The proliferation and adoption of data, sensors, mobile phones and social media technology present new ways of capturing conversations surrounding events in real-time. There is high demand for products that allow law enforcement and criminal investigators and others to explore events by monitoring many transmedia sources (social media sources like Facebook and Twitter, photos, news sources, and tweets) and relating that activity to historic data sets like neighborhood maps, crime databases and other digital records.
!
Using a combination of the data-analysis products available from D8A Group, we’ve been monitoring unfolding events in real-time to illustrate the ways our technology platforms can be used by public safety officials to make data informed decisions in real-time public safety.
Dealing with poor data quality of osint data in fraud risk analysisUniversity of Twente
Presented at the SIKS Smart Auditing Workshop, 25 Feb 2015.
Governmental organizations responsible for keeping certain types of fraud under control, often use data-driven methods for both immediate detection of fraud, or for fraud risk analysis aimed at more effectively targeting inspections. A blind spot in such methods, is that the source data often represents a 'paper reality'. Fraudsters will attempt to disguise themselves in the data they supply painting a world in which they do nothing wrong. This blind spot can be counteracted by enriching the data with traces and indicators from more 'real-world' sources such as social media and internet. One of the crucial data management problems in accomplishing this enrichment is how to capture and handle data quality problems. The presentation will start with a real-world example, which is also used as starting point for a problem generalization in terms of information combination and enrichment (ICE). We then present the ICE technology as well as how data quality problems can be managed with probabilistic databases. In terms of the 4 V's of big data -- volume, velocity, variety and veracity -- this presentation focuses on the third and fourth V's: variety and veracity.
Another great content/horrendous stock photo "presentation" from IT Business Edge about Big Data. (http://www.itbusinessedge.com/slideshows/big-data-eight-facts-and-eight-fictions.html)
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
This whitepaper discusses how social media monitoring tools can be applied as powerful and cost effective Open Source Intelligence (OSINT) platforms; and how they can support collection and analysis of relevant and targeted information relating to counter-terrorism, criminal and political open sources.
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsMike Kujawski
These are my slides from a custom tool-based demonstration workshop I was asked to do where I went over various free tools that can be used to obtain valuable public data.
Dealing with poor data quality of osint data in fraud risk analysisUniversity of Twente
Presented at the SIKS Smart Auditing Workshop, 25 Feb 2015.
Governmental organizations responsible for keeping certain types of fraud under control, often use data-driven methods for both immediate detection of fraud, or for fraud risk analysis aimed at more effectively targeting inspections. A blind spot in such methods, is that the source data often represents a 'paper reality'. Fraudsters will attempt to disguise themselves in the data they supply painting a world in which they do nothing wrong. This blind spot can be counteracted by enriching the data with traces and indicators from more 'real-world' sources such as social media and internet. One of the crucial data management problems in accomplishing this enrichment is how to capture and handle data quality problems. The presentation will start with a real-world example, which is also used as starting point for a problem generalization in terms of information combination and enrichment (ICE). We then present the ICE technology as well as how data quality problems can be managed with probabilistic databases. In terms of the 4 V's of big data -- volume, velocity, variety and veracity -- this presentation focuses on the third and fourth V's: variety and veracity.
Another great content/horrendous stock photo "presentation" from IT Business Edge about Big Data. (http://www.itbusinessedge.com/slideshows/big-data-eight-facts-and-eight-fictions.html)
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
This whitepaper discusses how social media monitoring tools can be applied as powerful and cost effective Open Source Intelligence (OSINT) platforms; and how they can support collection and analysis of relevant and targeted information relating to counter-terrorism, criminal and political open sources.
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsMike Kujawski
These are my slides from a custom tool-based demonstration workshop I was asked to do where I went over various free tools that can be used to obtain valuable public data.
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...g8briel
In light of new revelations about government warrantless wiretapping and electronic surveillance what role do librarians have in educating our patrons about digital privacy and security issues? Given that digital privacy is further complicated by for-profit Internet companies services, such as those provided by Facebook and Google, are our users savvy enough to understand threats to their information in this increasingly complex digital landscape? This presentation will explore issues related to current events and information security with an eye towards the implications for information literacy standards; brief examination of tools used to enhance information privacy; and discuss how librarians might play a role in helping users become more information aware.
A visual approach to fraud detection and investigation - Giuseppe FrancavillaData Driven Innovation
Understanding fraud is a matter of understanding connections. Investigators seek unusual links between people, accounts and events. They scour huge, noisy and complex datasets to understand which connections are genuine, and which may indicate fraud. This talk is about the vital role data visualization plays in fraud detection. Using live demos, Giuseppe Francavilla will describe a generic architecture for enterprise fraud detection, with data visualization at its core, and explain how a powerful visualization component can make fraud intelligence quick to find and easy to communicate
Top industry use cases for streaming analyticsIBM Analytics
Organizations need to get high value from streaming data to gain new clients and capitalize on market opportunities. Discover how IBM Streams is best suited for use cases that has the need for high speed and low latency.
