This document summarizes a workshop on failing with grace and style. The workshop covers identifying and managing failure, dealing with failure anxiety, and talking about failure. It includes readings on software project failures, learning from mistakes, and conducting blameless post-mortems. Participants discuss understanding failure in their work, avoiding problems like the Therac-25 disaster, and surviving failure with grace through preparation, iteration, and appropriate risk management and language. The goal is to think productively about failure and improve how organizations handle, discuss, and learn from mistakes.
This simple diagram is useful for teaching students about the Deep Web and how library subscription-based resources relate to and complement Google and Google Scholar.
My #HuntLibrary: Collecting student imagesJason Casden
Presented by Jason Casden and Cory Lown.
Code4Lib 2013 Lightning Talk.
February 14, 2013.
My #HuntLibrary is a participatory digital service designed to encourage visitors to document their Hunt Library experience using the social media platform Instagram. The development of this project coincided with the lead-up to the launch of NCSU's new James B. Hunt Jr. Library. My #HuntLibrary serves as an anchor activity for the Hunt Library opening events by helping to foster a sense of community ownership of the new building. Images from this crowdsourced documentation effort will be selected to become part of our permanent digital collections, allowing the NCSU community to contribute to the historical record of the Hunt Library through image submissions as well as the use of voting tools.
http://www.lib.ncsu.edu/dli/projects/MHL
The Big-Ass View on Competence (and Communication)Jurgen Appelo
This is an alternative version of "On the Road to Competence", with some stuff added about organizational structure.
http://www.noop.nl
http://www.jurgenappelo.com
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptxInflectra
The pressure to deliver faster to the market has never been more insistent and pervasive than today’s business environment. The Agile world of iterative and incremental delivery has enabled great advances in terms of delivery speed; however, the lack of an integrated risk framework is creating challenges in terms of matching speed with quality. On the one hand, the standards-setting organizations such as the Project Management Institute (PMI) have updated their book of knowledge (PMBOK v7) to move away from highly prescriptive processes to lean thinking. On the other hand, Agile standards themselves have started to emerge, recognizing the need for some prescriptive guidelines on coming up with release and iteration goals. Struggling in between this continuum are the innovative technology projects that wonder how “creativity can be timeboxed” to deliver value!
While the impact of leadership to form the team and the organizational culture to embrace continuous learning are unquestionable, it is important to realize that the areas of strategy, leadership, and culture are not substitutes for the lack of risk-based project thinking. When delivering IT applications that are contain inherent conceptual, technical, and compliance risks, a more systematic approach is needed. In this presentation, you will hear about the emerging space of IT initiatives that are impacted by such risks and the need to adopt risk-based frameworks in application lifecycle management. You will also see practical examples of how risk-based lifecycle management can be done in real-time.
This simple diagram is useful for teaching students about the Deep Web and how library subscription-based resources relate to and complement Google and Google Scholar.
My #HuntLibrary: Collecting student imagesJason Casden
Presented by Jason Casden and Cory Lown.
Code4Lib 2013 Lightning Talk.
February 14, 2013.
My #HuntLibrary is a participatory digital service designed to encourage visitors to document their Hunt Library experience using the social media platform Instagram. The development of this project coincided with the lead-up to the launch of NCSU's new James B. Hunt Jr. Library. My #HuntLibrary serves as an anchor activity for the Hunt Library opening events by helping to foster a sense of community ownership of the new building. Images from this crowdsourced documentation effort will be selected to become part of our permanent digital collections, allowing the NCSU community to contribute to the historical record of the Hunt Library through image submissions as well as the use of voting tools.
http://www.lib.ncsu.edu/dli/projects/MHL
The Big-Ass View on Competence (and Communication)Jurgen Appelo
This is an alternative version of "On the Road to Competence", with some stuff added about organizational structure.
http://www.noop.nl
http://www.jurgenappelo.com
Rethinking Risk-Based Project Management in the Emerging IT initiatives.pptxInflectra
The pressure to deliver faster to the market has never been more insistent and pervasive than today’s business environment. The Agile world of iterative and incremental delivery has enabled great advances in terms of delivery speed; however, the lack of an integrated risk framework is creating challenges in terms of matching speed with quality. On the one hand, the standards-setting organizations such as the Project Management Institute (PMI) have updated their book of knowledge (PMBOK v7) to move away from highly prescriptive processes to lean thinking. On the other hand, Agile standards themselves have started to emerge, recognizing the need for some prescriptive guidelines on coming up with release and iteration goals. Struggling in between this continuum are the innovative technology projects that wonder how “creativity can be timeboxed” to deliver value!
