This document discusses exploratory testing and provides examples of how to explore different targets like editing profiles and injection attacks to discover bugs. It suggests exploring with different resources and discussing techniques for brainstorming, planning, and observing tests. The document also lists some heuristics for test sizes and variations, including path names, strings, navigation, and data values to help test different scenarios.
Would you like to automate your acceptance tests against multiple browsers and multiple servers? How about make your UI tests run faster? And remove the boilerplate on them? Browser automation tools to the rescue! In this session, I'll share how you can gain back development time by using FluentLenium, an open source Java wrapper around the Selenium API. We'll take a brief look at what is new in the UI testing javascript ecosystem and then I’ll share with you some rules for writing better UI tests.
FluentLenium is an alternative way to do Selenium testing that optimizes test code writing, facilitates element interactions, ensures maintainability, improves handling of AJAX elements, simplifies assertions, and allows tests to be written in a JQuery style. It features custom CSS and XPath selectors, actions like click and fill, support for the page object pattern, waiting for AJAX elements, and assertion methods. The documentation provides examples of using FluentLenium and encourages testing teams to try it out.
Would you like to automate your acceptance tests against multiple browsers and multiple servers? How about make your UI tests run faster? And remove the boilerplate on them? Browser automation tools to the rescue! In this session, I'll share how you can gain back development time by using FluentLenium, an open source Java wrapper around the Selenium API. We'll take a brief look at what is new in the UI testing javascript ecosystem and then I’ll share with you some rules for writing better UI tests.
FluentLenium is an alternative way to do Selenium testing that optimizes test code writing, facilitates element interactions, ensures maintainability, improves handling of AJAX elements, simplifies assertions, and allows tests to be written in a JQuery style. It features custom CSS and XPath selectors, actions like click and fill, support for the page object pattern, waiting for AJAX elements, and assertion methods. The documentation provides examples of using FluentLenium and encourages testing teams to try it out.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
2024 State of Marketing Report – by HubspotMarius Sescu
https://www.hubspot.com/state-of-marketing
· Scaling relationships and proving ROI
· Social media is the place for search, sales, and service
· Authentic influencer partnerships fuel brand growth
· The strongest connections happen via call, click, chat, and camera.
· Time saved with AI leads to more creative work
· Seeking: A single source of truth
· TLDR; Get on social, try AI, and align your systems.
· More human marketing, powered by robots
ChatGPT is a revolutionary addition to the world since its introduction in 2022. A big shift in the sector of information gathering and processing happened because of this chatbot. What is the story of ChatGPT? How is the bot responding to prompts and generating contents? Swipe through these slides prepared by Expeed Software, a web development company regarding the development and technical intricacies of ChatGPT!
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
The realm of product design is a constantly changing environment where technology and style intersect. Every year introduces fresh challenges and exciting trends that mold the future of this captivating art form. In this piece, we delve into the significant trends set to influence the look and functionality of product design in the year 2024.
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
Mental health has been in the news quite a bit lately. Dozens of U.S. states are currently suing Meta for contributing to the youth mental health crisis by inserting addictive features into their products, while the U.S. Surgeon General is touring the nation to bring awareness to the growing epidemic of loneliness and isolation. The country has endured periods of low national morale, such as in the 1970s when high inflation and the energy crisis worsened public sentiment following the Vietnam War. The current mood, however, feels different. Gallup recently reported that national mental health is at an all-time low, with few bright spots to lift spirits.
To better understand how Americans are feeling and their attitudes towards mental health in general, ThinkNow conducted a nationally representative quantitative survey of 1,500 respondents and found some interesting differences among ethnic, age and gender groups.
Technology
For example, 52% agree that technology and social media have a negative impact on mental health, but when broken out by race, 61% of Whites felt technology had a negative effect, and only 48% of Hispanics thought it did.
While technology has helped us keep in touch with friends and family in faraway places, it appears to have degraded our ability to connect in person. Staying connected online is a double-edged sword since the same news feed that brings us pictures of the grandkids and fluffy kittens also feeds us news about the wars in Israel and Ukraine, the dysfunction in Washington, the latest mass shooting and the climate crisis.
Hispanics may have a built-in defense against the isolation technology breeds, owing to their large, multigenerational households, strong social support systems, and tendency to use social media to stay connected with relatives abroad.
Age and Gender
When asked how individuals rate their mental health, men rate it higher than women by 11 percentage points, and Baby Boomers rank it highest at 83%, saying it’s good or excellent vs. 57% of Gen Z saying the same.
Gen Z spends the most amount of time on social media, so the notion that social media negatively affects mental health appears to be correlated. Unfortunately, Gen Z is also the generation that’s least comfortable discussing mental health concerns with healthcare professionals. Only 40% of them state they’re comfortable discussing their issues with a professional compared to 60% of Millennials and 65% of Boomers.
