ICT deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send, and edit information.
Example: when we make a video call, we use internet.
Introduction to Empowerment Technology.pptxJerome Bigael
Introduction to Empowerment Technology.
What is ICT?
What is information and Communication Technology?
Status if ICT in the Philippines
Importance of ICT in the Philippine society
Introduction to Empowerment Technology.pptxJerome Bigael
Introduction to Empowerment Technology.
What is ICT?
What is information and Communication Technology?
Status if ICT in the Philippines
Importance of ICT in the Philippine society
ICT deals with the use of different communication technologies such as mobile phones, telephone, Internet, etc. to locate, save, send, and edit information.
Example: when we make a video call, we use internet.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
3. ICT (INFORMATION AND COMMUNICATION
TECHNOLOGY)
3
•ICT deals with the use of different
communication technologies such as mobile
phones, telephone, Internet, etc. to locate,
save, send, and edit information.
•Example: when we make a video call, we use
internet.
4. 4
ICT IN THE PHILIPPINES
•Philippines as the “ICT Hub of Asia”.
•huge growth of ICT related jobs around the
country, one of which is call center or BPO
(Business Process Outsourcing) centers.
•According to 2013 edition of Measuring
the Information Society by the
International
5. 5
ICT IN THE PHILIPPINES
Telecommunication Union, there are 106.8
cellphones per 100 Filipinos in the year
2012.
In a data gathered by the Annual Survey
of Philippines Business and Industries
in 2010, the ICT industry shares 19.3%
of the total employment population.
6. ICT IN THE PHILIPPINES
•Time magazines declared Makati City,
Philippines-Rank 1 as the “Selfiest Cities
around the world, and Rank 9 is Cebu City.
WWW-WORLD WIDE WEB
•When WWW was invented, most web pages were
static. Static (also known as flat page or
stationary page) in the same that the page “as
is” and cannot be manipulated by the user.
This referred to as Web 1.0.
7. 7
EXAMPLE OF WEB 2.0
• Social Networking sites
• Blogs
• Wikis
• Video sharing sites
8. 8
WEB 2.0
•Web 2.0 allows the user to interact with
the page known as DYNAMIC PAGE; instead of
just reading a page, the user may be able
to comment or create a user account.
Dynamic page refers to the web pages that
are affected by user input or preference.
9. 9
KEY FEATURES OF WEB 2.0
Folksonomy - allows users to categorize and
classify/arrange information using freely
chosen keywords
(e.g. tagging). Popular social networking sites
such as Twitter, Instagram, Facebook, etc.
use tags that start with a pound sign (#) or
hashtag.
10. 10
KEY FEATURES OF WEB 2.0
Rich User Interface - content is dynamic and
is responsive to user's input. An example
would be a website
that shows local content. In the case of
social networking sites, when logged on, your
account is used
to modify what you see in their website.
11. 11
KEY FEATURES OF WEB 2.0
•User Participation– the owner of website is
not the only one who is able to put content.
Others are able to place a content on their
own by means of comments, reviews, and
evaluation.
12. 12
•Long Tail – services are offered on demand
rather than on a one-time purchase. This is
synonymous to subscribing to a data plan that
charges you for the amount of time you spent
on Internet or a data plan that charges you
for the amount of bandwidth you used.
KEY FEATURES OF WEB 2.0
13. 13
WEB 3.0 AND THE SEMANTIC WEB
•Semantic Web– is a movement led by the
World Wide Web Consortium(W3C). The semantic
web provides a framework that allows data to
be shared and reuse to deliver web content
specifically targeting the user.
14. 14
WEB 3.0 IS YET TO BE FULLY REALIZED
BECAUSE OF SEVERAL PROBLEMS:
•Compatibility-HTML files and current web
browsers could not support Web 3.0.
•Security – The user’s security is also
question since the machine is saving his or
her preferences.
•Vastness-The World Wide Web already
contains billions of web pages.
15. 15
Vagueness – Certain words are imprecise. The words “old”
and “small” would depend to the user.
