This document discusses internet safety and awareness for young people. It provides examples of common internet activities like using social media, email, instant messaging, gaming and music sharing. It then describes potential risks to privacy and inappropriate content if proper precautions are not taken. Finally, it recommends that parents take an active role in educating themselves and their children about maintaining privacy online and using parental control software.
This document provides advice on safe usage of digital media and mobile phones. It discusses dangers of sharing personal information on platforms like Facebook and WhatsApp. It notes risks like identity theft, bullying, and data theft. The document advises setting strong privacy settings, only being friends with known people, avoiding suspicious links and downloads, and logging out of accounts properly. Overall, it emphasizes the importance of being cautious about what information is shared online and maintaining privacy to avoid potential digital dangers.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
Letter of 38 organizations to the Court of AppealsTonyo Cruz
The document is a letter from 37 international freedom of expression organizations expressing concern about a resolution by the Court of Appeals of the Philippines holding two women in contempt for comments made about the trial of those accused in the Ampatuan Massacre. The letter calls on the court to withdraw the resolution and recognize freedom of expression, noting international standards limit restricting speech to only when it poses a serious risk to fair trials.
This document discusses internet safety and awareness for young people. It provides examples of common internet activities like using social media, email, instant messaging, gaming and music sharing. It then describes potential risks to privacy and inappropriate content if proper precautions are not taken. Finally, it recommends that parents take an active role in educating themselves and their children about maintaining privacy online and using parental control software.
This document provides advice on safe usage of digital media and mobile phones. It discusses dangers of sharing personal information on platforms like Facebook and WhatsApp. It notes risks like identity theft, bullying, and data theft. The document advises setting strong privacy settings, only being friends with known people, avoiding suspicious links and downloads, and logging out of accounts properly. Overall, it emphasizes the importance of being cautious about what information is shared online and maintaining privacy to avoid potential digital dangers.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
Letter of 38 organizations to the Court of AppealsTonyo Cruz
The document is a letter from 37 international freedom of expression organizations expressing concern about a resolution by the Court of Appeals of the Philippines holding two women in contempt for comments made about the trial of those accused in the Ampatuan Massacre. The letter calls on the court to withdraw the resolution and recognize freedom of expression, noting international standards limit restricting speech to only when it poses a serious risk to fair trials.
This document provides tips to help military kids stay safe online. It discusses how to safely use chat rooms, instant messaging, webcams, and emails. The main tips are to only interact with known friends and family online, get parent permission before sharing private info or downloading anything, and tell a trusted adult if anything makes you feel uncomfortable. The goal is to educate kids on having fun online while taking basic precautions to avoid potential online threats.
This document provides tips to help military kids stay safe online. It discusses how to safely use chat rooms, instant messaging, webcams, and email. The main tips are to only interact with known friends and family online, get parent permission before sharing private info or downloading anything, and tell a trusted adult if anything makes you feel uncomfortable. The goal is to educate kids on having fun online while protecting their privacy and security.
The document discusses electronic safety and provides tips for safe internet and cell phone use. It asks a series of yes/no questions about computer, cell phone, email and social media use. It then describes four "electronic enemies" - Tag-a-long Teddy who seeks personal information, Suzy Spammer who sends junk emails and links, Collecting Carl who looks up personal information to sell, and Angry Abby who bullies others online. It provides solutions for each such as not sharing information, deleting spam, avoiding putting personal details online and reporting bullying.
The document provides information about internet safety and dangers for children. It discusses positive uses of the internet such as communication, entertainment, and information. However, it also outlines potential dangers like spam, cyberstalking, getting addicted, flaming, and spies. The document emphasizes the importance of keeping personal information private, not responding to unknown emails, and using caution online.
This document provides tips for military children to stay safe online. It advises only chatting with known friends and family, avoiding sharing private information, and getting parental permission for activities like webcam chats. Specific dos and don'ts are outlined for chatting, instant messages, profiles, emails and more. The goal is to help kids understand potential dangers and how to avoid unsafe situations so they can enjoy the internet while staying protected.
