You want it all. But you're scared. You don't want to put on a suit and watch your soul shrivel. There is another way.
In this session, you will learn: - why you want to do this to yourself - how to get the first job (which will suck) - how to turn the first job into the next job (while still having fun) - how to get the top job (sooner than you thought you could) - and how to do it all without feeling like a corporate whore.
You want to hack the planet? You've got to start somewhere.
Now with new information on why the suffering economy is good news for you!!!
David Mortman CSO in Residence, Echelon One
Rich Mogull Securosis
Dave Maynor Founder & CTO Errata Security
Larry Pesce Pauldotcom.com
Robert "RSnake" Hansen ha.ckers.org
James "Myrcurial" Arlen
We're baaaack. Yup that's right, some of the biggest mouths in Information Security and once again, we will show you all new of security FAIL. Our panelists will demonstrate innovative hacking techniques in naked wireless networking, GPS, intranet routing, web based applications and goats.
SecTor 2008 - Security Heretic: We're Doing It WrongJames Arlen
Security Heretic: We're Doing It Wrong - James Arlen
Information and Computer Security is a multi-million dollar business. I am part of that business. And it's wrong. An industry that was started with the highest of ideals, the most pure of motives has deteriorated into a crass, commercial race-to-the-bottom. Or at least it feels that way most of the time. In this presentation, a security heretic will outline a very personal journey through the meat-grinder of the information security industry and will ask you to join in this interactive discussion and walk through some critical self-analysis, some harsh criticism, some ludicrous stories, and hopefully exact the answers you need as you work through your own crises of faith in your career in Information and Computer Security.
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
James Arlen and Tiffany Strauchs Rad
As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail with your portable device’s transmitted communications and when your image is captured by surveillance cameras. Likewise, if you Tweet or blog, you have outsourced a large portion of your memory and some of your active cognition to inorganic systems. U.S. and International laws relating to protection of intellectual property and criminal search and seizure procedures puts into question protections of these ephemeral communications and memoranda stored on your personal computing devices, in cloud computing networks, on off-shore "subpoena proof" server/jurisdiction-hopping platforms, or on social networking sites. Although once considered to be futuristic technologies, as we move our ideas and memories onto external devices or are subjected to public surveillance with technology (Future Attribute Screening Technology) that assesses pre-crime thoughts by remotely measuring biometric data such as heart rate, body temperature, pheromone responses, and respiration, where do our personal privacy rights to our thoughts end and, instead, become public expressions with lesser legal protections? Similarly, at what state does data in-transit or stored in implantable medical devices continuously connected to the Internet become searchable? In a society in which there is little differentiation remaining between self/computer, thoughts/stored memoranda, and international boundaries, a technology lawyer/computer science professor and a security professional will recommend propositions to protect your data and yourself.
HAR2009 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
James Arlen and Tiffany Rad
As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail with your portable device’s transmitted communications and when your image is captured by surveillance cameras. Likewise, if you Tweet or blog, you have outsourced a large portion of your memory and some of your active cognition to inorganic systems. U.S. and International laws relating to protection of intellectual property and criminal search and seizure procedures puts into question protections of these ephemeral communications and memoranda stored on your personal computing devices, in cloud computing networks, on off-shore "subpoena proof" server/jurisdiction-hopping platforms, or on social networking sites. Although once considered to be futuristic technologies, as we move our ideas and memories onto external devices or are subjected to public surveillance with technology (Future Attribute Screening Technology) that assesses pre-crime thoughts by remotely measuring biometric data such as heart rate, body temperature, pheromone responses, and respiration, where do our personal privacy rights to our thoughts end and, instead, become public expressions with lesser legal protections? Similarly, at what state does data in-transit or stored in implantable medical devices continuously connected to the Internet become searchable? In a society in which there is little differentiation remaining between self/computer, thoughts/stored memoranda, and international boundaries, a technology lawyer/computer science professor and a security professional will recommend propositions to protect your data and yourself.
Notacon 7 - Hacking The Future Weaponizing The Next GenerationJames Arlen
The document is a presentation titled "Hacking The Future: Weaponizing the Next Generation" given at the Notacon 7 conference in Cleveland. It introduces the four panelists - Leigh Honeywell, Tiffany Rad, Jillian Loslo, and James Arlen - and provides brief biographies of each. It then outlines the topics to be covered, including what to expect when having children, schools and learning, gender issues, and supporting young adult children.
