SMSer Corne Grotius & Queensland Police Officer Gavin Raison's presentation from UX Australia 2014, where he talks about the revolutionary new mobile technology enabling Queensland Police Service.
Intranets 2014, Mobility for Queensland PoliceCorne Grotius
The Queensland Police Service is moving to a new mobile information platform that enables officers to conduct police checks from the road; avoiding lengthy radio queues, maintaining higher visibility and getting more work done.
In this presentation, Cornè will discuss:
- the design challenges faced in enabling police to quickly find the information required (from multiple systems)
- how the solution is making a difference to frontline police officers
- how to design a simple interface to match the way officers work
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The Leadership Initiative aims to help clients achieve extraordinary success by developing true leadership and a market leadership plan. They provide three levels of embedded services to clarify the leadership imperative, assess skills, launch a leadership initiative, and build confidence and cohesion across the organization. Their total commitment is to the client's extraordinary achievement through a cost-effective partnership that produces sustainable value within 12-18 months.
This document outlines assessment criteria for a geography course divided into 4 criteria: A) Knowing and Understanding, B) Investigating, C) Thinking Critically, and D) Communicating. Each criterion is described and defines different achievement levels from 0 to 8 points based on demonstrated skills.
A great way to manage employee performance is to use a standardized method of defining competencies or a competency model. Talent Snapshot includes a model that has been validated by research done over 40 years.
Intranets 2014, Mobility for Queensland PoliceCorne Grotius
The Queensland Police Service is moving to a new mobile information platform that enables officers to conduct police checks from the road; avoiding lengthy radio queues, maintaining higher visibility and getting more work done.
In this presentation, Cornè will discuss:
- the design challenges faced in enabling police to quickly find the information required (from multiple systems)
- how the solution is making a difference to frontline police officers
- how to design a simple interface to match the way officers work
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The Leadership Initiative aims to help clients achieve extraordinary success by developing true leadership and a market leadership plan. They provide three levels of embedded services to clarify the leadership imperative, assess skills, launch a leadership initiative, and build confidence and cohesion across the organization. Their total commitment is to the client's extraordinary achievement through a cost-effective partnership that produces sustainable value within 12-18 months.
This document outlines assessment criteria for a geography course divided into 4 criteria: A) Knowing and Understanding, B) Investigating, C) Thinking Critically, and D) Communicating. Each criterion is described and defines different achievement levels from 0 to 8 points based on demonstrated skills.
A great way to manage employee performance is to use a standardized method of defining competencies or a competency model. Talent Snapshot includes a model that has been validated by research done over 40 years.
This document provides guidance on building a tailored image to fit customer expectations. It recommends studying customers to understand their preferred style and adopting their language, dress, and conversational manner to establish trust. High performers are said to get involved in customer industries, quietly promote themselves and their company in a credible manner, and learn about customers' past successes before making a first impression. Proper business etiquette like dress and speech for each situation are also emphasized.
The document appears to be an outline for a self-introduction presentation, including sections about the presenter's family, city/origin, interests, and favorite season. It provides prompts and guidelines for including information such as the presenter's name, parents' names, number of siblings, where they live, hobbies and activities they enjoy, and reasons for liking their favorite season.
Develops comprehensive knowledge of products and applications to maintain credibility as a subject matter expert. Acquires knowledge through published information, contacts, and formal learning to serve as a resource for distributors, end-users, and others. Assumes the role of resident expert by keeping up-to-date on new product developments and sales strategies to effectively help customers.
Choosing the right competency model is an important first step in developing you talent management strategy. Talent Snapshot contains a world class competency model which is rigorously researched and validated.
I introduce myself and provide details about my family, including my parents' names and number of siblings. I then discuss where I'm from originally and my current city of residence, as well as the name of my school. The next section outlines my interests, with an example given of liking to go swimming. Finally, I state my favorite season and give a reason why that season is my favorite, such as enjoying the beach and sun in the summer.
Agileload - load testing tool for better web performanceAgileload testing
Agileload is a load testing tool suitable both for complex or small projects
AgileLoad simulates all kind of user load on business applications to validate their performance. If an application fails to perform, AgileLoad provides visibility and insight into performance behaviour and immediately diagnoses the root causes of the problem.
