James Andrade, Former VP Research Developme...Simba Events
The Sil Lum Tao of Innovation
——James Andrade, Former VP Research Development & Quality, Mondelez International; Adjunct Professor, Griffith University
Your challenge is not to sell products but to profitably manage products with...Product of Things
These are the slides from Omer Enbar's workshop at Product of Things Conference in Tel Aviv on July 2018:
Who this workshop is for:
This workshop is for those who want to establish a profitable product management environment in their organization
After this workshop you will be able to:
- Know the trigger that will raise your customer’s willingness to pay
- Understand the challenges of each link in your product’s distribution chain
- Use different methods to help your company stay alive and your product profitable
What is covered:
- Design for cost: how to set COGS/BOM and target price for your product
- Know your margin, and deducing your target sales, team size and burn rate
- Make a simple product: how to not over design and make everything simple
- Optimizing online marketing
- Overcoming the distribution and retail challenge
In this workshop, Omer will share his experience as the CEO of Sensibo, presenting some of his insights and unique methods for building and managing profitable IoT products.
just found this presentation I gave back in 2009. If you can live with this stripped down format: enjoy. I still believe that everything I said then is valid today.
The punch line was: "What is your Excuse not to be in Silicon Valley". Well I still have mine.
Apple is undoubtedly one of the leading technological companies in the world. Interestingly the company does not have customers but fans or fanatics. Discover the 5 marketing secrets that took Apple to the top of the food chain
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
2. 2
Plan
● Introduction.
● Why did Amazon invest in this
concept of real/smart stores?
● What can we buy at Amazon
Go? & Where is it located?
● How does it work : The
technology behind it.
● Avantage and disavantage
● Conclusion.
4. AMAZON SITE
● Here you have a list of items
● And some text
● But remember not to overload your slides with content
Your audience will listen to you or read the content, but won’t do both.
4
5. 5
So...What is the difference between Amazon.com and Amazon
GO smart Store ?
8. White
Is the color of milk and fresh snow, the color
produced by the combination of all the colors of
the visible spectrum.
Why did Amazon invest in AMAZON GO ?
Black
Is the color of coal, ebony, and of outer space. It
is the darkest color, the result of the absence of
or complete absorption of light.
8
First of all, you have to do is to install the amazon go app in your smartphone , which it available in ios and android, and log in into your amazon account, simple as that,
When entering the shop you should scan your phone which actually scans the QR code on your app , and you are good to go , which is explained in many posters outside the shop , grab what ever you need and leave
But the truth is a little bit more than that , Amazon is using combination of artificial intelligence, Computer vision , deep Learning and sensor fusion algorithms.
The stores’ shelves using weight sensors to detected an item has been lifted and automatically charges the shopper’s amazon account whom grabbed the item, and that is another reason why it is required to have the amazon go app installed on the smartphone and linked amazon go account
The patent described a store that would work using hundreds of cameras which are to control and feed information to servers that uses machine learning to determine exactly what a client picked and what he put down on shelves , RFID sensors (radios frequency identification) readers to identify shoppers and their items
The cameras will also take photos when people enter the store, when they removed items from a shelf, and they left with items in their hands, there is also a mention of ‘facial recognition ’and user information, which may include
Images of the user and other information like height and weight ,user biometrics , username and password and even user purchase history when. When you exit the amazon Go store , the system send you the bill automatically
The amzon go in Seattle is still a prototype of what the stores will be like, however many people enjoyed the experiment, and its many advantages such as, you don’t have to wait in line anymore , you just pick up what you want and leave, saving you a lot of time, especially in holidays
Also the cameras and the sensors, make shoplifting literally impossible , which make your shopping experience much much safer,
But this nice experience could be ruined if you lost your connection to the internet inside the store due to hardware fail or something else,
But this nice experience could be ruined if you lost your connection to the internet inside the store due to hardware fail or something else,
Also we can’t ignore the fact that amazon go stores , will make hundred of men jobless , due to its complete dependency on computers and artificial intelligence