The Last HOPE - Black Hat To A Black SuitJames Arlen
You want it all. You can see the brass ring and you want to jump for it. But you're scared. You don't want to put on a suit and watch your soul shrivel like the spot price on RAM. There is another way. In this session, you will learn: why you want to do this to yourself, how to get the first job (which will suck), how to turn the first job into the next job (while still having fun), how to get the top job (sooner than you thought you could), and how to do it all without feeling like a corporate whore. You want to hack the planet? You've got to start somewhere.
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
James Arlen and Tiffany Rad
As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail with your portable device's transmitted communications and when your image is captured by surveillance cameras. Likewise, if you Tweet or blog, you have outsourced a large portion of your memory and some of your active cognition to inorganic systems. U.S. and International laws relating to protection of intellectual property and criminal search and seizure procedures puts into question protections of these ephemeral communications and memoranda stored on your personal computing devices, in cloud computing networks, on off-shore "subpoena proof" server platforms, or on social networking sites.
Although once considered to be futuristic technologies, as we move our ideas and memories onto external devices or are subjected to public surveillance with technology (Future Attribute Screening Technology) that assesses pre-crime thoughts by remotely measuring biometric data such as heart rate, body temperature, pheromone responses, and respiration, where do our personal privacy rights to our thoughts end and, instead, become public expressions with lesser legal protections? Similarly, at what state does data in-transit or stored in implantable medical devices continuously connected to the Internet become searchable? In a society in which there is little differentiation remaining between self/computer, thoughts/stored memoranda, and international boundaries, a technology lawyer/computer science professor and a security professional will recommend propositions to protect your data and yourself.
BlackHat Europe 2010: SCADA and ICS for Security ExpertsJames Arlen
The traditional security industry has somehow decided that they are the white knights who are going to save everyone from the horror of insecure powergrids, pipelines, chemical plants, and cookie factories.
Suddenly, every consultant is an expert and every product is loudly advertising how it solves SCADA SECURITY AND COMPLIANCY ISSUES!!!
And because they don't know what the hell they're talking about - 'fake it till ya make it' doesn't work - they're making all of us look stupid.
Let's sit down for a little fireside chat and discuss all things SCADA and ICS with an eye towards increasing our knowledge to the point where we can confidently say: "I'm not an expert at everything, I can help some, may we work together on a solution?"
It's time to stop being a Cyber Idiot and start being a positive contributor. Learn some truth, look behind the curtain, bust some FUD, Oh - and make government agents have kittens. That's fun for everyone.
David Mortman CSO in Residence, Echelon One
Rich Mogull Securosis
Dave Maynor Founder & CTO Errata Security
Larry Pesce Pauldotcom.com
Robert "RSnake" Hansen ha.ckers.org
James "Myrcurial" Arlen
We're baaaack. Yup that's right, some of the biggest mouths in Information Security and once again, we will show you all new of security FAIL. Our panelists will demonstrate innovative hacking techniques in naked wireless networking, GPS, intranet routing, web based applications and goats.
SecTor 2008 - Security Heretic: We're Doing It WrongJames Arlen
Security Heretic: We're Doing It Wrong - James Arlen
Information and Computer Security is a multi-million dollar business. I am part of that business. And it's wrong. An industry that was started with the highest of ideals, the most pure of motives has deteriorated into a crass, commercial race-to-the-bottom. Or at least it feels that way most of the time. In this presentation, a security heretic will outline a very personal journey through the meat-grinder of the information security industry and will ask you to join in this interactive discussion and walk through some critical self-analysis, some harsh criticism, some ludicrous stories, and hopefully exact the answers you need as you work through your own crises of faith in your career in Information and Computer Security.