Race Affects Attitudes
As seen in previous research conducted by ThinkNow, Asian Americans lag other groups when it comes to awareness of mental health issues. Twenty-four percent of Asian Americans believe that having a mental health issue is a sign of weakness compared to the 16% average for all groups. Asians are also considerably less likely to be aware of mental health services in their communities (42% vs. 55%) and most likely to seek out information on social media (51% vs. 35%).
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
Creative operations teams expect increased AI use in 2024. Currently, over half of tasks are not AI-enabled, but this is expected to decrease in the coming year. ChatGPT is the most popular AI tool currently. Business leaders are more actively exploring AI benefits than individual contributors. Most respondents do not believe AI will impact workforce size in 2024. However, some inhibitions still exist around AI accuracy and lack of understanding. Creatives primarily want to use AI to save time on mundane tasks and boost productivity.
Organizational culture includes values, norms, systems, symbols, language, assumptions, beliefs, and habits that influence employee behaviors and how people interpret those behaviors. It is important because culture can help or hinder a company's success. Some key aspects of Netflix's culture that help it achieve results include hiring smartly so every position has stars, focusing on attitude over just aptitude, and having a strict policy against peacocks, whiners, and jerks.
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
PepsiCo provided a safe harbor statement noting that any forward-looking statements are based on currently available information and are subject to risks and uncertainties. It also provided information on non-GAAP measures and directing readers to its website for disclosure and reconciliation. The document then discussed PepsiCo's business overview, including that it is a global beverage and convenient food company with iconic brands, $91 billion in net revenue in 2023, and nearly $14 billion in core operating profit. It operates through a divisional structure with a focus on local consumers.
Content Methodology: A Best Practices Report (Webinar)contently
This document provides an overview of content methodology best practices. It defines content methodology as establishing objectives, KPIs, and a culture of continuous learning and iteration. An effective methodology focuses on connecting with audiences, creating optimal content, and optimizing processes. It also discusses why a methodology is needed due to the competitive landscape, proliferation of channels, and opportunities for improvement. Components of an effective methodology include defining objectives and KPIs, audience analysis, identifying opportunities, and evaluating resources. The document concludes with recommendations around creating a content plan, testing and optimizing content over 90 days.
How to Prepare For a Successful Job Search for 2024Albert Qian
The document provides guidance on preparing a job search for 2024. It discusses the state of the job market, focusing on growth in AI and healthcare but also continued layoffs. It recommends figuring out what you want to do by researching interests and skills, then conducting informational interviews. The job search should involve building a personal brand on LinkedIn, actively applying to jobs, tailoring resumes and interviews, maintaining job hunting as a habit, and continuing self-improvement. Once hired, the document advises setting new goals and keeping skills and networking active in case of future opportunities.
A report by thenetworkone and Kurio.
The contributing experts and agencies are (in an alphabetical order): Sylwia Rytel, Social Media Supervisor, 180heartbeats + JUNG v MATT (PL), Sharlene Jenner, Vice President - Director of Engagement Strategy, Abelson Taylor (USA), Alex Casanovas, Digital Director, Atrevia (ES), Dora Beilin, Senior Social Strategist, Barrett Hoffher (USA), Min Seo, Campaign Director, Brand New Agency (KR), Deshé M. Gully, Associate Strategist, Day One Agency (USA), Francesca Trevisan, Strategist, Different (IT), Trevor Crossman, CX and Digital Transformation Director; Olivia Hussey, Strategic Planner; Simi Srinarula, Social Media Manager, The Hallway (AUS), James Hebbert, Managing Director, Hylink (CN / UK), Mundy Álvarez, Planning Director; Pedro Rojas, Social Media Manager; Pancho González, CCO, Inbrax (CH), Oana Oprea, Head of Digital Planning, Jam Session Agency (RO), Amy Bottrill, Social Account Director, Launch (UK), Gaby Arriaga, Founder, Leonardo1452 (MX), Shantesh S Row, Creative Director, Liwa (UAE), Rajesh Mehta, Chief Strategy Officer; Dhruv Gaur, Digital Planning Lead; Leonie Mergulhao, Account Supervisor - Social Media & PR, Medulla (IN), Aurelija Plioplytė, Head of Digital & Social, Not Perfect (LI), Daiana Khaidargaliyeva, Account Manager, Osaka Labs (UK / USA), Stefanie Söhnchen, Vice President Digital, PIABO Communications (DE), Elisabeth Winiartati, Managing Consultant, Head of Global Integrated Communications; Lydia Aprina, Account Manager, Integrated Marketing and Communications; Nita Prabowo, Account Manager, Integrated Marketing and Communications; Okhi, Web Developer, PNTR Group (ID), Kei Obusan, Insights Director; Daffi Ranandi, Insights Manager, Radarr (SG), Gautam Reghunath, Co-founder & CEO, Talented (IN), Donagh Humphreys, Head of Social and Digital Innovation, THINKHOUSE (IRE), Sarah Yim, Strategy Director, Zulu Alpha Kilo (CA).
