Keynote for the Iowa State Extension Virtual Conference. The script can be found http://blog.anneadrian.com/2013/06/continuous-beta-and-healthy-dose-of.html
Keeping up: strategic use of online social networks for librarian current awa...suelibrarian
Presentation for VALA 2010 by Sue Cook and Con Wiebrands. If reusing please remove CSIRO branding and template. Copy of paper available via http://www.vala.org.au/conferences/vala2010/vala2010-programme (registration required)
This document discusses using Twitter lists to filter social media content by topic. It notes that 75% of online news consumers get news shared through social media, and over half share links. Twitter lists allow manually grouping users by topic discussed. The approach aims to automatically identify the niche topic of a Twitter list in real-time, improving the topic identification based on the global Twitter stream. Both textual and social features would be used to classify tweets, examining the interconnectedness of users in lists to identify central vs outlier users.
The document discusses the concepts of hyperpolitics, hyperconnectivity, hypermimesis, and hyperempowerment. It notes that information spreads rapidly around the world through connectivity and hacking communities. It also describes controversy at Wikipedia where administrators were found to be using a secret mailing list to crack down on perceived threats to their power, angering many editors. It concludes that hyperconnectivity leads to rapid copying of information and then greater empowerment, though this process is not like democracy.
This document is a homepage for EDU Libs, a website that provides educational documents for university research. It lists categories of documents available including a growing collection, published ebooks, project ideas, and recent documents. It also provides options to sign up for a newsletter to stay informed of new additions and get occasional free items. The footer provides basic information about the website.
The Benefits and Barriers for Social Media for ScientistsCraig McClain
Social media provides both benefits and challenges for scientists. It allows for quick connection and collaboration with other researchers, but does not directly correlate with increased citations. While it can help with outreach, communicating science to the public remains challenging. Many scientists see communication as filling knowledge deficits in the public, but this "deficit model" may not be effective. Effective social media use for outreach requires understanding audience and goals.
This document summarizes key facts and statistics about Twitter usage and demographics. It then provides context for studying hashtags and tweets related to the Black Lives Matter movement. Specifically, it examines the roles that social media and digital tools played in amplifying anti-police brutality activist goals. The research aims to understand how online media contributed to the growth and impact of the BLM movement by analyzing traces people left through interacting on Twitter.
Keeping up: strategic use of online social networks for librarian current awa...suelibrarian
Presentation for VALA 2010 by Sue Cook and Con Wiebrands. If reusing please remove CSIRO branding and template. Copy of paper available via http://www.vala.org.au/conferences/vala2010/vala2010-programme (registration required)
This document discusses using Twitter lists to filter social media content by topic. It notes that 75% of online news consumers get news shared through social media, and over half share links. Twitter lists allow manually grouping users by topic discussed. The approach aims to automatically identify the niche topic of a Twitter list in real-time, improving the topic identification based on the global Twitter stream. Both textual and social features would be used to classify tweets, examining the interconnectedness of users in lists to identify central vs outlier users.
The document discusses the concepts of hyperpolitics, hyperconnectivity, hypermimesis, and hyperempowerment. It notes that information spreads rapidly around the world through connectivity and hacking communities. It also describes controversy at Wikipedia where administrators were found to be using a secret mailing list to crack down on perceived threats to their power, angering many editors. It concludes that hyperconnectivity leads to rapid copying of information and then greater empowerment, though this process is not like democracy.
This document is a homepage for EDU Libs, a website that provides educational documents for university research. It lists categories of documents available including a growing collection, published ebooks, project ideas, and recent documents. It also provides options to sign up for a newsletter to stay informed of new additions and get occasional free items. The footer provides basic information about the website.
The Benefits and Barriers for Social Media for ScientistsCraig McClain
Social media provides both benefits and challenges for scientists. It allows for quick connection and collaboration with other researchers, but does not directly correlate with increased citations. While it can help with outreach, communicating science to the public remains challenging. Many scientists see communication as filling knowledge deficits in the public, but this "deficit model" may not be effective. Effective social media use for outreach requires understanding audience and goals.
