This document discusses values that should be embodied in information and communication technologies, including accessibility, flexibility, and visibility. It notes that putting algorithms online makes them accessible to scholars, the public, developers, journalists, and educators for analysis now and in the future. Key values that should be respected include human welfare, privacy, freedom from bias, trust, autonomy, and environmental sustainability.
The document discusses values related to information and communication technology. It addresses topics such as closed versus open source algorithms, the benefits of making algorithms accessible online, and relevant social groups that might benefit from accessibility such as scholars, the public, and developers. Key values mentioned include human welfare, ownership, privacy, freedom from bias, and environmental sustainability.
The document discusses open sharing and participation in media, culture, and technology. It encourages casting off oppressors and disseminating information to encourage participation. It also discusses tactical tools and going forth. The second part discusses case studies of physical, online, and human networks, including a blogger center, a climate change news site, and a youth empowerment organization.
Social Media Activism (SMA) is the use of web-based platforms, applications and technologies to bring about political or social change and has the power to disseminate information rapidly and globally. It has played a central role in recent worldwide movements for change.
We discuss current trends and limitations, the main players and their changing market share, and innovations in the on-line activism arena.
Traditional players like Twitter, Facebook and YouTube are now being challenged by new tools and activist specific spaces.
Security concerns have led to the creation of tools such as Pidder, Crabgrass and OTR.
SMA is not always a force for good. Users must be responsible, evaluate the veracity of information and understand the potential to propagate crime.
Ultimately, SMA can only be a part of the movement for change - it still needs brave people on the streets to challenge the status quo.
The document discusses social media activism and examines case studies to evaluate its effectiveness. It defines social media activism as using social platforms to champion causes. While some critics argue offline activism is more impactful, examples like the marriage equality referendum in Ireland found social media helped engage young voters and shift perceptions to support LGBT rights. The document also explores environmental campaigns and the Arab Spring, noting social media was effective at raising awareness but usually one catalyst among others for change. Overall, the impact of social media activism depends on how effectiveness is measured.
El documento habla sobre el embarazo en adolescentes, que generalmente ocurre en jóvenes de bajos recursos. Indica que el 19% de las adolescentes entre 13 y 19 años ya son madres y propone estrategias como promover más los métodos anticonceptivos, dar charlas en colegios y ofrecer métodos a bajos precios. Resalta la falta de información sobre la fecundidad como causa del problema y estadísticas como que una de cada cinco adolescentes de 17 años ha estado embarazada.
El documento habla sobre el embarazo en adolescentes, que generalmente ocurre en jóvenes de bajos recursos. Indica que el 19% de las adolescentes entre 13 y 19 años ya son madres y propone estrategias como promover más los métodos anticonceptivos, dar charlas en colegios y ofrecer métodos a bajos precios. Resalta que la falta de información sobre la fecundidad y educación son las causas principales del problema y que una de cada cinco adolescentes de 17 años ha estado embarazada.
The document discusses values related to information and communication technology. It addresses topics such as closed versus open source algorithms, the benefits of making algorithms accessible online, and relevant social groups that might benefit from accessibility such as scholars, the public, and developers. Key values mentioned include human welfare, ownership, privacy, freedom from bias, and environmental sustainability.
The document discusses open sharing and participation in media, culture, and technology. It encourages casting off oppressors and disseminating information to encourage participation. It also discusses tactical tools and going forth. The second part discusses case studies of physical, online, and human networks, including a blogger center, a climate change news site, and a youth empowerment organization.
Social Media Activism (SMA) is the use of web-based platforms, applications and technologies to bring about political or social change and has the power to disseminate information rapidly and globally. It has played a central role in recent worldwide movements for change.
We discuss current trends and limitations, the main players and their changing market share, and innovations in the on-line activism arena.
Traditional players like Twitter, Facebook and YouTube are now being challenged by new tools and activist specific spaces.
Security concerns have led to the creation of tools such as Pidder, Crabgrass and OTR.
SMA is not always a force for good. Users must be responsible, evaluate the veracity of information and understand the potential to propagate crime.
Ultimately, SMA can only be a part of the movement for change - it still needs brave people on the streets to challenge the status quo.
