This document summarizes a meeting of the C-ENERGY + project, which aims to connect National Contact Points for energy research. The 3-day meeting had over 25 participants and included:
1) Presentations on the project's activities and goals for further cooperation.
2) Breakout groups to discuss obstacles and success factors for the network, identifying things like involvement, communication, and budgets.
3) Roundtable discussions and action planning around communication, training, and networking activities. This included using the CORDIS partner search tool and a workshop in 2012.
4) Assigning reporters and deadlines to coordinate implementing the agreed upon actions from the meeting. The next meeting was scheduled for the end
Top Five Challenges to Delivering Relevant ContentSalesEngine
Content is the number one failure point of demand generation programs. In this webinar Paul Rafferty, CEO of Sales Engine International, covers the top five challenges to delivering relevant content. The presentation includes best practices on: defining your message, developing a content strategy, building an editorial calendar, segmenting for targeted content, utilizing resources for outbound campaigns, and using content for social media.
Top Five Challenges to Delivering Relevant ContentSalesEngine
Content is the number one failure point of demand generation programs. In this webinar Paul Rafferty, CEO of Sales Engine International, covers the top five challenges to delivering relevant content. The presentation includes best practices on: defining your message, developing a content strategy, building an editorial calendar, segmenting for targeted content, utilizing resources for outbound campaigns, and using content for social media.
Social innovation research on coworking clusters
Develops a new model of entrepreneurship and social innovation by favouring cooperation and operational bridging between public actors, universities, training centres and "mainstream" clusters together with civil society.
Cluster Managers have expressed their interest in innovative tools that bundle knowledge and is continuously updated. To meet their demands, MFG has implemented an interactive Cluster Manual based on the Wiki principle. The Cluster Manual gives cluster newbies a ‘basic’ guideline and offers cluster managers an in-depth source for every aspect of cluster issues. Additionally, it documents success stories and best practice examples to build up a repository of internal generated knowledge (‘learn from the best’), gives an overview of the most important literature in the area of Cluster Management and combines all this with the knowledge of experts.
www.FITT-for-Innovation.eu
Presented by Iddo Dror and Zelalem Lema at the CGIAR Research Program on the Humidtropics Capacity Development Workshop, Nairobi, Kenya, 29 April–2 May 2014
ECEEE summer study 2011 presentation on using social media to promote energy efficiency research in New Zealand. Panel 8 - Dynamics of Consumption (which I co-led with Michael Ornetzeder)
Katerina Zourou - Web2Learn - KA2 network Language Learning and Social media:...Web2LLP
Third session of the Web2LLP pilot for the online training course on web strategies and maximising the social media presence of Lifelong Learning Projects.
Topic: KA2 network Language Learning and Social media - 6 key dialogues
Author: Katerina Zourou
Website: web2llp.eu/training/pilot-online-session-3-management-impact
Social innovation research on coworking clusters
Develops a new model of entrepreneurship and social innovation by favouring cooperation and operational bridging between public actors, universities, training centres and "mainstream" clusters together with civil society.
Cluster Managers have expressed their interest in innovative tools that bundle knowledge and is continuously updated. To meet their demands, MFG has implemented an interactive Cluster Manual based on the Wiki principle. The Cluster Manual gives cluster newbies a ‘basic’ guideline and offers cluster managers an in-depth source for every aspect of cluster issues. Additionally, it documents success stories and best practice examples to build up a repository of internal generated knowledge (‘learn from the best’), gives an overview of the most important literature in the area of Cluster Management and combines all this with the knowledge of experts.
www.FITT-for-Innovation.eu
Presented by Iddo Dror and Zelalem Lema at the CGIAR Research Program on the Humidtropics Capacity Development Workshop, Nairobi, Kenya, 29 April–2 May 2014
ECEEE summer study 2011 presentation on using social media to promote energy efficiency research in New Zealand. Panel 8 - Dynamics of Consumption (which I co-led with Michael Ornetzeder)
Katerina Zourou - Web2Learn - KA2 network Language Learning and Social media:...Web2LLP
Third session of the Web2LLP pilot for the online training course on web strategies and maximising the social media presence of Lifelong Learning Projects.
Topic: KA2 network Language Learning and Social media - 6 key dialogues
Author: Katerina Zourou
Website: web2llp.eu/training/pilot-online-session-3-management-impact
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
When stars align: studies in data quality, knowledge graphs, and machine lear...
c-Energy+
1. Project no: 241325
Project acronym: C-ENERGY +
Project title: Connecting Energy NCPs Plus
A Pro-Active Network of National Contact Points in the Seventh Framework Programme under the
Energy Theme
Funding scheme: Coordination Action
Programme: FP7 Energy
Deliverable 1.1 Meeting report
Due date of deliverable: Month 12
Actual submission date: Month 15
Start date of project: May 1st, 2010
Duration: 3 years
Organisation name of lead contractor for this deliverable:
Partner 1, APRE
Dissemination level of this deliverable:
Confidential
3. Introduction
The meeting took place in the Permanent Representation of Estonia where a room was dedicated. Between
25 and 30 representatives of the Energy NCPs took part in the meeting.
The objectives of the meeting were:
• Review of the activities of the C-Energy + project
• Reflection and first steps for the next actions
• Reinforcement of the network dynamic
Euracle conceived and structure the meeting with modules easing the cooperation between participants and
enabling the cross-pollination.
Euracle provided APRE with the following documents issued from discussion with APRE representatives:
• Agenda,
• Presentation
• Follow up sheet
The meeting took place from 10.00 to 18.00 on July 6, 2011.