This document summarizes key facts and statistics about Twitter usage and demographics. It then provides context for studying hashtags and tweets related to the Black Lives Matter movement. Specifically, it examines the roles that social media and digital tools played in amplifying anti-police brutality activist goals. The research aims to understand how online media contributed to the growth and impact of the BLM movement by analyzing traces people left through interacting on Twitter.
Twitter Social Networking And Social Media Oct1509Molly Immendorf
This document discusses Twitter and social networks. It defines social networks and describes how Twitter allows for microblogging up to 140 characters in length. It notes how Twitter can be used for breaking news, marketing, and grassroots organizing. The document also discusses how farmers are using smartphones and social media like Twitter to connect with customers and share information.
How Social Media Might Impact the Sex Education DebateJESS3
The document discusses how social media was used to impact the sex education policy debate. It describes how the author saw a headline on Twitter criticizing sex education that motivated her to write a response. She launched a petition on Act.ly that gained support, and also responded in the original medium with a featured letter. The author then used targeted Facebook ads and Flickr images to further engage people. Key factors that worked were monitoring social media, having activists and bloggers to quickly reach, understanding Facebook advertising, documenting efforts, and responding in the original medium.
The document discusses the evolution of the web from read-only to read-write and participation through user-generated content and social media. It defines social media as people having conversations online and outlines how users interact by posting, sharing, tagging, and commenting on various types of content. The document also discusses emerging technologies like mobile social web, telepresence, and crowdsourcing as well as laws governing the growth of networks and bandwidth.
Social Media Adoption: U.S., Individual Level, Teens & Young AdultsDr. V Vorvoreanu
The document discusses trends in social media adoption among teens and young adults in the United States. It finds that 93% of teens and young adults use the internet, with social networks being their primary online activity. Usage of social networks has risen significantly between 2006 and 2010, with 73% of wired American teens now using social networks. The most commonly used social networks are Facebook, MySpace, and Twitter. Daily usage of social networks is high, with 45% of teens and young adults reporting using social networks daily.
Presentation charting the development of Web 2.0 technologies, and how to use them effectively as a medical professional, whilst avoiding the pitfalls. Draws on UK, ANZ and general professionalism guidelines.
NUSA 2013 - Lifestyles of the Well ConnectedEmpowerLA
The document discusses how people use social media and connectivity tools. It notes that 94% of internet users ages 18-64 use email daily and 61% use social networking sites. It provides tips for using various media like YouTube, UStream and Slideshare effectively by adding relevant tags, connecting to social accounts, and setting automatic captions. It lists different connectivity platforms that can be used like YouTube, Twitter, email campaigns and websites. It concludes with contact information for three people.
Building Movements: Beyond Emails, Campaigns, and Organizations (May 2013, PD...PDXTech4Good.org
Ivan Boothe from Rootwork.org presented an abbreviated version of his session at the 2013 Nonprofit Technology Conference.
A recording from PDXTech4Good, a free monthly gathering of nonprofits, techies and activists in Portland, Oregon. More information: PDXTech4Good.org
The full version of this presentation, along with Rachel Weidinger of Upwell, is posted here:
http://www.slideshare.net/rootwork/building-movements-beyond-emails-beyond-campaigns-and-beyond-organizations
Media, psychology and democracy 22nd may talk finalsharon coen
This document discusses several topics related to media, psychology and democracy. It summarizes findings from an 11-nation study that found a relationship between TV news viewing and political engagement. It also notes that political sources and women/minorities are underrepresented in UK media based on a study of BBC and ITV. Finally, it suggests actions that could be taken like protecting the BBC, raising awareness of media issues, and using social media for activism.
Using Twitter And Social Networking As A Toolmfaulkner
Michael Faulkner presents on using Twitter for situational awareness and public information during emergencies. Twitter allows real-time information sharing from any location. It was useful during disasters like wildfires and protests by providing firsthand updates. However, content is mostly casual conversations and promotions. Physical infrastructure is required and content cannot be regulated. Government use requires clear social media policies regarding appropriate content. Twitter provides a way to disseminate brief, urgent messages to a broad audience but has limitations and drawbacks to consider for emergency situations.
