Congrès ABF 2018
Vendredi 8 juin - 14h30
Intervention de Sylvie Kha, responsable de la bibliothèque Assia Djebar à Paris : mener un projet de co-acquisitions avec vos usagers
Shifting Habits Towards a User-Centered CultureJohn McCambley
Official #UXL16 keynote presentation by Mark Shahid, Senior Experience Architect at Sky Betting & Gaming. Presented at UX Leaders Masterclass in Manchester on Tuesday 20th September 2016.
Palestra apresentada durante o 18º Encontro Locaweb em Belo Horizonte. A perspectiva da apresentação foi abordar tópicos relacionados tanto a UX, quanto Design Thinking até entregáveis e relacionamento entre times multidisciplinares de produtos assim como sua conexão ao Lean Software Development.
أهمية العمل الجماعي تكمن في القدرة على تحقيق الهدف المنوط به للفريق باستخدام كل أفراد الفريق لمهاراتهم و تكاملها لمصلحة الفريق باستخدام الخطة التي تصل بهم للهدف، القائد دوره استكشاف ما هو كامن في أفراد فريقه و صقله عبر مراحل متعددة تدريباً و ارشاداً و الهاماً
Digital experiences across multiple languages and channels and markets bring a new level of complexity to an omni-channel strategy. See how top brands are leverage people, process and technology to deliver a first rate experience.
Shifting Habits Towards a User-Centered CultureJohn McCambley
Official #UXL16 keynote presentation by Mark Shahid, Senior Experience Architect at Sky Betting & Gaming. Presented at UX Leaders Masterclass in Manchester on Tuesday 20th September 2016.
Palestra apresentada durante o 18º Encontro Locaweb em Belo Horizonte. A perspectiva da apresentação foi abordar tópicos relacionados tanto a UX, quanto Design Thinking até entregáveis e relacionamento entre times multidisciplinares de produtos assim como sua conexão ao Lean Software Development.
أهمية العمل الجماعي تكمن في القدرة على تحقيق الهدف المنوط به للفريق باستخدام كل أفراد الفريق لمهاراتهم و تكاملها لمصلحة الفريق باستخدام الخطة التي تصل بهم للهدف، القائد دوره استكشاف ما هو كامن في أفراد فريقه و صقله عبر مراحل متعددة تدريباً و ارشاداً و الهاماً
Digital experiences across multiple languages and channels and markets bring a new level of complexity to an omni-channel strategy. See how top brands are leverage people, process and technology to deliver a first rate experience.
Hard to Reach Users in Easy to Reach PlacesMike Crabb
Presentation given at UX Scotland 2019 by Michael Crabb and Rachel Menzies. Work based on the User Centre that is based in the Department of Computing at the University of Dundee
During this webinar engineers:
- Gained a better understanding of the rules of UI composition including Consistency, Patterns, and Hierarchy. This will save you time during UI design creation and strive for a perfect implementation the first time around.
- Learned to understand what a developer looks for in a quality design work and how it can differ from a developer's perspective.
- Were taught the ability to recognize issues in visual UI and be able to fix them without your designer’s direction. As a result, more autonomy when implementing UI
These are the slides of the talk I gave at the Global Scrum Gathering Berlin in 2014.
It describes how Criteo managed to change the software engineering culture of its R&D department from 'Testing is cheating' to 22K+ tests being run every half hour.
A slide set to accompany an NKCS conversation on our emerging instructional coaching model... with the expert consultation of author, coach, and coach of coaches: Diane Sweeney. (www.dianesweeney.com)
In this presentation from ICA SBA 17, Anna Scudellari, consultant at the Martini & Rossi Historical Archive and member of the Bacardi Archive Team, speaks about heritage as a source of authenticity, inspiration and communication for the MARTINI Brand. She illustrates with some examples as well as present the museums at the MARTINI Brand Home. These archives have also been bestowed the public recognition of “Great Historical Interest” in Italy. She will also stress the importance of being part of archive networks, for both scientific support and increase in visibility.
A presentation from the the ICA SBA 17 conference in Stockholm in April 2017. For more from the conference, visit www.naringslivshistoria.se/icasba17stockholm
Hard to Reach Users in Easy to Reach PlacesMike Crabb
Presentation given at UX Scotland 2019 by Michael Crabb and Rachel Menzies. Work based on the User Centre that is based in the Department of Computing at the University of Dundee
During this webinar engineers:
- Gained a better understanding of the rules of UI composition including Consistency, Patterns, and Hierarchy. This will save you time during UI design creation and strive for a perfect implementation the first time around.
- Learned to understand what a developer looks for in a quality design work and how it can differ from a developer's perspective.
- Were taught the ability to recognize issues in visual UI and be able to fix them without your designer’s direction. As a result, more autonomy when implementing UI
These are the slides of the talk I gave at the Global Scrum Gathering Berlin in 2014.
It describes how Criteo managed to change the software engineering culture of its R&D department from 'Testing is cheating' to 22K+ tests being run every half hour.