SecTor 2009 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
James Arlen and Tiffany Strauchs Rad
As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail with your portable device’s transmitted communications and when your image is captured by surveillance cameras. Likewise, if you Tweet or blog, you have outsourced a large portion of your memory and some of your active cognition to inorganic systems. U.S. and International laws relating to protection of intellectual property and criminal search and seizure procedures puts into question protections of these ephemeral communications and memoranda stored on your personal computing devices, in cloud computing networks, on off-shore "subpoena proof" server/jurisdiction-hopping platforms, or on social networking sites. Although once considered to be futuristic technologies, as we move our ideas and memories onto external devices or are subjected to public surveillance with technology (Future Attribute Screening Technology) that assesses pre-crime thoughts by remotely measuring biometric data such as heart rate, body temperature, pheromone responses, and respiration, where do our personal privacy rights to our thoughts end and, instead, become public expressions with lesser legal protections? Similarly, at what state does data in-transit or stored in implantable medical devices continuously connected to the Internet become searchable? In a society in which there is little differentiation remaining between self/computer, thoughts/stored memoranda, and international boundaries, a technology lawyer/computer science professor and a security professional will recommend propositions to protect your data and yourself.
HAR2009 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
James Arlen and Tiffany Rad
As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail with your portable device’s transmitted communications and when your image is captured by surveillance cameras. Likewise, if you Tweet or blog, you have outsourced a large portion of your memory and some of your active cognition to inorganic systems. U.S. and International laws relating to protection of intellectual property and criminal search and seizure procedures puts into question protections of these ephemeral communications and memoranda stored on your personal computing devices, in cloud computing networks, on off-shore "subpoena proof" server/jurisdiction-hopping platforms, or on social networking sites. Although once considered to be futuristic technologies, as we move our ideas and memories onto external devices or are subjected to public surveillance with technology (Future Attribute Screening Technology) that assesses pre-crime thoughts by remotely measuring biometric data such as heart rate, body temperature, pheromone responses, and respiration, where do our personal privacy rights to our thoughts end and, instead, become public expressions with lesser legal protections? Similarly, at what state does data in-transit or stored in implantable medical devices continuously connected to the Internet become searchable? In a society in which there is little differentiation remaining between self/computer, thoughts/stored memoranda, and international boundaries, a technology lawyer/computer science professor and a security professional will recommend propositions to protect your data and yourself.
Notacon 7 - Hacking The Future Weaponizing The Next GenerationJames Arlen
The document is a presentation titled "Hacking The Future: Weaponizing the Next Generation" given at the Notacon 7 conference in Cleveland. It introduces the four panelists - Leigh Honeywell, Tiffany Rad, Jillian Loslo, and James Arlen - and provides brief biographies of each. It then outlines the topics to be covered, including what to expect when having children, schools and learning, gender issues, and supporting young adult children.
The Last HOPE - Black Hat To A Black SuitJames Arlen
You want it all. You can see the brass ring and you want to jump for it. But you're scared. You don't want to put on a suit and watch your soul shrivel like the spot price on RAM. There is another way. In this session, you will learn: why you want to do this to yourself, how to get the first job (which will suck), how to turn the first job into the next job (while still having fun), how to get the top job (sooner than you thought you could), and how to do it all without feeling like a corporate whore. You want to hack the planet? You've got to start somewhere.
DEFCON17 - Your Mind: Legal Status, Rights and Securing YourselfJames Arlen
James Arlen and Tiffany Rad
As a participant in the information economy, you no longer exclusively own material originating from your organic brain; you leave a digital trail with your portable device's transmitted communications and when your image is captured by surveillance cameras. Likewise, if you Tweet or blog, you have outsourced a large portion of your memory and some of your active cognition to inorganic systems. U.S. and International laws relating to protection of intellectual property and criminal search and seizure procedures puts into question protections of these ephemeral communications and memoranda stored on your personal computing devices, in cloud computing networks, on off-shore "subpoena proof" server platforms, or on social networking sites.
Although once considered to be futuristic technologies, as we move our ideas and memories onto external devices or are subjected to public surveillance with technology (Future Attribute Screening Technology) that assesses pre-crime thoughts by remotely measuring biometric data such as heart rate, body temperature, pheromone responses, and respiration, where do our personal privacy rights to our thoughts end and, instead, become public expressions with lesser legal protections? Similarly, at what state does data in-transit or stored in implantable medical devices continuously connected to the Internet become searchable? In a society in which there is little differentiation remaining between self/computer, thoughts/stored memoranda, and international boundaries, a technology lawyer/computer science professor and a security professional will recommend propositions to protect your data and yourself.