Main product features :
- automatic recording of users scenarios and correlation of dynamic data
- support for the most advanced web technologies
- broad monitoring capabilities in real-time
- end to end performance measurement
- anomaly detection and diagnostics
- highly customisable reporting
Agileload testing tool is free for set up, preparation and small tests. Large tests have the least cost on the market for the features provided.
Agile Load can be installed in your own datacenters or be hosted in the cloud to synthesize users around the world. All your test scripts and reports templates can be reused accross deployments.
More info on http://www.agileload.com
Competency of the month: Ability to Learn the Business. At the heart of every talent management system is a validated, research based competency library.
The document provides guidance for coaches on developing their direct reports through modeling, demonstration, instruction, and feedback. It recommends that coaches spend sufficient time with direct reports to provide guidance, commit to sharing expertise through opportunities for observation, and encourage questions to ensure understanding. Coaches should also regularly observe direct reports, judge their effectiveness, and provide timely feedback to help reports perform successfully and develop skills.
This document describes someone who seeks to broaden their social circle by initiating interactions with people from diverse backgrounds. They take advantage of opportunities to meet new people regardless of shared interests or experiences. This allows them to learn different perspectives and have a greater impact.
Competency of the Month: TAKES RESPONSIBILITY FOR THOROUGHNESS AND ACCURACY O...Talent Management LLC
Effective talent management systems are powered by validated competencies. This month's competency of the month: TAKES RESPONSIBILITY FOR THOROUGHNESS AND ACCURACY OF ASSIGNED WORK
Infection control refers to policies and procedures used to minimize the spread of infections in healthcare settings. The purpose is to reduce infectious diseases, which are usually caused by bacteria or viruses and can spread through human contact, contaminated surfaces, airborne transmission, or dried blood. Proper use of personal protective equipment and following universal precautions when exposed to bodily fluids are important for prevention. Training and education on current infection control guidelines and monitoring changes are also essential to protect patients and healthcare workers from exposure.
Competitiveness: the ability to successfully channel a competitive spirit into winning business tactics; thrives when challenged to succeed; avoids backing away from potential failure at all costs; competes with self as readily as against others
Competency Snapshot: Commits time and effort to achieve resultsTalent Management LLC
All talent management systems should have at their core a solid, scientifically validated competency model. At Talent Snapshot, we take that seriously and have included content which has been tested and retested through over 40 years of research.
The document introduces a person by providing their name, details about their family including parents and siblings, where they are from originally and currently live including the name of their school. It also lists some of their interests and activities they enjoy as well as stating their favorite season and reason for choosing that season.
Commits to taking personal responsibility for results achieved by others; solicits feedback to identify problems and ensure goals are met; maintains accountability while allowing others autonomy over their tasks. Focuses on outcomes not efforts, and holds all accountable without excuses when goals are not reached. Optimizes available resources and understands the strengths and limitations of direct reports.
This document summarizes the privacy implications of publicly available NYC taxi trip data. It describes how one researcher was able to de-anonymize the taxi driver and vehicle data, which included sensitive information like the exact pickup and dropoff locations and times of passenger trips. This could reveal passengers' private information like home addresses or locations frequented. The document discusses the debate around privacy rights of taxi drivers and passengers in relation to this type of public data. It notes efforts by the TLC to address these issues in future open data releases.
This document discusses solutions for securing documents optically. It introduces Phidelity, a framework for optically securing documents using digital signatures, optical watermarking, public key infrastructure security, print control, and audit trails. The document then describes several security features of Phidelity, including optical watermarks, transactional microprinting, SecureCODE, and print control. It explains how these features can be used at different verification levels and outlines methods for verifying documents, including via web, email, fax, and mobile interfaces. Finally, it suggests potential uses for secured documents and thanks the reader for their time.
Search & Rescue and Missing Persons’ investigations often come to a standstill due to lack of information. How can technology change that? Robert Sell will explore the answer. We will hear how crowdsourced OSINT can be successfully used by emergency services and law enforcement, providing lifesaving information to fill the gaps and bring loved ones back to their families.
