Cloud is still not well understood. Indeed the very name suggests fogginess. This is why we see such a profusion of "what is cloud" presentations, all, or most, providing a very vendor-centric view. In the presentation below, I've attempted instead to provide a general overview of how cloud is perceived by different players, and (surprise, surprise) to position Citrix technologies with respect to the most general views of 'cloud'.
Cloud computing (for the IT professional at least) includes notions of Software as a Service, Infrastructure as a Service, and Platform as a Service. These categories are well understood and largely accepted, but are imperfect. Very clearly, all can be applied to offerings from external providers as well as to operating models, or "patterns" within the enterprise. Furthermore, we're seeing a great deal of category leak at present, with SaaS offerings on IaaS, PaaS offerings that can be hosted as IaaS and offered as SaaS, etc, etc.
Citrix has various technologies that enable Infrastructure as a Service and this has been the focus of our C3 (Citrix Cloud Center) marketing to date. However Citrix has long been a leader in bringing the notions of Software as a Service to the enterprise. This is something we've been doing for over a decade with our WinFrame, MetaFrame and XenApp technology. It's the core notion of today's Citrix Delivery Center, now extended to desktop virtualization.
Here's an updated cloud computing deck, originally used at some of the Citrix iForum events (and posted here), that I recently presented as a keynote at the IT Architect Regional Conference in Malaysia (http://www.iasahome.org/web/malaysia/). Please let me know what you think.
Traditional database deployments resulted in high costs due to server sprawl. Database as a Service aims to provide cost savings through standardization and resource sharing while improving agility. Oracle's multitenant database architecture allows for greater database consolidation density by sharing memory and processes across pluggable databases. Oracle Exadata and Enterprise Manager enable safe consolidation of mixed workloads and lifecycle management of Database as a Service.
This is an updated talk on Cloud Computing and the Citrix Cloud Center.
From time to time the Citrix CTO Office is asked to give presentations at these and other events. I'm interested in any/all feedback from the Citrix and Cloud communities.
Citrix Synergy 2014 - Syn229 What's new in Citrix Cloud Portal Business ManagerCitrix
Citrix CloudPortal Business Manager is a cloud management platform that provides self-service provisioning, metering, billing, and chargeback capabilities. The latest version 2.2 adds enhanced integration with Citrix CloudPlatform and CloudPortal Services Manager for provisioning hosted applications, desktops, and Exchange services. It allows configuration of custom workflows, reports, and integration with billing systems. The presentation demonstrated the key capabilities and user interfaces of CloudPortal Business Manager.
Glimpses into the future of mobile devices, the internet, and more - updated ...Michael Harries
First given at Mobile Monday Sydney on 2 November 2009.
A thought provoking look at the forces affecting the future of the mobile internet.
(Let me know what you think.)
Today Mobile Internet, Tomorrow What Michael Harries Citrix May 2009Michael Harries
The document summarizes a talk given by Dr. Michael Harries on the future of the mobile internet. It discusses three major trends: 1) Synthesis, where mobile devices and computers will continue merging their functions; 2) Society, how social networking will evolve on mobile platforms; and 3) Awareness, how ubiquitous mobile access may change human cognition and behavior over time as "the mind becomes less in the head". The talk aimed to provoke discussion about long-term technological and social impacts.
The Audioverse In Your Pocket - Invited Talk at ABC Radio National - Harries ...Michael Harries
Public radio, and radio in general, is at risk of disruption by new audio technologies (podcasts, etc). However there are interesting opportunities when a longer-term technology-strategy view is brought to bear.
This presentation is from an invited talk at the Australian ABC Radio National ( August 2009) as part of their strategic process.
Here's how they describe themselves: "With over 60 distinct programs each week, the Australian Broadcasting Corporation's Radio National is different from any other radio station in Australia. Where else could you hear, for example, an exploration of ideas in science, followed by the latest in books from around the world, then a program about the mind and human behaviour?"
http://www.abc.net.au/rn/
Robots – Superhuman Killers Or What? Ted Salon - Newtown - 2009 April 2ndMichael Harries
What's a robot? This deck shows the sheer variety of what we mean by robot and was used to introduce a couple of fantastic TED talks on robotics for a TED Salon at Newtown Public School (NSW, Australia) on 2nd April 2009.
We followed a quick run through this deck with TED videos from:
1. Rodney Brooks
2. Hod Lipson
3. Caleb Chung
And finally a very interesting and varied discussion.
http://www.newtownkids.com/Home/ted-talks
Traditional database deployments resulted in high costs due to server sprawl. Database as a Service aims to provide cost savings through standardization and resource sharing while improving agility. Oracle's multitenant database architecture allows for greater database consolidation density by sharing memory and processes across pluggable databases. Oracle Exadata and Enterprise Manager enable safe consolidation of mixed workloads and lifecycle management of Database as a Service.
