Slides from the CHI 2008 talk for the paper "Exploring the Role of the Reader in the Activity of Blogging" by Eric Baumer, Mark Sueyoshi, and Bill Tomlinson
The document discusses advantages of personal learning networks (PLNs) such as Twitter. It notes that the capacity to know how and where to find information is more important than what is currently known, as information has a shorter lifespan now. Effective learning involves connecting information sources and determining what to learn and discard. PLNs like Twitter allow connecting with others worldwide to regularly exchange ideas, help categorize information through hashtags, and obtain different perspectives from professionals in similar fields quickly through its short message format. However, the document also questions if Twitter should always be considered a trusted resource and what disadvantages PLNs may have.
The document discusses advantages of personal learning networks (PLNs) such as Twitter. It notes that the capacity to know how and where to find information is more important than what is currently known, as information has a shorter lifespan now. Effective PLNs allow users to filter information and seek out knowledge on specialized topics from a variety of connected information sources. Twitter is presented as an example of an accessible PLN that allows users to quickly get feedback from others in their field through hashtags and exchanges with like-minded professionals from around the world. However, some questions are raised about whether Twitter should always be considered a trusted resource due to potential disadvantages of social media platforms.
This document provides an overview of the topics and assignments for a social media and public relations course. The course will include both in-person and virtual sessions and readings on social media practices. Students are required to create and maintain public social media accounts, posting at least three times per week. Assignments include discussion questions, quizzes, a step-by-step guide, analytics analysis, a case study, and a social media plan. Key terms around social networks and social media are also defined.
The document defines and provides brief explanations of common online terminology used on the internet. It discusses key terms such as email, online chat, blogs, URLs, social bookmarking, podcasts, streaming, VoIP, wikis, social networking, the World Wide Web, HTML, web feeds, and references used as sources. The document serves as a reference for understanding basic online concepts and technologies.
To successfully identify a business opportunity, you must determine that it fulfills an existing need in the market rather than creating a need. You should answer who cares about solving this need, how intensely they care about it, and why they would choose your solution over others. Identifying these key factors requires primary market research through direct engagement and secondary research online and on social media.
Third Learning Spaces in Open Online CoursesSuzan Koseoglu
(1) The study examined third learning spaces that emerged in an open online course through an interpretive case study approach.
(2) Open participants created unique learning paths by curating content on their blogs based on personal interests and connections to other communities.
(3) Meaningful learning occurred both within and beyond the course structure as open participants brought in their diverse roles, skills, and experiences with open and networked online spaces. The study highlighted the need to focus on open processes and literacies to better support open learning.
O documento discute as leis de proteção à infância e as ações a serem tomadas em diferentes situações de abuso e negligência infantil, como denunciar abuso sexual ou pais drogados que espancam filhos às autoridades, procurar abrigos para órfãos e ligar para a brigada quando o conselho tutelar não toma providências contra pais violentos. A conclusão afirma que as crianças ainda sofrem com a negligência da sociedade, apesar dos apelos, e que cada um deve fazer sua parte para protegê-las.
La Mezquita de Córdoba se compone de tres partes principales: el Patio de los Naranjos, la puerta del Perdón y el interior con más de 800 columnas. La Catedral de Jaén fue construida entre los siglos XVI y XVII y contiene importantes obras como la imagen gótica de Nuestra Señora de la Antigua. La Catedral de Málaga, apodada "La Manquita" debido a que le falta una de sus torres, data del periodo renacentista y contiene valiosas obras escultóricas y de
The document discusses advantages of personal learning networks (PLNs) such as Twitter. It notes that the capacity to know how and where to find information is more important than what is currently known, as information has a shorter lifespan now. Effective learning involves connecting information sources and determining what to learn and discard. PLNs like Twitter allow connecting with others worldwide to regularly exchange ideas, help categorize information through hashtags, and obtain different perspectives from professionals in similar fields quickly through its short message format. However, the document also questions if Twitter should always be considered a trusted resource and what disadvantages PLNs may have.
The document discusses advantages of personal learning networks (PLNs) such as Twitter. It notes that the capacity to know how and where to find information is more important than what is currently known, as information has a shorter lifespan now. Effective PLNs allow users to filter information and seek out knowledge on specialized topics from a variety of connected information sources. Twitter is presented as an example of an accessible PLN that allows users to quickly get feedback from others in their field through hashtags and exchanges with like-minded professionals from around the world. However, some questions are raised about whether Twitter should always be considered a trusted resource due to potential disadvantages of social media platforms.