The document discusses social media activism and examines case studies to evaluate its effectiveness. It defines social media activism as using social platforms to champion causes. While some critics argue offline activism is more impactful, examples like the marriage equality referendum in Ireland found social media helped engage young voters and shift perceptions to support LGBT rights. The document also explores environmental campaigns and the Arab Spring, noting social media was effective at raising awareness but usually one catalyst among others for change. Overall, the impact of social media activism depends on how effectiveness is measured.
El documento habla sobre el embarazo en adolescentes, que generalmente ocurre en jóvenes de bajos recursos. Indica que el 19% de las adolescentes entre 13 y 19 años ya son madres y propone estrategias como promover más los métodos anticonceptivos, dar charlas en colegios y ofrecer métodos a bajos precios. Resalta la falta de información sobre la fecundidad como causa del problema y estadísticas como que una de cada cinco adolescentes de 17 años ha estado embarazada.
El documento habla sobre el embarazo en adolescentes, que generalmente ocurre en jóvenes de bajos recursos. Indica que el 19% de las adolescentes entre 13 y 19 años ya son madres y propone estrategias como promover más los métodos anticonceptivos, dar charlas en colegios y ofrecer métodos a bajos precios. Resalta que la falta de información sobre la fecundidad y educación son las causas principales del problema y que una de cada cinco adolescentes de 17 años ha estado embarazada.
The document discusses vulnerability, adaptation and resilience to climate change. It notes that climate change affects all people but impacts the poorest and most vulnerable the most. These groups have contributed the least to global warming. The document presents a community-based adaptation framework and discusses how social factors like gender, asset ownership, and access to information influence people's vulnerability. It argues for understanding and empowering vulnerable communities to adapt to climate impacts through strengthening capacities and supporting adaptation efforts at all levels.
1) The document provides a summary of a class on sustainable design and the role of NGOs and activists in bringing about positive environmental change.
2) It discusses the history of the US environmental movement from Thoreau to Rachel Carson's Silent Spring to the establishment of the EPA.
3) It also covers concepts like deep ecology, inverted quarantine, leverage points, and how consumption and political action became separated in industrial societies.
4) The class discusses ways NGOs have used campaigns to change business practices and encourages students to research the environmental impacts of specific products.
The document discusses challenges and opportunities for technology-mediated social participation. It outlines a framework with three stages of participation: readers, contributors, and collaborators/leaders. It also discusses theories of how online social networks evolve and factors that motivate different levels of participation, such as usability, sociability, and recognition features. The goal is to harness online communities to address national priorities like disaster response, health issues, education and more.
Humanitarian emergencies: searching for Open Data - OKCon2013Anahi Iacucci
While a growing conversation is happening around Open Data as a driver for development and accountability, little, if any, is being said about the role of open data in humanitarian emergencies. While we ask governments to open all their data as a duty towards their citizens, humanitarian organizations seems to be pretty much left outside. Is there a need for open data in the humanitarian community space? What would it look like? Are transparency and accountability strictly linked to the healthy recovery of communities in emergencies? This talk will look at some of those questions and try to propose some solutions, drawing from the long-standing experience that Internews has in media and communication with communities during emergencies.
This document discusses the concepts of resilience and social-ecological systems in the context of parks. It defines resilience as the ability of a system to experience shocks and stresses while retaining its basic functions, and defines social-ecological systems as integrated systems involving both human and natural elements. The document discusses how parks can increase community resilience by improving physical/green infrastructure and human health and well-being. Specific examples from New York City and Albuquerque are provided to illustrate resilience planning for parks.
NYU ITP Winter Term 2010 Seminar Course: If Products Could Tell Their Stories. Taught to students who know how to make things talk.
Class One overview.
Information dissemination and lacking of communicationProfessor5G
Role of Information Dissemination in Effective Disaster Management
Information plays an important role in empowering the personnel involved in disaster management at various levels. The personnel who need information on disaster management range from-
Health sector managers,
Epidemiologists,
Primary health care physicians,
Nurses,
Sanitary engineers,
Academicians,
Researchers,
Disaster mitigation personnel,
Social service organizations etc.
