Democracy 2.0 - What can lawmakers learn from lean software development?Plural (think tank)
Can lean software development techniques (such as Scrum, Test-driven development, and UX-driven design) both increase government effectiveness and improve citizen engagement?
Anecdotal claims that Twitter is used for professional learning inspired this Doctoral research. This presentation describes how I interviewed professionals working in higher education about how they used Twitter for learning. Interestingly a number of barriers for professionals use of Twitter arose and are highlighted here.
Echo chambers (and Filter Bubbles) in Media and Social NetworksPlural (think tank)
Our perception of reality - and of the choices that we have in life - has always been influenced by our surroundings: education, friends, favourite newspaper, Facebook feed etc. On the one hand this allows us to live our values among like-minded people but on the other, it can oversimplify reality and deceive us.
An echo chamber is a group situation where information, ideas and beliefs are amplified or reinforced by transmission and repetition, while different or competing views are censored, disallowed or otherwise under-represented.
This slideshow is summarising pros and cons of Echo Chambers and Filter Bubbles in Media and Social Networks.
Democracy 2.0 - What can lawmakers learn from lean software development?Plural (think tank)
Can lean software development techniques (such as Scrum, Test-driven development, and UX-driven design) both increase government effectiveness and improve citizen engagement?
Anecdotal claims that Twitter is used for professional learning inspired this Doctoral research. This presentation describes how I interviewed professionals working in higher education about how they used Twitter for learning. Interestingly a number of barriers for professionals use of Twitter arose and are highlighted here.
Echo chambers (and Filter Bubbles) in Media and Social NetworksPlural (think tank)
Our perception of reality - and of the choices that we have in life - has always been influenced by our surroundings: education, friends, favourite newspaper, Facebook feed etc. On the one hand this allows us to live our values among like-minded people but on the other, it can oversimplify reality and deceive us.
An echo chamber is a group situation where information, ideas and beliefs are amplified or reinforced by transmission and repetition, while different or competing views are censored, disallowed or otherwise under-represented.
This slideshow is summarising pros and cons of Echo Chambers and Filter Bubbles in Media and Social Networks.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
This article is all about what AI trends will emerge in the field of creative operations in 2024. All the marketers and brand builders should be aware of these trends for their further use and save themselves some time!
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Back to basics
1. back to basics
www.webshell.it twitter.com/paolopolce
mercoledì 23 novembre 11
2. back to basics
no matter how good your software development
process is, you will still have to write some code
at some point.
twitter.com/paolopolce
mercoledì 23 novembre 11
3. Writing Software Is Engineering
twitter.com/paolopolce
mercoledì 23 novembre 11
5. Writing Software Is Engineering
• Engineering components are real, while
software is not.
• Interactions are more predictable in
engineering.
• Software is required to change during
development.
• There has always been the attempt to carry
out software projects as if they were
engineering products. But it never worked.
twitter.com/paolopolce
mercoledì 23 novembre 11
6. Bad news.
Programming is not engineering.
twitter.com/paolopolce
mercoledì 23 novembre 11
8. Writing Software Is Science
• The scientific method is “a method of procedure
that has characterized natural science since the 17th
century, consisting in systematic observation,
measurement, and experiment, and the formulation,
testing, and modification of hypotheses”
twitter.com/paolopolce
mercoledì 23 novembre 11
9. Writing Software Is Science
• The scientific method is “a method of procedure
that has characterized natural science since the 17th
century, consisting in systematic observation,
measurement, and experiment, and the formulation,
testing, and modification of hypotheses”
debug driven design?
twitter.com/paolopolce
mercoledì 23 novembre 11
11. Writing Software Is Art
• In fact, as in film,
music, sculpture,
painting and all the
other arts... software
is...
twitter.com/paolopolce
mercoledì 23 novembre 11
12. Writing Software Is Art
Men
Women
• In fact, as in film,
90
music, sculpture, 67,5
painting and all the
45
other arts... software
is... 22,5
0
2011
equally distributed between men and women
twitter.com/paolopolce
mercoledì 23 novembre 11
13. Very disappointing.
Programming is either not an art, or is not perceived as such.
twitter.com/paolopolce
mercoledì 23 novembre 11
14. There is no “Book”.
Programming sits somewhere between engineering, science
and art. Do not expect to find “The Book” that makes
everything clear about software.
twitter.com/paolopolce
mercoledì 23 novembre 11
15. Who writes software?
I have met software architects, software analystis, even
software evangelists and then... resources!
twitter.com/paolopolce
mercoledì 23 novembre 11
17. Do lots of deliberate practice
(J. Jagger “97 things every programmer should Know”)
Athletes know the difference between training and performing.
twitter.com/paolopolce
mercoledì 23 novembre 11
19. Story #1 - News Aggregator
• as a user I want a NewsAggregator
that shows me news of my interest so
that I can read something, rather than
having to listen to this very boring
keynote.
twitter.com/paolopolce
mercoledì 23 novembre 11
20. Story #1 - News Aggregator
design
• a NewsAggregator is something that
• receives user input in some way
• fetches the news somehow... ???