While the impact of leadership to form the team and the organizational culture to embrace continuous learning are unquestionable, it is important to realize that the areas of strategy, leadership, and culture are not substitutes for the lack of risk-based project thinking. When delivering IT applications that are contain inherent conceptual, technical, and compliance risks, a more systematic approach is needed. In this presentation, you will hear about the emerging space of IT initiatives that are impacted by such risks and the need to adopt risk-based frameworks in application lifecycle management. You will also see practical examples of how risk-based lifecycle management can be done in real-time.
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Steve Werby
20 years ago information security was a low corporate priority that was the realm of technical geeks. Factors such as the rapidly-evolving threat environment and increased corporate impact have elevated it to a multidisciplinary risk management discipline...which sometimes has a seat at the table. This talk explores what we're doing wrong, why it's ineffective (or worse), and better ways of thinking and doing. You will learn to question the status quo, rethink existing paradigms, and leverage better approaches from information security and other disciplines. Think different! Act different!
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...Adrian Sanabria
Enterprise security teams are facing numerous challenges because of evolving threat vectors bypassing existing technology, deluge of alerts, and lack of skilled resources to stop advanced threats. Even if enterprises have a budget to bring in outside incident response and forensics teams to stop the bleeding, by then, damages and loss have already occurred.
Security teams must change the shape of their security program to stop threats at the earliest and all stages of the attacker lifecycle. Join 451 Research Senior Analyst, Adrian Sanabria, and Director of Products at Endgame, Mike Nichols, talk about how earliest prevention and instant detection can change the shape and outcome of enterprise security program.
This talk will outline strategies for:
• Prioritizing the alerts and events that really matter
• Identifying parts of the investigation workflow that can be automated
• Building a detection methodology that creates confidence and continuously improves defenses
Resistance Isn't Futile: A Practical Approach to Threat ModelingKatie Nickels
There are hundreds (if not thousands) of adversary groups out there, and it’s understandable if defenders sometimes feel like resistance is futile. Good news: you don’t have to defend against all of them! Even better news: there’s a simple way you can prioritize what adversaries you focus on and how you defend against them–threat modeling. This presentation will present a simple, practical threat modeling approach that any analyst or defender can use to get started figuring out what threats matter to their organization.
The presentation will start by acknowledging the many approaches to threat modeling that others have created, and then discuss why there’s confusion around it. The presentation will then explain four simple steps and practical actions that anyone can take to get started with threat modeling: know your organization, know your adversaries, match those up, and take action. The audience will leave with an understanding of how threat modeling can help any team prioritize what threats they care about and use that to improve their organization’s defenses.
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...Pedro Henriques
The "life" of a company is the sum of its decisions. Hasty decisions can be disastrous, late decisions could mean loss of opportunity, but these decisions have to be made. Therefore it is important to have a tool that assists in decision making.
The main focus of this talk is to show the importance of support to decision making, understand the importance of risk and impediment management in agile environments and to present an approach to identify actions to mitigate risks and solve impediments based on Agile Community Knowledge.
This talk includes an example of a simple tool from the company SCRAIM. You can also check the video goo.gl/SBqAW4
Brad Andrews, CEO, RBA Communications
Threat Modeling Overview
This session will cover the basic elements of threat modeling, looking at what it does and why it is important. The goal is to provide a high level overview of the process and the use of things like data flow diagrams to look for trust boundaries attacks may come across. We will go through some common threats and hopefully a list of dangers to watch out for when carrying out threat modeling. The session will then work to interactively develop a flow diagram of Amazon.com and possibly another subject if we have time. This will all be based on looking at the system as a user, without any insider knowledge, though Threat Modeling is normally carried out by those who do know the system well.
Everyone knows you ought to threat model, but in practical reality it turns out to be tricky. If past efforts to threat model haven't panned out, perhaps part of the problem is confusion over what works, and how the various approaches conflict or align. This talk captures lessons from years of work helping people throughout the software industry threat model more effectively. It's designed to help security pros, developers and systems managers, all of whom will leave with both threat modeling lessons from Star Wars and a proven foundation, enabling them to threat model effectively.
What does it say traditional approaches about risk management? And what about agile? Why scrum by design is able to manager risk in a great way? How risks can be managed in agile big programs?
Machine Learning Operations Active Failures, Latent ConditionsFlavio Clesio
This talk will discuss risk assessment in ML Systems from the perspective of reliability, operations, and especially causal aspects that can lead to outages in ML Systems.