The document provides safety tips for using the internet and chatting online:
- It is not safe to give out private information like your name, phone number, address, or school name when chatting with strangers online.
- If someone says mean, threatening, or makes you uncomfortable, you should tell a trusted adult.
- Personal information and passwords should never be shared with strangers, and any suspicious messages or attachments should be deleted without opening.
The document discusses internet safety tips for youth, including respecting other users, using appropriate language, respecting privacy, being wary of sharing personal information online, and following family rules for internet use. It provides three "golden rules of netiquette": respect all users, use appropriate language, and respect others' privacy. Youth are advised to get parent permission before sharing photos or meeting online friends in person and to tell a parent if anything makes them uncomfortable online.
1) Spamming involves receiving unwanted emails that can contain viruses or pop-up links aiming to infect computers.
2) While chatting with friends online is generally safe, one should be cautious of sharing private information or meeting strangers from the internet.
3) Using strong, unique passwords and keeping profiles private are effective ways to help stay safe online.
Cyber bullying involves using electronic communication technologies like email and cell phones to deliberately and repeatedly harm others. It can take various forms such as sending harmful emails, texts, IMs, or creating defamatory blogs, websites or polls. Cyber bullying is a criminal act and violates human rights laws. Educating people and avoiding angry messages are ways to prevent cyber bullying. Victims should tell trusted adults, authorities and save evidence of the bullying. Cyber bullies can be traced and punished according to local laws.
Cyber bullying involves bullying that occurs online or through electronic means such as text messages. It can be done by classmates, friends, online acquaintances, or anonymously. Common forms of cyber bullying include spreading rumors online, tricking people, sending mean texts or messages, and posting embarrassing photos without consent. Victims may feel embarrassed, angry, or scared and could seek revenge, avoid friends, or bully back. It is important for youth to tell a trusted adult if they are being cyber bullied.
Cyber bullying involves mean or untrue things being said about someone online or embarrassing photos being shared without consent. To stay safe online, only add people you know on social media, keep your profiles private, don't open suspicious emails, scan USB drives for viruses, avoid giving out personal information, and never meet strangers alone. If cyber bullied, tell an adult, save evidence, don't respond to bullies, and report the behavior to the site or police. People bully for different reasons, so stand up for yourself and know who your real friends are.
This document discusses cyberbullying, defining it as tormenting, threatening, harassing, humiliating or embarrassing someone using the internet, digital technologies or mobile devices. It notes that a third of youth have experienced cyberbullying but only 10% tell parents or teachers. Examples are given of real cases that resulted in suicide. Cyberbullying can occur on emails, messaging, photos, social media, gaming sites and more. The document provides advice on how to prevent and respond to cyberbullying.
The document discusses how to keep children safe online. It notes that children today are serious gamers, social networkers, and adaptable to change. It asks what children do online, such as using email, Facebook, MySpace, and online games. It recommends setting a good example by turning off phones sometimes, demonstrating good communication, being aware of one's online image, knowing children's passwords, and ensuring children have offline lives too. It advises having an open profile, being careful about accepting friends, not sharing inappropriate content or meeting only online contacts. Resources for cyberbullying and safety are also listed.
This document discusses cyber safety tips for parents and children. It outlines common forms of cyberbullying like flaming, spreading rumors, identity theft, and photo manipulation. Signs a child may be cyberbullied include avoiding technology, mood changes, and poor grades. The document recommends telling children not to respond to bullying, saving evidence, blocking the bully, and getting the school involved. It also provides tips for safe internet use like increasing privacy settings, getting permission before posting photos/videos, not sharing personal information or passwords online, and avoiding meeting strangers from the internet in person.
Social media allows users to share personal information with large online networks, which can have both benefits and risks. It is important to be aware of privacy settings and use caution when posting content publicly, as anything shared could damage one's reputation for a long time. Maintaining professionalism online is also key, as future employers may review social media profiles.