BlackHat Europe 2010: SCADA and ICS for Security ExpertsJames Arlen
The traditional security industry has somehow decided that they are the white knights who are going to save everyone from the horror of insecure powergrids, pipelines, chemical plants, and cookie factories.
Suddenly, every consultant is an expert and every product is loudly advertising how it solves SCADA SECURITY AND COMPLIANCY ISSUES!!!
And because they don't know what the hell they're talking about - 'fake it till ya make it' doesn't work - they're making all of us look stupid.
Let's sit down for a little fireside chat and discuss all things SCADA and ICS with an eye towards increasing our knowledge to the point where we can confidently say: "I'm not an expert at everything, I can help some, may we work together on a solution?"
It's time to stop being a Cyber Idiot and start being a positive contributor. Learn some truth, look behind the curtain, bust some FUD, Oh - and make government agents have kittens. That's fun for everyone.
Fast Start Training Module - How social savvy real estate agents become, trus...Ken Brand
This is some of the material we cover in the two day module for our new team members. It's missing all the commentary, of some of the slides have videos and GIFs, but you sorta ge the idea. If I can be helpful, let me know. Ken Brand 832-797-1779.
PS. A book on some of this and much more is available in the book at Amazon.com. The title is Less Blah Blah More Ah Ha. You can check it out by clicking on this direct link: http://www.LessBlahBlah.com
This document appears to be from a conference on starting up companies. It contains multiple sections on common myths about startups, including that starting a company has no costs, that passion and a good idea are enough to raise money, and that a good idea guarantees success. It also discusses the importance of product, people, capital and resilience when starting a company and provides advice such as always hiring people better than yourself and focusing on problems rather than solutions. The document concludes by thanking the audience and providing contact information.
Angel Medinilla has over 14 years of experience in the ICT market and has been an Agile consultant for the past 4 years. In this presentation, he shares his entrepreneurial journey and provides unconventional advice for startups. Some key points include: don't stay in Spain as it's not ideal for startups, don't take money from politicians or bankers easily, pivot and change tracks as needed, focus on people and culture, and develop yourself through activities like meditation.
The document discusses designing the business experience for clients by knowing yourself, your clients, and your process. It emphasizes planning your client interactions, communications, and project processes to create a seamless experience and address any issues that may arise. The goal is to build strong relationships through empathy, listening, and attention to both big picture goals and small nuanced details throughout the entire client journey.
This document provides an overview of the work of Hellicar & Lewis, a creative agency that specializes in designing interactive installations and experiences. The document includes sections on the company's approach of creating loops between people, things, and networks; case studies of past projects in music, art, and technology; and insights from various thinkers on topics like inspiration, education, creativity, and the future of work.
The document discusses recruiting and retaining talent at startups. It emphasizes that recruiting is critical to a startup's survival. It recommends continuously recruiting through networking and involving the whole team. The ideal candidates are passionate, creative risk-takers who are smarter than the founders. Hiring involves honesty about the challenges and assessing cultural fit. Retaining talent requires an engaging work environment, transparency, flexibility, and work-life balance.
This handbook provides guidance for new employees at Valve. It discusses Valve's flat organizational structure without managers, and that employees are empowered to choose their own projects. It covers finding out about current projects by asking colleagues, and deciding what to work on by considering what will be most valuable and have the highest impact. The handbook also addresses balancing short-term and long-term goals when prioritizing work.
Everyone Can Participate - Dr Nic Williams - Railssummit Brazil 2008Dr Nic Williams
The document discusses open source projects and how everyone can participate in them. It reveals that there is no real distinction between those developing a project ("we") and outsiders ("them"), but rather that individuals play various roles within and across projects. It encourages the reader to get involved by choosing a role like contributor, tester, or documenter, and provides tips on how to start, such as learning source control, unit testing, blogging, and creating your own gems or plugins. The overarching message is that permission is not needed and the reader should not keep any secrets, but rather get involved in an open source project of their choosing.
