This document outlines a research study on how bricolage can facilitate emergent collectives in an entrepreneurial setting. It discusses key concepts like emergent collectives, bricolage, and provides an outline of the presentation. The research question asks how bricolage can be used to help adopt emergent collectives. The methodology includes action research using a case study of a small drop shipping company. Preliminary findings suggest bricolage repertoires exist and can be used dialogically to create value for customers.
The document summarizes Dr. Jan Devos' presentation on using bricolage to facilitate emergent collectives in small-to-medium enterprises (SMEs). It discusses emergent collectives and bricolage, presents Devos' research question on how bricolage can help adopt emergent collectives, and outlines the action research methodology used in a case study of a drop shipping company. The findings show how bricolage repertoire, dialogue, and outcomes exist in the company and support several of Ciborra's bricolage propositions. The conclusion is that bricolage helped adopt emergent technologies in a way that is more developed than traditional control-based thinking.
FInES, ENSEMBLE and A Scientific Perspective For Enterprise InteroperabilityFenareti Lampathaki
An overview of the interoperability history that led to the concept of the Enterprise Interoperability Science Base; the methodology followed; the main achievements so far and the key challenges towards the future.
The document presents a perspective on IT governance in small and medium enterprises (SMEs). It discusses how existing IT governance principles are better suited for large organizations rather than SMEs due to SMEs having less separation between ownership and control, and being more influenced by the CEO's personal beliefs. New findings from research on IT governance in SMEs in 22 countries show that while IT is important for innovation, benefits are hard to measure and strategic thinking on IT follows a bottom-up rather than top-down approach. The conclusions suggest existing IT governance models may be too mechanistic and formal for SMEs, and that an approach focusing more on people would be better suited.
Operationalizing wicked problem solving to create desirable futuresGavin Melles
This document discusses operationalizing solutions to wicked problems through collaboration and design techniques. It references the 1973 paper by Rittel and Webber that defined wicked problems. The document outlines methods used in a case study, including personas, scenarios, and participatory design, to address issues like health and independence for seniors. It argues that positioning Simon vs Rittel/Webber is a misunderstanding and that their approaches are compatible when addressing contingent real-world problems through feedback systems and artifacts.
This document discusses IT governance in small and medium enterprises (SMEs). It explores whether IT governance in SMEs is based more on control or trust when outsourcing IT projects. The document outlines definitions of SMEs, issues they face with IT and outsourcing, and introduces the concepts of agency theory and organizational trust as theoretical frameworks. It then describes the research methodology used - a retrospective multiple case study analysis of SMEs that experienced outsourced IT project failures. The document puts forward four propositions relating project failure to levels of control and trust.
O documento é uma reflexão sobre como a economia global produz bens baratos de forma questionável, explorando a inocência. O autor expressa indignação com um mundo que permite tal exploração.
The document summarizes Dr. Jan Devos' presentation on using bricolage to facilitate emergent collectives in small-to-medium enterprises (SMEs). It discusses emergent collectives and bricolage, presents Devos' research question on how bricolage can help adopt emergent collectives, and outlines the action research methodology used in a case study of a drop shipping company. The findings show how bricolage repertoire, dialogue, and outcomes exist in the company and support several of Ciborra's bricolage propositions. The conclusion is that bricolage helped adopt emergent technologies in a way that is more developed than traditional control-based thinking.
FInES, ENSEMBLE and A Scientific Perspective For Enterprise InteroperabilityFenareti Lampathaki
An overview of the interoperability history that led to the concept of the Enterprise Interoperability Science Base; the methodology followed; the main achievements so far and the key challenges towards the future.
The document presents a perspective on IT governance in small and medium enterprises (SMEs). It discusses how existing IT governance principles are better suited for large organizations rather than SMEs due to SMEs having less separation between ownership and control, and being more influenced by the CEO's personal beliefs. New findings from research on IT governance in SMEs in 22 countries show that while IT is important for innovation, benefits are hard to measure and strategic thinking on IT follows a bottom-up rather than top-down approach. The conclusions suggest existing IT governance models may be too mechanistic and formal for SMEs, and that an approach focusing more on people would be better suited.