Explore IT: Expand Your Teaching Practice with Twitter: Develop a PLNKristen T
This document discusses personal learning networks (PLNs) and how Twitter can be used to build a PLN. It defines a PLN as a network of people and resources that can help with learning and explains the benefits of Twitter for connecting with experts, collaborating, finding people at conferences, and more. The document provides tips on setting up a Twitter profile and identity, engaging with relevant hashtags and conversations, and using Twitter to communicate, converse and collaborate with others.
This document discusses how social media can be used by community journalists to reach new readers. It defines social media as online services that allow for interaction, content sharing within a network, and open conversations. Examples provided include commenting on websites, Facebook, Twitter, YouTube and Flickr. The document notes that 51% of social network users have more than one profile and 65% of readers also have multiple profiles according to survey data.
1. The document discusses trends in online collaboration including fractured attention, rapidly changing tools, and blurred boundaries between personal and professional communication.
2. It notes the rise in use of blogs, social networking, and mobile technologies for communication by different generations and the changing preferences around tools like email, instant messaging, and texting.
3. The document promotes starting discussions about power dynamics and accessibility issues in online spaces in order to make collaboration more inclusive.
This document summarizes a presentation about CloudMan, a platform for deploying cloud computing resources and Galaxy instances. CloudMan allows users to setup cloud clusters in minutes without expertise, provides over 700GB of reference genomes and bioinformatics tools, and enables customization and sharing of derived cluster instances. It bridges users, isolated Galaxy instances, and cloud infrastructure. Key features include deployment on AWS, automated configuration, dynamic storage, and elastic scaling of resources.
World's 1st Ever Dissertation on Cloud Computing: Assured Identity for The CloudLockheed Martin
First Dissertation on Cloud Computing -> Cloud Computing and Assured Identity
//
It has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008). A recent study conducted by the Office of Homeland Security found that cyber security is a national problem (Homeland Security, 2009). The study recommended that ―managing identities‖ must be part of a comprehensive national cyber security strategy. The Department of Defense Cyber, Identity, and Information Assurance Strategic Plan calls for systems and security to be united. In this research project, an approach to enabling assured identity and access management controls specifically in cloud computing environments was evaluated. The research designed and implemented the Assured Identity Management Systems (AIMS) using the systems engineering process (SEP). The evaluation of use cases and sequence diagrams demonstrated the capability for identity assurance with lifecycle events in cloud computing environments. The dissertation study designed an extensible model including requirements, use cases, context diagrams, sequence diagrams, reusable components to further the adoption of cloud It has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008).
1. The document discusses various ways the internet can be used for teaching and learning. It provides 10 examples of internet applications and 10 categories of internet uses.
2. The applications include video conferencing tools like Skype, educational games and simulations, and resources from organizations like NASA and National Geographic.
3. The uses include general research, completing and submitting assignments, online testing, presenting materials, social networking, professional consultation, enrolling in classes, submitting payments, reviewing records, and creating new content.
Twitter Social Networking And Social Media Oct1509Molly Immendorf
This document discusses Twitter and social networks. It defines social networks and describes how Twitter allows for microblogging up to 140 characters in length. It notes how Twitter can be used for breaking news, marketing, and grassroots organizing. The document also discusses how farmers are using smartphones and social media like Twitter to connect with customers and share information.
How Social Media Might Impact the Sex Education DebateJESS3
The document discusses how social media was used to impact the sex education policy debate. It describes how the author saw a headline on Twitter criticizing sex education that motivated her to write a response. She launched a petition on Act.ly that gained support, and also responded in the original medium with a featured letter. The author then used targeted Facebook ads and Flickr images to further engage people. Key factors that worked were monitoring social media, having activists and bloggers to quickly reach, understanding Facebook advertising, documenting efforts, and responding in the original medium.