Ruth Hull, Senior Scientist, Intrinsik Inc, and member of Society of Environmental Toxicology and Chemistry (SETAC) talks about importance of transparency in risk communication at the Commission for Environmental Cooperation's (CEC) Chemicals Management Forum in San Antonio, Texas, on May 16, 2012. More at: http://www.cec.org/chemicals2012
Turning the Corner: From Cybersafety to Digital Citizenship Catherine Hainstock
This document discusses issues related to cyberbullying and digital citizenship. It summarizes research showing that cyberbullying is often exaggerated and that face-to-face bullying is a larger problem. It advocates teaching digital citizenship across 9 areas to promote positive online behaviors. The document also provides advice for adults, such as focusing on influencing social norms and not worrying about technical skills. Overall it questions common perceptions around cyberbullying and promotes a comprehensive approach to digital citizenship education.
This document summarizes research on social media privacy and security concerns. It outlines the purpose of understanding how users can better manage their social media privacy and reduce risks. Previous research showed a correlation between increased social media usage and decreased privacy concerns. The current research found that many users are concerned about privacy breaches but unaware of how to change privacy settings. It concludes that more user-friendly privacy controls and educating users on social media risks could help address these issues. It recommends enabling easy to access privacy controls for platforms and researching social media before using it.
Security Concerns With Privacy in Social MediaKenie Moses
This document summarizes research on social media privacy and security concerns. It outlines the purpose of understanding how users can better manage their social media privacy and reduce risks. Research questions ask how users can enable themselves to be better social media users and how to increase awareness of diminishing privacy protections. Results found most users concerned about privacy breaches and security but unaware of privacy settings. The conclusion is that more user-friendly privacy controls and educating users on social media research is recommended.
This document discusses promoting inclusivity and digital citizenship. It covers addressing bias, discrimination, and cyberbullying online, as well as exploring ethical and responsible digital behavior. Specifically, it provides ways to promote inclusivity such as advocating for equal access, encouraging diverse representation, and fostering a respectful online environment. It also outlines aspects of digital citizenship like being respectful, responsible, and critical online. The document emphasizes educating others on these issues through workshops, social media campaigns, and supporting related organizations to create a more inclusive and responsible digital world.
Media and information communication literacy.pptxivy buncaras
This document defines and discusses communication, its modes, parts, flows, factors affecting it, and considerations for using technology. It covers verbal, non-verbal, and written communication. The factors discussed include media, information, and technology. Qualities of technology literacy are outlined, along with the components and characteristics of responsible media users. The document also provides a timeline of media roles throughout history.
1) Big societal forces are pushing society toward networked individualism, including weaker group boundaries, suburbanization, media fragmentation, and rising personal autonomy.
2) Three major technological revolutions - the internet/broadband revolution, wireless connectivity revolution, and social networking revolution - are making news and information more pervasive, portable, personal, and participatory.
3) Social networks now play an important role at every stage of how people encounter and share news and information, changing the news dissemination and sharing environment.
Ben Sheniderman, Technology-Mediated Social ComputingAngela Brandt
This document outlines Ben Shneiderman's vision for using technology-mediated social participation to address important national priorities such as disaster response, community safety, health, energy, education, and the environment. It discusses developing theories of how social media networks evolve and increase participation. It also emphasizes providing scalable, reliable technology infrastructure that protects privacy and security. The document provides examples of using social media for various purposes and proposes developing network theories, motivating different levels of participation, and creating a shared technology infrastructure to realize the vision of social participation.
The document discusses exposure and vulnerability to natural hazards. It defines exposure as the presence of people, assets, or resources that could be affected by hazards, while vulnerability is the susceptibility to harm from stresses or lack of adaptive capacity. The Philippines has high exposure and vulnerability due to factors like frequent typhoons, earthquakes, floods, its archipelagic geography, poverty, and weak institutional capacity to manage disasters. Key vulnerable sectors include agriculture, watersheds, coastal areas, and public health.
The Next 25 Years of HCI Research: Technology-Mediated Social ParticipationUniversity of Maryland
The document discusses the next 25 years of human-computer interaction (HCI) research with a focus on technology-mediated social participation. It outlines three main goals: 1) focusing HCI research on national priorities like disaster response, health, education and more, 2) developing theories of how social media networks evolve and participation can be increased, and 3) providing scalable technology infrastructure that is reliable, universal, and protects privacy. The document provides examples of how social media is already being used to achieve important goals and envisions further applications in areas like health, energy, education, and more to help society.