Anecdotes about real life usage of Analytics - research done on Google, hence no claims on accuracy. Please use this as a directional insights into the applications and benefits.
Whether you are in the field or at the office, Whooster LE delivers rapid, reliable person search data to solve your search and advance your investigation. Used by law enforcement, state and federal agencies across the United States and internationally, Whooster LE leads the industry with SMS Text-Messaging and Web Solutions.
This presentation gives you 3 tips to start Market (Open Source) Intelligence in your company:
1. Consider information as the Key of your Business;
2. Do not fight against the Web 2.0, ineluctable Evolution but use it for intelligence;
3. Break outdated paradigms about the Web.
Once again, it’s time for Kaspersky to deliver our customary retrospective of the key events that have defined the threat landscape in 2013. Let’s start by looking back at the things we thought would shape the year ahead, based on the trends we observed in the previous year.
Data Mining Online Audiences with D8A GroupJon Gosier
Using a combination of the data-analysis products available from D8A Group, we’ve been monitoring the unfolding events in real-time to illustrate the ways our technology platforms can be used by companies, PR firms, marketing agencies, political groups, celebrities, and NGOs to make data informed decisions in real-time crisis scenarios.
In this case study document, we analyze breaking news scenarios involving Chris Christie's Brigegate scandal, Kerry Washington's appearance at the Golden Globes, and the Knight Foundation who we weren't aware had any news events at the time, but we quickly became aware of two through the use of our software.
The primary purpose of using technologies like the D8A suite of analytic products is to monitor and capture real-time data for analysis and research. They are also predictive, helping to surface trends, patterns, and happenings before one might find out about them otherwise. D8A’s products work across multiple communication channels.
JIMS IT Flash , a monthly newsletter-An Initiative by the students of IT Department, shares the knowledge to its readers about the latest IT Innovations, Technologies and News.Your suggestions, thoughts and comments about latest in IT are always welcome at itflash@jimsindia.org.
Visit Website : http://jimsindia.org/
The Matrix Mapper (MM) - This is a product for which the Aarktech - KBCRF consortium is looking for any of several options to develop the product that would mirror the capabilities of the Analysts' Notebook (AN), an application created by i2, an IBM subsidiary, which cannot be sold anywhere outside the US and Russia and is subject to stringent US Export Control (EC) regulations.
The AN is the most sought after (but not readily available) tool, worldwide, by global businesses as also the crime fighting, counter terrorist, counter insurgency and financial intelligence agencies of numerous countries. It has the capability to integrate mountains of text, video, audio, graphic and image data and to employ Big Data Analytics, Semantics, Social Network Analysis (SNA) and Knowledge Discovery methods to delineate the existence, incidence, pattern and correlation of linkages in order to throw up actionable and predictive results.
The tsunami of data being generated globally threatens to submerge and seriously impair the interests of government agencies as well businesses worldwide unless powerful tools are available to intelligently comprehend diverse data types like alpha-numeric, voice, video and graphic; analyse these tidal waves of data; decipher patterns as well as connections and arrive at inferences and conclusions that provide a firm basis for next steps be they brick and mortar or in cyber space.
Matrix Mapper would serve as the ultimate tool for very large scale, cross platform, data collation, mining, comprehension, analysis, networking/ pattern identification and prediction/ direction determination using knowledge discovery methods. The Matrix Mapper would, thus, prove indispensable to businesses in sectors as diverse as mining, oil & gas, power (generation & distribution), airlines, land and water transport, shipping, chain stores, agriculture/ food distribution, warehousing, courier concerns, accounting, banking and insurance. Government agencies/ departments which would find Matrix Mapper to be a kind of force multiplier include the defence forces, police, forest conservation, counter terrorism units, municipalities, railways and a variety of Public Sector Undertakings.
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...g8briel
In light of new revelations about government warrantless wiretapping and electronic surveillance what role do librarians have in educating our patrons about digital privacy and security issues? Given that digital privacy is further complicated by for-profit Internet companies services, such as those provided by Facebook and Google, are our users savvy enough to understand threats to their information in this increasingly complex digital landscape? This presentation will explore issues related to current events and information security with an eye towards the implications for information literacy standards; brief examination of tools used to enhance information privacy; and discuss how librarians might play a role in helping users become more information aware.