The document discusses the evolution of the web from read-only to read-write and participation through user-generated content and social media. It defines social media as people having conversations online and outlines how users interact by posting, sharing, tagging, and commenting on various types of content. The document also discusses emerging technologies like mobile social web, telepresence, and crowdsourcing as well as laws governing the growth of networks and bandwidth.
Social Media Adoption: U.S., Individual Level, Teens & Young AdultsDr. V Vorvoreanu
The document discusses trends in social media adoption among teens and young adults in the United States. It finds that 93% of teens and young adults use the internet, with social networks being their primary online activity. Usage of social networks has risen significantly between 2006 and 2010, with 73% of wired American teens now using social networks. The most commonly used social networks are Facebook, MySpace, and Twitter. Daily usage of social networks is high, with 45% of teens and young adults reporting using social networks daily.
Presentation charting the development of Web 2.0 technologies, and how to use them effectively as a medical professional, whilst avoiding the pitfalls. Draws on UK, ANZ and general professionalism guidelines.
NUSA 2013 - Lifestyles of the Well ConnectedEmpowerLA
The document discusses how people use social media and connectivity tools. It notes that 94% of internet users ages 18-64 use email daily and 61% use social networking sites. It provides tips for using various media like YouTube, UStream and Slideshare effectively by adding relevant tags, connecting to social accounts, and setting automatic captions. It lists different connectivity platforms that can be used like YouTube, Twitter, email campaigns and websites. It concludes with contact information for three people.
Building Movements: Beyond Emails, Campaigns, and Organizations (May 2013, PD...PDXTech4Good.org
Ivan Boothe from Rootwork.org presented an abbreviated version of his session at the 2013 Nonprofit Technology Conference.
A recording from PDXTech4Good, a free monthly gathering of nonprofits, techies and activists in Portland, Oregon. More information: PDXTech4Good.org
The full version of this presentation, along with Rachel Weidinger of Upwell, is posted here:
http://www.slideshare.net/rootwork/building-movements-beyond-emails-beyond-campaigns-and-beyond-organizations
Media, psychology and democracy 22nd may talk finalsharon coen
This document discusses several topics related to media, psychology and democracy. It summarizes findings from an 11-nation study that found a relationship between TV news viewing and political engagement. It also notes that political sources and women/minorities are underrepresented in UK media based on a study of BBC and ITV. Finally, it suggests actions that could be taken like protecting the BBC, raising awareness of media issues, and using social media for activism.
Using Twitter And Social Networking As A Toolmfaulkner
Michael Faulkner presents on using Twitter for situational awareness and public information during emergencies. Twitter allows real-time information sharing from any location. It was useful during disasters like wildfires and protests by providing firsthand updates. However, content is mostly casual conversations and promotions. Physical infrastructure is required and content cannot be regulated. Government use requires clear social media policies regarding appropriate content. Twitter provides a way to disseminate brief, urgent messages to a broad audience but has limitations and drawbacks to consider for emergency situations.
Explore IT: Expand Your Teaching Practice with Twitter: Develop a PLNKristen T
This document discusses personal learning networks (PLNs) and how Twitter can be used to build a PLN. It defines a PLN as a network of people and resources that can help with learning and explains the benefits of Twitter for connecting with experts, collaborating, finding people at conferences, and more. The document provides tips on setting up a Twitter profile and identity, engaging with relevant hashtags and conversations, and using Twitter to communicate, converse and collaborate with others.
This document discusses how social media can be used by community journalists to reach new readers. It defines social media as online services that allow for interaction, content sharing within a network, and open conversations. Examples provided include commenting on websites, Facebook, Twitter, YouTube and Flickr. The document notes that 51% of social network users have more than one profile and 65% of readers also have multiple profiles according to survey data.
1. The document discusses trends in online collaboration including fractured attention, rapidly changing tools, and blurred boundaries between personal and professional communication.
2. It notes the rise in use of blogs, social networking, and mobile technologies for communication by different generations and the changing preferences around tools like email, instant messaging, and texting.