A slide set to accompany an NKCS conversation on our emerging instructional coaching model... with the expert consultation of author, coach, and coach of coaches: Diane Sweeney. (www.dianesweeney.com)
In this presentation from ICA SBA 17, Anna Scudellari, consultant at the Martini & Rossi Historical Archive and member of the Bacardi Archive Team, speaks about heritage as a source of authenticity, inspiration and communication for the MARTINI Brand. She illustrates with some examples as well as present the museums at the MARTINI Brand Home. These archives have also been bestowed the public recognition of “Great Historical Interest” in Italy. She will also stress the importance of being part of archive networks, for both scientific support and increase in visibility.
A presentation from the the ICA SBA 17 conference in Stockholm in April 2017. For more from the conference, visit www.naringslivshistoria.se/icasba17stockholm
En aquesta xerrada tractarem els canvis que han sofert les comunicacions dels ciutadans i empreses, entre elles i amb l´Administració. S´estudiarà la contractació electrònica, la firma digital, la factura electrònica, DNI electrònic, etz.
The slides cover Introduction to Big Data and Data Science, as well as go over our current and future projects @eHarmony.
eHarmony was founded to give people a better chance to find happy, passionate and fulfilling relationships.
During this talk I will describe steps that we go through to create Compatible matches and how we leverage Big Data technologies to accomplish that goal.
I will specifically talk on how we take Billion+ potential matches that we find through MongoDB, store them in Voldemort NoSQL datastore and then run multiple Hadoop jobs to come up with filtered list based on Machine Learned models.
Our hadoop clusters are in-house, high density, low power Seamicro installations and we use Spring Batch and Spring Data Hadoop to orchestrate the hadoop jobs.
Did you know that eHarmony is responsible for 5% of all new US marriages and that more than 600,000 people already got married through us?
Blue Moon - Advertising Plan (Group Project)Sam Cheema
Blue Moon Ad Plan that was a required assessment as part of undertaking my studies in SUNY New Paltz. We devised this plan through research and foresight of implication.
Knowledge and identification of Malware binaries is a crucial part of detection and incident response. There was a time when using MD5s was sufficient to ID binaries. The reverse engineering analysis conducted once would be useful anytime that same MD5 hash was seen again. This has rapidly changed in recent years. Polymorphic samples of the same specimen change the file hash (MD5, SHAx etc) without much effort by the attacker. Also, cyber criminals and advanced adversaries reuse their codebase to create newer versions of their malware, but changes in the file hash disallow any opportunity to connect and leverage previous analyses of similar samples by defenders. This gives them an asymmetric advantage.
In recent years, there has been research into “similarity metrics”― methods that can identify whether, or to what degree, two malware binaries are similar to each other. Imphash, ssdeep and sdhash are examples of such techniques. In this talk, Bhavna will review which of these techniques is more suitable for evaluating similarities in code for APT related samples. This presentation will take a data analytics approach. We will look at binary samples from APT events from Jan- Mar 2015 and create clusters of similar binaries based on each of the three similarity metrics under consideration. We will then evaluate the accuracy of the clusters and examine their implications on the effectiveness of each technique in identifying provenance of an APT related binary. This can aid Incident responders in connecting otherwise disparate infections in their environment to a single threat group and apply past analyses of the abilities and motivations of that adversary to conduct more effective response.
A well-informed C-Suite is the most critical part of an effective cyber risk management program. This presentation provides the essential knowledge every executive must possess about cybersecurity to be effective when discussing the topic.
Golden Gate - 2, 3 e 4 quartos - Centro Nova IguaçuAntonio Neto
O endereço mais nobre de Nova Iguaçu recebe agora um condomínio fechado a sua altura. 2, 3 e 4 quartos (all suítes) com até 137,75m², até 3 vagas de garagem e dependências; e coberturas de até 5 suítes, com até 252,68m², visão panorâmica e pé-direito duplo. A maior estrutura de lazer de Nova Iguaçu, bosque com vegetação nativa e alameda verde, segurança total para toda família com guarita de acesso, circuito interno de tv.
Journée d’étude nationale, organisée par la commission Bibliothèques en réseau, à la médiathèque municipale de Mâcon le 17 janvier 2019
Établissement public territorial Grand Paris Sud Est Avenir (Seine-et-Marne et Val-de-Marne)
Présentation de Marie Calmet, coordinatrice du réseau, et un·e bénévole
Journée d’étude nationale, organisée par la commission Bibliothèques en réseau, à la médiathèque municipale de Mâcon le 17 janvier 2019
Commune nouvelle de Mauges-sur-Loire (Maine-et-Loire)
Présentation d'Élisabeth Cailleau, directrice de la lecture publique
Journée d’étude nationale, organisée par la commission Bibliothèques en réseau, à la médiathèque municipale de Mâcon le 17 janvier 2019
Golfe du Morbihan-Vannes agglo (Morbihan)
Présentation de Raymonde Butterworth, conseillère intercommunale déléguée à la lecture publique, et Élodie Le Bail, responsable du service de lecture publique
Journée d’étude nationale, organisée par la commission Bibliothèques en réseau, à la médiathèque municipale de Mâcon le 17 janvier 2019
Communauté de communes Sud Vendée Littoral (Vendée)
Présentation de Sylvie Pierron, directrice du réseau et Anne-Marie Cossard, bénévole du réseau intercommunal
Journée d’étude nationale, organisée par la commission Bibliothèques en réseau, à la médiathèque municipale de Mâcon le 17 janvier 2019
Conférence de Françoise Minetti, formatrice spécialisée en lecture publique
Congrès ABF 2018
Vendredi 8 juin - 14h30
Organiser une murder party en bibliothèque : mode d’emploi
Intervention de Virginie Bazart, bibliothécaire en secteur adultes, bibliothèques et médiathèques intercommunales de la Communauté d’agglomération d’Épinal
Congrès ABF 2018
Samedi 9 juin - 14h30
Alison Macrina, fondatrice et directrice du Library Freedom Project (États-Unis), une organisation dédiée à former les bibliothécaires et leurs usagers à se protéger contre la surveillance de masse et les atteintes aux libertés.