Powerful stories are ones that lead people to change the way they think about their lives. This session will discuss the common elements found in powerful stories and will provide the hands-on, practical tips to tell a compelling story. In addition, Telling Powerful Stories Online will look at effective ways to harness the power of the social web to not only share your story, but to engage people and get them ready to take action!
Attendees Will Walk Away With:
• The common elements found in powerful stories
• Hands-on, practical tips to make stories compelling
• How to translate stories for the social web
Jaime Woo
Jaime works with nonprofit and community organizations such as Toronto Community Foundation, the Canadian Lesbian and Gay Archives, and Pride Toronto to share their stories. His writing on the impact of technology and social media has been featured in Torontoist, Xtra, Financial Post, and The Mark News.
Author of twelve books, professional speaker, award-winning blogger and entrepreneur Scott Ginsberg presents at the Unigroup 2011 Conference on how to become an approachable move coordinator!
First presented at the Manchester WordPress User Group on 16th May 2012.
Outlines what a workflow is, why it's important to have one, explains what mine is. Actual presentation had a live demo. (This is the KeyNote presentation rather than a flat PDF)
20 Copywriting Disasters (and how to avoid them)Ian Lurie
We've all made them: Those copywriting mistakes that leave us hanging our heads in shame 10 years later. I've made every single one.
So, benefit from my pain. This presentation goes through my top 20 mistakes (plus a bonus), and how you can avoid them.
This document is a handbook for new employees at Valve that outlines the company's unique structure and culture. It discusses that Valve is self-funded, owns its intellectual property, and has a flat, non-hierarchical structure where employees can work on projects they choose. The handbook provides guidance for new hires on navigating their first day, month, and six months at Valve by choosing projects, getting feedback from peers, and focusing on growth over formal roles or titles. It emphasizes that hiring and bringing in talented people is extremely important to Valve's continued success.
This document is a handbook for new employees at Valve that provides guidance on settling into the company. It explains that Valve has a flat, non-hierarchical structure where employees choose their own projects. It advises new employees to find out about current projects by asking colleagues and to consider both short and long-term goals when deciding what to work on. The handbook emphasizes that employees have autonomy and responsibility to prioritize projects that will benefit customers.
This document is a handbook for new employees at Valve, a video game company. It provides an overview of Valve's unique flat organizational structure, where employees choose their own projects and there is no traditional management. It discusses how employees should determine what projects to work on by finding areas where they can add the most value. It also covers peer reviews and performance evaluations at Valve. The overall goal is to help new employees understand Valve's non-hierarchical culture and feel empowered to contribute in a meaningful way.
This document is a handbook for new employees at Valve, a video game company. It provides an overview of Valve's unique flat organizational structure, where employees choose their own projects and there are no managers. It discusses how employees should determine what projects to work on by finding areas where they can add the most value. It also covers peer reviews and compensation at Valve. The overall goal is to help new employees understand Valve's non-traditional approach and feel empowered to contribute in a way that best uses their skills.
This document is a handbook for new employees at Valve that provides guidance on settling into the company. It explains that Valve has a flat, non-hierarchical structure where employees choose their own projects. It advises new employees to find out about current projects by asking colleagues and to consider both short and long-term goals when deciding what to work on. The handbook emphasizes that employees have autonomy and responsibility to prioritize projects that will benefit customers.
This document is a handbook for new employees at Valve, a video game company. It provides an overview of Valve's unique flat organizational structure, where employees choose their own projects and there are no managers. It discusses how employees should determine what projects to work on by finding areas where they can add the most value. It also covers peer reviews and compensation at Valve. The overall goal is to help new employees understand Valve's non-traditional approach and feel empowered to contribute in a way that best uses their skills.
This document is a handbook for new employees at Valve that outlines the company's unique structure and culture. It discusses that Valve is self-funded, owns its intellectual property, and has a flat, non-hierarchical structure where employees can work on projects they choose. The handbook provides guidance for new hires on navigating their first day, month, and six months at Valve by choosing projects, getting feedback from peers, and focusing on growth over formal roles or titles. It emphasizes that hiring and bringing in talented people is extremely important to Valve's continued success.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
More Related Content
Similar to Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now
Fast Start Training Module - How social savvy real estate agents become, trus...Ken Brand
This is some of the material we cover in the two day module for our new team members. It's missing all the commentary, of some of the slides have videos and GIFs, but you sorta ge the idea. If I can be helpful, let me know. Ken Brand 832-797-1779.