• displays the news somewhere ???
???
twitter.com/paolopolce
mercoledì 23 novembre 11
21. Story #1 - News Aggregator
design
• are we supposed to write a
NewsAggregator without knowing how
it will get the news and how it will show
them to us !?
Yes, we are.
twitter.com/paolopolce
mercoledì 23 novembre 11
22. Story #1 - News Aggregator
signature candidates...
public class NewsAggregator {
public ????? show(String searchQuery) {...}
}
twitter.com/paolopolce
mercoledì 23 novembre 11
23. Story #1 - News Aggregator
signature candidates...
public class NewsAggregator {
public List<News> show(String searchQuery) {...}
}
we tend to add useless getters only to be able to test our object via assertions
on its internal state (i.e. the collection of news). But we are not supposed to access
an object’s internals.
Getters (and Setters) break the most important OOP principle: Encapsulation.
List<News> is only a data container and is allowed to have a getter ;).
But NewsAggregator is not a value object.
twitter.com/paolopolce
mercoledì 23 novembre 11
24. Story #1 - News Aggregator
signature candidates...
public class NewsAggregator {
public void show(String searchQuery) {...}
}
... but how do we test it, now ?!
Tip: replace the word “method” with “message”.
rather than saying “call the method Show() on the NewsAggregator”, we will say “send the message
Show() to the object NewsAggregator”.
twitter.com/paolopolce
mercoledì 23 novembre 11
25. Story #1 - News Aggregator
testing without accessing the state...
Following the Single Responsibility Principle, we don’t want our object to do all
the work. Instead, we ask the NewsAggregator to collaborate with other two
objects: a NewsFetcher and a Display.
note: I don’t generally
prefix interfaces with the
Create two empty interfaces. “I”, especially in Java.
public interface INewsFetcher {}
public interface IDisplay {}
Update the signature.
public class NewsAggregator {
public void show(String searchQuery,
INewsFetcher newsFetcher,
IDisplay anOutputDisplay) {...}
}
twitter.com/paolopolce
mercoledì 23 novembre 11
26. Story #1 - News Aggregator
testing without accessing the state...
So far, we haven’t written any working code. We have only established that our
NewsAggregator should work with a NewsFetcher and a Display which we have
not written yet. And we are not going to!
We’ll keep our focus on the NewsAggregator and “mock out” the two
collaborators.
public class NewsAggregatorTest {
...
public void setUp() throws Exception {
m_context = new Mockery();
m_mockDisplay = m_context.mock(IDisplay.class);
m_mockNewsFetcher = m_context.mock(INewsFetcher.class);
}
}
twitter.com/paolopolce
mercoledì 23 novembre 11
27. Story #1 - News Aggregator
testing without accessing the state...
@Test
public void testNewsAggregator() {
final List<News> fakeNews = new Vector<News>();
fakeNews.add(new News("a news"));
fakeNews.add(new News("some other news"));
m_context.checking(new Expectations() {
{
oneOf(m_mockNewsFetcher).fetch("conferences");
will(returnValue(fakeNews));
exactly(2).of(m_mockDisplay).display(with(any(News.class)));
}
});
NewsAggregator newsAggregator = new NewsAggregator();
newsAggregator.show("conferences", m_mockNewsFetcher, m_mockDisplay);
}
twitter.com/paolopolce
mercoledì 23 novembre 11
28. Story #1 - News Aggregator
testing without accessing the state...
There is still no need to implement any of the
collaborators. We only provide them with the signatures
needed for the test.
public interface IDisplay {
void display(News notizia);
}
public interface INewsFetcher {
List<News> fetch(String queryString);
}
twitter.com/paolopolce
mercoledì 23 novembre 11
29. Story #1 - News Aggregator
public class NewsAggregator {
public void show(String searchQuery,
INewsFetcher newsFetcher,
IDisplay anOutputDisplay) {
List<News> someNews = newsFetcher.fetch(searchQuery);
for (News aNews : someNews) {
anOutputDisplay.display(aNews);
}
}
}
twitter.com/paolopolce
mercoledì 23 novembre 11
30. Story #1 - News Aggregator
keep the focus!
• The nice thing about the MockObjects
technique is that it lets you focus on what you
are testing.