Logic - since machine use logic, there are certain limitations
for a computer to be able to predict what the user is referring
to at a given time.
WEB 3.0 IS YET TO BE FULLY REALIZED
BECAUSE OF SEVERAL PROBLEMS:
16. 16
TRENDS IN ICT
1. Convergence – is the synergy of
technological advancements to work on a
similar goal or task. For example, besides
using your personal computer to create
word documents, you can now use your
smartphone.
2. Social Media - is a website, application, or
online channel that enables web users to
create, co-create, discuss, modify, and
exchange user generated content.
17. 17
SIX TYPES OF SOCIAL MEDIA
1.) Social Networks – These are sites
that allows you to connect with other
people with the same interests or
background. Once the user creates
his/her account, he/she can set up a
profile, add people, share content,
etc.
Example : Facebook and Google+
19. 19
2.) Bookmarking Sites– These are
sites that allow you to store and
manage links to various website
and resources. Most of these
sites allow you to create a tag
allows you to and others easily
share them.
Ex. : StumbleUpon/Pinterest
SIX TYPES OF SOCIAL MEDIA
21. 21
SIX TYPES OF SOCIAL MEDIA
3.) Social News - These are sites that
allow users to post their own news intems
or links to other new sources. The users
can also comment on the post and comments
may also be rank.
Example: reddit and Digg
23. 23
SIX TYPES OF SOCIAL MEDIA
4.)Media Sharing – These are sites that
allow you to upload and share media
content like images, music and video.
Example: Flickr, YouTube and Instagram.
25. 25
SIX TYPES OF SOCIAL MEDIA
5.) Microblogging– These are sites that
focus on short updates from the user.
Those that subscribed to the user will
be able to receive these updates.
Example: Twitter
27. 27
SIX TYPES OF SOCIAL MEDIA
6.) Blogs and Forums– These websites allow
user to post their content. Other users
are able to comment on the said topic.
Example: Blogger, WordPress and Tumblr
28. 28
TRENDS IN ICT
3. Mobile Technologies – The popularities of
smartphones and tablets has taken a
major rise over the years. This is
largely because of the devices
capability to do the tasks that were
originally found in PCs.
Several of these devices are Caple of
using high-speed internet. Today the
latest model devices use 4G
Networking(LTE), which is currently the
fastest mobile network.
29. 29
MOBILE OS
IOS – use in apple devices such as iPhone and
iPad.
Android - an open source OS developed by google.
Being open source means mobile phone companies
use this OS for free.
Blackberry OS – use in Blackberry devices.
Windows Phone OS – a closed source and
proprietary operating system developed by
Microsoft.
30. 30
Symbian – the original smartphone OS; used by
Nokia devices.
WebOS – originally used in smartphones; now
smart TV’s. used in
Windows Mobile – developed by Microsoft for
smartphones and pocket PCs.
MOBILE OS
31. 31
TRENDS IN ICT
4. Assistive Media - is a non-profit
service designed to help people who
have visual and reading impairments. a
database of audio recordings is
used to read to the user.
32. 32
KEY TERMS
•Web 1.0 – static websites without
interactivity.
•Web 2.0 – websites that contain dynamic
content.
•Web 3.0 – a concept of the World Wide Web
that is designed to cater to the individual
user.
•Static – refers to the web that are the same
regardless of the user.
33. 33
KEY TERMS
•Dynamic – refers to the that are affected by
user input or preference.
•Folksonomy – allows user to categorize and
classify/arrange information.
•Hashtag # – used to “categorize” posts in a
website.
•Convergence – the synergy of technological
advancements to work a similar goal or task.
34. 34
•Social Media – websites, applications or
online channels that enable users to co-
create, discuss, modify, and exchange user-
generated content.
KEY TERMS
36. 36
INSTRUCTION: WRITE (T) IF THE STATEMENT IS TRUE, WRITE
(F) IF THE STATEMENT IS FALSE
1.) Web 2.0 is classified as dynamic webpage.