3. The document promotes starting discussions about power dynamics and accessibility issues in online spaces in order to make collaboration more inclusive.
This document summarizes a presentation about CloudMan, a platform for deploying cloud computing resources and Galaxy instances. CloudMan allows users to setup cloud clusters in minutes without expertise, provides over 700GB of reference genomes and bioinformatics tools, and enables customization and sharing of derived cluster instances. It bridges users, isolated Galaxy instances, and cloud infrastructure. Key features include deployment on AWS, automated configuration, dynamic storage, and elastic scaling of resources.
World's 1st Ever Dissertation on Cloud Computing: Assured Identity for The CloudLockheed Martin
First Dissertation on Cloud Computing -> Cloud Computing and Assured Identity
//
It has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008). A recent study conducted by the Office of Homeland Security found that cyber security is a national problem (Homeland Security, 2009). The study recommended that ―managing identities‖ must be part of a comprehensive national cyber security strategy. The Department of Defense Cyber, Identity, and Information Assurance Strategic Plan calls for systems and security to be united. In this research project, an approach to enabling assured identity and access management controls specifically in cloud computing environments was evaluated. The research designed and implemented the Assured Identity Management Systems (AIMS) using the systems engineering process (SEP). The evaluation of use cases and sequence diagrams demonstrated the capability for identity assurance with lifecycle events in cloud computing environments. The dissertation study designed an extensible model including requirements, use cases, context diagrams, sequence diagrams, reusable components to further the adoption of cloud It has been widely reported the largest security concerns with cloud computing design and implementation are centered on identity and access management. Pearson (2009) identifies open security challenges such as where processing takes place, auditability of transactions, and data sensitivity in distributed systems. Cloud computing builds on prior research in virtualization, distributed computing, utility computing, networking, and web services (Vouk, 2008).
1. The document discusses various ways the internet can be used for teaching and learning. It provides 10 examples of internet applications and 10 categories of internet uses.
2. The applications include video conferencing tools like Skype, educational games and simulations, and resources from organizations like NASA and National Geographic.
3. The uses include general research, completing and submitting assignments, online testing, presenting materials, social networking, professional consultation, enrolling in classes, submitting payments, reviewing records, and creating new content.
VIVO is an open source software and community that aims to facilitate research discovery by creating a platform to connect data about people, publications, funding, events, and more. It extracts and links this information using ontologies. VIVO generates HTML and RDF representations of the data to allow for presentation, search, and analysis tools like ScienceMap to examine collaborations. The VIVO community includes scientists, implementers, and developers who work to augment the data and develop new tools and visualizations to further research discovery goals.
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015Claus Cramon Houmann
1) The I Am The Cavalry organization aims to ensure connected technologies that could impact public safety and lives are secure and trustworthy.
2) As technology connectivity grows faster than security improvements, the Cavalry argues that citizens must take action to drive positive change sooner.
3) The Cavalry's mission is to connect security researchers, industry, policymakers and others to collaborate on solutions like the "5 Star" framework to help manufacturers design secure products and respond quickly to vulnerabilities.
This document discusses the importance of Government 2.0 and adopting Web 2.0 tools to make government more open, collaborative, and efficient. It provides examples of how agencies can use wikis, blogs, podcasts, social networking, and other online tools to engage with the public, leverage collective intelligence, and streamline internal processes. The document encourages agencies to think about why, who, what, when, and how they can implement these new technologies as part of their mission to better serve constituents.
Claudia Maria is a woman passionate about technology who aims to be a visible role model empowering future generations, especially girls, to pursue STEM. As an undergraduate researcher, she led a team of 4 students conducting data analysis and usability testing to help publish a journal on IPv6 adoption. Her leadership role involved supervising teammates, conducting meetings, and presenting their research posters. She hopes to continue empowering women through technology education.
This document provides tips for evaluating information found online. It discusses checking the currency, reliability, and author/publisher of information. Professional versus amateur design is also considered. Collective intelligence from networks and applications can help assess information by tapping many individuals. Examples given are Wikipedia, Q&A sites, Facebook, and Google. The document contrasts various search engines and websites for different types of information like medical, political, general, and journalism-related. Principles of media consumption and the echo chamber effect are also covered. The document ends with discussion questions about online information credibility, civil journalism advantages/disadvantages, and downsides of collective intelligence.