This document appears to be a quiz about online safety and appropriate behaviors when interacting with others online.
The summary provides guidance on using nicknames instead of real names online, only sharing limited personal information with strangers, and how to respond if being bullied or harassed in a chat room. It also cautions against meeting strangers in person that someone only knows from chatting online.
This document appears to be a quiz about online safety and appropriate behaviors when interacting with others online.
The summary provides guidance on using nicknames instead of real names online, only sharing limited personal information with strangers, and how to respond if being bullied or harassed in a chat room. It also cautions against meeting strangers in person that someone only knows from chatting online.
The document discusses cyberbullying, including definitions, types of cyberbullying, statistics, and scenarios. It defines cyberbullying as using technology like cell phones or the internet to harass or bully others. Common types include "mean girls", "power hungry" bullies, and inadvertent bullies. Scenarios describe situations like creating a hate website about someone, anonymous threatening emails, sharing a private photo online, and catfishing someone online. Advice is provided on how to prevent and respond to cyberbullying.
Netiquette refers to etiquette rules for respectful and appropriate communication on the internet. These are recommended guidelines rather than legally binding rules. Some key guidelines include not sharing personal information with strangers, not meeting people in person who were only met online, and telling someone if anything seen online causes worry. Risks of the internet include cyberbullying, inappropriate content, and online grooming or deception. Maintaining healthy online behaviors includes thinking before posting, avoiding oversharing personal details, and maintaining meaningful in-person relationships rather than just online "friends."
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
This document provides tips to help military kids stay safe online. It discusses how to safely use chat rooms, instant messaging, webcams, and emails. The main tips are to only interact with known friends and family online, get parent permission before sharing private info or downloading anything, and tell a trusted adult if anything makes you feel uncomfortable. The goal is to educate kids on having fun online while taking basic precautions to avoid potential online threats.
This document provides tips to help military kids stay safe online. It discusses how to safely use chat rooms, instant messaging, webcams, and email. The main tips are to only interact with known friends and family online, get parent permission before sharing private info or downloading anything, and tell a trusted adult if anything makes you feel uncomfortable. The goal is to educate kids on having fun online while protecting their privacy and security.
The document discusses electronic safety and provides tips for safe internet and cell phone use. It asks a series of yes/no questions about computer, cell phone, email and social media use. It then describes four "electronic enemies" - Tag-a-long Teddy who seeks personal information, Suzy Spammer who sends junk emails and links, Collecting Carl who looks up personal information to sell, and Angry Abby who bullies others online. It provides solutions for each such as not sharing information, deleting spam, avoiding putting personal details online and reporting bullying.
The document provides information about internet safety and dangers for children. It discusses positive uses of the internet such as communication, entertainment, and information. However, it also outlines potential dangers like spam, cyberstalking, getting addicted, flaming, and spies. The document emphasizes the importance of keeping personal information private, not responding to unknown emails, and using caution online.
This document provides tips for military children to stay safe online. It advises only chatting with known friends and family, avoiding sharing private information, and getting parental permission for activities like webcam chats. Specific dos and don'ts are outlined for chatting, instant messages, profiles, emails and more. The goal is to help kids understand potential dangers and how to avoid unsafe situations so they can enjoy the internet while staying protected.
The document provides safety tips for using the internet and chatting online:
- It is not safe to give out private information like your name, phone number, address, or school name when chatting with strangers online.
- If someone says mean, threatening, or makes you uncomfortable, you should tell a trusted adult.
- Personal information and passwords should never be shared with strangers, and any suspicious messages or attachments should be deleted without opening.
The document discusses internet safety tips for youth, including respecting other users, using appropriate language, respecting privacy, being wary of sharing personal information online, and following family rules for internet use. It provides three "golden rules of netiquette": respect all users, use appropriate language, and respect others' privacy. Youth are advised to get parent permission before sharing photos or meeting online friends in person and to tell a parent if anything makes them uncomfortable online.
