Ducktype is a lightweight format designed explicitly for Mallard. These are the slides from a fast-paced lightning talk on Ducktype I gave at GUADEC 2015. Slides lack commentary, jokes, and Mallard balls flying through the air.
You stink at email: Why spend time writing something nobody wants to read? Viqui Dill
Â
This presentation discusses how to write effective emails that get read. It notes that people are busy and don't have time to read lengthy emails. It provides tips for crafting concise subject lines that convey the essential information. The body of the email should follow an inverted pyramid structure, with the most important details up front. Links, bullet points, and visual elements can help engage readers. The goal is to write emails that are scannable and invite further interaction.
Setting expectations through the Doc PlanLarry Kunz
Â
On any user-assistance or technical-communication project, the project plan - or Documentation Plan - is essential for aligning expectations of the documentation team and all other stakeholders. We explore the outline for the doc plan, the importance of the doc plan for validating your assumptions and for ensuring that your team will receive what it needs from other stakeholders, and a few best practices.
Mature Products: The Cycle of UX Reinvention UXPA 2016Carol Smith
Â
As products mature, the user’s needs change over time and so must the way we work. This presentation discusses various experiences working on mature software and complex Web applications and a set of best practices.
The SlideShare 101 is a quick start guide if you want to walk through the main features that the platform offers. This will keep getting updated as new features are launched.
The SlideShare 101 replaces the earlier "SlideShare Quick Tour".
This document provides an agenda and slides for a PowerShell presentation. The agenda covers PowerShell basics, file systems, users and access control, event logs, and system management. The slides introduce PowerShell, discuss cmdlets and modules, and demonstrate various administrative tasks like managing files, users, services, and the firewall using PowerShell. The presentation aims to show how PowerShell can be used for both system administration and security/blue team tasks.
Introduction of "document management system - creation kit"ssuser285ddb
Â
Author: Osamu Kawaguchi mail: cast 1110@yahoo.co.jp CC-BY-SA 4.0
It is an introduction of "document management system - creation kit" that I created. Although the very simple system, it can record file names and comments in a simple table, search and retrieve the necessary documents easily ,even after a few years. If all members of the group use it properly, you will very get a good result.
I will release and distribute in the near future. If you are in a hurry please send me an email. I will send you the file.
Try it.
1. It is an application made with free LibreOffice calc macros.
2. You can share and manage documents with multiple users mixed in
Windows and Linux on the cloud.
o Managing files in the list
o Creating new by copying stationery files
o Starting applications and editing files
o Copying and deleting files
o Prevent duplicate editing (Libre calc, writer only)
o Easy operation, same as remote control of television
3. The format of the document that can be handled are
o (graph, excel, calc, writer, draw, etc.)
o graphic (jpeg, tiff, png, etc.)
o music, video (mp 3, mp 4, avi, etc.) .
4. Applications that can be started directly
o Office (word, excel, Libre calc, Libre writer, notepad, gedit, etc.)
o Graphics (mspaint, Libre draw, etc)
o Music, video (wmplayer, totem, vlc, etc. .).
5. It can be used for private use (library management)
6. The design of the table can be changed.
It is the data of LibreOffice Kaigi 2018 (Osaka Japan 20180512).
The document discusses methods for sharding MySQL databases. It begins with an introduction to sharding and the different types of sharding methods. It then provides details on building a large database cluster using the Palomino Cluster Tool, which utilizes configuration management tools like Ansible, Chef and Puppet. The document concludes with a section on administering the large database cluster using the open source tool Jetpants.
You are tasked with gaining privileged access to a Windows 2008 server through a capture-the-flag event. You first use Metasploit to exploit vulnerable MS SQL services to get an unprivileged shell. Then, you use the exploit suggester module to find exploits for privilege escalation, using the ms16_014_wmi_recv_notif exploit to achieve a privileged shell. Finally, you perform an action like deleting important files to cause an information security breach on the target system.