Operationalizing wicked problem solving to create desirable futuresGavin Melles
This document discusses operationalizing solutions to wicked problems through collaboration and design techniques. It references the 1973 paper by Rittel and Webber that defined wicked problems. The document outlines methods used in a case study, including personas, scenarios, and participatory design, to address issues like health and independence for seniors. It argues that positioning Simon vs Rittel/Webber is a misunderstanding and that their approaches are compatible when addressing contingent real-world problems through feedback systems and artifacts.
This document discusses IT governance in small and medium enterprises (SMEs). It explores whether IT governance in SMEs is based more on control or trust when outsourcing IT projects. The document outlines definitions of SMEs, issues they face with IT and outsourcing, and introduces the concepts of agency theory and organizational trust as theoretical frameworks. It then describes the research methodology used - a retrospective multiple case study analysis of SMEs that experienced outsourced IT project failures. The document puts forward four propositions relating project failure to levels of control and trust.
O documento é uma reflexão sobre como a economia global produz bens baratos de forma questionável, explorando a inocência. O autor expressa indignação com um mundo que permite tal exploração.
The document discusses key topics related to information and communication technologies (ICTs) and their impact on businesses and society. It addresses issues like disruptive innovations, the need for businesses to change their models, the importance of broadband access, and questions around control and appropriate business models in a digital world. The future of ICTs and emerging collectives is uncertain but impactful.
The document provides information about Dr. Jan Devos and discusses several topics related to engineering models and organizational change. It includes contact information for Dr. Devos at the top, followed by sections that discuss the emergence of the engineering model in history. Later sections discuss successes and failures of the engineering model, as well as alternative approaches and examples of emergent collectives such as Wikipedia.
This document summarizes challenges with IT projects and proposes new paradigms for managing them more effectively. It notes that 30-40% of IT projects run over budget, over schedule, or fail to meet specifications. Common types of system failures include failing to capture business requirements or provide organizational benefits. The document then discusses traditional project management approaches and their limitations. It proposes new paradigms like real options pricing models, prioritizing high reliability through collective mindfulness, and considering the sociomateriality of information systems. Overall, it argues for a more critical perspective on projects that focuses on values, ethics, meaning, and trust in addition to traditional efficiency and control measures.
The document discusses IT governance in small and medium enterprises (SMEs). It begins by providing background on corporate governance and IT governance. It then questions whether IT governance is relevant for SMEs given factors like independence, personal influence of the CEO, and need for flexibility. The presentation outlines new findings from a study of IT governance research involving SMEs in 22 countries. Key findings include that IT can enable innovation but adoption is often slow in SMEs, benefits of IT are difficult to measure, and outsourcing is common due to resource constraints.
This document provides contact information for Dr. Jan Devos and information about his expertise in electronics and IT. It discusses three rules for conducting a project, but notes that nobody knows what those rules actually are. It then provides definitions and examples of what constitutes a project, including its temporary nature, goal orientation, and impact on existing organizations. Project management is introduced as the planning, monitoring, and control of all aspects of a project to achieve objectives on time and within budget. Key project management practices like work breakdown structures, GANTT charts, and PERT planning are also summarized.
The document discusses research into finding theoretical foundations for the COBIT 5 framework. It aims to determine if COBIT has visible theoretical underpinnings by mapping its principles, processes, and goals to constructs in stakeholder theory, principal-agent theory, and the technology acceptance model. The research finds the strongest links to principal-agent theory, along with some relationships to stakeholder theory. It concludes that while certain theories are present, COBIT may have benefited from a clearer theoretical starting point in its development.
This document discusses the concepts of projects and project management. It begins with definitions of a project as a temporary endeavor undertaken to create a unique product or service. Key aspects of projects mentioned include them being limited in time, goal-centric, and impacting existing organizations. Examples of projects like building a house or developing a new product are provided. The document then discusses what constitutes a project team and management. It provides insights into evaluating different project models and highlights factors like control, discipline, and organization type that determine the best model. The rest of the document offers perspectives on project failures, principles of high reliability organizations, and practical tools for project planning like the work breakdown structure, Gantt chart, PERT planning and managing scope.
This document discusses the emergence of engineering as a profession and contrasts the engineering model with an alternative approach called bricolage. The engineering model emphasizes reductionism, specialization, and the separation of creation and use. In contrast, bricolage is characterized by making use of whatever resources are at hand, an emphasis on relationships and interconnected systems over isolated parts, and blending creation and use. The document suggests that while both approaches have merits, a mixed approach integrating aspects of engineering and bricolage may be most effective.