1) Spamming involves receiving unwanted emails that can contain viruses or pop-up links aiming to infect computers.
2) While chatting with friends online is generally safe, one should be cautious of sharing private information or meeting strangers from the internet.
3) Using strong, unique passwords and keeping profiles private are effective ways to help stay safe online.
Cyber bullying involves using electronic communication technologies like email and cell phones to deliberately and repeatedly harm others. It can take various forms such as sending harmful emails, texts, IMs, or creating defamatory blogs, websites or polls. Cyber bullying is a criminal act and violates human rights laws. Educating people and avoiding angry messages are ways to prevent cyber bullying. Victims should tell trusted adults, authorities and save evidence of the bullying. Cyber bullies can be traced and punished according to local laws.
Cyber bullying involves bullying that occurs online or through electronic means such as text messages. It can be done by classmates, friends, online acquaintances, or anonymously. Common forms of cyber bullying include spreading rumors online, tricking people, sending mean texts or messages, and posting embarrassing photos without consent. Victims may feel embarrassed, angry, or scared and could seek revenge, avoid friends, or bully back. It is important for youth to tell a trusted adult if they are being cyber bullied.
Cyber bullying involves mean or untrue things being said about someone online or embarrassing photos being shared without consent. To stay safe online, only add people you know on social media, keep your profiles private, don't open suspicious emails, scan USB drives for viruses, avoid giving out personal information, and never meet strangers alone. If cyber bullied, tell an adult, save evidence, don't respond to bullies, and report the behavior to the site or police. People bully for different reasons, so stand up for yourself and know who your real friends are.
This document discusses cyberbullying, defining it as tormenting, threatening, harassing, humiliating or embarrassing someone using the internet, digital technologies or mobile devices. It notes that a third of youth have experienced cyberbullying but only 10% tell parents or teachers. Examples are given of real cases that resulted in suicide. Cyberbullying can occur on emails, messaging, photos, social media, gaming sites and more. The document provides advice on how to prevent and respond to cyberbullying.
The document discusses how to keep children safe online. It notes that children today are serious gamers, social networkers, and adaptable to change. It asks what children do online, such as using email, Facebook, MySpace, and online games. It recommends setting a good example by turning off phones sometimes, demonstrating good communication, being aware of one's online image, knowing children's passwords, and ensuring children have offline lives too. It advises having an open profile, being careful about accepting friends, not sharing inappropriate content or meeting only online contacts. Resources for cyberbullying and safety are also listed.
This document discusses cyber safety tips for parents and children. It outlines common forms of cyberbullying like flaming, spreading rumors, identity theft, and photo manipulation. Signs a child may be cyberbullied include avoiding technology, mood changes, and poor grades. The document recommends telling children not to respond to bullying, saving evidence, blocking the bully, and getting the school involved. It also provides tips for safe internet use like increasing privacy settings, getting permission before posting photos/videos, not sharing personal information or passwords online, and avoiding meeting strangers from the internet in person.
Social media allows users to share personal information with large online networks, which can have both benefits and risks. It is important to be aware of privacy settings and use caution when posting content publicly, as anything shared could damage one's reputation for a long time. Maintaining professionalism online is also key, as future employers may review social media profiles.
This document appears to be a quiz about online safety and appropriate behaviors when interacting with others online.
The summary provides guidance on using nicknames instead of real names online, only sharing limited personal information with strangers, and how to respond if being bullied or harassed in a chat room. It also cautions against meeting strangers in person that someone only knows from chatting online.
This document appears to be a quiz about online safety and appropriate behaviors when interacting with others online.
The summary provides guidance on using nicknames instead of real names online, only sharing limited personal information with strangers, and how to respond if being bullied or harassed in a chat room. It also cautions against meeting strangers in person that someone only knows from chatting online.
The document discusses cyberbullying, including definitions, types of cyberbullying, statistics, and scenarios. It defines cyberbullying as using technology like cell phones or the internet to harass or bully others. Common types include "mean girls", "power hungry" bullies, and inadvertent bullies. Scenarios describe situations like creating a hate website about someone, anonymous threatening emails, sharing a private photo online, and catfishing someone online. Advice is provided on how to prevent and respond to cyberbullying.