This document provides an overview of the topics and assignments for a social media and public relations course. The course will include both in-person and virtual sessions and readings on social media practices. Students are required to create and maintain public social media accounts, posting at least three times per week. Assignments include discussion questions, quizzes, a step-by-step guide, analytics analysis, a case study, and a social media plan. Key terms around social networks and social media are also defined.
The document defines and provides brief explanations of common online terminology used on the internet. It discusses key terms such as email, online chat, blogs, URLs, social bookmarking, podcasts, streaming, VoIP, wikis, social networking, the World Wide Web, HTML, web feeds, and references used as sources. The document serves as a reference for understanding basic online concepts and technologies.
To successfully identify a business opportunity, you must determine that it fulfills an existing need in the market rather than creating a need. You should answer who cares about solving this need, how intensely they care about it, and why they would choose your solution over others. Identifying these key factors requires primary market research through direct engagement and secondary research online and on social media.
Third Learning Spaces in Open Online CoursesSuzan Koseoglu
(1) The study examined third learning spaces that emerged in an open online course through an interpretive case study approach.
(2) Open participants created unique learning paths by curating content on their blogs based on personal interests and connections to other communities.
(3) Meaningful learning occurred both within and beyond the course structure as open participants brought in their diverse roles, skills, and experiences with open and networked online spaces. The study highlighted the need to focus on open processes and literacies to better support open learning.
O documento discute as leis de proteção à infância e as ações a serem tomadas em diferentes situações de abuso e negligência infantil, como denunciar abuso sexual ou pais drogados que espancam filhos às autoridades, procurar abrigos para órfãos e ligar para a brigada quando o conselho tutelar não toma providências contra pais violentos. A conclusão afirma que as crianças ainda sofrem com a negligência da sociedade, apesar dos apelos, e que cada um deve fazer sua parte para protegê-las.
La Mezquita de Córdoba se compone de tres partes principales: el Patio de los Naranjos, la puerta del Perdón y el interior con más de 800 columnas. La Catedral de Jaén fue construida entre los siglos XVI y XVII y contiene importantes obras como la imagen gótica de Nuestra Señora de la Antigua. La Catedral de Málaga, apodada "La Manquita" debido a que le falta una de sus torres, data del periodo renacentista y contiene valiosas obras escultóricas y de
The document contains information about ages of people, numbers, family relationships, spelling words, interview questions, use of "a" and "an", and details about 4 people including their first name, middle name, surname, and age. It provides vocabulary practice and comprehension exercises around these topics for English language learners.
Justo Sierra Méndez fue una figura política mexicana cuyo nombre fue inscrito en letras de oro en el Salón de Plenos de la Cámara de Diputados para honrar su servicio. Sierra Méndez jugó un papel importante en la política y la educación de México a finales del siglo XIX y principios del siglo XX.
El documento habla sobre un museo de Mercedes Benz en 2007 que presenta un vehículo increíble sin volante, pedales de freno o acelerador. El vehículo parece ser completamente autónomo y sin controles para el conductor.
O documento resume as atividades realizadas no 2o período pelo grupo no desenvolvimento do projeto AlmaInova, que visa criar cartões eletrônicos para promover a cultura em Almada. Eles pesquisaram empresas de cartões, idealizaram materiais para exposição, fizeram contatos, escolheram orçamento e entregaram documentos ao conselho. Dividiram o projeto em três modalidades e criaram blogs e agenda cultural.
La presentación describe brevemente la ciudad de Lisboa, la capital y ciudad más grande de Portugal. Se anima a los lectores a compartir la presentación con amigos y encontrar más presentaciones similares en un sitio web específico.
The document discusses unflattening the online classroom. It introduces the author as an educator with nearly 20 years of experience, including 10 years teaching online courses. It notes that traditional classrooms involve buying a textbook, reading it, discussing it in class, and taking a test or writing a paper. However, online classrooms were originally limited to early versions that focused only on course content without collaboration. The author advocates moving beyond these limitations to think of new possibilities for online education.