IT for Small and Medium-sized Enterprises (SMEs)Ghent University
This document discusses IT for small and medium-sized enterprises (SMEs). It begins with a brief history of SMEs, noting they were largely ignored until the 1970s. It then discusses definitional problems in classifying SMEs, noting heterogeneity in factors like organizational size, economic sector, and ownership structure. The document also outlines some generic characteristics of SMEs in relation to IT, such as resource poverty, low IT capabilities, and a focus on informal management. Finally, it summarizes some key findings from past research on IT use and challenges in SMEs.
This document discusses a case study on applying systems thinking and circular design principles in an industrial engineering course. Students worked in teams on material-driven and overarching challenges. The researchers noticed collaboration between teams and with stakeholders. They analyzed two teams' challenges, collaborations, and stakeholder mentions. The researchers aim to understand the relationship between systems thinking training and collaborative attitude. Further research is needed to determine which factors favor collaboration in project-based learning. The researchers invite feedback on the theoretical grounding and research design.
Opinions on the State of Production Distributed Infrastructure (PDI)Daniel S. Katz
This document discusses the state of production distributed infrastructure (PDI) and open challenges. It describes three types of existing PDIs - academic/public for science, academic/public for research, and commercial. Key open challenges include measuring delivered science, developing integrated infrastructure and tools, representing small users, the role of virtualization in high-performance computing, and defining an overall vision and architecture with interfaces. The path forward requires a single agreed upon vision and metrics to measure progress towards enabling maximum science delivery.
The document describes Dr. Mahdi Fahmideh's background and research interests which include disruptive technologies like cloud computing, IoT, blockchain, and data analytics. It provides examples of Dr. Fahmideh's research output, including a process model developed using design science research for migrating legacy applications to the cloud. The document identifies knowledge gaps in the current literature around cloud migration processes and outlines Dr. Fahmideh's research objective to develop a generic, customizable cloud migration process model.
The document discusses how design is adapting to new complex systems shaped by emerging technologies like biotechnology. It argues that design can help navigate unfamiliar spaces by generating more possibilities through an exploratory process. The document also discusses how design can influence research by manipulating interdependencies to explore the fitness landscape and increase adaptability to changing topographies.
The document discusses software architecture and life cycle management. It defines a company information system and notes that architecture has always been important, even in the 1960s, though the technological means have changed. It discusses architectural disorientation and notes that without proper architecture, software systems can become disorganized "shantytowns". It provides definitions of architecture and notes that good architecture balances stakeholder needs and may conform to recognized styles.
Invited presentation for the Engineering Projects In Community Service - in - IEEE (EPICS-in-IEEE) Virtual Learning Environment (VLE) conference on 27 Oct. 2012.
Engineers or Bricoleurs by prof Jan DevosCONFENIS 2012
This document discusses the emergence and successes of the engineering model as well as its limitations. It describes how the engineering model focuses on reduction, decomposition, specialization, and the separation of creation and use. However, this model fails to account for real-world complexity and vagueness. The document then introduces the concept of bricolage as an alternative approach that focuses on improvisation, resilience, and making use of whatever resources are available. Bricolage is characterized by a closed universe, cyclical time, intimate knowledge, and the inseparability of creation and use. The bricoleur and engineer are contrasted, and bricolage is proposed as a way to complement and improve upon the traditional engineering
The document discusses key topics related to information and communication technologies (ICTs) and their impact on businesses and society. It addresses issues like disruptive innovations, the need for businesses to change their models, the importance of broadband access, and questions around control and appropriate business models in a digital world. The future of ICTs and emerging collectives is uncertain but impactful.
The document provides information about Dr. Jan Devos and discusses several topics related to engineering models and organizational change. It includes contact information for Dr. Devos at the top, followed by sections that discuss the emergence of the engineering model in history. Later sections discuss successes and failures of the engineering model, as well as alternative approaches and examples of emergent collectives such as Wikipedia.
This document summarizes challenges with IT projects and proposes new paradigms for managing them more effectively. It notes that 30-40% of IT projects run over budget, over schedule, or fail to meet specifications. Common types of system failures include failing to capture business requirements or provide organizational benefits. The document then discusses traditional project management approaches and their limitations. It proposes new paradigms like real options pricing models, prioritizing high reliability through collective mindfulness, and considering the sociomateriality of information systems. Overall, it argues for a more critical perspective on projects that focuses on values, ethics, meaning, and trust in addition to traditional efficiency and control measures.