Netiquette refers to etiquette rules for respectful and appropriate communication on the internet. These are recommended guidelines rather than legally binding rules. Some key guidelines include not sharing personal information with strangers, not meeting people in person who were only met online, and telling someone if anything seen online causes worry. Risks of the internet include cyberbullying, inappropriate content, and online grooming or deception. Maintaining healthy online behaviors includes thinking before posting, avoiding oversharing personal details, and maintaining meaningful in-person relationships rather than just online "friends."
Similar to Cyberbullying - surviving life online (20)
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
2. any questions?
write / SMS / tweet your questions and we’ll try and
answer them at the end of the session
add #sc1011 to the tweet
SMS to 0434 xxx xxx
6. introduction
split into 6 groups
how would you define “bullying”?
see how you’d respond to one of the bullying scenarios
summarise findings; tweet or SMS them back
7. where to go?
Year 9-12 Boys - Auditorium
Year 9-12 Girls - Waratah meeting
Year 7-8 Boys - Waratah seminar
Year 7-8 Girls - Banksia meeting
Post-school men - Boronia
Post-school women - Banksia seminar
8. what did we come up with?
definition of bullying
14. Live at peace with
everyone
If possible, so far as it depends on you, live
peaceably with all.
Romans 12:18
15. when I’m bullied, is it just
“discipline from God”?
Heb 12:7 It is for discipline that you have to
endure. God is treating you as sons. For what son
is there whom his father does not discipline?
16. Strive for peace with
everyone
Strive for peace with everyone, and for the
holiness without which no one will see the
Lord.
Heb 12:14
17. Wisdom from God is
peace-able
17 But the wisdom from above is first pure, then peaceable,
gentle, open to reason, full of mercy and good fruits, impartial
and sincere. 18 And a harvest of righteousness is sown in peace
by those who make peace.
James 3:17-18
18. A Christian leader can’t
be a bully
1 Tim 3:3 not a drunkard, not violent but gentle, not
quarrelsome, not a lover of money.
Titus 1:7 For an overseer, as God’s steward, must be above
reproach. He must not be arrogant or quick-tempered or a
drunkard or violent or greedy for gain,
19. what does a
peacemaker do?
not bullying others
acting to stop bullying when you see it.
21. why are there bullies?
people become bullies to get recognition and status with other people.
cyber bullies don’t see the effect their bullying is having on their victim, so it can
escalate much quicker than other types of bullying
22. social
online bullies
friends sites
games
SMS
blogs
phone you
chat & IM
email
the web facebook
family strangers
23. social
online bullies
friends sites
games
SMS
blogs
phone you
chat & IM
email
the web facebook
family strangers
24. social
online bullies
friends sites
games
SMS
blogs
phone you
chat & IM
email
the web facebook
family strangers
25. social
online bullies
friends sites
games
SMS
blogs
phone you
chat & IM
email
the web facebook
family strangers
26. Preventing cyber-bullying
keeping your personal information private
keep your computer safe from viruses
understand what you’re sharing
have a strong password and don’t share it
27. a password is like a
toothbrush
Once you’ve shared it, you should never
use it again.
28. a strong password
letters, numbers, characters
make it memorable to you, but hard to guess
don’t write it anywhere
don’t use the same password for every site
31. facebook privacy settings
understanding how information is shared on FB
how much can a casual user who isn’t your friend find out about you?
if you can understand the privacy settings on facebook, you can understand anything.
52. keeping yourself safe online
have an internet curfew - say, 10pm
keep your home computer in a public space
invite your parents to monitor your internet access (this is a good way to avoid
temptation)
want to keep a diary? keep one on paper.
53. keeping yourself safe online
don’t mention these kinds of details online
your school
any other groups you belong to
your address, or any other place you’re going to be
don’t invite people you don’t know to meet you offline
don’t lie about your age to join facebook before you’re 13.