El documento describe cuatro tribus indígenas que se pueden identificar en las administraciones públicas basadas en sus hábitos de trabajo. Los Incas llegan puntualmente y trabajan duro hasta el final del día. Los Mayas llegan más tarde y se toman descansos para almorzar. Los Aztecas llegan tarde y deleguen tareas a otros. Los Arapajoes rara vez se les ve y aparecen a última hora los viernes para asignar tareas. Al final se pregunta a qué tribu pertenece el lector.
Light the Way - Starshrooms Final Presentation - IAT 404/5scottxko
Light the Way is a two-part device created by Starshroom, Kawi Cho, Carmen Chow, Shawn Hsiao, Jack Ju, Scott Ko, and Darell Teo, and Stephanie Yin that helps moviegoers find their seats faster through low-intensity lighting that illuminates seats and walkways, and displays seat occupancy. The concept provides helpful visibility while not being obtrusive.
La mezquita de Córdoba se compone de tres partes principales: el Patio de los Naranjos, la puerta del Perdón y la mezquita propiamente dicha, que contiene ochocientas cincuenta columnas que sostienen trescientos sesenta y cinco arcos. La catedral de Jaén fue construida entre los siglos XVI y XVII siguiendo los planos de Andrés de Vandelvira y contiene importantes obras como la imagen gótica de Nuestra Señora de la Antigua. La Catedral de
Este documento presenta un supuesto "test de inteligencia" con preguntas y respuestas que buscan avergonzar e insultar a quien lo toma. Consiste en 8 preguntas con respuestas incorrectas propuestas, seguidas de insultos por no saber la respuesta correcta. Al final se anima a compartir el test con otros para que también se sientan humillados.
Este documento presenta información sobre cascadas. Incluye una invitación a compartir el documento con otros y enlaces para obtener más presentaciones o suscribirse a un boletín.
The document discusses the Community Technology Center (CTC) at Passaic County Community College. The CTC is a 16,000 square foot facility that provides community access to technology and training. It has benefited the community by providing over 40 organizations with technology access, training over 150 teachers and 600 residents in computer basics and financial literacy, and offering after school programs, small business workshops, and citizenship classes. The CTC has also benefited the college by fulfilling its community outreach mission and increasing college-wide experience in community development.
Este documento discute o acordo entre sindicatos de professores e o Ministério da Educação para "salvar" o terceiro período letivo e evitar instabilidade. O acordo abre negociações sobre avaliação de desempenho e horários de trabalho, mas sindicatos continuam insatisfeitos com as políticas do governo sobre a carreira docente e gestão escolar.
Este documento describe un sofisticado criadero de marihuana escondido detrás de una puerta secreta en el garaje de una casa aparentemente normal en Tennessee. El criadero hidropónico se extiende más de 50 yardas dentro de la colina bajo la casa y cuenta con un sistema automatizado de riego, iluminación, ventilación y control de temperatura para cultivar la marihuana, la cual puede cosecharse en sólo 60 días. El túnel de escape incluye una trampilla camuflada que conduce al exterior para permitir una salida de emer
Whole Through the Presence of Others? Integrity and Participation in Blogs, ...dcambrid
This document discusses how blogs, social networking sites, and eportfolios are used personally and socially. It notes that blogs and social networks allow for brief and frequent updates that fit into daily life. However, eportfolios aim to present a more coherent and complex representation of identity over time. The document questions how to mediate between these genres and help students craft public displays of connection through intentional self-representation in their eportfolios.
My presentation on Student Blogging originally presented at 2014's CCS #C4 Connect, Collect, Create Technology Conference in Carmel, IN on July 8th. The session has been repeated at various #INeLearn conferences and others since.
Quote on slide 45 is a paraphrase of Jerry Blumengarten's "Tech gives the quietest student a voice"
Drawing on slide 4 is by Matt Miller, based on a @YourKidsTeacher tweet from ISTE 2014
Research cited and resources embedded are credited within the resource links and web pages listed on slide 48.
The document contains information about ages of people, numbers, family relationships, spelling words, interview questions, use of "a" and "an", and details about 4 people including their first name, middle name, surname, and age. It provides vocabulary practice and comprehension exercises around these topics for English language learners.
Justo Sierra Méndez fue una figura política mexicana cuyo nombre fue inscrito en letras de oro en el Salón de Plenos de la Cámara de Diputados para honrar su servicio. Sierra Méndez jugó un papel importante en la política y la educación de México a finales del siglo XIX y principios del siglo XX.