This presentation was delivered at the 2012 NYTD Conference by Brittany Smith, Director of Community Management at the Children's Mental Health Network.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfleebarnesutopia
So… you want to become a Test Automation Engineer (or hire and develop one)? While there’s quite a bit of information available about important technical and tool skills to master, there’s not enough discussion around the path to becoming an effective Test Automation Engineer that knows how to add VALUE. In my experience this had led to a proliferation of engineers who are proficient with tools and building frameworks but have skill and knowledge gaps, especially in software testing, that reduce the value they deliver with test automation.
In this talk, Lee will share his lessons learned from over 30 years of working with, and mentoring, hundreds of Test Automation Engineers. Whether you’re looking to get started in test automation or just want to improve your trade, this talk will give you a solid foundation and roadmap for ensuring your test automation efforts continuously add value. This talk is equally valuable for both aspiring Test Automation Engineers and those managing them! All attendees will take away a set of key foundational knowledge and a high-level learning path for leveling up test automation skills and ensuring they add value to their organizations.
The document discusses vulnerability, adaptation and resilience to climate change. It notes that climate change affects all people but impacts the poorest and most vulnerable the most. These groups have contributed the least to global warming. The document presents a community-based adaptation framework and discusses how social factors like gender, asset ownership, and access to information influence people's vulnerability. It argues for understanding and empowering vulnerable communities to adapt to climate impacts through strengthening capacities and supporting adaptation efforts at all levels.
1) The document provides a summary of a class on sustainable design and the role of NGOs and activists in bringing about positive environmental change.
2) It discusses the history of the US environmental movement from Thoreau to Rachel Carson's Silent Spring to the establishment of the EPA.
3) It also covers concepts like deep ecology, inverted quarantine, leverage points, and how consumption and political action became separated in industrial societies.
4) The class discusses ways NGOs have used campaigns to change business practices and encourages students to research the environmental impacts of specific products.
The document discusses challenges and opportunities for technology-mediated social participation. It outlines a framework with three stages of participation: readers, contributors, and collaborators/leaders. It also discusses theories of how online social networks evolve and factors that motivate different levels of participation, such as usability, sociability, and recognition features. The goal is to harness online communities to address national priorities like disaster response, health issues, education and more.
Humanitarian emergencies: searching for Open Data - OKCon2013Anahi Iacucci
While a growing conversation is happening around Open Data as a driver for development and accountability, little, if any, is being said about the role of open data in humanitarian emergencies. While we ask governments to open all their data as a duty towards their citizens, humanitarian organizations seems to be pretty much left outside. Is there a need for open data in the humanitarian community space? What would it look like? Are transparency and accountability strictly linked to the healthy recovery of communities in emergencies? This talk will look at some of those questions and try to propose some solutions, drawing from the long-standing experience that Internews has in media and communication with communities during emergencies.
This document discusses the concepts of resilience and social-ecological systems in the context of parks. It defines resilience as the ability of a system to experience shocks and stresses while retaining its basic functions, and defines social-ecological systems as integrated systems involving both human and natural elements. The document discusses how parks can increase community resilience by improving physical/green infrastructure and human health and well-being. Specific examples from New York City and Albuquerque are provided to illustrate resilience planning for parks.
NYU ITP Winter Term 2010 Seminar Course: If Products Could Tell Their Stories. Taught to students who know how to make things talk.
Class One overview.
Information dissemination and lacking of communicationProfessor5G
Role of Information Dissemination in Effective Disaster Management
Information plays an important role in empowering the personnel involved in disaster management at various levels. The personnel who need information on disaster management range from-
Health sector managers,
Epidemiologists,
Primary health care physicians,
Nurses,
Sanitary engineers,
Academicians,
Researchers,
Disaster mitigation personnel,
Social service organizations etc.
Ruth Hull, Senior Scientist, Intrinsik Inc, and member of Society of Environmental Toxicology and Chemistry (SETAC) talks about importance of transparency in risk communication at the Commission for Environmental Cooperation's (CEC) Chemicals Management Forum in San Antonio, Texas, on May 16, 2012. More at: http://www.cec.org/chemicals2012
Turning the Corner: From Cybersafety to Digital Citizenship Catherine Hainstock
This document discusses issues related to cyberbullying and digital citizenship. It summarizes research showing that cyberbullying is often exaggerated and that face-to-face bullying is a larger problem. It advocates teaching digital citizenship across 9 areas to promote positive online behaviors. The document also provides advice for adults, such as focusing on influencing social norms and not worrying about technical skills. Overall it questions common perceptions around cyberbullying and promotes a comprehensive approach to digital citizenship education.