2.) People Magazine conducted the research on “The
Selfiest Cities in the World”.
3.) Web 2.0 introduced static web pages that allow users
to interact with the web page.
4.) Folksonomy allows user to categorize and locate
information.
5.) Technological convergence is the synergy of
technological advancement to work on a similar goal or task.
6.) According to Nielsen, users who use the Internet spend
more time in social media sites than in any other type of
site.
37. 37
7.) Blogging sites are sites that focus on short
updates from the user.
8.) Android is a mobile operating system for Apple
devices.
9.) Assistive media is a nonprofit service designed
to help people who have visual and reading
impairments.
10.) ICT deals with the use of diff. comm. Tech. to
locate, send, save & edit info.
11.) Semantic web means that the page is stationary
or flat page.
INSTRUCTION: WRITE (T) IF THE STATEMENT IS TRUE, WRITE
(F) IF THE STATEMENT IS FALSE
38. 38
Write SO if the item is for Social Networks, BS for bookmarking, MS
for Media sharing, SN for Social News, MB for Micro-Blogging and BF
for Blogs and Forums.
1. Facebook 6. Google+ 11. WordPress
2. Plurk 7. Instagram 12. Digg
3. Twitter 8. Pinterest 13. YouTube
4. Tumblr 9. Blogger 14. Flicker
5. Reddit 10.StumbleUpon
45. 45
This picture shows the speed at
which The Internet is changing
the world.
The sites we visit are so
overwhelmingly popular to both
adults and children.
46. 46
The online world is
increasingly integrated
into our daily lives.
The internet like the
physical world, maybe safe
or unsafe depending on our
habits.
47. 47
Sometimes, we do not
pay much attention
about the information
that we share.
49. 49
Being safe and secured online depends
on how we protect ourselves.
Analyze the following statements
Guess the correct answer by giving a
thumbs-up if You agree and thumbs
–down if not.
59. 59
The internet is define as the
information superhighway. This
means that anyone has access to
this highway, can place
information and can grab that
Information.
64. 64
It is a malicious
program that usually
transfer from one device
to another with the aid
of the local networks ,
but commonly through
data storage such as
flash drives and hard
drive.
VIRUS
66. 66
This malicious program
disguise as a useful
program, however left
your device unprotected
and became vulnerable to
other malwares once you
accessed or download.
TROJAN
85. 85
TEST II. TRUE OR FALSE
Direction: Write True if you agree or False if you
do not agree with the statements below.
______ 1. Read the terms and conditions before accepting it.
______ 2. Only download music or video from a trusted website.
______ 3. You can use a pirated software for personal use only.
______ 4. There is a danger for posting future vacation.
______ 5. Avoid logging in to free WIFI.
86. 86
TEST II. TRUE OR FALSE
Direction: Write True if you agree or False if you
do not agree with the statements below.
TRUE 1. Read the terms and conditions before accepting it.
TRUE 2. Only download music or video from a trusted website.
FALSE 3. You can use a pirated software for personal use only.
TRUE 4. There is a danger for posting future vacation.
TRUE 5. Avoid logging in to free WIFI.
87. TEST II. Match Column A with Column B.
DIRECTION: Read Column A and Identify the correct answer by choosing
answers in Column B. Write the LETTER of the correct answer at the
space provided before the number.
Answers A B
________1. It is a malicious program that
usually transfer from one device to
another with the aid of the local
networks , but commonly through
data storage such as flash drives
and hard drive.
a. Worm
b. Virus
c. Trojan
d. Hacking
e. Spyware
f. Adware
g. Spam
________2. This malicious program disguise as
a useful program, however left
your device unprotected and
became vulnerable to other
malwares once you accessed or
download.
________3. A program designed to send you
advertisements mostly popups
________4. A malicious program that monitors
the device, and the actions of the
users without its knowledge.
________5. This Malware replicates itself and
can transfer by any type of means,
but more often through computer
network.