El documento habla sobre un museo de Mercedes Benz en 2007 que presenta un vehículo increíble sin volante, pedales de freno o acelerador. El vehículo parece ser completamente autónomo y sin controles para el conductor.
O documento resume as atividades realizadas no 2o período pelo grupo no desenvolvimento do projeto AlmaInova, que visa criar cartões eletrônicos para promover a cultura em Almada. Eles pesquisaram empresas de cartões, idealizaram materiais para exposição, fizeram contatos, escolheram orçamento e entregaram documentos ao conselho. Dividiram o projeto em três modalidades e criaram blogs e agenda cultural.
La presentación describe brevemente la ciudad de Lisboa, la capital y ciudad más grande de Portugal. Se anima a los lectores a compartir la presentación con amigos y encontrar más presentaciones similares en un sitio web específico.
The document discusses unflattening the online classroom. It introduces the author as an educator with nearly 20 years of experience, including 10 years teaching online courses. It notes that traditional classrooms involve buying a textbook, reading it, discussing it in class, and taking a test or writing a paper. However, online classrooms were originally limited to early versions that focused only on course content without collaboration. The author advocates moving beyond these limitations to think of new possibilities for online education.
El documento describe cuatro tribus indígenas que se pueden identificar en las administraciones públicas basadas en sus hábitos de trabajo. Los Incas llegan puntualmente y trabajan duro hasta el final del día. Los Mayas llegan más tarde y se toman descansos para almorzar. Los Aztecas llegan tarde y deleguen tareas a otros. Los Arapajoes rara vez se les ve y aparecen a última hora los viernes para asignar tareas. Al final se pregunta a qué tribu pertenece el lector.
Light the Way - Starshrooms Final Presentation - IAT 404/5scottxko
Light the Way is a two-part device created by Starshroom, Kawi Cho, Carmen Chow, Shawn Hsiao, Jack Ju, Scott Ko, and Darell Teo, and Stephanie Yin that helps moviegoers find their seats faster through low-intensity lighting that illuminates seats and walkways, and displays seat occupancy. The concept provides helpful visibility while not being obtrusive.
La mezquita de Córdoba se compone de tres partes principales: el Patio de los Naranjos, la puerta del Perdón y la mezquita propiamente dicha, que contiene ochocientas cincuenta columnas que sostienen trescientos sesenta y cinco arcos. La catedral de Jaén fue construida entre los siglos XVI y XVII siguiendo los planos de Andrés de Vandelvira y contiene importantes obras como la imagen gótica de Nuestra Señora de la Antigua. La Catedral de
Este documento presenta un supuesto "test de inteligencia" con preguntas y respuestas que buscan avergonzar e insultar a quien lo toma. Consiste en 8 preguntas con respuestas incorrectas propuestas, seguidas de insultos por no saber la respuesta correcta. Al final se anima a compartir el test con otros para que también se sientan humillados.
Este documento presenta información sobre cascadas. Incluye una invitación a compartir el documento con otros y enlaces para obtener más presentaciones o suscribirse a un boletín.
The document discusses the Community Technology Center (CTC) at Passaic County Community College. The CTC is a 16,000 square foot facility that provides community access to technology and training. It has benefited the community by providing over 40 organizations with technology access, training over 150 teachers and 600 residents in computer basics and financial literacy, and offering after school programs, small business workshops, and citizenship classes. The CTC has also benefited the college by fulfilling its community outreach mission and increasing college-wide experience in community development.
Este documento discute o acordo entre sindicatos de professores e o Ministério da Educação para "salvar" o terceiro período letivo e evitar instabilidade. O acordo abre negociações sobre avaliação de desempenho e horários de trabalho, mas sindicatos continuam insatisfeitos com as políticas do governo sobre a carreira docente e gestão escolar.