This is an updated talk on Cloud Computing and the Citrix Cloud Center.
From time to time the Citrix CTO Office is asked to give presentations at these and other events. I'm interested in any/all feedback from the Citrix and Cloud communities.
Citrix Synergy 2014 - Syn229 What's new in Citrix Cloud Portal Business ManagerCitrix
Citrix CloudPortal Business Manager is a cloud management platform that provides self-service provisioning, metering, billing, and chargeback capabilities. The latest version 2.2 adds enhanced integration with Citrix CloudPlatform and CloudPortal Services Manager for provisioning hosted applications, desktops, and Exchange services. It allows configuration of custom workflows, reports, and integration with billing systems. The presentation demonstrated the key capabilities and user interfaces of CloudPortal Business Manager.
Glimpses into the future of mobile devices, the internet, and more - updated ...Michael Harries
First given at Mobile Monday Sydney on 2 November 2009.
A thought provoking look at the forces affecting the future of the mobile internet.
(Let me know what you think.)
Today Mobile Internet, Tomorrow What Michael Harries Citrix May 2009Michael Harries
The document summarizes a talk given by Dr. Michael Harries on the future of the mobile internet. It discusses three major trends: 1) Synthesis, where mobile devices and computers will continue merging their functions; 2) Society, how social networking will evolve on mobile platforms; and 3) Awareness, how ubiquitous mobile access may change human cognition and behavior over time as "the mind becomes less in the head". The talk aimed to provoke discussion about long-term technological and social impacts.
The Audioverse In Your Pocket - Invited Talk at ABC Radio National - Harries ...Michael Harries
Public radio, and radio in general, is at risk of disruption by new audio technologies (podcasts, etc). However there are interesting opportunities when a longer-term technology-strategy view is brought to bear.
This presentation is from an invited talk at the Australian ABC Radio National ( August 2009) as part of their strategic process.
Here's how they describe themselves: "With over 60 distinct programs each week, the Australian Broadcasting Corporation's Radio National is different from any other radio station in Australia. Where else could you hear, for example, an exploration of ideas in science, followed by the latest in books from around the world, then a program about the mind and human behaviour?"
http://www.abc.net.au/rn/
Robots – Superhuman Killers Or What? Ted Salon - Newtown - 2009 April 2ndMichael Harries
What's a robot? This deck shows the sheer variety of what we mean by robot and was used to introduce a couple of fantastic TED talks on robotics for a TED Salon at Newtown Public School (NSW, Australia) on 2nd April 2009.
We followed a quick run through this deck with TED videos from:
1. Rodney Brooks
2. Hod Lipson
3. Caleb Chung
And finally a very interesting and varied discussion.
http://www.newtownkids.com/Home/ted-talks
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
Creative operations teams expect increased AI use in 2024. Currently, over half of tasks are not AI-enabled, but this is expected to decrease in the coming year. ChatGPT is the most popular AI tool currently. Business leaders are more actively exploring AI benefits than individual contributors. Most respondents do not believe AI will impact workforce size in 2024. However, some inhibitions still exist around AI accuracy and lack of understanding. Creatives primarily want to use AI to save time on mundane tasks and boost productivity.
Organizational culture includes values, norms, systems, symbols, language, assumptions, beliefs, and habits that influence employee behaviors and how people interpret those behaviors. It is important because culture can help or hinder a company's success. Some key aspects of Netflix's culture that help it achieve results include hiring smartly so every position has stars, focusing on attitude over just aptitude, and having a strict policy against peacocks, whiners, and jerks.
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
PepsiCo provided a safe harbor statement noting that any forward-looking statements are based on currently available information and are subject to risks and uncertainties. It also provided information on non-GAAP measures and directing readers to its website for disclosure and reconciliation. The document then discussed PepsiCo's business overview, including that it is a global beverage and convenient food company with iconic brands, $91 billion in net revenue in 2023, and nearly $14 billion in core operating profit. It operates through a divisional structure with a focus on local consumers.
Content Methodology: A Best Practices Report (Webinar)contently
This document provides an overview of content methodology best practices. It defines content methodology as establishing objectives, KPIs, and a culture of continuous learning and iteration. An effective methodology focuses on connecting with audiences, creating optimal content, and optimizing processes. It also discusses why a methodology is needed due to the competitive landscape, proliferation of channels, and opportunities for improvement. Components of an effective methodology include defining objectives and KPIs, audience analysis, identifying opportunities, and evaluating resources. The document concludes with recommendations around creating a content plan, testing and optimizing content over 90 days.