A visual approach to fraud detection and investigation - Giuseppe FrancavillaData Driven Innovation
Understanding fraud is a matter of understanding connections. Investigators seek unusual links between people, accounts and events. They scour huge, noisy and complex datasets to understand which connections are genuine, and which may indicate fraud. This talk is about the vital role data visualization plays in fraud detection. Using live demos, Giuseppe Francavilla will describe a generic architecture for enterprise fraud detection, with data visualization at its core, and explain how a powerful visualization component can make fraud intelligence quick to find and easy to communicate
Top industry use cases for streaming analyticsIBM Analytics
Organizations need to get high value from streaming data to gain new clients and capitalize on market opportunities. Discover how IBM Streams is best suited for use cases that has the need for high speed and low latency.
Anecdotes about real life usage of Analytics - research done on Google, hence no claims on accuracy. Please use this as a directional insights into the applications and benefits.
Whether you are in the field or at the office, Whooster LE delivers rapid, reliable person search data to solve your search and advance your investigation. Used by law enforcement, state and federal agencies across the United States and internationally, Whooster LE leads the industry with SMS Text-Messaging and Web Solutions.
This presentation gives you 3 tips to start Market (Open Source) Intelligence in your company:
1. Consider information as the Key of your Business;
2. Do not fight against the Web 2.0, ineluctable Evolution but use it for intelligence;
3. Break outdated paradigms about the Web.
Once again, it’s time for Kaspersky to deliver our customary retrospective of the key events that have defined the threat landscape in 2013. Let’s start by looking back at the things we thought would shape the year ahead, based on the trends we observed in the previous year.
Data Mining Online Audiences with D8A GroupJon Gosier
Using a combination of the data-analysis products available from D8A Group, we’ve been monitoring the unfolding events in real-time to illustrate the ways our technology platforms can be used by companies, PR firms, marketing agencies, political groups, celebrities, and NGOs to make data informed decisions in real-time crisis scenarios.
In this case study document, we analyze breaking news scenarios involving Chris Christie's Brigegate scandal, Kerry Washington's appearance at the Golden Globes, and the Knight Foundation who we weren't aware had any news events at the time, but we quickly became aware of two through the use of our software.
The primary purpose of using technologies like the D8A suite of analytic products is to monitor and capture real-time data for analysis and research. They are also predictive, helping to surface trends, patterns, and happenings before one might find out about them otherwise. D8A’s products work across multiple communication channels.
JIMS IT Flash , a monthly newsletter-An Initiative by the students of IT Department, shares the knowledge to its readers about the latest IT Innovations, Technologies and News.Your suggestions, thoughts and comments about latest in IT are always welcome at itflash@jimsindia.org.
Visit Website : http://jimsindia.org/
The Matrix Mapper (MM) - This is a product for which the Aarktech - KBCRF consortium is looking for any of several options to develop the product that would mirror the capabilities of the Analysts' Notebook (AN), an application created by i2, an IBM subsidiary, which cannot be sold anywhere outside the US and Russia and is subject to stringent US Export Control (EC) regulations.
The AN is the most sought after (but not readily available) tool, worldwide, by global businesses as also the crime fighting, counter terrorist, counter insurgency and financial intelligence agencies of numerous countries. It has the capability to integrate mountains of text, video, audio, graphic and image data and to employ Big Data Analytics, Semantics, Social Network Analysis (SNA) and Knowledge Discovery methods to delineate the existence, incidence, pattern and correlation of linkages in order to throw up actionable and predictive results.
The tsunami of data being generated globally threatens to submerge and seriously impair the interests of government agencies as well businesses worldwide unless powerful tools are available to intelligently comprehend diverse data types like alpha-numeric, voice, video and graphic; analyse these tidal waves of data; decipher patterns as well as connections and arrive at inferences and conclusions that provide a firm basis for next steps be they brick and mortar or in cyber space.
Matrix Mapper would serve as the ultimate tool for very large scale, cross platform, data collation, mining, comprehension, analysis, networking/ pattern identification and prediction/ direction determination using knowledge discovery methods. The Matrix Mapper would, thus, prove indispensable to businesses in sectors as diverse as mining, oil & gas, power (generation & distribution), airlines, land and water transport, shipping, chain stores, agriculture/ food distribution, warehousing, courier concerns, accounting, banking and insurance. Government agencies/ departments which would find Matrix Mapper to be a kind of force multiplier include the defence forces, police, forest conservation, counter terrorism units, municipalities, railways and a variety of Public Sector Undertakings.
ŠVOČ: Design and architecture of a web applications for interactive display o...Martin Puškáč
My ŠVOČ (Študentská vedecká činnosť) based on my Bachelor thesis with title "Design and architecture of a web applications for interactive display of criminal statistical data".