54. what to do when you see cyberbullying
tell an adult you trust
leave the area (maybe get a new account)
don’t respond to the remarks online
record the message
block the person
advise the relevant people (the site, your ISP or police)
55. what to do about physical bullying
know the bullying policy at the place you’re being bullied
get away from the situation
report it to the relevant authority
56. what to do about social bullying
know what it looks like
don’t participate
don’t ignore it
have the courage to talk to the bully, and let them know that their behaviour is
unacceptable
57. what to do when you see bullying
if you feel confident, try and stop what’s happening
report the bullying to the relevant authority
provide whatever comfort you can to the person being bullied.
if you say nothing, you leave the victim with the impression that you approve of the bullying.
58. Something surprising
a class where there are multiple people being bullied is better for everyone than one where only one
person is bullied (Salmivalli, 2010)
when only one person is bullied, they assume it’s some fault of theirs that is the issue.
when multiple people are bullied, it’s easier to see that it is the bullies that are to blame, not
the victims
59. everyone suffers from bullying
victims of bullying often suffer long-term changes to their thinking
bullies are more likely to go on to be violent (and in trouble with the police) later in
life
people witnessing bullying will be anxious, wondering when they’ll be next
60. oh... and it may be illegal
NSW law means that acts of cyberbullying may be breaking a number of laws.
repeated SMS may be considered stalking
social media sites may be considered unlawful use of a “wire service”
there’s even a special law for school-based cyber bullying
if you’re bullying someone because of race or sexuality, there are libel and vilification laws that
could be broken.
61. Summary
Christians should be peace-makers
Know how to recognise and resolve bullying
Know how to keep yourself safe online
62. and we’re done.
David Phillips
twitter: @cafedave
http://cafedave.net/
Editor's Notes
\n
\n
7:35-7:50\n(examples from my life)\n\nCyberbullying tends to peak around 13-14yo. An angry sibling could use your fb password to offend all your friends in one hit! \nNetalert study 2007: 16% of 13-17yo have been bullied online. Aust covert bullying study 2009: 10% of years 4-7. \nUpcoming study: 20% of 12-18yo have been victims of cyber bullying, 13% have bullied. Girls and boys c-bully at equivalent rates. \nOnly 7% of those bullied tell a parent, 10% a teacher, 60% a friend. Worried that if they tell, they will lose their online devices.\n
http://www.flickr.com/photos/duaneschoon/3935553091/\nbeing bullied doesn’t mean that God has abandoned you.\ngoing through a time of suffering can strengthen your character, but this doesn’t mean you need to put up with bullying.\n\n
Wisdom from God is about making peace - the reward of people living God’s way is that they get along. \nBullying gets in the way of this.\nhttp://www.flickr.com/photos/florin_mogos/2523984446/\n\n
http://www.flickr.com/photos/andrewrennie/5207163798/\n\nIf you’re violent or a bully, you can’t be a leader.\nIf you see a Christian leader involved in bullying, this is something that will need to be resolved.\n
Some people go so far as to deactivate their FB profile when they’re not logged in. This is extreme, but would work to avoid a lot of potential cyberbullying attacks.\n
\n
\n
\n
\n
http://www.flickr.com/photos/catmachine/3826156707/sizes/o/in/photostream/\nthis was drawn in 1974\n
\n
\n
\n
\n
\n
\n
\n
Bullying and the peer group: A review Christina Salmivalli ⁎\nAggression and Violent Behavior 15 (2010), pp112-120\nChristina Salmivalli\n\nhttp://www.sciencedirect.com/science?_ob=PublicationURL&_tockey=%23TOC%236059%232010%23999849997%231619119%23FLA%23&_cdi=6059&_pubType=J&_auth=y&_acct=C000050221&_version=1&_urlVersion=0&_userid=10&md5=6b146d2d95e39b07e71f3bdd6acae4a5\n\n