PS. A book on some of this and much more is available in the book at Amazon.com. The title is Less Blah Blah More Ah Ha. You can check it out by clicking on this direct link: http://www.LessBlahBlah.com
This document appears to be from a conference on starting up companies. It contains multiple sections on common myths about startups, including that starting a company has no costs, that passion and a good idea are enough to raise money, and that a good idea guarantees success. It also discusses the importance of product, people, capital and resilience when starting a company and provides advice such as always hiring people better than yourself and focusing on problems rather than solutions. The document concludes by thanking the audience and providing contact information.
Angel Medinilla has over 14 years of experience in the ICT market and has been an Agile consultant for the past 4 years. In this presentation, he shares his entrepreneurial journey and provides unconventional advice for startups. Some key points include: don't stay in Spain as it's not ideal for startups, don't take money from politicians or bankers easily, pivot and change tracks as needed, focus on people and culture, and develop yourself through activities like meditation.
The document discusses designing the business experience for clients by knowing yourself, your clients, and your process. It emphasizes planning your client interactions, communications, and project processes to create a seamless experience and address any issues that may arise. The goal is to build strong relationships through empathy, listening, and attention to both big picture goals and small nuanced details throughout the entire client journey.
This document provides an overview of the work of Hellicar & Lewis, a creative agency that specializes in designing interactive installations and experiences. The document includes sections on the company's approach of creating loops between people, things, and networks; case studies of past projects in music, art, and technology; and insights from various thinkers on topics like inspiration, education, creativity, and the future of work.
The document discusses recruiting and retaining talent at startups. It emphasizes that recruiting is critical to a startup's survival. It recommends continuously recruiting through networking and involving the whole team. The ideal candidates are passionate, creative risk-takers who are smarter than the founders. Hiring involves honesty about the challenges and assessing cultural fit. Retaining talent requires an engaging work environment, transparency, flexibility, and work-life balance.
This handbook provides guidance for new employees at Valve. It discusses Valve's flat organizational structure without managers, and that employees are empowered to choose their own projects. It covers finding out about current projects by asking colleagues, and deciding what to work on by considering what will be most valuable and have the highest impact. The handbook also addresses balancing short-term and long-term goals when prioritizing work.
Everyone Can Participate - Dr Nic Williams - Railssummit Brazil 2008Dr Nic Williams
The document discusses open source projects and how everyone can participate in them. It reveals that there is no real distinction between those developing a project ("we") and outsiders ("them"), but rather that individuals play various roles within and across projects. It encourages the reader to get involved by choosing a role like contributor, tester, or documenter, and provides tips on how to start, such as learning source control, unit testing, blogging, and creating your own gems or plugins. The overarching message is that permission is not needed and the reader should not keep any secrets, but rather get involved in an open source project of their choosing.
Powerful stories are ones that lead people to change the way they think about their lives. This session will discuss the common elements found in powerful stories and will provide the hands-on, practical tips to tell a compelling story. In addition, Telling Powerful Stories Online will look at effective ways to harness the power of the social web to not only share your story, but to engage people and get them ready to take action!
Attendees Will Walk Away With:
• The common elements found in powerful stories
• Hands-on, practical tips to make stories compelling
• How to translate stories for the social web
Jaime Woo
Jaime works with nonprofit and community organizations such as Toronto Community Foundation, the Canadian Lesbian and Gay Archives, and Pride Toronto to share their stories. His writing on the impact of technology and social media has been featured in Torontoist, Xtra, Financial Post, and The Mark News.
Author of twelve books, professional speaker, award-winning blogger and entrepreneur Scott Ginsberg presents at the Unigroup 2011 Conference on how to become an approachable move coordinator!
First presented at the Manchester WordPress User Group on 16th May 2012.
Outlines what a workflow is, why it's important to have one, explains what mine is. Actual presentation had a live demo. (This is the KeyNote presentation rather than a flat PDF)
20 Copywriting Disasters (and how to avoid them)Ian Lurie
We've all made them: Those copywriting mistakes that leave us hanging our heads in shame 10 years later. I've made every single one.