Data Science Innovations : Democratisation of Data and Data Science suresh sood
Data Science Innovations : Democratisation of Data and Data Science covers the opportunity of citizen data science lying at the convergence of natural language generation and discoveries in data made by the professions, not data scientists.
Steven was the CEO of Hummingbird Communications, he focused on the enterprise networking, networking security and security detection devices, security software sales, design, development, systems integration, and deployment of network and integration systems for L-3 Communications, Security and Detection Systems whose target market was the aviation industry and private sector companies.
Practical and Actionable Threat Intelligence CollectionSeamus Tuohy
A great deal of the existing human rights reporting and analysis aggregate and strip away contextual information in order to produce “quantified knowledge” that is technically reliable and useful for governmental decision making. The results produced often end up too delayed, partial, distorted, and misleading to be used by local actors and human rights defenders to directly respond to the threats that they face. Those who could benefit most from the human rights knowledge being collected and shared in the digital world are those that existing repositories of information serve the least.
In this presentation I will provide concrete guidance on approaches for adopting data-rich, practical, and actionable threat information collection. In this content heavy 1.5 hour talk I will discuss a range of tools and techniques for seeking out sources of actionable information, distinguishing valuable information from useless but interesting information, and streamlining your information collection and analysis process to allow you to focus on your real work.
This talk WON’T be focused on collecting or sharing threat intelligence and/or human rights research aimed at evidence creation or changing the public dialogue. It WILL be focused on helping you identify, collect, and use publicly available sources of information to respond to your changing threat landscape.
Similar to Using Predictive Analytics for Anticipatory Investigation and Intervention (20)
Film + TV Private Finance Insights 2022 [Report]Jon Gosier
This report shares insights about how the Film/TV industry is evolving from a financial data perspective.
Insights were derived from hundreds of productions prior to release. This is the opposite of box office data, it's the financial data from Film/TV productions that prior to completion and release.
To respect the privacy of the individual filmmakers and producers, we have abstracted the names of each production analyzed.
SCALETECH 2022: What Scaling $300M Startups Taught me about Scaling $300M MoviesJon Gosier
Jon Gosier's slides from a presentation given at Scaletech 2022 in Toronto, Canada on 10/13/2022.
Prior to FilmHedge, a fin-tech that has changed the way major Film and TV projects are financed, Jon founded programmatic advertising company Audigent which now dominates the 1st-party entertainment space.
Using 6 films (and one song) as an example, here are my tips for scaling from startup to growth-stage:
1. Zack and Miri - Vet your co-founder based on you mutual interest and obsessiveness at solving a problem
2. Suicide Squad - hire to compliment your weaknesses as a Founder
3. The Expendables - know when to cut your losses with a bad hire or someone in the wrong role
4. Moneyball - track everything, define KPIs (not just for the big obvious stuff), milestones are just KPIs over time, KPIs keep your team focused
5. The French Dispatch - your company's relationship with the press will change as you grow, use the press to help re-educate the market and change behavior
6. "Know When to Hold em/Fold em" - know when to get out of your own way as a Founder, to build something bigger than yourself (by definition) sometimes you don't even need to be there anymore (graduate as a founder).
7. Avengers: Endgame - know your 'endgame'. re you building for lifestyle, legacy, or a liquidity event/exit?
My talk from Marketing Analytics and Data Science 2018 on April 11. A talk illustrating how audience/fan/user meta data is being used by executives in music and sports.
Do recording artists pick-up on emerging audience trends or do audiences follow artist trends? The answer is a bit of both. In this talk data scientist Jonathan Gosier shares methods on how the music industry is learning to apply data science to music listening audiences to boost revenue, maximize reach and improve engagement.
This presentation is about how to design technologies and business models that yield better incomes for society, reduce risk, and, as a result, maximize value.
It was delivered by Jon Gosier on June 26th, 2015 at Maine Startup and Create Week 2015 in Portland, ME.
IOT4I Internet of Things for Impact | NetherlandsJon Gosier
A presentation delivered by data scientist Jon Gosier at the DOEN Foundation in the Netherlands on how IOT can be used at the intersection of people, profit, and planet.
For more visit Gosier.org
Predicting Macroeconomic Trends Through Real-Time Mobile Data Collection [Pa...Jon Gosier
This paper outlines a study conducted in Mombasa, Kenya where real-time consumer data collection techniques (also known as known as big data, real-time data, crowdsourced data or open source data) were used to prove or disprove hypothesis about macroeconomic trends. It concludes that there are many reasons to feel confident that these techniques may serve as sufficient alternatives for economic forecasts in countries where traditional means of microeconomic data collection are sparse due to poor infrastructure and other circumstance. Further research is needed to verify the repeatability of these findings and the methods soundness statistically.