You stink at email: Why spend time writing something nobody wants to read? Viqui Dill
Â
This presentation discusses how to write effective emails that get read. It notes that people are busy and don't have time to read lengthy emails. It provides tips for crafting concise subject lines that convey the essential information. The body of the email should follow an inverted pyramid structure, with the most important details up front. Links, bullet points, and visual elements can help engage readers. The goal is to write emails that are scannable and invite further interaction.
Setting expectations through the Doc PlanLarry Kunz
Â
On any user-assistance or technical-communication project, the project plan - or Documentation Plan - is essential for aligning expectations of the documentation team and all other stakeholders. We explore the outline for the doc plan, the importance of the doc plan for validating your assumptions and for ensuring that your team will receive what it needs from other stakeholders, and a few best practices.
Mature Products: The Cycle of UX Reinvention UXPA 2016Carol Smith
Â
As products mature, the user’s needs change over time and so must the way we work. This presentation discusses various experiences working on mature software and complex Web applications and a set of best practices.
The SlideShare 101 is a quick start guide if you want to walk through the main features that the platform offers. This will keep getting updated as new features are launched.
The SlideShare 101 replaces the earlier "SlideShare Quick Tour".
This document provides an agenda and slides for a PowerShell presentation. The agenda covers PowerShell basics, file systems, users and access control, event logs, and system management. The slides introduce PowerShell, discuss cmdlets and modules, and demonstrate various administrative tasks like managing files, users, services, and the firewall using PowerShell. The presentation aims to show how PowerShell can be used for both system administration and security/blue team tasks.
Introduction of "document management system - creation kit"ssuser285ddb
Â
Author: Osamu Kawaguchi mail: cast 1110@yahoo.co.jp CC-BY-SA 4.0
It is an introduction of "document management system - creation kit" that I created. Although the very simple system, it can record file names and comments in a simple table, search and retrieve the necessary documents easily ,even after a few years. If all members of the group use it properly, you will very get a good result.
I will release and distribute in the near future. If you are in a hurry please send me an email. I will send you the file.
Try it.
1. It is an application made with free LibreOffice calc macros.
2. You can share and manage documents with multiple users mixed in
Windows and Linux on the cloud.
o Managing files in the list
o Creating new by copying stationery files
o Starting applications and editing files
o Copying and deleting files
o Prevent duplicate editing (Libre calc, writer only)
o Easy operation, same as remote control of television
3. The format of the document that can be handled are
o (graph, excel, calc, writer, draw, etc.)
o graphic (jpeg, tiff, png, etc.)
o music, video (mp 3, mp 4, avi, etc.) .
4. Applications that can be started directly
o Office (word, excel, Libre calc, Libre writer, notepad, gedit, etc.)
o Graphics (mspaint, Libre draw, etc)
o Music, video (wmplayer, totem, vlc, etc. .).
5. It can be used for private use (library management)
6. The design of the table can be changed.
It is the data of LibreOffice Kaigi 2018 (Osaka Japan 20180512).
The document discusses methods for sharding MySQL databases. It begins with an introduction to sharding and the different types of sharding methods. It then provides details on building a large database cluster using the Palomino Cluster Tool, which utilizes configuration management tools like Ansible, Chef and Puppet. The document concludes with a section on administering the large database cluster using the open source tool Jetpants.
You are tasked with gaining privileged access to a Windows 2008 server through a capture-the-flag event. You first use Metasploit to exploit vulnerable MS SQL services to get an unprivileged shell. Then, you use the exploit suggester module to find exploits for privilege escalation, using the ms16_014_wmi_recv_notif exploit to achieve a privileged shell. Finally, you perform an action like deleting important files to cause an information security breach on the target system.
Chris Michael and Stefan Schmidt from Samsung OSG's UK office talk about the design of Enlightenment as it relates to being used as a standalone Wayland compositor.
Talk from Embedded Linux Conference, http://elcabs2015.sched.org/event/551ba3cdefe2d37c478810ef47d4ca4c?iframe=no&w=i:0;&sidebar=yes&bg=no#.VRUCknSQQQs
GPU programing
The Brick Wall -- UC Berkeley's View
Power Wall: power expensive, transistors free
Memory Wall: Memory slow, multiplies fast ILP Wall: diminishing returns on more ILP HW
Here are the key points covered in the essay:
- Exercise 15.1 involves creating a custom backup job in Windows 7 to back up selected files and folders to a hard disk partition.