The document discusses IT governance in small and medium enterprises (SMEs). It begins by providing background on corporate governance and IT governance. It then questions whether IT governance is relevant for SMEs given factors like independence, personal influence of the CEO, and need for flexibility. The presentation outlines new findings from a study of IT governance research involving SMEs in 22 countries. Key findings include that IT can enable innovation but adoption is often slow in SMEs, benefits of IT are difficult to measure, and outsourcing is common due to resource constraints.
This document provides contact information for Dr. Jan Devos and information about his expertise in electronics and IT. It discusses three rules for conducting a project, but notes that nobody knows what those rules actually are. It then provides definitions and examples of what constitutes a project, including its temporary nature, goal orientation, and impact on existing organizations. Project management is introduced as the planning, monitoring, and control of all aspects of a project to achieve objectives on time and within budget. Key project management practices like work breakdown structures, GANTT charts, and PERT planning are also summarized.
The document discusses research into finding theoretical foundations for the COBIT 5 framework. It aims to determine if COBIT has visible theoretical underpinnings by mapping its principles, processes, and goals to constructs in stakeholder theory, principal-agent theory, and the technology acceptance model. The research finds the strongest links to principal-agent theory, along with some relationships to stakeholder theory. It concludes that while certain theories are present, COBIT may have benefited from a clearer theoretical starting point in its development.
This document discusses the concepts of projects and project management. It begins with definitions of a project as a temporary endeavor undertaken to create a unique product or service. Key aspects of projects mentioned include them being limited in time, goal-centric, and impacting existing organizations. Examples of projects like building a house or developing a new product are provided. The document then discusses what constitutes a project team and management. It provides insights into evaluating different project models and highlights factors like control, discipline, and organization type that determine the best model. The rest of the document offers perspectives on project failures, principles of high reliability organizations, and practical tools for project planning like the work breakdown structure, Gantt chart, PERT planning and managing scope.
This document discusses the emergence of engineering as a profession and contrasts the engineering model with an alternative approach called bricolage. The engineering model emphasizes reductionism, specialization, and the separation of creation and use. In contrast, bricolage is characterized by making use of whatever resources are at hand, an emphasis on relationships and interconnected systems over isolated parts, and blending creation and use. The document suggests that while both approaches have merits, a mixed approach integrating aspects of engineering and bricolage may be most effective.
IT for Small and Medium-sized Enterprises (SMEs)Ghent University
This document discusses IT for small and medium-sized enterprises (SMEs). It begins with a brief history of SMEs, noting they were largely ignored until the 1970s. It then discusses definitional problems in classifying SMEs, noting heterogeneity in factors like organizational size, economic sector, and ownership structure. The document also outlines some generic characteristics of SMEs in relation to IT, such as resource poverty, low IT capabilities, and a focus on informal management. Finally, it summarizes some key findings from past research on IT use and challenges in SMEs.
This document discusses a case study on applying systems thinking and circular design principles in an industrial engineering course. Students worked in teams on material-driven and overarching challenges. The researchers noticed collaboration between teams and with stakeholders. They analyzed two teams' challenges, collaborations, and stakeholder mentions. The researchers aim to understand the relationship between systems thinking training and collaborative attitude. Further research is needed to determine which factors favor collaboration in project-based learning. The researchers invite feedback on the theoretical grounding and research design.
Opinions on the State of Production Distributed Infrastructure (PDI)Daniel S. Katz
This document discusses the state of production distributed infrastructure (PDI) and open challenges. It describes three types of existing PDIs - academic/public for science, academic/public for research, and commercial. Key open challenges include measuring delivered science, developing integrated infrastructure and tools, representing small users, the role of virtualization in high-performance computing, and defining an overall vision and architecture with interfaces. The path forward requires a single agreed upon vision and metrics to measure progress towards enabling maximum science delivery.
The document describes Dr. Mahdi Fahmideh's background and research interests which include disruptive technologies like cloud computing, IoT, blockchain, and data analytics. It provides examples of Dr. Fahmideh's research output, including a process model developed using design science research for migrating legacy applications to the cloud. The document identifies knowledge gaps in the current literature around cloud migration processes and outlines Dr. Fahmideh's research objective to develop a generic, customizable cloud migration process model.