Workshop content to support a half day training session on threat modeling, specifically focusing on Hacker Stories / Rapid Threat Modeling / VAST / Misuse or Abuse Cases. This content is focused on orienting someone new to threat modeling, then subsequently how to get started with threat modeling in a devops world.
Oleksander Krakovetskyi "Explaining a Machine Learning blackbox"Fwdays
As Data Scientists we want to understand machine learning models we have built. “Why did my model make this mistake?”, “Does my model discriminate?”, “How can I understand and trust the model's decisions?”, “Does my model satisfy legal requirements?” are commonly asked questions.
In this presentation we will talk about machine learning explainability and interpretability - two concepts that could help us really understand ML models.
Website: https://fwdays.com/en/event/data-science-fwdays-2019/review/explaining-a-machine-learning-blackbox
Talk @ #fuzzconeurope2020
Paper: https://ieeexplore.ieee.org/document/9166552
(M. Böhme, C. Cadar, and A. Roychoudhury)
Disclaimer: Our perspective on the discussions. Mistakes are mine.
Security Champions - Introduce them in your OrganisationIves Laaf
How to get security software development established, training of teams. A methodology based on the concept of security champions and owasp tools and guides.
Risk management is a strategic security activity and is a cornerstone of security governance. The management of risk not only requires that we effectively measure it but also understand what effect vulnerability has on the level of risk. Both risk and vulnerability constantly change and not only in response to threats but also business initiatives. Does your organization have a mature risk and vulnerability identification, measurement and management process? The discussion will identify how risk responds to changes in vulnerability and how we might maximize our risk management activities to enhance the resilience of the organization and its assets.
Presentation by: Philip Banks, P. Eng., CPP, Director, The Banks Group
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018Codemotion
Creating a quality web application is hard. It’s hard to gain customers, it’s hard to build your reputation and it’s hard to keep the costs low. Nevertheless, security is often an afterthought. However… Have you considered the cost of fixing security issues later? What about the reputational damage of a security breach? Are you worried about your customers’ data? We will talk about good security coding practices for web applications and how to apply them early on using some real world examples. We will also help you to think about your website’s vulnerabilities from the view of a hacker.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Steve Werby
20 years ago information security was a low corporate priority that was the realm of technical geeks. Factors such as the rapidly-evolving threat environment and increased corporate impact have elevated it to a multidisciplinary risk management discipline...which sometimes has a seat at the table. This talk explores what we're doing wrong, why it's ineffective (or worse), and better ways of thinking and doing. You will learn to question the status quo, rethink existing paradigms, and leverage better approaches from information security and other disciplines. Think different! Act different!
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...Adrian Sanabria
Enterprise security teams are facing numerous challenges because of evolving threat vectors bypassing existing technology, deluge of alerts, and lack of skilled resources to stop advanced threats. Even if enterprises have a budget to bring in outside incident response and forensics teams to stop the bleeding, by then, damages and loss have already occurred.
Security teams must change the shape of their security program to stop threats at the earliest and all stages of the attacker lifecycle. Join 451 Research Senior Analyst, Adrian Sanabria, and Director of Products at Endgame, Mike Nichols, talk about how earliest prevention and instant detection can change the shape and outcome of enterprise security program.
This talk will outline strategies for:
• Prioritizing the alerts and events that really matter
• Identifying parts of the investigation workflow that can be automated
• Building a detection methodology that creates confidence and continuously improves defenses
Resistance Isn't Futile: A Practical Approach to Threat ModelingKatie Nickels
There are hundreds (if not thousands) of adversary groups out there, and it’s understandable if defenders sometimes feel like resistance is futile. Good news: you don’t have to defend against all of them! Even better news: there’s a simple way you can prioritize what adversaries you focus on and how you defend against them–threat modeling. This presentation will present a simple, practical threat modeling approach that any analyst or defender can use to get started figuring out what threats matter to their organization.
The presentation will start by acknowledging the many approaches to threat modeling that others have created, and then discuss why there’s confusion around it. The presentation will then explain four simple steps and practical actions that anyone can take to get started with threat modeling: know your organization, know your adversaries, match those up, and take action. The audience will leave with an understanding of how threat modeling can help any team prioritize what threats they care about and use that to improve their organization’s defenses.