- The C: system drive does not appear as a backup destination because you cannot back up a drive to itself.
- A warning appears when selecting the X: drive for backup because although it appears as a separate drive letter, it is physically located on the same hard disk as the system drive C:. Backing up to this location would not provide the benefits of an off-site backup if the hard disk failed.
- When selecting folders and files for backup, you must ensure the selected items are not part of an operating system
This document provides an overview of the dost.jar and fo.jar files in the DITA-OT. It discusses that dost.jar holds the Java code for the overall DITA-OT framework, while fo.jar holds the code for the FO plugin that generates PDF output. It then describes how to build a customized version of these jars by modifying the source code, and outlines some of the key functions contained within each jar file, such as the Java invoker, integrator, and processing pipeline modules.
Experiences with backend user rights in TYPO3punkt.de GmbH
Â
For the last several years we've been working on various TYPO3 projects. During that time we've gained some experience in setting up backend users fitting to their needs.
In this talk we would like to share our experiences with and ideas on backend user settings. We will show you how we handle backend user groups in our projects as well as some Dos and Don'ts.
This document provides an overview of applets, including:
- Applets are Java programs that run within web browsers. Examples include interactive scientific visualizations and real-time satellite trackers.
- Applets have a lifecycle controlled by the browser via init(), start(), stop(), and destroy() methods. They are also subject to security restrictions since they are downloaded from the web.
- Resources like images, audio, and text files can be accessed from the home server hosting the applet. Communication between the applet and browser is also possible using the AppletContext interface.
This document provides an overview and agenda for a 5-day UNIX/Linux training course. The training will cover Linux installations, desktops, command line administration, networking, and server/programming. Each day focuses on a different topic area. Day 1 is an introduction and installation. Day 2 covers Linux desktops and administration. Day 3 is Linux CLI administration. Day 4 is networking and internet. Day 5 is Linux servers and programming. The document also includes background information on Linux and UNIX as well as tips for Linux installations, file systems, users, commands, and performance.
Inspection and maintenance tools (Linux / OpenStack)Gerard Braad
Â
This handout is part of the training at UnitedStack and will introduce you to several inspection and maintenance tools.
It is generated from the slides at: http://gbraad.gitlab.io/tools-training/
Source: https://gitlab.com/gbraad/tools-training
Using Apache Camel connectors for external connectivityClaus Ibsen
Â
The document summarizes a public presentation by Claus Ibsen on using Apache Camel connectors for external connectivity. The presentation covers understanding Camel components, essential components like Direct, Bean, File, and JMS, and how to create new Camel components. It also provides information on where to find additional Camel resources.
Terraform modules provide reusable, composable infrastructure components. The document discusses restructuring infrastructure code into modules to make it more reusable, testable, and maintainable. Key points include:
- Modules should be structured in a three-tier hierarchy from primitive resources to generic services to specific environments.
- Testing modules individually increases confidence in changes.
- Storing module code and versions in Git provides versioning and collaboration.
- Remote state allows infrastructure to be shared between modules and deployments.
Systemd: the modern Linux init system you will learn to loveAlison Chaiken
Â
The talk combines a design overview of systemd with some tutorial incofrmation about how to configure it. Systemd's features and pitfalls are illustrated by short demos and real-life examples. Files used in the demos are listed under "Presentations" at http://she-devel.com/
Video of the live presentation will appear here:
http://www.meetup.com/Silicon-Valley-Linux-Technology/events/208133972/
This document provides tips and recommendations for XPages developers to work more efficiently. It recommends using a local development server, source control, unit testing, and leveraging open source tools from OpenNTF and Apache. Some specific tips include tweaking memory settings, using code templates, shortcuts, and refactoring, domain driven design and clean code principles. The document also offers to help connect developers with experienced XPages experts.
This document provides a cheat sheet of common Linux commands and their usage. It covers basic file operations like copying, moving, deleting files and directories. It also includes commands for viewing files, compressing/decompressing files, finding files, remote access, and getting system information. The commands are explained over 3 pages with examples of proper syntax and usage for each one.