II. Agenda
Timing Session
10.00 – 10.15 1. Welcome by EC and Apre
Welcome by the EC – Martin Huemer and Apre – Chiara Pocaterra
10.15 – 10.45 2. Introduction
Description of the meeting development; objectives included
10.45 – 11.15 3. Activity report presentation
Main activities undertaken in previous years described by Apre
Presentation by Chiara Pocaterra
11.15 – 11.30 4. Icebreaker: Let’s investigate
Icebreaker based on the search of personal properties of the participants – 8
questions to answer!
11.30 – 11.45 5. Coffee break
11.45 – 13.00 6. Awareness of the network
The objective is to get the participants aware of the importance of the network
for their activities and to identify what could be the obstacles and success
factors to the development of the network. The participants are grouped into
subgroups of 4 persons.
3 steps are used here:
1. Presentation: the participants present themselves and inform
the 3 other participants on their objectives towards this meeting
2. Obstacles: participants list the serious obstacles that may
destroy the network. Reporting of the obstacles!
3. Successes: participants list the crucial success factors to
ensure the success of the network. Reporting of the success
factors!
The idea here is to make aware the participants of the importance of their
contribution to ensure the success of the network and then of the project. The
information will remain available to the participants for the rest of the day. It will
4. Timing Session
be also used in the round tables module!
13.00 – 14.00 7. Lunch
14.00– 14.45 8. Round table discussions
The discussion during the round tables will be based on the results of module 6
(meaning of the network) and should allow the participants to find possible
solutions to the obstacles that can jeopardise the operations of the network. It
will be also an occasion to share ideas in order to reach the success factors.
14.45 – 15.15 9. Reporting on Round table discussions
The work package leader will report the main highlights of the round table
discussions.
15.15 – 15.30 10. Coffee break
15.30 – 16.45 11. Action plans
Based on the action plans of C Energy +, the participants will be split in
subgroups to define the action plans with the following information:
• Title
• Objectives
• Steps
• Owner
• Deadline
• Name of the reporter
A process with individual brainstorming, categorisation and action plans will be
implemented. A reporter for each action (work package coordinator) will be
identified for the reporting session (Gallery Walk).
16.45 – 18.00 12. Reporting session – Gallery Walk
The room will be organised into a “gallery” visited by the participants. Each
reporter will present his/her action to the other groups. Each visit will last 15
minutes and a shift rotation system will be implemented.
In this session, the participants will have the opportunity to enrich the
presented action plan and also to propose to be a mentor in case he/she thinks
capable to assist the others in the implementation of the action.
20.30 13. Working dinner
III Results
III.1 Awareness of the network
Obstacles
1. Project
• Involvement (different levels of members’ involvement in the network)
• Decision-making process
• Not enough meetings
• Too many tasks
• Lack of coordination overlap of events (meetings…)
• More clarification on expected deliverables
• High level of efforts to complete the project
2. Human resources
5. • Turnover
• Inexperience
• Do not assume that people (members) know everything
• More proactivity
3. Communication
• Lack of email communication
• Communication with other networks
• Communication with programme committee
4. Budget/national support
• Reform in national policies
• National budget cuts
• Participation of third countries should be foreseen in budget
• Heavy workload at national level
Successes
1. Networking
• Exchange of experiences/practices
• Personal contacts
• Multi-cultural exchanges (meetings…)
• Website – our communication platform
• Informal information
• Quality of staff (experiences, competences) guidance and assistance
• Various choices of partners (associated partners…)
2. Training
• Positive impact of the mentoring
• Positive impact of the training
3. Coordination of the project
• Project management
• Overall performance of the project
• Flexibility
• Funding
4. More information on EU policies
5. Events
• information on events
• better coordination of the Brokerage Events with the Infodays
III.2 The outputs of the meeting
3 themes of actions were defined after the discussions of the group:
1. Communication
a. Forum/ social network: which option?
b. Email management: rules
c. Code of conduct: structure
2. Training
a. Matrix of competences: structure
b. Mentoring: action plan
3. Networking
a. Workshops: 5 W
1. Communication (reporter: Julian)
6. To be completed by Julian:
The subgroups proposed to use the Cordis Partner Search as it can be considered as a social network tool,
it covers the email functionalities and then rules will have to be edited in this context.
The Cordis Partner Search allows structuration of messages. In this context, the project can have different
groups in relation with the project activities: project management, networking, communication, profile
validation group…
The decision of the subgroup is that every member of the project updates its profile at 90 % for mid-
September.
2. Training/mentoring (reporter: Borja)
• Step 1: Questionnaire for a complete map of competences and needs (Bea from MCST)
based on persons and organisation! every members should have filled in the
questionnaire by mid-September
• Step 2: Mapping of the capacities and needs based on questionnaire with the identification
of mentees and mentors!
• Step 3: identification of existing training/mentoring materials already existing in the network
For the mentoring:
• Identification of possible mentors during the meeting: Italy, Poland, Malta, Estonia,
Portugal, Spain.
• Identification of content and organisation (agenda, dates…)
3. Networking (reporter: Mari)
Application to a workshop to organise in Ispra:
• Who: NCPs and researchers
• What: workshop
• When: Spring 2012
• Where: Ispra (Other option: Güssing, Wells…)
• Why: JRC – new technologies…
III Next meeting
Date: end of October (to be confirmed)
Location: Brussels
Themes: review of operations and reinforcement of the network