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
The search marketing landscape is evolving rapidly with new technologies, and professionals, like you, rely on innovative paid search strategies to meet changing demands.
It’s important that you’re ready to implement new strategies in 2024.
Check this out and learn the top trends in paid search advertising that are expected to gain traction, so you can drive higher ROI more efficiently in 2024.
You’ll learn:
- The latest trends in AI and automation, and what this means for an evolving paid search ecosystem.
- New developments in privacy and data regulation.
- Emerging ad formats that are expected to make an impact next year.
Watch Sreekant Lanka from iQuanti and Irina Klein from OneMain Financial as they dive into the future of paid search and explore the trends, strategies, and technologies that will shape the search marketing landscape.
If you’re looking to assess your paid search strategy and design an industry-aligned plan for 2024, then this webinar is for you.
5 Public speaking tips from TED - Visualized summarySpeakerHub
From their humble beginnings in 1984, TED has grown into the world’s most powerful amplifier for speakers and thought-leaders to share their ideas. They have over 2,400 filmed talks (not including the 30,000+ TEDx videos) freely available online, and have hosted over 17,500 events around the world.
With over one billion views in a year, it’s no wonder that so many speakers are looking to TED for ideas on how to share their message more effectively.
The article “5 Public-Speaking Tips TED Gives Its Speakers”, by Carmine Gallo for Forbes, gives speakers five practical ways to connect with their audience, and effectively share their ideas on stage.
Whether you are gearing up to get on a TED stage yourself, or just want to master the skills that so many of their speakers possess, these tips and quotes from Chris Anderson, the TED Talks Curator, will encourage you to make the most impactful impression on your audience.
See the full article and more summaries like this on SpeakerHub here: https://speakerhub.com/blog/5-presentation-tips-ted-gives-its-speakers
See the original article on Forbes here:
http://www.forbes.com/forbes/welcome/?toURL=http://www.forbes.com/sites/carminegallo/2016/05/06/5-public-speaking-tips-ted-gives-its-speakers/&refURL=&referrer=#5c07a8221d9b
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
Everyone is in agreement that ChatGPT (and other generative AI tools) will shape the future of work. Yet there is little consensus on exactly how, when, and to what extent this technology will change our world.
Businesses that extract maximum value from ChatGPT will use it as a collaborative tool for everything from brainstorming to technical maintenance.
For individuals, now is the time to pinpoint the skills the future professional will need to thrive in the AI age.
Check out this presentation to understand what ChatGPT is, how it will shape the future of work, and how you can prepare to take advantage.
The document provides career advice for getting into the tech field, including:
- Doing projects and internships in college to build a portfolio.
- Learning about different roles and technologies through industry research.
- Contributing to open source projects to build experience and network.
- Developing a personal brand through a website and social media presence.
- Networking through events, communities, and finding a mentor.
- Practicing interviews through mock interviews and whiteboarding coding questions.
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
1. Core updates from Google periodically change how its algorithms assess and rank websites and pages. This can impact rankings through shifts in user intent, site quality issues being caught up to, world events influencing queries, and overhauls to search like the E-A-T framework.
2. There are many possible user intents beyond just transactional, navigational and informational. Identifying intent shifts is important during core updates. Sites may need to optimize for new intents through different content types and sections.
3. Responding effectively to core updates requires analyzing "before and after" data to understand changes, identifying new intents or page types, and ensuring content matches appropriate intents across video, images, knowledge graphs and more.
A brief introduction to DataScience with explaining of the concepts, algorithms, machine learning, supervised and unsupervised learning, clustering, statistics, data preprocessing, real-world applications etc.
It's part of a Data Science Corner Campaign where I will be discussing the fundamentals of DataScience, AIML, Statistics etc.
Time Management & Productivity - Best PracticesVit Horky
Here's my presentation on by proven best practices how to manage your work time effectively and how to improve your productivity. It includes practical tips and how to use tools such as Slack, Google Apps, Hubspot, Google Calendar, Gmail and others.
The six step guide to practical project managementMindGenius
The six step guide to practical project management
If you think managing projects is too difficult, think again.
We’ve stripped back project management processes to the
basics – to make it quicker and easier, without sacrificing
the vital ingredients for success.
“If you’re looking for some real-world guidance, then The Six Step Guide to Practical Project Management will help.”