The document discusses how design is adapting to new complex systems shaped by emerging technologies like biotechnology. It argues that design can help navigate unfamiliar spaces by generating more possibilities through an exploratory process. The document also discusses how design can influence research by manipulating interdependencies to explore the fitness landscape and increase adaptability to changing topographies.
The document discusses software architecture and life cycle management. It defines a company information system and notes that architecture has always been important, even in the 1960s, though the technological means have changed. It discusses architectural disorientation and notes that without proper architecture, software systems can become disorganized "shantytowns". It provides definitions of architecture and notes that good architecture balances stakeholder needs and may conform to recognized styles.
Invited presentation for the Engineering Projects In Community Service - in - IEEE (EPICS-in-IEEE) Virtual Learning Environment (VLE) conference on 27 Oct. 2012.
Engineers or Bricoleurs by prof Jan DevosCONFENIS 2012
This document discusses the emergence and successes of the engineering model as well as its limitations. It describes how the engineering model focuses on reduction, decomposition, specialization, and the separation of creation and use. However, this model fails to account for real-world complexity and vagueness. The document then introduces the concept of bricolage as an alternative approach that focuses on improvisation, resilience, and making use of whatever resources are available. Bricolage is characterized by a closed universe, cyclical time, intimate knowledge, and the inseparability of creation and use. The bricoleur and engineer are contrasted, and bricolage is proposed as a way to complement and improve upon the traditional engineering
The paper presents the literature review on long term preservation of 3D architectural building data. The review identified the existing gap in the research and practice of the long term preservation of 3D architectural models,
and suggested future research opportunities in this domain.
Understanding and Addressing Architectural Challenges of Cloud- Based SystemsCREST
This keynote talk discusses architectural challenges of cloud-based systems. It begins with background on the speaker and an outline of the talk. The speaker then discusses why software architecture is important and key facets of cloud computing and architecture. Several research challenges are presented, such as interoperability, privacy, scalability, and service level agreement compliance. The talk emphasizes the need to systematically build and leverage architectural knowledge for cloud-based systems. Approaches discussed include classifying cloud architecture knowledge, discovering architecture styles, and developing an architecture design knowledge ecosystem. The talk concludes that software architecture plays a vital role in cloud systems and that building architectural knowledge is important for developing and migrating systems to the cloud.
The document discusses the INREMO Resource Network, which fosters research in interactive representations and models. It aims to spread research results among its 15 university, industry, and museum partners. The network manages various research projects involving interactive visualizations and models to aid understanding of complex topics. Such representations are relevant across several fields, as simulations can help analyze issues like climate change, medical data, and more. As data volumes continue doubling yearly, interactive visualizations will remain important for exploring and making sense of large datasets.
Deze presentatie is gegeven aan de Open Universiteit te Amsterdam bij het afscheidv van prof. Lex Bijlsma. Er wordt een overzicht gegeven van enterprise architectuur, het gebruik van ArchiMate en de noodzaak om eerst te denken en dan pas te doen
Socio-technical systems engineering (LSCITS EngD 2012)Ian Sommerville
The document discusses socio-technical systems engineering (STSE) which aims to embed socio-technical analysis into engineering processes to account for social factors in system design. It outlines challenges with existing social analysis methods and proposes practical alternatives like informal ethnography and guided ethnography using viewpoints and patterns of interaction. STSE seeks to address issues of studying work at both small and large scales within organizations undergoing technological and organizational change.
To architect or engineer? Lessons from DataPool on building RDM repositoriesjiscdatapool
There cannot be many mature products where development meetings have not been interrupted with a rueful declaration that to make further progress “you wouldn’t start from here”. This encapsulates one key difference between the architect and engineer, the latter prepared to work with the set of tools provided, the other preferring to start with a blank sheet of paper or an open space. In building research data repositories using two different softwares, Microsoft Sharepoint and EPrints, the DataPool Project is working somewhere between these extremes. Which approach will prove to be the more resilient for research data management (RDM)? In this talk we will look at the relevant factors.
The document outlines Howard Kramer's presentation on integrating Universal Design content and principles into university curriculum. It discusses definitions of Universal Design, examples of how it has been incorporated into courses at the University of Colorado-Boulder, and seeks input on sharing resources and collaborating to further promote Universal Design in curriculum. The overall goal is to determine how to best increase the amount of classes addressing Universal Design principles and content on campus.