This document provides an overview of building a news aggregation feature for Open Atrium. It discusses:
1) Doing a quick demo of Open Atrium's existing features like time tracking, maps, and Alfresco document management.
2) The steps to build the news aggregation feature, including using the Feeds and Views modules to create content types, fields, and displays for feed items that will be accessible to groups.
3) Important considerations like using exportables to configure modules like Context and ensure the feature works for any Open Atrium site, avoiding issues with taxonomy IDs, and using Organic Groups for access control at the SQL level.
This document provides an introduction to Linux, including its history and architecture. It describes Linux's origins from Unix in the 1960s and the development of the Linux kernel by Linus Torvalds in 1991. It outlines the key components of a Linux system, including the kernel, shell, file system, processes, networking, and desktop environments. It also discusses booting a Linux system and provides resources for learning more about Linux distributions and building your own operating system.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Â
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Â
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
More Related Content
Similar to Ducktype Lightning Talk for GUADEC 2015
Chris Michael and Stefan Schmidt from Samsung OSG's UK office talk about the design of Enlightenment as it relates to being used as a standalone Wayland compositor.
Talk from Embedded Linux Conference, http://elcabs2015.sched.org/event/551ba3cdefe2d37c478810ef47d4ca4c?iframe=no&w=i:0;&sidebar=yes&bg=no#.VRUCknSQQQs
GPU programing
The Brick Wall -- UC Berkeley's View
Power Wall: power expensive, transistors free
Memory Wall: Memory slow, multiplies fast ILP Wall: diminishing returns on more ILP HW
Here are the key points covered in the essay:
- Exercise 15.1 involves creating a custom backup job in Windows 7 to back up selected files and folders to a hard disk partition.
- The C: system drive does not appear as a backup destination because you cannot back up a drive to itself.
- A warning appears when selecting the X: drive for backup because although it appears as a separate drive letter, it is physically located on the same hard disk as the system drive C:. Backing up to this location would not provide the benefits of an off-site backup if the hard disk failed.
- When selecting folders and files for backup, you must ensure the selected items are not part of an operating system
This document provides an overview of the dost.jar and fo.jar files in the DITA-OT. It discusses that dost.jar holds the Java code for the overall DITA-OT framework, while fo.jar holds the code for the FO plugin that generates PDF output. It then describes how to build a customized version of these jars by modifying the source code, and outlines some of the key functions contained within each jar file, such as the Java invoker, integrator, and processing pipeline modules.
Experiences with backend user rights in TYPO3punkt.de GmbH
Â
For the last several years we've been working on various TYPO3 projects. During that time we've gained some experience in setting up backend users fitting to their needs.
In this talk we would like to share our experiences with and ideas on backend user settings. We will show you how we handle backend user groups in our projects as well as some Dos and Don'ts.
This document provides an overview of applets, including:
- Applets are Java programs that run within web browsers. Examples include interactive scientific visualizations and real-time satellite trackers.
- Applets have a lifecycle controlled by the browser via init(), start(), stop(), and destroy() methods. They are also subject to security restrictions since they are downloaded from the web.
- Resources like images, audio, and text files can be accessed from the home server hosting the applet. Communication between the applet and browser is also possible using the AppletContext interface.
This document provides an overview and agenda for a 5-day UNIX/Linux training course. The training will cover Linux installations, desktops, command line administration, networking, and server/programming. Each day focuses on a different topic area. Day 1 is an introduction and installation. Day 2 covers Linux desktops and administration. Day 3 is Linux CLI administration. Day 4 is networking and internet. Day 5 is Linux servers and programming. The document also includes background information on Linux and UNIX as well as tips for Linux installations, file systems, users, commands, and performance.
Inspection and maintenance tools (Linux / OpenStack)Gerard Braad
Â
This handout is part of the training at UnitedStack and will introduce you to several inspection and maintenance tools.