This document summarizes research on social media privacy and security concerns. It outlines the purpose of understanding how users can better manage their social media privacy and reduce risks. Previous research showed a correlation between increased social media usage and decreased privacy concerns. The current research found that many users are concerned about privacy breaches but unaware of how to change privacy settings. It concludes that more user-friendly privacy controls and educating users on social media risks could help address these issues. It recommends enabling easy to access privacy controls for platforms and researching social media before using it.
Security Concerns With Privacy in Social MediaKenie Moses
This document summarizes research on social media privacy and security concerns. It outlines the purpose of understanding how users can better manage their social media privacy and reduce risks. Research questions ask how users can enable themselves to be better social media users and how to increase awareness of diminishing privacy protections. Results found most users concerned about privacy breaches and security but unaware of privacy settings. The conclusion is that more user-friendly privacy controls and educating users on social media research is recommended.
This document discusses promoting inclusivity and digital citizenship. It covers addressing bias, discrimination, and cyberbullying online, as well as exploring ethical and responsible digital behavior. Specifically, it provides ways to promote inclusivity such as advocating for equal access, encouraging diverse representation, and fostering a respectful online environment. It also outlines aspects of digital citizenship like being respectful, responsible, and critical online. The document emphasizes educating others on these issues through workshops, social media campaigns, and supporting related organizations to create a more inclusive and responsible digital world.
Media and information communication literacy.pptxivy buncaras
This document defines and discusses communication, its modes, parts, flows, factors affecting it, and considerations for using technology. It covers verbal, non-verbal, and written communication. The factors discussed include media, information, and technology. Qualities of technology literacy are outlined, along with the components and characteristics of responsible media users. The document also provides a timeline of media roles throughout history.
1) Big societal forces are pushing society toward networked individualism, including weaker group boundaries, suburbanization, media fragmentation, and rising personal autonomy.
2) Three major technological revolutions - the internet/broadband revolution, wireless connectivity revolution, and social networking revolution - are making news and information more pervasive, portable, personal, and participatory.
3) Social networks now play an important role at every stage of how people encounter and share news and information, changing the news dissemination and sharing environment.
Ben Sheniderman, Technology-Mediated Social ComputingAngela Brandt
This document outlines Ben Shneiderman's vision for using technology-mediated social participation to address important national priorities such as disaster response, community safety, health, energy, education, and the environment. It discusses developing theories of how social media networks evolve and increase participation. It also emphasizes providing scalable, reliable technology infrastructure that protects privacy and security. The document provides examples of using social media for various purposes and proposes developing network theories, motivating different levels of participation, and creating a shared technology infrastructure to realize the vision of social participation.
The document discusses exposure and vulnerability to natural hazards. It defines exposure as the presence of people, assets, or resources that could be affected by hazards, while vulnerability is the susceptibility to harm from stresses or lack of adaptive capacity. The Philippines has high exposure and vulnerability due to factors like frequent typhoons, earthquakes, floods, its archipelagic geography, poverty, and weak institutional capacity to manage disasters. Key vulnerable sectors include agriculture, watersheds, coastal areas, and public health.
The Next 25 Years of HCI Research: Technology-Mediated Social ParticipationUniversity of Maryland
The document discusses the next 25 years of human-computer interaction (HCI) research with a focus on technology-mediated social participation. It outlines three main goals: 1) focusing HCI research on national priorities like disaster response, health, education and more, 2) developing theories of how social media networks evolve and participation can be increased, and 3) providing scalable technology infrastructure that is reliable, universal, and protects privacy. The document provides examples of how social media is already being used to achieve important goals and envisions further applications in areas like health, energy, education, and more to help society.
This presentation was delivered at the 2012 NYTD Conference by Brittany Smith, Director of Community Management at the Children's Mental Health Network.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfleebarnesutopia
So… you want to become a Test Automation Engineer (or hire and develop one)? While there’s quite a bit of information available about important technical and tool skills to master, there’s not enough discussion around the path to becoming an effective Test Automation Engineer that knows how to add VALUE. In my experience this had led to a proliferation of engineers who are proficient with tools and building frameworks but have skill and knowledge gaps, especially in software testing, that reduce the value they deliver with test automation.