The document discusses JISC's VRE programs from 2004-2011 which aimed to support collaborative research through online tools and technologies. It summarizes the three phases of the program, including 15 experimental projects in VRE1, 4 demonstrator projects in VRE2 focused on user practices, and 10 projects in VRE3 broadening usage. Specific VRE projects are highlighted from the natural sciences, social sciences, and domains like myExperiment, CREW and VERA.
The document outlines the program educational objectives, program specific outcomes, program outcomes, and mission and vision of an Electronics and Communication Engineering department. It also provides details of a course on Sensors and Interfacing Devices, including course objectives, topics, reference materials, assessment methods, and a lecture plan with 12 experiments mapped to course outcomes. The key goals of the department include providing industry-aligned education, undertaking interdisciplinary research, and imparting experiential learning through projects. The course aims to help students understand sensor principles, interface sensors with circuits, select sensors for applications, and design data acquisition systems using sensors.
This document discusses theoretical foundations for information systems (IS) success in small- and medium-sized enterprises (SMEs). It introduces four theories that may help explain IS success in SMEs: the theory of planned behavior, transaction cost economy, technology acceptance model, and the DeLone & McLean IS success model. The document also presents open questions about how to conceptualize IS success in SMEs and how these theories relate to the existing literature on adopting and using information technologies in small businesses.
This document discusses the relationship between small and medium enterprises (SMEs) and independent software vendors (ISVs) in the IT marketplace. It suggests that SMEs face an asymmetric lack of information when purchasing strategic IT solutions from ISVs. This dynamic could lead to a "lemon market" where low-quality solutions drive out high-quality ones. The author screens ISV websites for signs of this issue and interviews SME CIOs about their experiences. The findings provide some evidence of a lemon market, as smaller ISVs serve the SME market while larger ISVs flee it. Building trust and providing real references are important for SMEs due to past experiences with failed IT projects from erroneous ISV proposals.
This document provides an overview of small and medium-sized enterprises (SMEs) and their use of information technology. It discusses the history and rise of SMEs, noting they were largely ignored until the 1970s but are now recognized as playing an important role in economies. The document also covers definitional problems in classifying SMEs due to heterogeneity in factors like organization size, industry, and ownership structure. Research findings show that while SMEs face disadvantages accessing new technologies compared to large enterprises, they contribute significantly to job growth, innovation, and economic sustainability.
Despite efforts from IT practitioners as well as from IS researchers to assist organizations in adopting IT, a majority of IS projects fail.
What is the state of the art in "failing"? Is it getting better? Do we learn from our mistakes?
Learn all about it in this presentation.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Essentials of Automations: The Art of Triggers and Actions in FME
Aog feb 06-03-2012 v.2.0
1. Using Bricolage to Facilitate
Emergent Collectives in an
Entrepreneurial Setting
(work in progress)
Jan Devos
ECIME 2012 Conference Cork Irl.
AOG FEB – Jan Devos - 06/03/2012 pag. 1
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
2. Outline of the presentation
- Emergent Collectives
- Bricolage
- Research Question
- Research Methodology
- Findings
- Conclusion
AOG FEB – Jan Devos - 06/03/2012 pag. 2
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
3. Emergent Collective
Petrie (2010) introduced the concept of “Emergent Collectives”
- A network of information/function nodes that has minimal
central control, and that‟s largely controlled by a protocol
specification.
- In which it‟s easy for people to add nodes to the network
- And where there are social incentives that motivate people
to act collectively.