Robert Sell, OSINT expert and Founder, Trace Labs
This document summarizes research on car theft in San Antonio from October to December 2013. The research included two surveys. Part I was a multiple choice survey that found most thefts occurred during morning and afternoon hours and involved trucks and SUVs. Part II used a Likert scale and found public education, schedules/locations, and funding were viewed as inadequate, while police staffing and utilization of resources were viewed as balanced. The results imply areas like education, locations, and funding allocation could be improved. Future research should narrow the area studied and involve personnel earlier in the survey design process.
This document provides guidance on building a tailored image to fit customer expectations. It recommends studying customers to understand their preferred style and adopting their language, dress, and conversational manner to establish trust. High performers are said to get involved in customer industries, quietly promote themselves and their company in a credible manner, and learn about customers' past successes before making a first impression. Proper business etiquette like dress and speech for each situation are also emphasized.
The document appears to be an outline for a self-introduction presentation, including sections about the presenter's family, city/origin, interests, and favorite season. It provides prompts and guidelines for including information such as the presenter's name, parents' names, number of siblings, where they live, hobbies and activities they enjoy, and reasons for liking their favorite season.
Develops comprehensive knowledge of products and applications to maintain credibility as a subject matter expert. Acquires knowledge through published information, contacts, and formal learning to serve as a resource for distributors, end-users, and others. Assumes the role of resident expert by keeping up-to-date on new product developments and sales strategies to effectively help customers.
Choosing the right competency model is an important first step in developing you talent management strategy. Talent Snapshot contains a world class competency model which is rigorously researched and validated.
I introduce myself and provide details about my family, including my parents' names and number of siblings. I then discuss where I'm from originally and my current city of residence, as well as the name of my school. The next section outlines my interests, with an example given of liking to go swimming. Finally, I state my favorite season and give a reason why that season is my favorite, such as enjoying the beach and sun in the summer.
Agileload - load testing tool for better web performanceAgileload testing
Agileload is a load testing tool suitable both for complex or small projects
AgileLoad simulates all kind of user load on business applications to validate their performance. If an application fails to perform, AgileLoad provides visibility and insight into performance behaviour and immediately diagnoses the root causes of the problem.
Main product features :
- automatic recording of users scenarios and correlation of dynamic data
- support for the most advanced web technologies
- broad monitoring capabilities in real-time
- end to end performance measurement
- anomaly detection and diagnostics
- highly customisable reporting
Agileload testing tool is free for set up, preparation and small tests. Large tests have the least cost on the market for the features provided.
Agile Load can be installed in your own datacenters or be hosted in the cloud to synthesize users around the world. All your test scripts and reports templates can be reused accross deployments.
More info on http://www.agileload.com
Competency of the month: Ability to Learn the Business. At the heart of every talent management system is a validated, research based competency library.
The document provides guidance for coaches on developing their direct reports through modeling, demonstration, instruction, and feedback. It recommends that coaches spend sufficient time with direct reports to provide guidance, commit to sharing expertise through opportunities for observation, and encourage questions to ensure understanding. Coaches should also regularly observe direct reports, judge their effectiveness, and provide timely feedback to help reports perform successfully and develop skills.
This document describes someone who seeks to broaden their social circle by initiating interactions with people from diverse backgrounds. They take advantage of opportunities to meet new people regardless of shared interests or experiences. This allows them to learn different perspectives and have a greater impact.
Competency of the Month: TAKES RESPONSIBILITY FOR THOROUGHNESS AND ACCURACY O...Talent Management LLC
Effective talent management systems are powered by validated competencies. This month's competency of the month: TAKES RESPONSIBILITY FOR THOROUGHNESS AND ACCURACY OF ASSIGNED WORK
Infection control refers to policies and procedures used to minimize the spread of infections in healthcare settings. The purpose is to reduce infectious diseases, which are usually caused by bacteria or viruses and can spread through human contact, contaminated surfaces, airborne transmission, or dried blood. Proper use of personal protective equipment and following universal precautions when exposed to bodily fluids are important for prevention. Training and education on current infection control guidelines and monitoring changes are also essential to protect patients and healthcare workers from exposure.