Congrès ABF 2018
Vendredi 8 juin - 14h30
Intervention de Sophie Rat, bibliothécaire, bibliothèque municipale de Dijon, membre du groupe de travail Illettrisme de l'ABF
Congrès ABF 2018
Jeudi 7 juin - 16H45
Intervention de Jean-Philippe Accart, directeur de la bibliothèque et des archives, école hôtelière de Lausanne, Suisse
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
Getting started with Amazon Bedrock Studio and Control Tower
Congrès ABF 2018 - Mini conf : 5 projets pour vous inspirer, 15 minnutes pour partager !
1. B I B L I O T H È Q U E A S S I A D J E B A R | 1 R U E R E Y N A L D O H A H N 7 5 0 2 0 | 0 1
8 4 8 2 1 9 5 0 B I B L I O T H E Q U E . A S S I A - D J E B A R @ PA R I S . F R | B I B - A S S I A -
D J E B A R . W I X S I T E . C O M / B I B - B A Z A R
2. COACQUISITION
BD&MANGAS
ADOS
U N P R O J E T PA R T I C I PAT I F M E N É
AVA N T L’ O U V E R T U R E
D E L A B I B L I OT H È Q U E A S S I A D J E B A R ( 7 5 0 2 0 )
2 0 1 6 - 2 0 1 7
3. 5 OBJECTIFS :
• C O N D U I R E U N E S T R AT É G I E D ’ I M M E R S I O N
Q U A R T I E R
• FAV O R I S E R L’A P P R O P R I AT I O N D ’ U N
N O U V E L É Q U I P E M E N T
• I N C L U R E L E S A D O L E S C E N T S E T
VA L O R I S E R L E U R S C O M P É T E N C E S ( R Ô L E
V I P D ’A M B A S S A D E U R S )
• C O N S T R U I R E AV E C E T PA S S E U L E M E N T
P O U R E T S U R TO U T PA S À L A P L A C E D E
• E T P U I S S U R TO U T D I S C U T E R , É C H A N G E R ,
S E R E N C O N T R E R !
4. ORGANISATION
• Q U A N D = 2 A N N É E S S C O L A I R E S 2 0 1 6 E T 2 0 1 7
• 1 S É A N C E M E N S U E L L E E N 2 0 1 6 P U I S 2 PA R M O I S E N
2 0 1 7
• Q U I = C O L L É G I E N S V O L O N TA I R E S 5 È M E E T 4 È M E
C O L L È G E L U C I E FA U R E / C R I S T I N O G A R C I A ( 2 0 È M E )
• O Ù = C D I D U C O L L È G E
• AV E C Q U I = 2 - 3 B I B L I O T H É C A I R E S D E L’ É Q U I P E D E
P R É F I G U R AT I O N
• E T A U S S I À PA R T I R D E 2 0 1 7 , D E U X I PA D !
5. POUR QUI
ACHÈTE-T-ON ?
L A C H A R T E D E P O L I T I Q U E D ’A C Q U I S I T I O N E N 4 A R T I C L E S
• C O M M E N T C O N S T R U I R E U N E P O L D O C ?
• C O M M E N T G É R E R U N B U D G E T ?
• L A V E I L L E D O C U M E N TA I R E , C ’ E S T Q U O I ?
• C O M M E N T A R G U M E N T E R S E S C H O I X ?
6. Des séances toujours animées
Au fur et à mesure, le projet fait
le buzz au sein du collège et
certaines séances ont pu avoir
jusqu’à 17 participants ! (8-9
participants en moyenne par
séance)
Certains choix sont déclinés
façon booktubing pour le blog
de la bibliothèque
Mais plus que d’être acquéreur
ou critique c’est LE PLAISIR DE
L’ECHANGE qu’on recherche !
Le bibliothécaire : facilitateur,
modérateur, curateur
7. QUELQUES
CHIFFRES…
D E 2 0 1 6 À 2 0 1 7 :
7 0 0 0 € D É P E N S É S
8 7 5 E X E M P L A I R E S A C Q U I S
6 7 0 M A N G A S E T 1 5 5 B D
6 V I D É O S R É A L I S É E S PA R L E S C O L L É G I E N S