This document provides an overview of the ClimberzzAssist mobile application, which is designed to help mountain climbers plan and navigate hiking trips. The key features of the Minimum Viable Product (MVP) include crowdsourcing reviews from other climbers, planning trips in advance, and using offline maps and GPS tracking while hiking. Future versions may incorporate health tracking, audio directions, emergency calling, and social media integration. Use cases and flow diagrams show the planning and on-site hiking experiences. Entity-relationship diagrams outline the user, mountain, route, review, and media data. The architecture will have presentation, application, and data layers, storing local data for offline use and connecting to backend services.
The State of Logistics Outsourcing; 2009 Third Party Logistics StudyDennis Wereldsma
This report presents findings from the 2009
Fourteenth Annual Third-Party Logistics
Study, conducted in mid-2009. This study
examines the state of the global market
for 3PL services and explores key issues
affecting the industry: economic volatility,
the IT capability gap and the challenges of
supply chain orchestration.
The State of Logistics Outsourcing; 2009 Third Party Logistics StudyDennis Wereldsma
This report presents findings from the 2009
Fourteenth Annual Third-Party Logistics
Study, conducted in mid-2009. This study
examines the state of the global market
for 3PL services and explores key issues
affecting the industry: economic volatility,
the IT capability gap and the challenges of
supply chain orchestration.
Qstream and Sales Readiness Group: Transforming Sales Managers into Great Coa...QstreamInc
Recent research reveals that an overwhelming 77 percent of firms don’t provide adequate coaching to their salespeople. This gap exists despite the fact that the same research shows an effective sales coaching strategy can improve revenue and profit achievement by nearly 20 percent. So why are so many companies still missing the mark when it comes to sales coaching? In this webcast, co-hosted with the Association of Talent Development, our presenters share data-driven best practices for implementing a sales coaching program that will help your organization develop a sales coaching culture, support front-line managers with real-time insights into their team’s skills and capabilities, and overcome the most common barriers to better coaching.
a) Created Real time Web application which tracks the sentiment of a unique hashtag in real-time and plots the results in a continuously varying graph.
b) Responsibilities included configuring and setting up a 4-node Hadoop cluster, including the general Hadoop services like MapReduce, Hive, HDFS as well as specialized data consumption services like Apache Flume.
c) The Twitter fire hose stream was set up and was consumed by the Apache Flume service and persisted in the HDFS.
d) Combination of machine learning algorithms like Naïve Bayesian, MaxEnt and SVM Is applied in the consumed tweets to extract the sentiment as positive, negative or neutral.
e) Other lexical analytical methods like Recursive Tensor Neural Networks were also applied for complex and compounded sentences to handle negation, etc.
f) HBase and Hive are then used to query the results periodically and plot the graph using D3.js
g) Other responsibilities also included maintaining the load on the Hadoop cluster such that it may continuously consume new data and plot the results, along with archiving redundant data to conserve the resources.
Source Code: https://github.com/akshaywattal/sentiXchange
Walloon-Dutch Matchmaking Event | Liège (Palais des Congrès) - 24 février 2015Cluster TWEED
Walloon-Dutch Matchmaking Event | Liège (Palais des Congrès) - 24 février 2015 : Bio based economy (chemicals, energy, waste) & Solar Energy - Clean tech.
Lectures presented during the two-day PAARL-sponsored Public Consultation and Training Workshop on RDA Policy and Action Plan for Philippine Libraries held at
Phela Grande Hotel, Magsaysay Avenue cor. Atis St., General Santos City on 28-29 August 2014
BYOD Security Scanning - the ability to assess smartphones, tablets and laptops for vulnerabilities, secure configurations and unprotected data at rest are vital for visualizing the entire security and compliance posture of an organization. BYOD environments are equally important as traditional servers and computers.
This paper illustrates that all endpoints can now be scanned for threats regardless of where the device is physically located, anytime and anywhere.)
Qstream and Sales Readiness Group: Transforming Sales Managers into Great Coa...QstreamInc
Recent research reveals that an overwhelming 77 percent of firms don’t provide adequate coaching to their salespeople. This gap exists despite the fact that the same research shows an effective sales coaching strategy can improve revenue and profit achievement by nearly 20 percent. So why are so many companies still missing the mark when it comes to sales coaching? In this webcast, co-hosted with the Association of Talent Development, our presenters share data-driven best practices for implementing a sales coaching program that will help your organization develop a sales coaching culture, support front-line managers with real-time insights into their team’s skills and capabilities, and overcome the most common barriers to better coaching.
a) Created Real time Web application which tracks the sentiment of a unique hashtag in real-time and plots the results in a continuously varying graph.
b) Responsibilities included configuring and setting up a 4-node Hadoop cluster, including the general Hadoop services like MapReduce, Hive, HDFS as well as specialized data consumption services like Apache Flume.
c) The Twitter fire hose stream was set up and was consumed by the Apache Flume service and persisted in the HDFS.
d) Combination of machine learning algorithms like Naïve Bayesian, MaxEnt and SVM Is applied in the consumed tweets to extract the sentiment as positive, negative or neutral.
e) Other lexical analytical methods like Recursive Tensor Neural Networks were also applied for complex and compounded sentences to handle negation, etc.
f) HBase and Hive are then used to query the results periodically and plot the graph using D3.js
g) Other responsibilities also included maintaining the load on the Hadoop cluster such that it may continuously consume new data and plot the results, along with archiving redundant data to conserve the resources.
Source Code: https://github.com/akshaywattal/sentiXchange
Walloon-Dutch Matchmaking Event | Liège (Palais des Congrès) - 24 février 2015Cluster TWEED
Walloon-Dutch Matchmaking Event | Liège (Palais des Congrès) - 24 février 2015 : Bio based economy (chemicals, energy, waste) & Solar Energy - Clean tech.
Lectures presented during the two-day PAARL-sponsored Public Consultation and Training Workshop on RDA Policy and Action Plan for Philippine Libraries held at
Phela Grande Hotel, Magsaysay Avenue cor. Atis St., General Santos City on 28-29 August 2014
BYOD Security Scanning - the ability to assess smartphones, tablets and laptops for vulnerabilities, secure configurations and unprotected data at rest are vital for visualizing the entire security and compliance posture of an organization. BYOD environments are equally important as traditional servers and computers.
This paper illustrates that all endpoints can now be scanned for threats regardless of where the device is physically located, anytime and anywhere.)
Consecutive 2.0: How to use your tablet for consecutive interpreting (IAPTI P...Josh Goldsmith
Josh Goldsmith
September 6, 2015
3rd IAPTI Conference, Bordeaux
Slides from a workshop at the 2015 IAPTI Conference about how to use your tablet for consecutive interpreting.