www.emergent-collectives.be
AOG FEB – Jan Devos - 06/03/2012 pag. 3
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
9. Emergent Collectives
• FLOSS (OpenERP and Magento)
• Twitter
• Cloud Computing
• On-line repositories (Wiki‟s)
AOG FEB – Jan Devos - 06/03/2012 pag. 9
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
10. Trinidadian Steel drums (pans)
AOG FEB – Jan Devos - 06/03/2012 pag. 10
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
11. Bricolage - French anthropologist Lévi-Strauss, „La pensée
sauvage‟ (1962)
“doing things with whatever is at hand”
Bricolage relates with (Duymedjian & Rüling, 2010)
organizational resilience
improvisation
sensemaking
entrepreneurship
utilization of technical systems and artefacts
the bricoleur versus the engineer
AOG FEB – Jan Devos - 06/03/2012 pag. 11
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
12. Bricoleur Engineer
Everything matters A priori hierarchical order
Complex, interconnected system Reduction/decomposition
Closed universe Openness, transcending boundaries
Cyclical time Linear time
Intimate knowledge, familiarity Distant knowledge, representation
Knowledge about relationships implying a low Knowledge about structural characteristic entities
functional fixedness bias
Versatility implying resilience Specialization
Collection through unplanned encounters Search for the adequate, project-oriented means
Unclear outcomes Projects and designs
Dialogue with elements in stock (resources) Respect of prior specifications
Assemblage, substitution, …‟it‟s working‟ Evaluation through expected level of performance and
quality
Creation and use cannot be dissociated Separation of creation and use
Outcomes look unlike anything else Outcomes respond to field norms
AOG FEB – Jan Devos - 06/03/2012
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
13. Literature on Bricolage
- Seminal work in anthropology (Strauss-Levi 1962)
- Entrepreneurship (Baker et al. 2003; Garud et al. 2003; Phillips
et al. 2007)
- Innovation research (Banerjee et al. 2009; Essen 2009;
Fuglsang et al. 2011)
- Organization theory (Duymedjian et al. 2010; Weick 1998)
- Information Technology (Ciborra 2002; DesAutels 2011;
Ferneley et al. 2006; Johri 2011)
AOG FEB – Jan Devos - 06/03/2012 pag. 13
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
14. Research Question
How can the use of Bricolage facilitate
the adoption of Emergent Collectives in
an Entrepreneurial Setting?
AOG FEB – Jan Devos - 06/03/2012 pag. 14
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
15. Research Methodology
- Action Research (Design Science)
- Case Endoxa (drop shipping)
- Interpretive epistemology (Walsham, 2004)
AOG FEB – Jan Devos - 06/03/2012 pag. 15
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
16. Interpretive epistemology
- Our knowledge of reality is a social construction by
human actors
- Growing body of research stream in IS research
- Fundamental basis of an interpretive study is fieldwork
- Involved (participant, action) researcher versus outside
researcher
- Neutral observer (not necessarily unbiased)
- No consultancy
- Data collection: interviews and participant notes and reports
AOG FEB – Jan Devos - 06/03/2012 pag. 16
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
17. Interpretive epistemology
- Role of theory
- Choice of theory = subjective !
- Use of theory as a final product of the research or as a
guide for design and data collection
- Contribution and how to generalize from interpretive
studies? (Klein & Myers, 1999)
- Ways of reflecting on the existing literature and identifying
gaps
- Framing material for particular audiences
AOG FEB – Jan Devos - 06/03/2012 pag. 17
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
18. Action Research (Design Science)
(Baskerville 1999, Baskerville et al 2004)
- Two cycles of five phases (baseline,
implementation) (Street et al. 2004)
- Axial coding (Corbin et al 2008)
- Pattern mapping (Yin, 2004)
AOG FEB – Jan Devos - 06/03/2012 pag. 18
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
19. AOG FEB – Jan Devos - 06/03/2012
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
20. Client-System Infrastructure
Case Endoxa
E-business / Drop shipping / E-Supply chain
Minimal organization (Weick, 1993)
1) direct supervision,
2) strategy planned at the top,
3) little formalized behavior,
4) organic structure and
5) CEO tending to formulate plans intuitively (plans are an direct
extensions of his own personality)
Research team (PWO-project)
AOG FEB – Jan Devos - 06/03/2012 pag. 20
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
21. Endoxa
AOG FEB – Jan Devos - 06/03/2012 pag. 21
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
22. Is Bricolage a theory?
• Levi-Strauss 1962
Bricolage is an analogy to shed light on the processes underlying
mythical thinking
• Constructs of Bricolage (Duymedjian & Rüling 2010)
Repertoire (stock)
= material and immaterial resources that are collected
independently of any particular project or utilization.