[Agile Portugal 2014] - Agile Decision Support System for Upper Management - ...Pedro Henriques
The "life" of a company is the sum of its decisions. Hasty decisions can be disastrous, late decisions could mean loss of opportunity, but these decisions have to be made. Therefore it is important to have a tool that assists in decision making.
The main focus of this talk is to show the importance of support to decision making, understand the importance of risk and impediment management in agile environments and to present an approach to identify actions to mitigate risks and solve impediments based on Agile Community Knowledge.
This talk includes an example of a simple tool from the company SCRAIM. You can also check the video goo.gl/SBqAW4
Brad Andrews, CEO, RBA Communications
Threat Modeling Overview
This session will cover the basic elements of threat modeling, looking at what it does and why it is important. The goal is to provide a high level overview of the process and the use of things like data flow diagrams to look for trust boundaries attacks may come across. We will go through some common threats and hopefully a list of dangers to watch out for when carrying out threat modeling. The session will then work to interactively develop a flow diagram of Amazon.com and possibly another subject if we have time. This will all be based on looking at the system as a user, without any insider knowledge, though Threat Modeling is normally carried out by those who do know the system well.
Everyone knows you ought to threat model, but in practical reality it turns out to be tricky. If past efforts to threat model haven't panned out, perhaps part of the problem is confusion over what works, and how the various approaches conflict or align. This talk captures lessons from years of work helping people throughout the software industry threat model more effectively. It's designed to help security pros, developers and systems managers, all of whom will leave with both threat modeling lessons from Star Wars and a proven foundation, enabling them to threat model effectively.
What does it say traditional approaches about risk management? And what about agile? Why scrum by design is able to manager risk in a great way? How risks can be managed in agile big programs?
Machine Learning Operations Active Failures, Latent ConditionsFlavio Clesio
This talk will discuss risk assessment in ML Systems from the perspective of reliability, operations, and especially causal aspects that can lead to outages in ML Systems.
Workshop content to support a half day training session on threat modeling, specifically focusing on Hacker Stories / Rapid Threat Modeling / VAST / Misuse or Abuse Cases. This content is focused on orienting someone new to threat modeling, then subsequently how to get started with threat modeling in a devops world.
Oleksander Krakovetskyi "Explaining a Machine Learning blackbox"Fwdays
As Data Scientists we want to understand machine learning models we have built. “Why did my model make this mistake?”, “Does my model discriminate?”, “How can I understand and trust the model's decisions?”, “Does my model satisfy legal requirements?” are commonly asked questions.
In this presentation we will talk about machine learning explainability and interpretability - two concepts that could help us really understand ML models.
Website: https://fwdays.com/en/event/data-science-fwdays-2019/review/explaining-a-machine-learning-blackbox
Talk @ #fuzzconeurope2020
Paper: https://ieeexplore.ieee.org/document/9166552
(M. Böhme, C. Cadar, and A. Roychoudhury)
Disclaimer: Our perspective on the discussions. Mistakes are mine.
Security Champions - Introduce them in your OrganisationIves Laaf
How to get security software development established, training of teams. A methodology based on the concept of security champions and owasp tools and guides.
Risk management is a strategic security activity and is a cornerstone of security governance. The management of risk not only requires that we effectively measure it but also understand what effect vulnerability has on the level of risk. Both risk and vulnerability constantly change and not only in response to threats but also business initiatives. Does your organization have a mature risk and vulnerability identification, measurement and management process? The discussion will identify how risk responds to changes in vulnerability and how we might maximize our risk management activities to enhance the resilience of the organization and its assets.
Presentation by: Philip Banks, P. Eng., CPP, Director, The Banks Group
N. Oskina, G. Asproni - Be your own Threatbuster! - Codemotion Milan 2018Codemotion
Creating a quality web application is hard. It’s hard to gain customers, it’s hard to build your reputation and it’s hard to keep the costs low. Nevertheless, security is often an afterthought. However… Have you considered the cost of fixing security issues later? What about the reputational damage of a security breach? Are you worried about your customers’ data? We will talk about good security coding practices for web applications and how to apply them early on using some real world examples. We will also help you to think about your website’s vulnerabilities from the view of a hacker.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Fail4Lib
1. Fail4Lib
Failing with grace
and style... or not.
Jason Casden
and
Andreas Orphanides
NCSU Libraries
(jmcasden|akorphan)@ncsu.
edu
2. Outline
1. Identifying and managing failure
2. Failure anxiety!
3. Talking about failure
4. Lightning talks
3. Outcomes
1. I like to think about wrongness and failure
a. Can we talk about it in a productive way?
b. Can we improve the ways we handle, seek, or
discuss failure?