• We don’t know how the NewsFetcher or the
Display will be implemented. And we actually
don’t care. What we do know is that once the
collaborators will be available, our
NewsAggregator will work.
twitter.com/paolopolce
mercoledì 23 novembre 11
31. Story #1 - News Aggregator
best practices with mockobjects
• do not Mock value objects
• It’s very bad and useless.
• do not Mock classes.
• It’s a code smell you can easily avoid.
• avoid retro-fitting mocks into existing tests.
• only mock interfaces.
twitter.com/paolopolce
mercoledì 23 novembre 11
32. Story #1 - News Aggregator
refactoring
public class NewsAggregator {
public void show(String searchQuery,
INewsFetcher newsFetcher,
IDisplay anOutputDisplay) {...}
}
move const dependencies
to the constructor
public class NewsAggregator {
public NewsAggregator(INewsFetcher newsFetcher, IDisplay aDisplay) {...}
public void show(String searchQuery) {...}
}
twitter.com/paolopolce
mercoledì 23 novembre 11
33. Story #1 - News Aggregator
typical usage
constructor injection
NewsAggregator aggregator =
new NewsAggregator(
new GoogleNewsAggregator(),
new ConsoleDisplay());
aggregator.show("sport");
twitter.com/paolopolce
mercoledì 23 novembre 11
35. Story #1 - News Aggregator
go patterns go!
GoogleNewsFetcher() YahooNewsFetcher() BingNewsFetcher()
CompositeNewsFetcher(G,Y, B)
NoDuplicatesDecoratorNewsFetcher(C)
new NewsAggregator( NoDupes, new ConsoleDisplay())
twitter.com/paolopolce
mercoledì 23 novembre 11
36. Story #1 - News Aggregator
go patterns go!
GoogleNewsFetcher() YahooNewsFetcher() CompositeNewsFetcher
BingNewsFetcher()
List<News> fetch(String query)
{
CompositeNewsFetcher(G,Y, B) gNews = m_googleFetcher.fetch(query);
yNews = m_yahooFetcher.fetch(query);
bNews = m_bingFetcher.fetch(query);
return g + y + b;
NoDuplicatesDecorator NewsFetcher }(C)
new NewsAggregator( NoDupes, new ConsoleDisplay())
twitter.com/paolopolce
mercoledì 23 novembre 11
37. Story #1 - News Aggregator
go patterns go!
GoogleNewsFetcher() YahooNewsFetcher() BingNewsFetcher()
CompositeNewsFetcher(G,Y, B)
NoDuplicatesDecoratorNewsFetcher(C)
new NewsAggregator( NoDupes, new ConsoleDisplay())
twitter.com/paolopolce
mercoledì 23 novembre 11
38. Story #1 - News Aggregator
go patterns go!
GoogleNewsFetcher() YahooNewsFetcher() BingNewsFetcher()
NoDupesDecoratorNewsFetcher
List<News> fetch(String query)
{
Composite (G,Y, B)
someNews = m_Fetcher.fetch(query);
NewsFetcher
return removeDuplicates(someNews);
}
NoDuplicatesDecoratorNewsFetcher(C)
new NewsAggregator( NoDupes, new ConsoleDisplay())
twitter.com/paolopolce
mercoledì 23 novembre 11
39. Story #1 - News Aggregator
go patterns go!
GoogleNewsFetcher() YahooNewsFetcher() BingNewsFetcher()
CompositeNewsFetcher(G,Y, B)
NoDuplicatesDecoratorNewsFetcher(C)
new NewsAggregator( NoDupes, new ConsoleDisplay())
twitter.com/paolopolce
mercoledì 23 novembre 11
40. Getters vs Messages
The Concert
twitter.com/paolopolce
mercoledì 23 novembre 11
41. Push your design, try to:
• remove getters
• remove singletons, or at least move them to the constructor,
and use them as a service locator
• remove train wrecks
• refactor as you go.
• split responsibility as soon as your method reaches 5 or 10
lines of code.
• do not make your tests more complicated than the actual
code, or you will have to test the tests.
twitter.com/paolopolce
mercoledì 23 novembre 11
42. Push your design, try to:
• don’t be skeptical!
• learn new stuff.You haven’t finished yet. No one has.
• make your code a pleasant place to live in (see Richard Gabriel’s “code
habitability”)
twitter.com/paolopolce
mercoledì 23 novembre 11
43. Credits
• mock roles, not objects (Mackinnon/Freeman/Pryce/Walnes)
• http://www.jmock.org/oopsla2004.pdf
• 97 things every programmer should know (K. Henney et al.)
• http://www.amazon.com/Things-Every-Programmer-Should-Know/dp/0596809484
• why writing software is not like engineering (T. Parr)
• http://www.cs.usfca.edu/~parrt/doc/software-not-engineering.html
twitter.com/paolopolce
mercoledì 23 novembre 11