Competitiveness: the ability to successfully channel a competitive spirit into winning business tactics; thrives when challenged to succeed; avoids backing away from potential failure at all costs; competes with self as readily as against others
Competency Snapshot: Commits time and effort to achieve resultsTalent Management LLC
All talent management systems should have at their core a solid, scientifically validated competency model. At Talent Snapshot, we take that seriously and have included content which has been tested and retested through over 40 years of research.
The document introduces a person by providing their name, details about their family including parents and siblings, where they are from originally and currently live including the name of their school. It also lists some of their interests and activities they enjoy as well as stating their favorite season and reason for choosing that season.
Commits to taking personal responsibility for results achieved by others; solicits feedback to identify problems and ensure goals are met; maintains accountability while allowing others autonomy over their tasks. Focuses on outcomes not efforts, and holds all accountable without excuses when goals are not reached. Optimizes available resources and understands the strengths and limitations of direct reports.
This document summarizes the privacy implications of publicly available NYC taxi trip data. It describes how one researcher was able to de-anonymize the taxi driver and vehicle data, which included sensitive information like the exact pickup and dropoff locations and times of passenger trips. This could reveal passengers' private information like home addresses or locations frequented. The document discusses the debate around privacy rights of taxi drivers and passengers in relation to this type of public data. It notes efforts by the TLC to address these issues in future open data releases.
This document discusses solutions for securing documents optically. It introduces Phidelity, a framework for optically securing documents using digital signatures, optical watermarking, public key infrastructure security, print control, and audit trails. The document then describes several security features of Phidelity, including optical watermarks, transactional microprinting, SecureCODE, and print control. It explains how these features can be used at different verification levels and outlines methods for verifying documents, including via web, email, fax, and mobile interfaces. Finally, it suggests potential uses for secured documents and thanks the reader for their time.
Search & Rescue and Missing Persons’ investigations often come to a standstill due to lack of information. How can technology change that? Robert Sell will explore the answer. We will hear how crowdsourced OSINT can be successfully used by emergency services and law enforcement, providing lifesaving information to fill the gaps and bring loved ones back to their families.
Robert Sell, OSINT expert and Founder, Trace Labs
This document summarizes research on car theft in San Antonio from October to December 2013. The research included two surveys. Part I was a multiple choice survey that found most thefts occurred during morning and afternoon hours and involved trucks and SUVs. Part II used a Likert scale and found public education, schedules/locations, and funding were viewed as inadequate, while police staffing and utilization of resources were viewed as balanced. The results imply areas like education, locations, and funding allocation could be improved. Future research should narrow the area studied and involve personnel earlier in the survey design process.
Top 24 team in the High School Utah Entrepreneur Challenge 2017. The program is managed by the Lassonde Entrepreneur Institute at the University of Utah. Learn more at lassonde.utah.edu/hsuec.
A presentation by Luigi Cappel to the NZ Parking Association taking into consideration the importance of the industry. Suggesting more focus on customers' needs and that the car park is not in fact the destination. How can the car park industry provide better service, to meet customers ever changing needs and play a role in developing smarter cities.
This document summarizes a panel discussion on rights registries. The panel, chaired by Paul Jessop and including Nic Garnett, Godfrey Rust, Nicholas Bentley, and Jonathan Lockwood, discussed key issues around rights registries including who is building them, what information they contain, when they will launch, where their geographical scope is, and why they are beneficial. The document also covered categories of metadata like identity management, rights management, and indexing, and how registry functions work like registration, querying, and resolution of identifiers.
Smart Chicago's fourteenth Civic User Testing Group (CUTGroup) for Chicago Cityscape, a website that tracks building permits, violations, and historic resources in all neighborhoods, community areas, and wards using open data
Automatic Image Cropping - A journey from a Master Thesis to ProductionAlexey Grigorev
The document discusses developing a neural network model for automatic image cropping. It proposes that properly cropped images can improve listing performance on online classifieds sites. The model uses a Deeply Supervised Salient Network (DSS) which improves on fully convolutional networks with deep supervision and short connections. Experiments were conducted on an online classifieds site by manually evaluating cropped images in different categories. The best performing category of engagement rings was selected for initial deployment. The system architecture includes components for image enhancement, cropping, hosting, and a frontend interface.