A summary presentation can be found here - http://www.slideshare.net/jongos1/predicting-macrodeck
Predicting Macroeconomic Trends Through Real-Time Mobile Data Collection [Sli...Jon Gosier
This deck outlines a study conducted in Mombasa, Kenya where real-time consumer data collection techniques (also known as known as big data, real-time data, crowdsourced data or open source data) were used to investigate hypotheses about macroeconomic trends. It concludes that there are many reasons to feel confident that these techniques may serve as sufficient alternatives for economic forecasts in countries where traditional means of microeconomic data collection are sparse due to poor infrastructure and other circumstance. Further research is needed to verify the repeatability of these findings and the methods soundness statistically.
The full paper can be found here - http://www.slideshare.net/jongos1/predicting-macroeconomic-trends-through-realtime-mobile-data-collection
21st Century Strategies for Financial InclusionJon Gosier
The wealth of black american households was decimated in 2008. This white paper outlines a strategy on how to structure new instruments for investment for black americans and other minority communities.
About Ebola Deeply - Slides from Foreign Press CenterJon Gosier
Slides from the Interview with Jon Gosier (Ebola Deeply) and Nicole Walden (International Rescue Committee) held November 7th, 2014 by the U.S. State Department. The full transcript can be found at - http://fpc.state.gov/233836.htm
Ebola Deeply is an impact journalism project founded by Isha Sesay (CNN), Jon Gosier (Appfrica/D8A), Lara Setrakian (News Deeply), James Andrews (True Story), Azeo Fables (News Deeply), and Bahiyah Robinson (Appfrica/D8A).
In this press conference we also unveiled our Mobile Wire service, a solution that greatly simplifies and improves targeting fragmented mobile user audiences in developing countries.
Data-Driven Crisis Monitoring: Turning Online Activity into Actionable Insigh...Jon Gosier
The proliferation and adoption of mobile phones and social media technologies presents new ways of capturing conversations surrounding crisis events in real-time. This allows researchers, analysts, and first-responders to explore events by monitoring many media sources (blogs, photos, web feeds, news sources, and tweets) from one environment.
The tragic situation unfolding in South Sudan is complex and evolving rapidly. The rate at which the fledgling state has descended into political and social unrest is distressing and highlights the need for urgent intervention. Thus, having ways to identify and engage influencers and to anticipate and potentially mitigate disastrous scenarios is greatly needed.
Using a combination of the data-analysis products available from D8A Group, we’ve been monitoring the unfolding events in real-time to illustrate ways our technology platforms can be used by NGOs, first-responders, civil society organizations and government agencies make data informed decisions in real-time in crisis scenarios.
The Humanitarian Face of Big Data | ICCM 2013Jon Gosier
What's the big deal with Big Data? How does it affect the humanitarian community? Is it all hype? What are the benefits and potential applications? This talk explores the 'humanitarian face of big data'.
CREDITS
========
Smolan, R. (2012) Human Face Of Big Data. Against All Odds Publications
Balet, C. (2013) Strangers in the Light. Gerhard Steidl Druckerei und Verlag
Photos by Josh Grow, Catherine Balet, & Peter Menzel
Cited Projects: D8A.com, AidData.org, un.data.gov, Thomson Reuters, appfrica.com, MetaLayer.com, statfrica.com, SiftDeck.com
One of the most intimidating things about being an entrepreneur or founder of an organization can be the first steps of incorporating and legally structuring things.
The good thing to note is that if you make a mistake at the beginning, its almost always addressable down the road (but it can require a lot of time or significant cost).
What's the best legal structure for your social enterprise? Why do these different models exist?
Platform to Playform: The Gamification of Civic ActionJon Gosier
“Game designers are the experts in motivating people and getting them to do repetitive stuff,” says Microtask CEO Wili Miettinen.
Science isn’t so great at getting people to care.
Civil Society isn’t so great at raising money.
Humanitarians groups aren’t great at either.
What if in-game actions mapped to real-world outcomes?
This postulates what tools like Flowminder, Ushahidi, Reddit, Storyful, Crowdflower, MetaLayer, open data and others might accomplish if coupled with a game layer of abstraction.
SiftDeck: Predictive Analytics for Disaster and RiskJon Gosier
Given a tragic event or disaster, SiftDeck attempts to predict where organizations or people are most vulnerable. This helps organizations mitigate the loss of life, property, or assets.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
3. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
!
!
TABLE OF CONTENTS
!