So, benefit from my pain. This presentation goes through my top 20 mistakes (plus a bonus), and how you can avoid them.
This document is a handbook for new employees at Valve that outlines the company's unique structure and culture. It discusses that Valve is self-funded, owns its intellectual property, and has a flat, non-hierarchical structure where employees can work on projects they choose. The handbook provides guidance for new hires on navigating their first day, month, and six months at Valve by choosing projects, getting feedback from peers, and focusing on growth over formal roles or titles. It emphasizes that hiring and bringing in talented people is extremely important to Valve's continued success.
This document is a handbook for new employees at Valve that provides guidance on settling into the company. It explains that Valve has a flat, non-hierarchical structure where employees choose their own projects. It advises new employees to find out about current projects by asking colleagues and to consider both short and long-term goals when deciding what to work on. The handbook emphasizes that employees have autonomy and responsibility to prioritize projects that will benefit customers.
This document is a handbook for new employees at Valve, a video game company. It provides an overview of Valve's unique flat organizational structure, where employees choose their own projects and there is no traditional management. It discusses how employees should determine what projects to work on by finding areas where they can add the most value. It also covers peer reviews and performance evaluations at Valve. The overall goal is to help new employees understand Valve's non-hierarchical culture and feel empowered to contribute in a meaningful way.
This document is a handbook for new employees at Valve, a video game company. It provides an overview of Valve's unique flat organizational structure, where employees choose their own projects and there are no managers. It discusses how employees should determine what projects to work on by finding areas where they can add the most value. It also covers peer reviews and compensation at Valve. The overall goal is to help new employees understand Valve's non-traditional approach and feel empowered to contribute in a way that best uses their skills.
This document is a handbook for new employees at Valve that provides guidance on settling into the company. It explains that Valve has a flat, non-hierarchical structure where employees choose their own projects. It advises new employees to find out about current projects by asking colleagues and to consider both short and long-term goals when deciding what to work on. The handbook emphasizes that employees have autonomy and responsibility to prioritize projects that will benefit customers.
This document is a handbook for new employees at Valve, a video game company. It provides an overview of Valve's unique flat organizational structure, where employees choose their own projects and there are no managers. It discusses how employees should determine what projects to work on by finding areas where they can add the most value. It also covers peer reviews and compensation at Valve. The overall goal is to help new employees understand Valve's non-traditional approach and feel empowered to contribute in a way that best uses their skills.
This document is a handbook for new employees at Valve that outlines the company's unique structure and culture. It discusses that Valve is self-funded, owns its intellectual property, and has a flat, non-hierarchical structure where employees can work on projects they choose. The handbook provides guidance for new hires on navigating their first day, month, and six months at Valve by choosing projects, getting feedback from peers, and focusing on growth over formal roles or titles. It emphasizes that hiring and bringing in talented people is extremely important to Valve's continued success.
Similar to Black Hat To A Notacon 6 - Black Suit: Econopocalypse Now (20)
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
155. It’s time to invest in “Me, Inc.”
Increase your education
155
155
156. It’s time to invest in “Me, Inc.”
Increase your education
-Especially adjacently to infosec
156
156
157. It’s time to invest in “Me, Inc.”
Increase your education
-Especially adjacently to infosec
Spend time networking
157
157
158. It’s time to invest in “Me, Inc.”
Increase your education
-Especially adjacently to infosec
Spend time networking
-Remember that you may end up working
for just about anyone – keep
relationships strong.
158
158
159. Don’t forget the most interesting part of
Information Security.
It’s all about control.
159
159
165. While there may be a reduction in the number
of people working FOR the security industry,
there will not be a reduction in the number
of security practitioners working IN other
industries
165
165
166. Don’t get me going about
“the security industry.”
166
166
169. Credits, Links and Notices.
Me:
http://myrcurial.com and
http://www.linkedin.com/in/jamesarlen
and sometimes
ttp://liquidmatrix.org/blog
h
Thanks: My Family, Friends, and the Notacon Awesome
Bastards
Inspiration: coffee, my lovely wife and hackerish
children, Strattera, Club Mate, Information
Society, NIN, altruism.
http://creativecommons.org/licenses/by-nc-sa/2.5/ca/
169
169