The document discusses how globalization and new technologies have "flattened the world" by enabling more collaboration and outsourcing of jobs internationally. It outlines 10 "flatteners" including the rise of the internet, outsourcing, offshoring, and supply chain management. It argues that to succeed in this new environment, workers must constantly upgrade skills and notes shortfalls in US students pursuing STEM fields and American ambition compared to countries like China.
A technical update on CILogon (cilogon.org) and InCommon (incommon.org), which enable federated authentication to Globus, XSEDE, and other research services. Topics include: 1) growing support for the Research and Scholarship Category in InCommon and the world, 2) Identifier-Only Trust Assurance (IOTA) in the Interoperable Global Trust Federation (igtf.net), 3) obtaining X.509 server certificates from the InCommon IGTF Server CA, and 4) keeping current with security standards (e.g., OpenID Connect, SHA-2, TLS 1.2).
Presented at GlobusWorld 2015 (www.globusworld.org).
"Leaders and Laggards in the preservation of raw biomedical research data" presented at NEDCC 2010, The Tectonics of Digital Curation
A Symposium on the Shifting Preservation and Access Landscape
Keynote presentation at Hack.lu 2015 by Marie Moe. This talk is focused on the problem that we have these life critical devices with vulnerabilities that can’t easily be patched without performing surgery on patients, my personal experience with being the host of such a device, and how the hacker community can proceed to work with the vendors to secure the devices.
Similar to Continuous Beta and a Healthy Dose of Paranoia (13)
Study of Open Data in PUSH UniversitiesAnne Adrian
The document summarizes a study conducted by PUSH and GODAN on open data policies at 99 PUSH universities. Some key findings were that only 15 universities had open access policies, none had specific open data policies, and open data sharing was driven more by funder requirements. Recommendations included for universities to define data ownership, involve faculty in policy creation, and have administrative support. Recommendations for funders/universities included facilitating conversations between the two, developing agreements that address challenges, and agreeing on standards and protocols.
Presidents United to Solve Hunger (PUSH) and Open Data a PUSH UniversitiesAnne Adrian
An international consortium of over 100 university presidents from five continents called Presidents United to Solve Hunger (PUSH) aims to end hunger and poverty through research, education, student engagement and outreach. A recent study assessed the open access and open data policies of 99 PUSH universities and found that while 15 have open access policies, none have open data policies. The study identified benefits and concerns of open data, and provided recommendations for universities to develop open data policies and infrastructure to support open data practices. These recommendations include communicating benefits, aligning policies with funder expectations, improving faculty compliance, refining policies, and creating infrastructure.
University of Georgia Cooperative Extension Winter School 2016: From Innovati...Anne Adrian
The document outlines the new structure and focus of eXtension, now called i-Three. It has a member-based model with premium and basic member institutions governed by a Board of Directors. i-Three will increase the effectiveness of Cooperative Extension Service (CES) professionals through an Issue Corps, Innovation Lab, and Rapid Solutions programs. The Issue Corps will have around 120 members working on climate and food systems issues in 2016. The Innovation Lab will support innovation projects and fellows. Rapid Solutions will generate 10-20 solutions with Issue Corps members by August 2016. i-Three aims to help CES professionals deliver greater measurable impact through new resources, tools, methods, and professional development opportunities.
International Extension Education Conference: From Innovation to ImpactAnne Adrian
The document summarizes Anne Mims Adrian's presentation on eXtension and its new i-Three initiative. eXtension began in 2004 as an online collaboration platform for Cooperative Extension, and is now a nonprofit focused on innovation to increase Extension's impact. The i-Three initiative includes Issue Corps of 127 educators working on food/climate issues, an Innovation Lab developing new projects, and rapid Project Solutions. The presentation outlines how i-Three will help Corps members and develop new tools, and notes upcoming professional development and the March conference.