Dr Andrew Makar, Tactical Project Management
7. a style of software testing that
emphasizes the personal
freedom and responsibility
of the individual tester to
continually optimize the quality of
his/her work by treating testrelated learning, test design,
test execution, and test result
50. PATH/FILE
Long Name (>255 chars)
Special Characters in Name (space * ? / | < > , . ( )
* + , - ; : ‘ “ ! @ # $ % ^ &)
Non-Existent
Already Exists
No Space
Minimal Space
Write- Protected, Unavailable, Locked, On Remote
Machine, Corrupted …
51. STRING
Long (255, 256, 257, 1000, 1024, 2000, 2048 or more
characters)
Accented Chars (àáâãäåçèéêëìíîðñòôõöö, etc.)
Asian Chars
Common Delimiters and Special Characters ( “ ‘ ` | / ,
; : & < > ^ * ? Tab )
Leave Blank
Single Space
Multiple Spaces Leading Spaces End-of-Line
Characters (^M) SQL Injection ( ‘select * from customer
) With All Actions ….
On peutpenserquecomme on vaparler de test, je vaism’adresser aux developpeursou aux testeurs. Pas du tout. On vaaborder des notions importantes pour toute les personnes qui désirentobtenir un produitsolide et fiable. On ne parle pas de qualité de code, de couverture de tests. Non, ce qui nous interese, c’est la qualité du produit.Quelsquesoitnotre position, la plupartd’entre nous testefréquemment. Tester estune part important lorsquel’oncréequelque chose. Sans tests, on restedansune phase de simulation.
La première chose qui nous interessec’est : Estceque le logiciel se comporteconformément a ce qui estattendu ?
Est-cequ’il y a d’autresrisques ?Par exemple, mon site d’e-commerce estconformeàce qui a étédéfini. Maisestceque les données des cartesbleues des clients sontbien protégés ? Estcequel’utilisateur Y peutavoir les données de X ? Qu’estce qui se passesiquelqu’unmodifie son cookie à la main ?La premiere question, celle de la conformité, on peut y repondre avec un plan de tests defini en avance plus oumoinspoussé.Et meme si le logicielou la fonctionnalitéesttresbientestee, ilrestetoujours la seconde question. Estc’esticque les tests exploratoiresprennenttousleurssens.
Les tests exploratoiresvontpermettred’explorer des zones non couvertes par les tests planifiés. Typiquement, aller au dela de la fonctionnalitéseule et la considérerdans son périmetre reel ouellen’est pas isolée.Commelorsquel’onteste du code, unecouverture de test de 100% negarantit pas que le code soit de qualité. Que la feature X soitbiencouverte ne m’assure pas forcémmentque la feature X utilisé avec la feature Y. Bien sur, des tests scriptéspourraisgarantirque la feature X fonctionnebien avec la feature Y. Maissivousproposez 1000 features différentes ?Le test exploratoireest un moyen de naviguer au travers d unepossibilitéinfinie de variation et de permettre de diminuer le risque d’un faconque les tests scriptés ne peuvent pas. Pour découvrir des bugs surprise, la répétabilité ne peut pas vous aider, la variation oui.Cesdeux questions, sur la confirmité et sur le risque, representent 2 facettes du testing vérifierque le logicielestconforme aux specifications et explorer le risque.
Onretrouvesouventcette notation des qu’ons’interesse aux tests exploratoires. En tantquedev, je ne la trouve pas juste. Les tests exploratoires constituent une “sécurité. Moinsil y a de tests scriptés, plus ilva y avoirbesoin de tests d’explorations, ce qui estdefinitivementunemauvaisepratique. Il est primordial d’avoirtoujours des tests d’explorations (et si je faiscequ’estcequ’il se passe, des crash tests, des tests de perfs) maisceux ci ne doiventjamaisdevenir la source principale des tests.
Ces notions sonttrèsimportantesdans le test exploratoire.Le design “continue” et l executions de tests permettentd’apprendresur le systeme, en utilisant les donnéesrésultantes de la dernièreexpérimentation pour préparer la suivante.
Le design de test implique d indentifier des parametresinteressants a faire varier et de methodesinteressantes pour les faire varier, on y retrouve les tables de décisions, la dérivation de tests a partir de modele de design comme des diagrammes d’états, des diagrammes de séquences (The art of software testing, Software testing techniques, A practitionners Guide to software test design). Ces techniques de bases sontaussiadéquate pour du test exploratoire. Cette phase de design esttrèsimportante. Comme nous travaillonsiciàpartir du produit, et non d’unecouche interne, il sera toujours plus couteux et chronophage de lancer des tests. Par exemple, quand on essaie de forcer un nom dans un formulaire avec une apostrophe ou un accent, le test est beaucoup plus couteux pour l’explorateurque pour le developpeur, sans compterque le developeur aura l’avantage de produire un test reproductible.
Quand on explore, on execute immédiatement des que l on a une idée de test. C estune des cles qui distingue le test exploratoire du test scripté. On ne design pas ses tests en avanceavant de les executer. C estune notion importante : avant d executer des tests, on ne sait pas quelle question vontsuivre. L execution immediate et non planifiéevontpermettre de conduire l exploration.