Este documento describe un sofisticado criadero de marihuana escondido detrás de una puerta secreta en el garaje de una casa aparentemente normal en Tennessee. El criadero hidropónico se extiende más de 50 yardas dentro de la colina bajo la casa y cuenta con un sistema automatizado de riego, iluminación, ventilación y control de temperatura para cultivar la marihuana, la cual puede cosecharse en sólo 60 días. El túnel de escape incluye una trampilla camuflada que conduce al exterior para permitir una salida de emer
Whole Through the Presence of Others? Integrity and Participation in Blogs, ...dcambrid
This document discusses how blogs, social networking sites, and eportfolios are used personally and socially. It notes that blogs and social networks allow for brief and frequent updates that fit into daily life. However, eportfolios aim to present a more coherent and complex representation of identity over time. The document questions how to mediate between these genres and help students craft public displays of connection through intentional self-representation in their eportfolios.
My presentation on Student Blogging originally presented at 2014's CCS #C4 Connect, Collect, Create Technology Conference in Carmel, IN on July 8th. The session has been repeated at various #INeLearn conferences and others since.
Quote on slide 45 is a paraphrase of Jerry Blumengarten's "Tech gives the quietest student a voice"
Drawing on slide 4 is by Matt Miller, based on a @YourKidsTeacher tweet from ISTE 2014
Research cited and resources embedded are credited within the resource links and web pages listed on slide 48.
Blogs can serve as tools for both action/creation and reflection in learning. They allow students to document their thinking and receive feedback, which supports higher-order thinking. The Professional Learning session will cover setting up blogs in Moodle and Edublogs, and how blogs can promote skills like collaboration, creativity, and empathy. It will provide examples of blogs being used in classes and discuss questions to focus student reflection.
Information Fluency Strategies and Practices to Help Enhance Critical Thinkin...St. Petersburg College
Information fluency is the intersection of information literacy, computer literacy and critical thinking and is a “must” for participants of the 21st century. Mairn explores a variety of resources, research tools, and tips that can be integrated into course management systems and/or traditional classroom settings to help build fluency and develop critical thinking. These tools range from using real-time web/mobile services like Twitter to using conventional econtent more creatively and other tools/services to construct a learning environment — online or face-to-face — that is conducive to information discovery, sharing, and lifelong learning.
This document summarizes a study on deploying social software like blogs in distance learning environments. It found that while blogs provided benefits like facilitating reflective practice and community, students struggled with finding purpose for blogging and tensions between private and public sharing. Only 20-30% of students blogged regularly, with 50% not blogging at all, similar to other studies. Students had pragmatic concerns about time and assessment that influenced tool use. Understanding blogs as a genre and negotiating their purpose and context of use is important for adoption in educational settings.
Online Reading Comprehension: Challenges and Opportunities (Brazil 2014)Julie Coiro
This presentation was given during a conference for Brazilian educators and students, sponsored by XI Encontro Virtual de Documentação em Software Livre (EVIDOSOL) e VIII Congresso Internacional de Linguagem e Tecnologia online (CILTEC-online). A companion website with links to resources included in this presentation is available at http://coiroevidosol.wikispaces.com/home
User-Generated Content and Social Discovery in the Academic Library Catalogu...Steve Toub
1) The document discusses findings from user research on incorporating user-generated content and social discovery features into academic library catalogs.
2) Participants expressed a desire to see what trusted colleagues think of resources and find "gems" they don't know exist. However, few used existing social tools for academic purposes.
3) The strongest motivation for contributing user reviews was helping others find useful resources faster. Ensuring quality would involve authenticating users and exposing more than binary reviews.
This document summarizes research on academic blogging. It finds that most academic blogs are single-authored blogs written by academics for an audience of peers. They typically take the form of informal essays commenting on academia and research. While academic blogging expands the dissemination of ideas, the research shows bloggers primarily converse with each other rather than engaging the general public. Academic blogs form interconnected communities rather than a cohesive online forum for broader debate.
These days, students and teachers alike are spending a lot of time online. Among issues which affect those who "live on the Internet," information validity and "information overload" are frequently discussed. Both of these issues can be addressed through critical thinking. More specifically, students and teachers can undertake what Alexandre calls "online literacy," the Internet version of "media literacy." By evaluating, creating, and analyzing online content, anyone should be able to assess the validity of the information they process and decrease the effects of "information overload" in their online lives.
This session will explore online literacy in learning and teaching contexts.
This article provides a critique of the paper "Connectivism and Dimensions of Individual Experience" by Carmen Tschofen and Jenny Mackness. It summarizes the key themes of connectivism explored in their paper, such as autonomy, connectedness, diversity and openness. It also discusses some of the tensions identified between these connectivist ideals and the realities of individual experience in MOOCs. However, the critique finds the original paper difficult to understand for those unfamiliar with MOOCs and connectivism concepts due to its use of jargon and limited research scope.