Final cut group-5-chicago-worksforyou-reportsmarziano
This is a final report for Smart Chicago's CUTGroup remote test that happened on November 25. This was a test of ChicagoWorksforYou.com, a dashboard to provide citywide information about city service requests.
The document summarizes challenges faced by the San Francisco Municipal Transportation Agency (SFMTA) in operating reliable public transit. It outlines SFMTA's transit networks and policies to promote reliability. SFMTA aims to analyze automatic vehicle location and passenger counter data to determine if new projects and policies have achieved the goals of more reliable and faster transit service. The agency is looking for data visualizations that provide insights into service levels, ridership patterns, traffic interactions, and the benefits of specific transit projects.
While there is tendency to publicly acclaim GDPR as a wonderful advancement, the sad truth is that EU operators now need sophisticated techniques to extract at least part of the knowledge that is freely available in other Countries. One of the main tools is Data Anonymization. Full anonymization amounts to data destruction. But there are levels. What is actually required to be compliant? How different situations require different anonymization levels? How to measure?
eStudio34 presents London Search Love 2015 | Five emerging Trends in Online S...William Renedo
Tom Anthony outline 5 key changes in technologies and trends which are changing the landscape of search. Some of these trends are here now, but some are trends which will emerge in the next 12-24 months.
I outline 5 key changes in technologies and trends which are changing the landscape of search. Some of these trends are here now, but some are trends which will emerge in the next 12-24 months.
Opposing Force research presentation on Smart Cities security and Smart Mobility technologies penetration testing (DEF CON 24 | HITB GSEC Singapore 2016)
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
5. 5
THE REALITY OF RADIO
“Operator can you check car
registration 456HAA for me?”
“Hang on, you are number 8
in the queue”
“No, 456HAA … anything?”
“Sorry, was that 496 HDA?”
“The car checks out. The
owner is one Derek Trotter,
male 35 yrs old with brown
hair, wanted for questioning”
“He says Derek is his brother,
he left his license at home …
without a picture, I had to let
him go”
10. 10
REMOVE THE OPERATOR – SEARCH ON DEMAND
Before:
• Talk to an operator
• Wait in a queue
• Search databases only from
the office/station
After:
• Direct access
• Immediate response
• Search from anywhere
12. 12
SEARCH ONCE - CLICK THROUGH RESULTS
BEFORE
• Search for vehicle in QPRIME
• Search for driver in Transport
• Search for driver history in QPRIME
AFTER
• Search for vehicle
• Returns information related to the
vehicle from all available data
sources
14. 14
CAPTURE NOW - NOT AT THE STATION
BEFORE
• Written notes
• … including descriptions
• Enter information at the station
• Delays in information sharing
AFTER
• Capture new info on the spot
• .. Including photos
• Information shared instantaneously
15. 15
RADIO VS MOBILE
Before Now
Radio/Operator Device
Talk/Listen See/Read
Queue/Wait… Immediate response
See part of the picture See the full picture
Notebook/Retype Capture information
at the source
Delayed information sharing Information shared immediately
19. 19
USER INTERFACE
I want to search for a person…
Step 1: Select the person icon
Step 2: Type the search criteria into the field
Stewart Jarrod 37
20. 20
OUTCOMES
BEFORE
• Open QPRIME
• Navigate to Person Search
• Complete multiple fields with search criteria
• Search >>
• Open CrimTrac and repeat
AFTER
• Select person type
• Type all the details into a single field
• Search >>
21. 21
DESIGN CHALLENGE | HIGHLIGHT CRITICAL
INFORMATION
Who is this person? Can they hurt me?
Do I need to take
any action?
23. 23
USER INTERFACE
• Officer alerted with a red Person flag
• User can drill down further into the
person’s details to review flag details
Demonstrating alerts using flags – Search
for a vehicle
24. 24
OUTCOMES
BEFORE
• Search for a vehicle in QPRIME
• Receive a list of matches
• Open every record to inspect
• Search for the registered owner
• Open matching record > Person is dangerous!
AFTER
• Search for a vehicle
• Flag: Registered owner is dangerous!
25. 25
DESIGN CHALLENGE | MINIMIZE DATA RE-ENTRY
“Never rekey. Reuse”
Q
T
C
DerekFirst name
Last name Trotter
DerekFirst name
Last name Trotter
78541254Drivers Licencse no.