Quand on explore, on découvreegalement comment le logicielopere. On apprendrasesspécifités. Il faudraegalementapprendre a détecter des indices pouvantmontrer des bugs vicieux. L observation est crucial, plus on observe, plus on apprends. C estegalement plus difficilequil n y parait.
Se diriger : Avec chaque experimentation que l on va executer, vousallezcomprendre de mieux en mieux comment le logiciel se comprte. Vouspouvezvousrendrecompte du types de conditions que le logiciel ne gere pas bien et poussercetteconnaissance encore plus loin. Il faut user de curiosité, baséesur des apprentissagesprécdents.
On a vu que les tests exploratoiresn’étaient pas planifiés. Quelsest le risque ? Il est possible de passer des jours sans trouver des informationsinteressantesouutilesMeme si les tests exploratoiressont fait en direct, cela ne veut pas dire qu’ils ne sont pas structurésniorganisés. Il estdonc important de préparer son travail en avance de phase.En effet,la durée des tests exploratoires sera séparé en session time boxée. Pendant chaque session, ilfautprentre des notes pour savoir ce qui a étéexplorée, ce qui a etetrouvé. Maisaussi des idées de tests, des questions, des risques, des zones additionelles a explorer et des bugs.A la fin de chaque session, ilest important de partagerses observations avec ses pairs, de reporter les bugs.Et comme on cherche, on explore, on commence par demarrer avec des questions. Estceque le workflow estfonctionnel ? Estceque la feature A fonctionnequand la feature B estactivée ? Questcequil se passesi je charge le site au moment ou un utilisateurrentreunecommande ?Pour toutes les questions, ilfautvoirquel technique y repond le mieux : des tests cases prédesignée, avec de l exploration ouunecombinaison des 2.
Si on considere un autre type d exploration, l exploration de continent et que l on regardeceque les 2 en ont en commum :des surprises vousattendent, et meme des bugsilest utile d apporter des outilsmais le plus important estvotrecerveausi la carte et le territoirediffere, croire le territoireDans les 2 cas, ilest possible de se perdreou de tourner en rond, et donc de ne rientrouver.Pour evitercela, ilestconseillée d utiliser un simple template qui permet de biendefinirceque l on cherche. Je suppose que la plupartd’entrevousconnaisse le pattern given/when/then pour écrire un test “scripté” quelqu’ilsoit. Ici meme principemais un peudifférent.
Si on considere un autre type d exploration, l exploration de continent et que l on regardeceque les 2 en ont en commum :des surprises vousattendent, et meme des bugsilest utile d apporter des outilsmais le plus important estvotrecerveausi la carte et le territoirediffere, croire le territoireDans les 2 cas, ilest possible de se perdreou de tourner en rond, et donc de ne rientrouver.Pour evitercela, ilestconseillée d utiliser un simple template qui permet de biendefinirceque l on cherche.
LE target : questceque l on explore : unefonctionnalité, un requirement, un module …resources : un outil, un jeu de données, une technique, une configuration, un fonctionnalitéinterdépendante.
resources : un outil, un jeu de données, une technique, une configuration, un fonctionnalitéinterdépendante.
inforamtion : questceque l on esperechercher ? sécuritee, performance, usabilité, consistence, violations d un standard ?
Par exemple Explore editing profiles with injection attacks to discover security vulnerability. On vadonc essayer des injections javascript, SQL …
Si on regardecettefeuille de route :
trop specifique, c est un test individuel. Le risqueest de passer beaucoup de temps a ecrirece genre de test avec peu de benefice.Explorer la sécurité du système -> trop vague. Personne ne peutfinircette mission. Au lieu de creerunefeuille de route enorme, ilest plus performant de la decouper en plusieurs, chacuneneconcernantquunefonctionnalité/zone unique.
On a vu comment écrire des templates, comment reperer les feuilles de routes les plus importantes ?
L etude des fonctionnalitéslors de discussions avec des pairs est un bon moment pour commencer a ecrire les feuilles de routes. Estceque tout le profilest modifiable ? meme le login ? Les regles de validation du login sontelle les memes lors d unemise a jour ? un profildesactivépeutiletremis a jour ?C est a dire, estceque la feature developpée “edition de profil” peutavoir des consequences sur les fonctionnalitésdejaexistantes, notammentici “désactivation des profils” ?Les données de profilsontaffichées a deuxendroitsmaisleursmises a jours n estproposéqu a un seul, estce normal ? L exploration estuneopportunité pour ajouter des nouveaux requirements au meme point que des risques et des problemes.