Overcoming Challenges of Using Social Media for Outreach in an Academic Librarysociamigo
This tutorial addresses the challenges of using social media for outreach. Free MP3 Podcast reveals how to use social media to sell more stuff.
Find out more at www.sociamigo.com/mp3
The document discusses using blogs in the classroom to expand learning beyond traditional walls. It reviews three articles on the benefits and proper implementation of blogs. The first article finds that blogging can improve writing skills and student interaction when used purposefully. The second highlights a teacher who used blogs to enhance literature discussions, finding improved motivation and engagement. The third stresses teaching civil discourse when using blogs to avoid inappropriate interactions and instead encourage reflection and self-restraint. The conclusion is that integrated technology like blogging can expand learning but must prioritize educational goals and student safety.
Blogging can improve students' reading and writing skills while also helping educators share ideas. Blogs allow students to create original content, learn through experience, provide peer feedback, and enhance literacy. Using blogs enables students to operate as both visitors who use the web as a tool and residents with an online presence. This helps students become "transliterate" by gaining meaning from various media. Educators can assign different types of blogs for students, such as research blogs, autobiographies, reading journals, or historical timelines. Blogging addresses Common Core standards by having students integrate diverse media, publish writing online, and collaborate with others.
Social and Cognitive Presence in Virtual Learning Environments Terry Anderson
Reviews and speculates on further development of the Community of Inquiry model (communitiesofinquiry.com) developed in Alberta by Randy Garrison, Terry Anderson, Walter Archer and Liam Rourke. This project developed theory and tools to measure teaching, cognitive and social presence in online environments
Renee Hobbs and Paul Folkemer present “Teens Blog the News,” Paper to the Association for Supervision in Curriculum and Instruction (ASCD), New Orleans, March 17, 2008.
Social Presence: What Is It And Why Does It Matter?Patrick Lowenthal
The document discusses social presence in online learning. It defines social presence as the degree to which communication participants feel socially and emotionally connected. Early research viewed computer-mediated communication as impersonal, but later studies found social presence improves student satisfaction, community, and perceived learning. The document outlines strategies to build social presence, such as using introductions, group work, and sharing personal stories. It concludes by discussing the researcher's current studies on social presence indicators and differences across online courses.
This document discusses building online reading comprehension. It covers several key topics: (1) theories of reading comprehension and how they apply to online reading; (2) differences between online and offline reading and challenges of online reading; (3) skills needed for online reading comprehension including decoding, meaning making, using and analyzing text; and (4) strategies for teaching online reading comprehension including modeling skills, scaffolded activities, collaborative projects, and think-alouds. The goal is to help students develop skills for comprehending various online text types and evaluating online information.
Information Literacy and Student Engagement: Cultivating Student Learning Th...Deana Greenfield
This document discusses using critical pedagogy and critical reflection to cultivate student learning through information literacy instruction. It advocates using guiding questions to encourage critical thinking when evaluating information sources and citations. Examples of questions provided aim to examine assumptions, knowledge construction, and issues of authority and privilege. The document also describes using tools like critical incident questionnaires and reflection journals to foster critical perspectives in students.
The Promise of Authority in Social Scholarshiplcohen
The document discusses the changing nature of scholarly authority and publishing in an increasingly social and participatory digital environment. It defines social scholarship as using networked social tools to publish and interact with scholarly output. Parameters of social scholarship include things like comments, reviews, bookmarks and ratings. Soft peer review can build authority through implicit and explicit social interactions with published work. New metrics of authority are emerging that incorporate social metadata around usage and conversation. This leads to new models of hybrid peer review and open access journal communities that blend traditional review with informal open review processes.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
Chi2008 Blog Readers Talk
1. Exploring the Role of the Reader in the Activity of Blogging Eric Baumer, Mark Sueyoshi, Bill Tomlinson University of California, Irvine CHI 2008 – Florence, Italy April 9, 2008
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
Editor's Notes
Thanks Gerhard. Research conducted in the social code group at UC Irvine. Bill Tomlinson is my advisor and head of that group, Mark Sueyoshi is an undergrad researcher with our group.