The document discusses key statistics about social media usage. It notes that Facebook has over 1.3 billion active users, 82% of which are outside of the US and Canada. It also mentions that 60 million photos are uploaded to Instagram each day. The document then discusses predictions that social media usage will nearly double by 2018 with over 2.44 billion people using social networks globally. It ends by emphasizing the importance of aligning social media goals with organizational goals.
Skills for the Current and Future Knowledge WorkerAnne Adrian
This document summarizes a presentation on the skills needed for current and future knowledge workers. It identifies 11 skills from a 2020 knowledge work skills report by the Institute for the Future: sensemaking, social intelligence, novel adaptive thinking, cross-cultural competency, computational thinking, new media literacy, transdisciplinarity, design mindset, cognitive load management, and virtual collaboration. It also identifies 9 skills and 7 attributes that a separate ECOP-sponsored study found are important for 21st century Extension professionals. The presentation concludes with questions for discussion on how Extension should adjust to future forces and focus its workforce.
Scaling Our Teaching and Learning on learn.eXtension.orgAnne Adrian
Learn.eXtension.org is an online platform for professional development events and learning activities that can be conducted anywhere and accessed by individuals tracking their presentations and courses. The site provides a centralized page for each event with details like the title, presenters, description, resources, slides, recordings and social media sharing. Users can follow events, comment, create events, edit events, and tag events. There is potential to host nationwide series on topics that could benefit educators across the country. The site aims to connect learners with presenters and content.
Not Your Grandparents’ or Great-grandparents' ExensionAnne Adrian
Presentation for a guest lecture in a a graduate level Extension Methods class.
A blog post explanation the points in more detal can be found http://blog.anneadrian.com/2014/04/guest-lecture-on-extension-engagement.html
A comparison of two studies --an ECOP sponsored study identifying 21st Century Cooperative Extension professionals and the Institute of the Future 2020 Skills of the Knowledge Workers
This presentation was conducted as a webinar with the Oregon State Cooperative Extension field, regional, and county leaders.
The presentation was conducted with the goal of discussion what our workforce should look like in the future.
This document summarizes a study on the skills needed for future knowledge workers, including Extension professionals. It identifies 10 key skills from an Institute for the Future report: sensemaking, social intelligence, novel adaptive thinking, cross-cultural competency, computational thinking, new media literacy, transdisciplinarity, design mindset, cognitive load management, and virtual collaboration. The study examined Extension job postings, surveys of Extension administrators, and focus groups with effective Extension professionals to identify important skills and attributes. It emphasizes skills like technology use, communication, teamwork and teaching, as well as attributes like engagement, listening, flexibility, and passion.
What Do Future Technology and Trends Mean for You? Anne Adrian
This document discusses future technology trends and their implications for organizations like Cooperative Extension. It outlines trends like MOOCs, open access, mobile computing and their impact on education and information sharing. The document recommends that Cooperative Extension focus on skills like critical thinking, virtual collaboration, social media proficiency, and developing open and shareable content to respond effectively to changing needs and landscapes.
The Role of Public Intellectuals in Cooperative Extension Anne Adrian
Shouldn't Extension experts, members of an organization that has always prided itself on providing impartial research-based information, share a place at the table with the nation’s leading public intellectuals? We contend that establishing a core group of public intellectuals at both the state and national levels of discourse should be a core strategy in helping us separate our message from others in this enormously competitive information environment. As a moral obligation Extension educators at all levels have a responsibility, not only as scholars but as public servants, to help put highly complicated, even controversial issues, into sharper perspective on behalf of their clients with the goal of improving their lives. “…no scholar, historian or anyone else is — merely by being a scholar — ethically excused from their own circumstances. We are also participants in our own time and place and cannot retreat from it…” Extension educators are now struggling to navigate their way across an increasingly steep, jagged divide between techno-skeptics, who harbor a deep mistrust of technology and its long-term implications, and techies, who, despite some misgivings, generally believe that each technological advance ultimately works to secure a better life for all of us. With this refinement has come a clearer understanding of the environmental costs associated with scientific and techno Who is better equipped to serve the bridging the gap that exists in understanding environmental costs, benefits, and technological process.