Uneautre source d’inspirationest tout simplement les situations cauchemardeques. Un jeupeutetre de faire imaginer l equipe de decouvrir au matin, dans le journal en premiere page un grostitreevoquant le travail surlequel l equipetravaille.Et de demander a l equipe a votreavis, quelleest la phrase des grostitres ?
Par exemple, unetva a 200% surtous les achats du site xxx, les utilisateursexcédéstoutes les commandeslivrées en double sur le site xxxun trou de sécuritésur le site xxx : l ensemble des cartesbleues des utilisateurspiratées
Aprescette premiere etape, demander a l equipe de choisir (avec les differentes techniques habituelles) une qui est plausible et interessante pour une discussion.Brainstormersur les causesQuestce qui peut causer ceprobleme. Demander aux participants d ecrrire les causes possible.Par exemple, la duplication des commandespeutvenir de l utilisateur precedent suivant du navigateur, de l integration entre le server et le systeme de traitement des commandes …
Convertirces causes en tantquefeuille de route.Explorer le workflow d achat en utilisant des operations telsque refresh, back, bookmark pour deecouvrir des moyens pour acheterinvolontairement plus d items queprévus.
On a maintenant un certainsnombres de feuilles de routes, comment les planifier ?Planification des charters :Bien quilpeutetre utile de planifierses explorations, ilestdifficile de planifierreelementavant de commencer a explorer. Si on planifie tout en acances, il sera plus difficile d ajuster l exploration en fonction d informationsnouvelles. Il est possible d indentifier en avance de phase les explorations les plus importantes. Maisilreste important de n explorer quunetache a la fois.
En résuméIl est important que le tester travaillesescapacités a trouver des feuilles de routes qui vont faire remonter le plus d anomalies ou de bug. Il fauttoujourschoisir des zones spécifiques a explorer notamment en s’aidant :discuter avec ses pairsles interactions entre featuresimaginer les scenarios du pire
Tester peutsemblercomme un process linéaire. Entrerune value, obteniruneréponse. Verifier que la reponseobtenueestbien la reponseattendue. Si oui, le test passe, si non le test echoue.Maisce n est pas si simple. Justeparceque l on voitque la reponseattendueestbienegale avec la reponseobtenue ne signifie pas que le systemeest ok. Que dire sivousvoyez un message de log pendant le operation indiquantque 80% de la memoire vive estutilisé ? que le cpureste a 100% pdt 30 secondes ? Comme pour un iceberg, il ne faut pas se concentreruniquementsur la partie visible : tout ceque l on ne voit pas estegalementextremenent important.
C’estpourquoi, la qualité majeure pour faire du test exploratoireest la capacité a observer. Il fautanalser avec l utilisations des logs, du monitoring. On doitresteralertesur un indice d un comportement suspect. Contrairement a ceque l on pourraitpenser, c est en fait trescompliqué.
Did you see the moonwlaking bear ? C est facile de rater quelque chose que l on ne cherche pas. C’estexactementceque l on vavoirmaintenant, quels techniques peuvent nous aider ?Pour le logiciel, celaveut dire quesi l on se concentresuruneseule dimension, par exemple la comparaison de l attendu avec l obtenu, le plus certainement on va rater des indices critiques dans d autres dimensions.
D’oul’importance de creuser le plus profondemment possible. “Estceque le setup d installation marche sans erreurs” En se concentrantseulementsur la GUI, cette question peutmasquer des defects importants. La question que l on aurait du se poser est : estceque je peuxutiliser le software que je viens d installer ? Quand on teste un login, on ne se contente pas d etresatisfait de voirapparaitre welcome mister X, maissurtout de savoir si l utilisateur a bienacces au contenuquildoitavoir, ni a celui de son voisinou de l administrateur.
Des fois, les indices sont plus subtilesqu un message de log en erreur. Une augmentation rapide de la mémoireutilisépeut faire penser a une out of memory.Quand on observe on doitutiliser tout sessens :al vue : estceque la lumiere du ddflashealorsqu on ne s y attend pas. Estceque l on voit des fenetresinnatenduesappaitre ? Uneactivité en fond que l on attend pas ? Il estegalement possible de prendre des screenshots a des moments clés et de les faire passer rapidement. Vousdetecterezpeutetre un element qui estdecalé de quelques pixels.Hearing : ecouter son ddtouching . estceque la machine surhcauffe ?
Testerc’estavoir de la visibilité et du controle. Lancer les outils de controles du systems, controler les fichiersecritschangésoumodifiéssur le file system, regarder le traficsur le réseau, regarder les requetes et les reponses du serveur, avec firebug par exemple, verifier l’absence d erreurjs, regarder l activité en bdd *quels champs mis a jour, modifié, ajoutéAnalyse complete des logs…
Le test n’estjamaisfini, ilestjustearreté.Trouver des variations interessantes :Meme dans un systemerelativement simple, ilest des possibilitésinfinies de variations a explirer, incluant les interactions de l utilisateurs, le temps, les données, les configurations maisaussi les facteursenvironnementaux *charges cpu, memoire, traficreseau.