In this talk, Lee will share his lessons learned from over 30 years of working with, and mentoring, hundreds of Test Automation Engineers. Whether you’re looking to get started in test automation or just want to improve your trade, this talk will give you a solid foundation and roadmap for ensuring your test automation efforts continuously add value. This talk is equally valuable for both aspiring Test Automation Engineers and those managing them! All attendees will take away a set of key foundational knowledge and a high-level learning path for leveling up test automation skills and ensuring they add value to their organizations.
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Ukraine
Під час доповіді відповімо на питання, навіщо потрібно підвищувати продуктивність аплікації і які є найефективніші способи для цього. А також поговоримо про те, що таке кеш, які його види бувають та, основне — як знайти performance bottleneck?
Відео та деталі заходу: https://bit.ly/45tILxj
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxSunil Jagani
Discover how AI is transforming the workplace and learn strategies for reskilling and upskilling employees to stay ahead. This comprehensive guide covers the impact of AI on jobs, essential skills for the future, and successful case studies from industry leaders. Embrace AI-driven changes, foster continuous learning, and build a future-ready workforce.
Read More - https://bit.ly/3VKly70
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Keywords: AI, Containeres, Kubernetes, Cloud Native
Event Link: https://meine.doag.org/events/cloudland/2024/agenda/#agendaId.4211
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
37. human welfare, ownership/property,
privacy, freedom from bias, universal
usability, trust, autonomy, informed
consent, accountability, courtesy,
identity, calmness, environmental
sustainability
38. human welfare, ownership/property,
privacy, freedom from bias, universal
usability, trust, autonomy, informed
consent, accountability, courtesy,
identity, calmness, environmental
sustainability
39. human welfare, ownership/property,
privacy, freedom from bias, universal
usability, trust, autonomy, informed
consent, accountability, courtesy,
identity, calmness, environmental
sustainability...reflection?
Editor's Notes
Hello.\n
P: So - the world in general is not COMPLETELY ignorant about the vagueries of autocomplete...consider: moderately popular website and now book: Whoogles...\n
K: Like Patrick, some of us (accusatory glance at Luke) might be familiar with the censorship of sexy words in autocomplete.  Indeed, the autocomplete implemented in the search bars of many popular websites seems to refuse autocompleting words that are sexually lewd or offensive.  Here, it is worth mentioning that censorship of any given word or phrase has side-effects other than perpetuating questionable ideologies. For example, though we don’t expect many users to need autocomplete to search for Nixon’s nickname or large, long-billed, blue-footed birds, there is an obvious tension in the unintended censorship of homonyms. These sort of seemingly inconsequential side-effects of censorship are worth mentioning insofar as they help expose how small changes in autocomplete have the potential to alter our perception of cyberspace and change our browsing experience.\n
P: Historically, autocompletion can be most closely linked to “tab-completion” which allows users typing in command line interfaces to have their computer finish commands after having typed only a few letters, and then hitting tab. However, the specific flavor of auto-complete that we are interested in investigating is that which resides in internet connected search bars. \n
P: The differences between a tab completion and auto-completion are significant. We’d like to highlight three different ways:\n
P: First, when you’re completing a command, you’re always completing something known. When you’re constructing a search query, it’s often the case that the ideal query is unknown.\n
P: Second, the process by which tab-completion works is pretty transparent, compared to autocompletions which are often run by proprietary commercial software.\n
P: Third, while tab-completion is local and personal, auto-completion is networked, aggregated, and public.\n
K: One goal of our project is to unveil autocorrect as a technology that has become normalized.  Throughout this project, we talked a lot about normalization... so much so that conversing about normalization actually became a normalized experience.  At some point, though, we recognized that autocorrect is only one entry in a massive array of web tech that people engage with in a particularly uncritical way.\n
K: Search Results (google vs bing)\n
K: Twitter trends (bieber vs wikileaks)\n
K: Facebook Friends (random vs intimacy)]\n
K: There is a two-part danger indicated by these examples. The first is that of normalization - in all three of these cases we can see users questioning the underlying algorithmic determination of their experiences, but then, how many more are NOT pursuing this same questioning? Secondly, the act of questioning on the part of these users makes it clear that really, because the algorithms in question are proprietary and unadvertised that really only educated speculation is possible, rather than true transparency.\n
P: So, for the purposes of our particular project, we’ve limited our investigation of autocomplete to Amazon.com For two reasons: 1. we believe that the explicit commercial nature of the site is bound to have “value” rich implications, and 2. since it’s perceived ostensibly as a store (and not a search engine) it’s been subjected to far less critical scrutiny than something like Google.\n