It is generated from the slides at: http://gbraad.gitlab.io/tools-training/
Source: https://gitlab.com/gbraad/tools-training
Using Apache Camel connectors for external connectivityClaus Ibsen
Â
The document summarizes a public presentation by Claus Ibsen on using Apache Camel connectors for external connectivity. The presentation covers understanding Camel components, essential components like Direct, Bean, File, and JMS, and how to create new Camel components. It also provides information on where to find additional Camel resources.
Terraform modules provide reusable, composable infrastructure components. The document discusses restructuring infrastructure code into modules to make it more reusable, testable, and maintainable. Key points include:
- Modules should be structured in a three-tier hierarchy from primitive resources to generic services to specific environments.
- Testing modules individually increases confidence in changes.
- Storing module code and versions in Git provides versioning and collaboration.
- Remote state allows infrastructure to be shared between modules and deployments.
Systemd: the modern Linux init system you will learn to loveAlison Chaiken
Â
The talk combines a design overview of systemd with some tutorial incofrmation about how to configure it. Systemd's features and pitfalls are illustrated by short demos and real-life examples. Files used in the demos are listed under "Presentations" at http://she-devel.com/
Video of the live presentation will appear here:
http://www.meetup.com/Silicon-Valley-Linux-Technology/events/208133972/
This document provides tips and recommendations for XPages developers to work more efficiently. It recommends using a local development server, source control, unit testing, and leveraging open source tools from OpenNTF and Apache. Some specific tips include tweaking memory settings, using code templates, shortcuts, and refactoring, domain driven design and clean code principles. The document also offers to help connect developers with experienced XPages experts.
This document provides a cheat sheet of common Linux commands and their usage. It covers basic file operations like copying, moving, deleting files and directories. It also includes commands for viewing files, compressing/decompressing files, finding files, remote access, and getting system information. The commands are explained over 3 pages with examples of proper syntax and usage for each one.
This document provides an overview of building a news aggregation feature for Open Atrium. It discusses:
1) Doing a quick demo of Open Atrium's existing features like time tracking, maps, and Alfresco document management.
2) The steps to build the news aggregation feature, including using the Feeds and Views modules to create content types, fields, and displays for feed items that will be accessible to groups.
3) Important considerations like using exportables to configure modules like Context and ensure the feature works for any Open Atrium site, avoiding issues with taxonomy IDs, and using Organic Groups for access control at the SQL level.
This document provides an introduction to Linux, including its history and architecture. It describes Linux's origins from Unix in the 1960s and the development of the Linux kernel by Linus Torvalds in 1991. It outlines the key components of a Linux system, including the kernel, shell, file system, processes, networking, and desktop environments. It also discusses booting a Linux system and provides resources for learning more about Linux distributions and building your own operating system.
Similar to Ducktype Lightning Talk for GUADEC 2015 (20)
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Â
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Â
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Â
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Â
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
Â
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Fueling AI with Great Data with Airbyte WebinarZilliz
Â
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Â
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Â
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
Â
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Â
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
2. Open Help Conference & Sprints
The Open Source Documentation Conference
@openhelpconf http://conf.openhelp.cc/
3. A Short History of Ducks
â—Ź
GNOME needed a format that allowed distros to plug new
information in without patching.
â—Ź
Shaun needed an extensible format with a small core.
â—Ź
The world needed a semantic format that was simple.
Mallard: We Built the Help System
4. Mallard Is a Success
â—Ź
It is pluggable.
â—Ź
It is extensible.
â—Ź
It is semantic.
â—Ź
It is simple.
Mallard: We Built the Help System
11. Informational Elements
= Page Title
@link[guide >index]
@title[link role=”topic”] Topic Link Title
@credit[author copyright]
@name Shaun McCance
@email shaunm@gnome.org
Mallard: We Built the Help System
12. Semantic Inline Elements
Here is a $gui(button label).
Please don't run $cmd(rm -rf /).
Yes, we can $link[>otherpage](link).
Mallard: We Built the Help System
15. Even More Extensible
[[!ns svg=http://www.w3.org/2000/svg
mal=http://projectmallard.org/1.0/]]
= Page With SVG & Mallard Links
[svg viewBox="0 0 120 120" version="1.1"]
[circle cx=60 cy=60 r=50 mal:xref=pageid]
Mallard: We Built the Help System