Dialogue
= the activity of assembling objects
Outcome
= refers both to the process and its results (circular dynamic)
AOG FEB – Jan Devos - 06/03/2012 pag. 22
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
23. Is Bricolage a theory?
Seven oxymoron‟s as propositions (Ciborra, 2002)
• Value bricolage strategically (VBS)
• Design tinkering (DT)
• Establish systematic serendipity (ESS)
• Thrive on gradual breakthroughs (TGB)
• Unskilled Learning (UL)
• Strive for failure (SFF)
• Achieve collaborative inimitability (ACI)
AOG FEB – Jan Devos - 06/03/2012 pag. 23
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
24. Diagnosing Action Planning Action Taking Evaluating Specifying
Learning
VBS Mission BRIDEE Negative Too complex
statement
DT
ESS Twitter Hashtags Hashtags Positive
TGB Web services
PUL Wiki‟s
SFF
ACI Open „model‟
Diagnosing Action Planning Action Taking Evaluating Specifying
Learning
VBS Mission Network
statement Orchestrator
DT
ESS
TGB E-commerce Magento Modules
Front-end Apps
ERP
Back-end OpenERP
PUL Lynda.com
SFF
ACI
AOG FEB – Jan Devos - 06/03/2012
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
25. Findings
• Bricolage repertoire does exist
• OpenERP
• Magento
• Remark: no limits on repertoire
• Dialogue (action research / design science)
• Outcome: serving customers (making money)
AOG FEB – Jan Devos - 06/03/2012 pag. 25
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
26. Findings
• Value bricolage strategically (VBS)
CEO sees drop shipping as an E-Supply Ecosystem
mission statement of Endoxa
- “Alignment clicks with bricks & mortar”
- “Network Orchestrator of the complete cross e-supply chain”
• Establish systematic serendipity (ESS)
• IceCat
• Magento
• e-Air Waybill (e-AWB)
• Keep on Tweeting
AOG FEB – Jan Devos - 06/03/2012 pag. 26
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
27. Findings
• Thrive on gradual breakthroughs (TGB)
Magento
• Unskilled Learning (UL)
Training modules with Lynda.com
• Strive for failure (SFF)
• Achieve collaborative inimitability (ACI)
The process of bricolage leads to an inimitable
outcome, although the model is open
Drop shipping ecosystem
AOG FEB – Jan Devos - 06/03/2012 pag. 27
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
28. Conclusions
- RQ: Yes
- OpenERP & Magento is bricolage
- Twitter „faster than e-mail‟
- Cloud Computing: no real impact
- Wiki‟s: repertoire is not limited
- Bricolage as a theory is more developed
- The „alternative‟ way of thinking of IS in
organizations iso control thinking is gaining more
validity
AOG FEB – Jan Devos - 06/03/2012 pag. 28
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
29. Questions?
AOG FEB – Jan Devos - 06/03/2012 pag. 29
Faculteit Ingenieurswetenschappen en Architectuur – Campus West
Editor's Notes
Upper partA necessary (but not sufficient) condition for the take-off of an EC is the speed by which data can be interchanged. A speed of 15Mbps is a strict minimum. According to the IUT by 2015 entry-level broadband services should cost less than 5% of the average monthly income. In Europe 11 of 15 countries has already affordable broadband services with sometimes only 0,3% of the monthly income.Lower partNot only the speed matters but also the degree of mobility of the connection. Users do not access the Internet at a specific place (and time) but anywhere and at anytime, since they are highly mobile with their Smartphones.
The disruptive usage of Internet-related ICTs all have in common that the content is under control of the user. Even Mark Zuckerberg, founder and CEO of Facebook is now not in control of all the produced content on his platform. Although he stays in control of the whole Facebook platform; which is of course another issue to be concerned of. This makes the difference between an email system, which is merely an application and Facebook or Twitter which are social communities of people.
The spontaneous questions that comes up by most business managers is then: If we can’t control it will the absence of a centralized control mechanism than lead to anarchy and chaos? The answer is definitely no! Millions of people are using social media on a daily basis, in their job, at home and on the road. Although social media seems to have the power to change politics and government, as one could observe during the Arab spring last year, they do not aim at chaos. Chaos is merely a side-effect. And of course there are hackers who try to play their role in the piece, but their roles are extras.
This brings us to the next condition for an EC to become airborne: the customization and consumerization of IT and the BYOD (Bring Your Own Device) to the company. Users today do not depend anymore on IT only available within the boundaries of a company, but can chose to use IT anywhere, at home, at the office and on the road. Tablets, BlackBerries, iPhones, and iPads are becoming commodities at an increasing speed and are capable to support almost every possible application (apps). Access to the Internet by these devices comes in a wide variety of protocols (3G, 4G, WIFI) and at high speeds. These powerful mobile stations drives the users out of the office and out of the organization.