P: With a little bit of code, we’re able to piggyback on the slightly unorthodox manner in which Amazon delivers their own search auto-complete suggestions from one machine to another. \n
P: So we simply “enter” each letter of the alphabet, and then document the 10 suggestions that come back from amazon.\n
P: Then we’re able to correlate that data in order to get stats for everything that’s been suggested. So we know how long something has been in the “top ten.”\n\n\n
\n
KYLE DOES THIS\n
\n
\n
\n
\n
P: In addition to essentially shoving snapshots of Amazon’s past into a digital mattress, the script also has a tiny front end that allows both us (and theoretically other users) to search for information and generate different types of visualizations. (mentionworking with Hock he’s a good guy)\n
K: So why do this you might be wondering?\n
K: First, there is a value in databasing the past for future research.  If the present is never properly logged, it won’t be accessible to anybody in the future who might use this information for projects or analyses of their own.\n
K: There is also value in the online database in that it allows for a broad audience to access it.  Again, this audience might do something with it, or just engage with it in a hopefully reflective manner.\n
K: Because the algorithm that dictates the behavior of Amazon autocorrect is locked behind closed doors, we have to rely on inference to get closer and closer to discovering the algorithm.  Having a database of this size allows for us to more accurately glean that algorithm by providing an accessible but large quantity of information.\n
P: As we’ve said before, we want our database to be accessible to the general public, and visualizing data which might otherwise seem complex and crazy makes it infinitely more accessible.\n
P: By affording a wide variety of options in the representation of the data, we hope to embed our database with flexibility.  In other words, we borrowed from reflective design, and decided we wanted to make a database that was just as customizable as Amazon’s autocorrect isn’t.??\n
P: And as a final point, visibility as a whole often lends itself to easier comparisons.  By being able to understand the information from a particular visual viewpoint, the data becomes more easy to digest. ??\n
K: So, WHO cares?  Well, we hope lots of people... but especially these people...scholars, public, developers, journalists, educators, and marketers.  But of these six relevant social groups, we find three to be the most relevant-scholars, the public, and developers.\n
P: As far as scholars go, one potential “audience” for this type of work would be other contemporary researchers. Others may have far more ideas as to what analytics can be run on this type of data, but they can’t go back in time to start the archive in the past - so it pays to begin grabbing this info before all possible applications are theorized. As such, the idea of putting a more API-like interface on the front end, so that programming savvy people could leverage the data being grabbed, is an attractive prospect, and one that can scale up as the project continues.\n
K: Given the mild popularity of things like “Whoogles” and “Seriously, Google?” it’s plausible to believe that certain types of auto-complete archives (perhaps not JUST amazon) might be leveraged to produce oddball comedic content. This kind of link-bait could theoretically lead everyday internet users to a space where the naturalization of auto-completion could be debunked, but there are obviously no guarantees.\n
P: Aside from alterations to our own script, database, or visualizations, there are numerous possibilities for adding features to actual instances of auto-completion in order to combat the naturalization that is currently in place. Obviously, some measure of publication on the actual nature of the algorithms at the heart of auto-complete would be ideal, but even given that, other small changes might be positive as well.\n\n
 P: talk about this\n
K: Taking from Friedman et al, we think it’s crucial to understand which social values are most relevant to our project.  Friedman proposes 13 human values with ethical import-human welfare, ownership/property, privacy, freedom from bias, universal     usability, trust, autonomy, informed consent, accountability, courtesy, identity, calmness,  and environmental sustainability.  \n
K: While most are relevant to our project, the core values we tried to focus on are freedom from bias, autonomy, and informed consent.  This idea of informed consent hints at what we consider the central value of our project...\n
K: Borrowing from reflective design, we consider reflection to be a value in itself, especially when considering technologies such as autocomplete, which have quickly and often uncritically garnered widespread usage in our day-to-day lives.  In reflecting on reflection as a value, we realized that it has the unique potential to support other values, such as human welfare, privacy, freedom from bias, autonomy, and identity.  Basically, reflection might very well be our drive, goal, and methodology.\n In fact, we consider this value of “reflection” and reflective design in itself to have conceptually under-girded all our efforts, from the construction of the scraper tool and database to our overarching analysis of autocorrect.  \n