There will be an increasing need for public intellectuals from many different disciplines within Extension to explain how this new farming model will be expressed and how it ultimately will affect them. Herein lies an enormous opportunity for Extension — an opportunity for profound organizational transformation. This presentation was conducted at Galaxy 2013. See page 5 for a more detailed explanation https://custom.cvent.com/18A6750208F1461A8000EA09BA931C3A/files/c9cdbf25833147d4ae232bab6a08ff47.pdf
Jim Langcuster and Anne Adrian were the presenters
Collaborative social platforms for agriculture extension”Anne Adrian
Jim Langcuster and Anne Adrian from Auburn University presented at the University of Guelph on April 5, 2013. Their presentation focused on how organizations can become defined by how they contribute to ecosystems and platforms through sharing, serendipitous insights, diversity of information, and innovative thinking. They drew inspiration from the books Where Good Ideas Come From and The Connected Company. They discussed publication and video on platforms.
We used these questions http://www.slideshare.net/aafromaa/questions-for-informal-learning to have the discussion around informal learning
December 13, 2012
This document provides questions to prompt discussion around informal learning. It cites a statistic that 85-90% of job knowledge is learned on the job through informal learning, while 10-15% is learned through formal training. The questions prompt discussion on defining and providing examples of formal, non-formal and informal learning. Additional questions explore what people find rewarding about conferences, how technology has changed expectations, how to enhance non-formal learning programs, how to help people take advantage of informal learning, and if co-creation could encourage informal learning.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
1. Continuous Beta and a
Healthy Dose of Paranoia
Anne Mims Adrian, Ph.D.
eXtension Military Families Learning Network located
Auburn University
@aafromaa
slideshare.net/aafromaa
storify.com/ndbob/forward-looking-concepts-in-extension
#ISUVirtual2013
June 4, 2013
Iowa State Virtual State Conference
13. Connectedness-Wireachy
Wirearchy – a dynamic two-way flow of power and authority based on
knowledge, trust, credibility and a focus on results, enabled by
interconnected people and technology. Jon Husband 1999
http://www.jarche.com/
15. Barriers to Cooperative Extension
to Disruptive Innovations
• Lack of urgency to innovate
• A lack of diversity in customer base and staffing
• Strong linkage to academia, bureaucracy and historic
slowness to react to change
• Lack of operating with a business mindset
• An expert model paradigm rather than collaborative
paradigms with clients
• Over reliance on rural customers
• A lack of customer management/tracking over time
• Status quo
• Over dependence on past sources of funding
http://www.joe.org/joe/2012april/comm1.php
19. Sense-making and Curation
Scoop.it Community Gardens –Illinois
http://www.scoop.it/t/community-gardening-resources
Twitter Paul McKenzie, Ag Agent
https://twitter.com/pgmckenzie
Pinterest: Master Gardeners
http://pinterest.com/search/pins/?q=master%20gardener&rs=ac&len=10
Blogging Military Families
http://blogs.extension.org/militaryfamilies/
LinkedIn: Early Ed for Military Families
http://www.linkedin.com/groups?gid=4276983&trk=myg_ugrp_ovr
Paper.li Stan Skrabut, Wyoming
http://paper.li/skrabut/1344968231
Kurator Bob Bertsch, ND State
http://kuratur.com/ndbob/netlit.html
Storify This presentation
http://storify.com/ndbob/forward-looking-con
Google Plus Network Literacy
https://plus.google.com/u/0/100994641102542483850/posts
20. Informal Learning
is a continuous process
http://www.jarche.com/key-posts/personal-knowledge-management/
27. “Continuous Beta and a Healthy
Dose of Paranoia”
by Anne Mims Adrian is licensed under a
Creative Commons Attribution 3.0 Unported
License.
When using photos from this presentation, please note and
adhere to their Creative Commons or All rights reserved
license.