Public Safety in the 21st Century
Case Studies
1- Risk Patterns
2- Remote Investigation
3- Network Analysis
Contextual News Discovery
Momentum
Real-Time Zeitgeist
Filtering by Keyword Exclusion
Keyword and Phrase Networks
Identifying Influencers
Sentiment Analysis
Geography Trends and
Locations of Interest
Predictive Analytics
Risk Mitigation and the Timing
Of Information
!
!
4
6
10
12
14
15
17
18
19
20
22
24
26
28
!
3"
4. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
4"
Public Safety in the 21st Century
!
The proliferation and adoption of data, sensors, mobile phones and social media
technology present new ways of capturing conversations surrounding events in
real-time. There is high demand for products that allow law enforcement and
criminal investigators and others to explore events by monitoring many
transmedia sources (social media sources like Facebook and Twitter, photos,
news sources, and tweets) and relating that activity to historic data sets like
neighborhood maps, crime databases and other digital records.
!
Using a combination of the data-analysis products available from D8A Group,
we’ve been monitoring unfolding events in real-time to illustrate the ways our
technology platforms can be used by public safety officials to make data informed
decisions in real-time crisis scenarios. The solutions used for this analysis
include:
!
•
SiftDeck: a product that connects online conversations to the people,
places, and things being referenced offline. This helps users manage realworld risk to predict and avoid their offline assets from being threatened
(think staff, office locations, or property).
•
Themes: a product that allows users to visually sort through large
amounts of text data or streaming data to surface patterns and trends in
the content. It allows for the visual navigation of real-time data using
search, word trees, keyword & phrase network analysis, and various
filters.
•
Muxboard: a remixable analytic dashboard that allows researchers to
apply various algorithms and third-party APIs to real-time, ever-evolving
data sets using drag and drop ease. Muxboaard makes it easy to quickly
create dashboards tracking different people or brands, each with intricate
customizable analytics.
5. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
5"
!
The primary purpose of using technologies like the D8A suite of analytic products
is to monitor and capture real-time data for analysis and research that serves as
a baseline so that users can look for “spikes” of irregular activity. These solutions
are also predictive, helping to surface trends, patterns, and happenings before
one might find out about them otherwise. D8A’s products work across multiple
communication channels and with multiple types of public safety data.
!
When it comes to social data, most users are primarily interested in analyzing
Twitter’s real-time global data stream, our products also work with mobile data
streams (text messages), news articles and headlines, blogs, RSS feeds, JSON
feeds, email, and can hook virtually any API made available. This makes our
products flexible for any type of online activity monitoring.
!
The added advantage of D8A’s particular set of products is the ability to research,
sift through, and sort data streams in real time, allowing companies to make
data-driven decisions while events are still unfolding.
!
6. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
!
!
Case Study 1: Risk Patterns
This example illustrates how our suite of products can be used to quickly build
risk models using non-traditional data. For instance, the user might upload
various datasets to our system that would contain historic crime records of a
given area, similar to what is publicly available through CrimeReports.com
!
This is what we call our ‘baseline’. Historic records that show what has occurred
in the past and where. This gives the user data to begin building a sophisticated
model that triages real-time data with additional historic data.
!
6"
7. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
7"
What type of model? Well, first let’s say we want to overlay other types of data on
the map. This might include demography, patrol car routes, information on
surrounding buildings (ex. vacant lots) or events.
!
To do so, we can simply choose from data sets containing this information, or
upload our own.
!
Drag ‘Upload Your Data’ on to the canvas.
8. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
8"
Choose your file and upload it. The system will automatically begin number
crunching to figure out the best way to display the file.
You can then drag and drop algorithms to augment the dataset. For instance,
using our ‘Counts’ module to find things like standard deviation patterns or mean
averages in your data.
!
!
9. 9"
Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
The combined data set can then be used to create other maps or charts. This is
an alternative way of doing what some would call ‘data science’. Merging,
combining and ultimately displaying disparate information types — all made drag
and drop simple so that public sector staff need little to know retraining to do it.
!
Rather than only looking historically, users can combine their historic crime data
and real-time happenings to create new visualizations that ordinarily would take a
contractor or consultant a lot of time (and usually a lot of money) to produce.
10. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
10"
!
Case Study 2: Remote
Investigation and Online Forensics
Another popular use case for our products is remote investigation. Using realtime data to create dashboards that can be used to explore an unfolding situation
without necessarily being on the scene.
!
!
!
The above map might represent the last known locations of a suspect, or group
of suspects based on data mined from their social media presence. If we know
their location what types of crimes they've committed in the past and the types of
locations or people in the area, we can triangulate potential targets for new
criminal activity.
!
12. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
12"
Case Study 3: Network Mapping
It’s a common tactic of predictive analytics to use the peer networks of criminals
to identify others likely to commit criminal activity.
Tracing these networks of
friends and ’friends of friends’ is called network analysis. They have shown up in
investigations for years in the form of evidence maps and can be used to connect
people to people, but also people to places and things.
!
During an investigation, these network maps can become unwieldily.
!
!
!
!
!
!
!
14. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
14"
!
Contextual News Discovery
SiftDeck learns to aggregate news headlines based on keywords parsed from
aggregated content. This is different from only aggregating content based on the
keywords users enter because it provides a contextual stream of headlines
based on the real-time conversation. In other words, SiftDeck recommends
potentially related news headlines that a user may not even be aware of. So it
serves as a real-time discovery and recommendation engine.
!
This feature tries to answer the question: “What if I don’t know what I’m looking
for?” Rather than the user programming every single detail into our products,
they learn from both the user and the content creators to make new suggestions
of which news items might be relevant to the investigation underway.
!
15. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
15"
!
!
Momentum
Momentum is the term we use to refer to the qualities of a conversation. Does
the conversation activity seem to be building or slowing? Are new people joining
or are they leaving? Are the people involved from the beginning conversing more
or less than they were from the start? Which keywords, influencers, and
communication channels are leading the conversation?
!
!
!
The image above chronicles the drop and eventual rebound of momentum
surrounding the various keywords being tracked.
!
17. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
17"
!
Real-Time Zeitgeist
What are the recurring themes and phrases in a real-time conversation? The
words, phrases, names, and locations that repeat may allow analysts to draw
correlations between seemingly unrelated conversations.
!
!
!
Were one not even looking for a scandal involving Chris Christie, if a word cloud
all of a sudden started surfacing words like ‘scandal’, ‘bridge’, ‘taxes’ and
‘campaign’ (like in the above image) they could easily determine a big story might
be breaking and take action. For a someone working in public safety a
dashboard might surface warnings of an unfolding event or situation
!
!
18. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
18"
This ability to actively monitor the ‘zeitgeist’ or thematic relationships between
conversations happening across disparate communication channels often proves
powerful for organizations who have to plan suggested interventions or activities
in real-time.
!
Filtering By Keyword Exclusion
More importantly, these word clouds make it possible to conditionally filter out
conversations that actually are unrelated.
!
!
!
In this case, the recurrence of the word ‘Munich’ in data streams monitoring
conversations about Sudan was because of a football match between Sudanese
and German teams. After identifying messages that are skewing the research,
with our product, Themes, the user can simply click on the word (in this case
‘Munich’) and opt to exclude all data where non-relevant words appear in the
same sentences together, while keeping all other data intact.
!
19. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
19"
Organizations using other products for social media analytics often forget that
many such tools don’t allow for the selective ‘cleansing’ of datasets to remove
misleading or non-relevant content.
!
Keyword and Phrase Networks
!
!
Themes’ network graphs of words and phrases can provide a powerful means
for visually controlling the underlying dataset. In this case, clicking on any word in
the above graph, gives you the option to focus only on content that contains that
word, or only on the content that doesn’t contain a particular word.
!
In the above example, a very large dataset was used to show how select key
words appear in high frequency in the same datasets. But by clicking on each
word, and choosing to focus or exclude certain ones, the dataset is refined as
needed.
!
20. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
20"
!
!
A researcher might want to only view content where the phrases ‘taxes’, ‘liberals’,
‘scandal’ and ‘work’ appear together as it relates to a criminal political scandal. If
so, it’s simply a matter of point and click (the collection of keywords in the bottom
right), and the data is re-organized to fit that criteria. Terms can just as easily be
excluded from the dataset.
!
Identifying Influencers
Monitoring digital conversations allows organizations to identify potential ‘thought
leaders’, friends of suspects or other people who may be influential in a given
scenario. While it’s usually impossible to verify exactly who these actors are, and
what their motives are, it’s useful to identify them, to conduct strategies for
engagement and outreach.
22. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
22"
!
Sentiment Analysis
Sentiment analysis is a method of measuring the emotional tone of written text
using computer programs. It attempts to weight different words in a body of text
against one another, to ultimately provide a ‘score’ to the whole body of text that
is either positive, negative, or neutral.
!
Why is this useful? Because it allows users to algorithmically determine whether
an online conversation is skewing positive or negative in tone.
!
!
!
In the image above, it’s easy to quickly see that of the more than 6,972
messages analyzed in the first column, 1679 (25%) have been marked as being
negative in tone, while 700 (10%) are positive. If the analyst wants to focus on
23. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
23"
the dataset that’s been marked negative, they simply click on that area of the
graph.