Etantdonnéce monde infini a explorer, etrecompletementsatisfaitest un ecceuildangereux. Si on explore uniquementsuperficiellement et que l on declare que tout est ok, ilest possible que de mauvaises decisions soitprises et qu l on manqueune part importante de l image.Les bonsexplorateursreconnaissentquil y a uneinfiniequantité de variation et quil n est pas possible de toutes les couvrir. Les meilleursexplorateurssavent comment s orienter pour trouverles variations les plus interessantes. C;estunecompence d analyzer un system pour en decouvrir les nouveautés et les moyens de le manipuler.
Il y a plusieurs types de varialbes :les variables claires . par exemple, vouspouvez tester quequandvousdonnezdans un formulaire de creation des champs nom prenom, vouspouvez verifier quilsontbien presents dans le systeme.les variables subtiles : imaginonsque caches dans un workflow, on appeleune page avec des parametres : test.com?page=3andlogin=totoQue se passe t ilsitoto n existe plus ?Peutetreque la page a puetrebookmarké, ouqu un utilisateur mal intentionnéessaie de se faire passer pour un autre.De la meme maniere, que se passe t ilsiquelqu un change des infosdans son cookies qui sontsupposéés n etredefinieque par le logiciel ? Estcequilspeuventavoiracces a quelque chose auquelils n ont pas le droit ?
Quelquesgrandséchec :a la fin des années 80, un certainsnombres de personnessubissantunetherapie par radiation sont mort d empoisement par radiation. L enquete a montréque c etait un enchainementcomplexe qui engendré la mauvaisesfonctions de l’appareil, Notammentquand le technicienentrait et editait les données du traitement en moins de 8 secondes. Ces 8 secondesetaientaussi le temps qui permettait au champs magnetique de s engager et creerune petite maisdevastatricefenetre de vulnaribilité.
conversion d un 64 bit flottant a un 16 bit signé. Overflow error. Le processus de controleaaetedesignée pour ariane 4, alorsquariane 5 etant beaucoup plisrapide. Les appareilssensitifs n ont pas pugerer la velocitéhorizontale.
Mars RoverEn 2004, la NASA a perducontrole avec Spirit. Ils se sontrendusassezvitecompteque le robot rebooter encore et encore. Le probemeetaitcausé par le nombre de file danssa memoire flash. Certainesoperrationscréesplusieurspetitsfichiers. De temps en temps, certains de sesfichiersinnondés la RAM, entrainant un reboot.La variable clé n est pas icijuste la taille du disquemaisaussi le nombre de petit fichier. Cela n aurait pas étédetecté avec un grosfichierfaisant la taille des petits.
Un des points les plus importants du test exploratoireestnotrecapacitéà identifier les variables à modifier.
Définirheuristiques
Zero, One, Many 0 record found, 1 records found
Goldilocks
too many create des conditions avec plus d elements que le logiciel pour gerer, trop de connexionsouvertes, trop de requetes …
too few : crerer des conditions avec moins d elements que le systeme ne peutgerer, une facture sans produitacheter …
0 que se passe t ilsi je veuximprimer et quil n y a aucuneimprimanteinstallée ?
0 que se passe t ilsi je veuximprimer et quil n y a aucuneimprimanteinstallée ?
Vairer les locations geographiquesVarier les formats (numero de telephone - international aussi), les differents code postaux, les emails, les differents formats de dates, les ip v4/v6.Verifier aussiqu’on ne peut pas etre né le 31 février, avoirune date de naissance dans le future …Gerer pour des webservices des niveaux de profondeursdifferents
0 que se passe t ilsi je veuximprimer et quil n y a aucuneimprimanteinstallée ?
0 que se passe t ilsi je veuximprimer et quil n y a aucuneimprimanteinstallée ?
0 que se passe t ilsi je veuximprimer et quil n y a aucuneimprimanteinstallée ?
En résumé, on saitmaintenantchoisir et définirnos variables, les fairesvarier. Maiscen’estqu’unepartie du test. Maintenantquel’onsaitcequel’on a en entrée, qu’estcequel’on a en sortie ?
Unefoisquel’on commence a explorer, une nouvelle question apparait : comment savoir siceque je testeest correct ?- Pour un site web, estcequec’est OK de ne pas pouvoir bookmarker une des pages du parcours ?- Qu’estcequ’il se passequandil y a une part d’aléatoiredanscertainscalculs ?- Quand les calculssont trop compliqués pour garantirque le resultatobtenueest correct ?
Les situations commecelasont au centre des challenges du test exploratoire. Il existe des techniques pour valider le comportement du systeme meme quand on ne sait pas exactementceque l on attend.