27. 27
USER INTERFACE
Navigate to linked records
Only had to type the information
once and was able to navigate
to related records by simply linking to
them
28. 28
OUTCOMES
BEFORE
• Search for a person in QPRIME
• Rekey in Queensland Transport database
• Rekey in CrimTrac
AFTER
• Search for a person in QPRIME
• Link to related vehicle records
• Link to drivers license information in Queensland Transport database
• Link to CrimTrac search results for the person
31. 31
USER INTERFACE
Creating a Street Check Occurrence
• To add the current record to the Street
Check, use the context menu
The “Green man” indicator shows that a
street check is currently in progress
• Users can tap on the “Green man” on the
navigation bar to finalise the Street Check
• On the Street Check screen we can see
the entities that were added. The officer can
now complete the remaining information
and Submit the record
32. 32
OUTCOMES
BEFORE
• Record details in a notebook
• Enter details into QPRIME at the station
• Multiple searches and rekeying of information to complete entry
AFTER
• Search for a record
• “Add to cart”
• Link to or search for other records
• “Add to cart”
• “Checkout” to complete record entry
35. 35
35
iOS Device
The user must learn how each system work
The user must know what information is available in each system
The user must conduct separate searches on each system
The user must combine and interpret information from each system
Users must learn, understand and work across all the different systems
“WE WANT WHAT WE HAVE ON OUR DESKTOPS,
ONLY MOBILE
36. 36
36
iOS Device
1. Developed a single mobile app
2. Created a common data model
3. Inserted a web service layer
- The user doesn't need to know about the back end systems
- The user doesn't need to know what information is stored where
- The user’s only concern is the device and single interface
WHAT CHANGES DID WE MAKE TO THE ARCHITECTURE?
37. 37
37
HOW DID THE NEW ARCHITECTURE SUPPORT OUR
DESIGN GOALS?
Search once?
Minimize navigation?
Present the required information
quickly?
- Who is this person?
- Can they hurt me?
- Do I need to take any action?
Before After
39. 39
FEEDBACK FROM OUR USERS?
“On a quick note, the I-pad mini’s are excellent. As an example,
because of Q-Lite we were able to identify an offender
wanted for almost 3 years on two warrants (6 offences), who
had managed to create a new identity through Queensland
Transport. He was only found due to the associate function on
a passenger in the vehicle with him and the ease of accessing
QPRIME photos. In the 3 years he was wanted, he had come
into Police contact several times under his new identity and
remained undetected.”
“Only last week out here at Longreach we were conducting
patrols of the Highway between Longreach and Ilfracombe. This
is an area that has many radio black-spots. At about 11:30pm
we intercepted a vehicle containing three occupants. Two of
which provided false names and we were able to verify this using
the (mobile device) to check on scene. As a result of this
intercept, all three persons were arrested and identified as
either wanted for questioning, wanted on bail act warrants or
wanted on return to prison warrant. About seven fresh charges
were also laid. It also should be noted that the person wanted
on the return to prison warrant had been actively evading or
running from Police for some five months. ”
“Friday and Saturday night shift completed and what a
difference the iPad made!
Often on these nights it's difficult to even get on the radio,
and even when you do you are often 6th in queue looking at a
substantial wait. In the past you may have to give up on
checking only to return to station later to find they were
wanted.
The ability to conduct my own checks immediately allowed
me to be far more productive not to mention the fact that it
appears far more professional than making Joe Citizen
wait 10 minutes just to check his licence.
The only problem is that I am now the team inquiries office as
everyone has worked out that it's far quicker to do checks with
me than through inquiries.”
“I am a full time motorcycle rider. The device is fantastic and is a
great step forward for the QPS.
Being on the bike I am often working one up. We all know the
dramas with overloading of the enquiry radio channel. It
is not good to be standing on the side of the road with a high
risk suspect and be told you are fifth in the queue. Many
times I have released persons prior to doing the necessary
checks because of the delays on the enquiry channel. With
Qlite that information is readily available in seconds.”
40. “This is the most exciting thing I have seen in my entire
policing career” Paul Stewart, Assistant Commissioner,
30 years in the field