How to Prepare For a Successful Job Search for 2024Albert Qian
The document provides guidance on preparing a job search for 2024. It discusses the state of the job market, focusing on growth in AI and healthcare but also continued layoffs. It recommends figuring out what you want to do by researching interests and skills, then conducting informational interviews. The job search should involve building a personal brand on LinkedIn, actively applying to jobs, tailoring resumes and interviews, maintaining job hunting as a habit, and continuing self-improvement. Once hired, the document advises setting new goals and keeping skills and networking active in case of future opportunities.
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
The document provides career advice for getting into the tech field, including:
- Doing projects and internships in college to build a portfolio.
- Learning about different roles and technologies through industry research.
- Contributing to open source projects to build experience and network.
- Developing a personal brand through a website and social media presence.
- Networking through events, communities, and finding a mentor.
- Practicing interviews through mock interviews and whiteboarding coding questions.
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
1. Core updates from Google periodically change how its algorithms assess and rank websites and pages. This can impact rankings through shifts in user intent, site quality issues being caught up to, world events influencing queries, and overhauls to search like the E-A-T framework.
2. There are many possible user intents beyond just transactional, navigational and informational. Identifying intent shifts is important during core updates. Sites may need to optimize for new intents through different content types and sections.
3. Responding effectively to core updates requires analyzing "before and after" data to understand changes, identifying new intents or page types, and ensuring content matches appropriate intents across video, images, knowledge graphs and more.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
6. Others, like Nicholas Carr,
have a „utopian‟, user oriented
view of cloud computing.
Cheap, utility-supplied
computing will ultimately
change society as profoundly
as cheap electricity did
7. Some vendors, like
SalesForce, argue that cloud is
the whole future of IT.
Cloud is web based SaaS
+
web based, hosted dev platform
9. For the end user, cloud is
synonymous with „nice web
Cloud is ease of use application‟
It‟s every cool web page
It‟s Google mail
It‟s SaaS
It‟s EASY
10. For Enterprise IT, cloud promises
to make IT „easy‟
Cloud is flexibility of resources, available on demand
Cloud is dynamically scalable
Cloud is automated
Cloud is IT nirvana!
11. But it‟s just not that simple
Cloud is insecure
Loss of IT control
Limited SLAs
A Threat
12. So why so many disparate
views?
Cloud computing is an idea
„made to stick‟
1. Simple
2. Unexpected
3. Concrete
4. Credible
5. Emotional
6. Stories
13. One of the reasons „cloud‟ is so
popular is that enterprise IT sees these
numbers from cloud providers as
extremely attractive.
Storage Servers Network Apps
1 image x 1M users
$0.15/GB/mo 1 admin/20,000 $10/megabit x 4 upgrades/yr
vs. vs. vs. vs.
230 apps x 5 versions
$3.75/GB/mo 1 admin/100 $500/megabit x many upgrades
14. But they are misleading for the
enterprise as they result from
massive standardization at the
core of each vendor‟s business
model.
Standardisation
15. Here are some commonly
agreed cloud categories.
Only IaaS requires System
Virtualization.
Cloud
Software as a Infrastructure
Service as a Service
Platform as a
Service
16. Let‟s start by talking about
Infrastructure as a Service or
IaaS.
IaaS
Infrastructure as a Service
17. Amazon has been a pioneer of
IaaS with their Elastic Compute
Cloud and Simple Storage
Service.
The Amazon cloud has enabled a
new wave of innovation.
Elastic Compute Cloud
• from $0.10 per VM hour
Simple Storage Service
• $0.15 per gig stored
• $0.17 per gig transfered
18. For example, SmugMug have been
able to scale tremendously without
any of their own infrastructure
through using Amazon Servers and
“30 employees. More than Storage.
300,000 paying customers.
288,000,000 photos.”
NO INFRASTRUCTURE
19. And burst computing by the
New York Times in converting
historical images for use on a
„retrospective‟ web site.
• New York Times
• 4TB of TIFFs
• To 1.5TB of PDFs
• 100 EC2 Xen VMs
20. These capabilities are enabled by
system virtualization and, in most
cases, by the Xen Hypervisor which is
at the heart of Citrix XenServer as
well as at the heart of most public
“
clouds.
Xen
Citrix, Intel, AMD, IBM, HP, Fujitsu,
”
Unisys, SGI, Samsung, Sun, VA
Systems, Red Hat, Novell, VA
Linux, DoD, NSA (42 orgs)
+ XenServer + 100% compatible
with Hyper-V
21. Sounds good so far? IaaS is
more complex than it may
appear. IaaS cloud vendors
mean many different things by
„cloud‟.
22. Some emphasize base level
virtualization – virtual servers,
virtual storage, and virtual
networks.
24. Still others are mainly about
application management,
which components work where,
and how they need to interact.
25. And some are mainly about
providing access and
automation in the cloud.
26. The key promise of IaaS is to bring
improved operational efficiency from
virtual server agility.