!
The content and related analysis is then sorted to focus on the ‘negative’ content.
To give a use case scenario, this would allow a researcher to view a list of
influencers leading the negative tone of a conversation.
In the past, this has
allowed our users to identify individuals whom they would qualify as the
‘antagonists’ or ‘instigators’ who might be inciting violence or other unwanted
activities. Being able to sort data in this way provides a powerful lens of context
and discovery. More importantly, it allows analysts to constantly ask questions of
the data itself through our simple drag and drop interface.
!
!
!
The above screenshot looks at only the analysis of content negative in tone from
a different data set than the previous image. You can see that 379 messages
represent the negative content, of which 376 comes from Twitter, 3 items come
from Google News, and we have a list of potential conversation influencers, as
24. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
24"
well as how much content they’ve contributed to the overall conversation.
Analysts can now reach out to them directly, or begin monitoring these new
sources of interest. Again, all of this is being done in real-time.
!
Geography Trends and Locations
of Interest
Connecting this type of online research to offline activities and actions is a big
portion of why people use data products like the ones provided by D8A. We use
the social graph and natural language processing to algorithmically map various
locations of interest to researchers.
!
!
!
!
25. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
25"
!
!
The power of this information is that even with the most minimal knowledge of a
situation, the maps and graphs generated tell a story. While knowing the broader
context and having professional expertise in the given subject matter is
absolutely necessary, when such knowledge is coupled with these kinds of visual
data exploration tools, it’s possible to make the job of experts faster, more
nuanced and efficient.
!
D8A’s products (SiftDeck, Muxboard/MetaLayer, and Themes) are not meant to
replace professional analysts and researchers, but to save them incredible
amounts of time.
!
!
26. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
26"
!
Predictive Analytics
When all of our products are combined, it’s possible to anticipate events,
demands, or activities that have not happened yet. This is type of anticipatory
response to data is based on an area of research called predictive analytics.
!
By combining all of our insights into an informed narrative, researchers might be
able to determine the correct actions to take well before it’s obvious. As with all
systems, it’s possible these predictions can be wrong so rather than give
researchers objectives, our products serve to provide the appropriate information
for informed conversation and action.
!
!
!
27. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
!
!
27"
!
In a scenario where an analyst is viewing multiple dashboards in an unfolding
scenario, it’s possible to piece each of these different insights together to suggest
action and give reasons for that action.
!
In one use of our products in South Sudan, well before stories played out in the
media, our team identified several influencers in-country and around the world.
!
We knew that the situation was no longer contained to just South Sudan, but was
now affecting the whole of the East Africa region; we knew that there appeared to
be a rapid build of momentum in the conversations on the evening of January 9th
leading into the 10th, and we know that the thematic tone of conversation was
trending towards some sort of conflict. We also had the related breaking news
stories confirming as much.
!
!
28. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
28"
!
Risk Mitigation and the Timing of
Information
While it’s possible to come to the same conclusions in a number of other ways,
the timing of information often dictates its value, as well as the time it takes to
aggregate all data sources to predict future conclusions.
!
For a Wallstreet broker, receiving information that the CEO of a major company is
about to be fired might indicate he needs to sell his position in that companies
stock. However, receiving the information after the fact (ex. “the CEO was fired
yesterday”) is an entirely different scenario. The first scenario allows him to
mitigate risk in anticipation of a potential disaster. The other scenario allows him
to make the same decisions, but the information is less valuable because he has
less control over how the news affects things. A portion of the risk is already
realized, thereby making the information less valuable. For the Wallstreet broker,
the value of information could be valued in the millions or billions of dollars. For
humanitarian organizations and journalists, the type of risk we try to help them
mitigate might be measured in loss of life & property, or at the very least, quality
of life for the people affected by these events. For brands or public figures, their
reputation is directly correlated with their value and ability to derive revenue from
customers.
!
D8A’s products are designed to shift critical analysis of any situation, event, or
phenomena from a retroactive exploration, to a real-time one. In the above
scenario, the case was made that value of information is very much related to its
timing.
!
29. Using"Predictive"Analytics"for"Anticipatory"Investigation"and"Intervention"
29"
Thus, even if our products only slightly move the needle in regards to the time of
information, there is a direct correlation to the amount of value that analysis
provides. Knowing how to potentially affect a situation in real-time can be
exponentially more valuable than waiting for everything to play out, only to deal
with the aftermath.
!
While such actions need to be tempered with consideration for culture, context,
privacy and law, there is great value in time-shifting the analytics so that
companies can react to events more readily because they were able to anticipate
potential risk scenarios.