Tout systemepossède des règles. Celapeutetreque tout logicield’édition a la possibilité de créer en toutecirconstance un nouveau document. Peutetreestceque les modifications d un utilisateur ne peutjamaisentrainerune modification du systeme pour un autre. Ouquil ne peut pas engendrer un arret du serveur.Meme quand on ne connait pas exactementcequel’on attend, on peutdejachercheràdéfinirsesrègles du jamais et toujours.
toutes les capacitées du coeur du logiciel qui doiventtoujoursfonctionner
les capacitiées du systemecomme la scalabilité, l’usabilité, la conformité, la disponibilité …
les risquesremontées par les pairs.
Il est possible de regarder la conformité du site : y a t il 2 ecranssimilairesdont l un propose unefonctionnalitéquel’autre ne propose pas ?2 appels de méthodesprennentelle des parametresidentiquesdans des ordresdifférents ?
Si on regarde le mobile, estcequel’applicationestconforme aux reglesd’utilisationsur Android ? Estcequel’applicationestconforme aux regles de GUI d’Apple ? (les 2 diffèrent)Estceque les codes retours de l’applicationsontcohérents ? Estceque le HTML généréestconforme aux normes du W3CEstcequemon application repond aux normes de sécurité ?
Regarderquelssont les normesd’usagesacceptés :Si on prend la fonctionnalitéd’envoie d’un nouveau password, la plupart des applications propose un lien avec un token pour le remettreà jour. Uneautreapproche non standard est par exempled’envoyer un mot de passe en clair.
Les règlesd’approximationsQuand on ne peut pas etre certain de la valeurattendue, on vautiliser des approximations.
Danscertainscas, ilest possible d’évaluer en fonction d’un intervalle. On saitquetelles variables devraient se trouver entre telle et telleautre. Une application qui évalue la vitesse d’un aigle en fonction de sescaracteristiques (poids/taille) devraitnormalement faire entre x et y km/h donctoutesdonnées en dehors de cetintervalleest suspect.
Maisque faire si par exemple, on doit tester quelque chose de totalementaléatoire. Danscecas la, on essaiera de voirsi la distribution estuniforme après un grand nombre de lancement. Si par exemple, on a unefonction random de 0 à 9 et que le chiffre 7 sort àprès de 30% et jamais le chiffre 0, on peutsuspecter un problème.
Essayer de jouer avec les valeursminimales et maximales
En résuméIl est important de savoir observer ce qui se passe pour ne pas etreconcentréuniquementsur le résultatattendu. Maiségalement de réussirà identifier les variables, de les faire varier, notammentàl’aided’heuristiquesou de valeurs “limites” ouexceptionnelles. Tout en gardant en mémoirequel’aléatoireesttoujours un challenge.
Les utilisateursquel’on le veuilleou non, ne sont pas ordonnés. Ils font des choses surprenantes, ne respectent pas les étapes de cheminmentquel’on a fixé pour eux, utilisent les pages précedentes et suivantes de leursnavigateurs …Pour découvrir des problemesinpliquantl’utilisation et la sur-utilisation de votrelogiciel, ilfautvarier les méthodesd’interaction.
Quel’on en soitconscientou non, ilfaut faire un effort pour éviter de faire les choses d’unemanièrehabituelle. Par exemple, d’utilisertoujours la meme adresse, le meme code postal. De créertoujours les enregistrements de la meme manière. Essayer de changer les jeuc de données, les rendre plus réalisteou plus sujetsà exposer des problèmes (par exemple, un code postal qui concerneplusieursvilles, un nom avec une apostrophe, un prénomtrès long …).
Unefoisquel’on a fait cela, on peututilisericiaussi des personas. Emilie, cadre supérieurpressé de nature, vaavoirtendance a appuyerplusieursfoissur les boutonsvalider des formulairesalorsque Emma, étudiantes en infos, vaavoirtendanceàbidouillersesformulaires HTML ...
En résuméIl est capital dans un deuxième temps d’ajouter des dimensions pour élargirses explorations .Nous n’avonsabordéqu’unepartie des outilsmisànotre disposition, on y retrouveégalement, les machines àétat, les tables d’états, les diagrammes de séquences, les modelisations …
On a vu justeiciunepartie du test exploratoire. Ce qui est certain, c’estquec’est un test qui sontcouteux, a l’inverse des tests unitaires. Plus il y a une bonne couverture de tests autres, moinsil y a besoind’exploration. Beaucoup font naturellement de l’exploration.
On a vu justeiciunepartie du test exploratoire. Ce qui est certain, c’estquec’est un test qui sontcouteux, a l’inverse des tests unitaires. Plus il y a une bonne couverture de tests autres, moinsil y a besoind’exploration. Beaucoup font naturellement de l’exploration.