While much of the rhetoric focuses on off-
premise cloud, on-premise (or private)
cloud offers immediate benefits to
enterprise IT.
Operational efficiency
Off-premise
On-Premise
28. Software as a Service or SaaS
also brings important “cloud”
ideas for the enterprise.
SaaS
Software as a Service
29. Citrix is the fifth largest
external SaaS vendor
globally with the Citrix
Software as a Service
offerings.
30. There are enormous benefits
from treating all enterprise
applications as SaaS – as Application Delivery
applications to be delivered to
end users on demand.
=
Enterprise SaaS
SSL 001000111010101 SSL 001000111010101 SSL 001000111010101 SSL 001000111010101 SSL 001000111010101
Abstract connection
High-fidelity experience
Common security model
etc
etc
31. Citrix has long been about turning
Where Does Citrix Fit? Enterprise applications into a
service. In a very real sense,
Citrix Delivery Center bringing delivery abstraction to
every application.
Delivering Enterprise IT as a Service
XenDesktop · XenApp · NetScaler · XenServer
Users Apps
32. From a TCO and ROI
perspective this approach
brings formidable
benefits.
IT operational HW & SW Worker IT staff
costs costs downtime productivity
29%
reduction
40%
reduction
88%
reduction
78%
increase
Source: Gartner, IDC, Citrix and Wyse Estimates
33. However the long term
effects are potentially more
important. Using an
application delivery
“mediator” between your Agile Infrastructure
enterprise architecture and
application architecture Creates a „change friendly‟ organization
makes the organization
“change friendly” by reducing
inertia.
Enterprise Application
Architecture Architecture
34. Citrix Cloud Center addresses
both SaaS and IaaS.
Citrix Cloud Center
C3
(SaaS + IaaS)
35. C3 is exactly the same technology
that Citrix sells for the Enterprise,
but with a pricing model that‟s more
appropriate for the cloud.
Citrix Delivery Center
[but for the cloud]
36. Here‟s a simple schematic
showing how it might deployed
for cloud use (inside or outside
the datacenter)
NetScaler Workflow Studio Repeater
XenApp XenDesktop
cloud bridge
XenServer
Users Datacenter
37. Recent additions to C3 include:
A virtual appliance version of
our celebrated NetScaler
appliance.
38. 75% of Internet Users Each Day
The physical NetScaler appliance is
heavily used by internet companies
globally to optimize their web
applications to the extent that 75%
of all internet users touch the
technology daily.
39. Recent additions to C3 include:
A virtual switch (announced but
not yet released)
Company A Company C
Company B
40. Recent additions to C3 include:
XenApp and XenDesktop, as we‟re
recognized that application delivery
is an important cloud task. All of
these contribute to the broader
picture.
NetScaler Workflow Studio Repeater
XenApp XenDesktop
cloud bridge
XenServer
Users Datacenter
41. Here‟s one way to think about
C3 Reference Architecture IaaS cloud computing.
Customer / Consumer / VM Transactions
Application App Management
cloud bridge
Workload Distribution System (grid engine)
Web Application Delivery Fabric
Virtual Server Containers
Commodity Hardware Infrastructure
Distributed Virtual Switch
42. And here‟s how the Citrix Cloud
C3 Reference Architecture Center technologies fit into
such an architecture.
Customer Application / VM Management
NetScaler MPX cloud bridge
Workload Distribution System (grid engine)
Web Application Delivery Fabric
Repeater
XenApp XenDesktop
Virtual Server Containers
Dynamic Workload Provisioning
XenServer
Commodity Hardware Infrastructure
Distributed Virtual Switch
43. We‟ve also recently announced
Citrix Service Provider Program a Service Provider program.
Citrix newest partner program
Designed for service providers
Monthly “active subscriber” pricing &
licensing model
Route-to-market for customers inclined to
leverage hosted services
44. Enterprise Cloud is about new
operating models that leverage
the flexibility and agility of
SaaS and IaaS.
Enterprise
Cloud
45. Enterprise Cloud is about
Windows applications being
delivered as SaaS.
Windows Apps
46. “Cloud-burst”
Enterprise Cloud is about Cloud-bursting;
for example automatically load balancing
application delivery sessions to the cloud
when the physical XenApp farm is at it‟s
limit.
47. Enterprise Cloud is about the
capability to keep your data on
premise and your applications in
Bridge the cloud.
Apps in cloud; Data stays on premise
48. Citrix C3 Labs provides an easy
way to explore these ideas at
very low cost using Amazon EC2
Citrix C3
C3 Lab
49. C3 Labs blueprints
(recipes) are available
on the Citrix community
site.
Citrix C3 Lab Blueprints
• Common Scenarios
• Community Driven
• Architectural Overviews
• Deployment Guides
• Best Practices
http://community.citrix.com/C3Lab
50. Cloud is the future. Now is
the time for exploration.