2. Is this kind of workshop useful?
a. There will be a survey.
5. Readings
1) The Long, Dismal History of Software Project Failure (Coding Horror)
http://www.codinghorror.com/blog/2006/05/the-long-dismal-history-of-
software-project-failure.html
2) Sowing Failure, Reaping Success (New York Times)
http://learning.blogs.nytimes.com/2012/05/07/sowing-failure-reaping-
success-what-failure-can-teach/
3) On Being Wrong (Kathryn Schulz via TED)
http://www.ted.com/talks/kathryn_schulz_on_being_wrong.html
7. Some flavors of failure
● Technical failure
● Failure to effectively address a real user
need
● Overinvestment
● Outreach/Promotion failure
● Design/UX failure
● Project team communication failure
● Missed opportunities (risk-averse failure) (!)
● Failure to launch
8.
9.
10.
11.
12.
13.
14.
15.
16.
17. Hosted by Nina McHale and Chris Evjy, featuring Monique Sendze, Jason Battles, Rachel Vacek, and Steve Teeri.
19. Biz Lit buzz
● Lean startup principles
● Failing fast
● Pivots
● Beginner's mind
● Wrongology
20. Managing risk
● Building diverse teams
● Expecting dead ends
● Having fall-back plans
● Fault-tolerant schedules
● Establishing flexible goals at the start
21. Getting myself beat up
Avoiding Schulz's assumptions
1) Ignorance assumption
2) Idiocy assumption
3) The evil assumption
22. Breakout 1: Understanding and dealing with
failure in your own practice
● What are the symptoms of failure?
● How do you identify an incipient failure and try to
recover/adjust?
● What do you do after a project has failed? How do you
make failure valuable? (Post-mortems, recovery,
etc....)
● How do you plan for the unknown when beginning a
project?
● How do you manage risk to mitigate potential damage
when undertaking work in new areas?
24. Readings
1) Mitt Romney learns the hard way: mission critical systems are called that for a reason (Ars
Technica)
http://arstechnica.com/information-technology/2012/11/inside-team-romneys-whale-of-an-it-
meltdown/
2) The Therac-25 disaster: the dangers of a “nothing will go wrong” mentality
Short version (CalPoly software engineering): http://users.csc.calpoly.
edu/~jdalbey/SWE/Papers/THERAC25.html
Full report (Nancy Levison, PI of the Therac-25 investigation) -- Optional, but a fascinating read:
http://sunnyday.mit.edu/papers/therac.pdf
3) How risk averse is too risk averse? Bruce Schneier on "Cover Your Ass" security policy (Wired)
http://www.wired.com/politics/security/commentary/securitymatters/2007/02/72774?
currentPage=all
26. 2: THERAC-25 & software control
● Risk management and risk severity
● High-risk software dev anti-practices
○ Inherited software, new hardware
○ Poor code design and management
○ Redundant hardware checks?
○ Test environment / reality mismatch
● Limits and risks of software control
● Opaque error reporting
● Denial
27. 3: TSA CYA
● Hindsight-based security practices
● Relative risk versus perceived risk
● "Just in case" thinking
● Visible but ineffective "security theater"
● What drives risk management decisions?
28. Breakout 2: Where's the sweet spot?
● How could these problems have been avoided, or their
damage mitigated?
● How can we manage the need for assigning blame?
How do we focus on moving forward after a failure?
Are there cases where finding a responsible party is
warranted?
● What liabilities are associated with too great a focus
on blame/responsibility? What liabilities are associated
with setting aside the assignment of responsibility?
● What are the worst case scenarios for your own work?
How does this affect your risk management choices?
30. Readings
1) James Dyson on living a life of failure (37 Signals)
http://37signals.com/svn/posts/408-james-dyson-on-living-a-life-of-failure
2) Quantity always trumps quality (Coding Horror)
http://www.codinghorror.com/blog/2008/08/quantity-always-trumps-
quality.html
3) Blameless PostMortems and a Just Culture (Etsy: Code as Craft)
http://codeascraft.etsy.com/2012/05/22/blameless-postmortems/
31. Balancing credibility and flexibility
Certainty is a limited resource early on
This isn't an excuse for poor planning or
communication
34. Breakout 3: Surviving failure, risk, and the
unexpected with grace.
● How do you prepare colleagues for unexpected
outcomes?
● What is your organization’s approach to risk and
failure?
○ Is risk well-tolerated/well-managed?
○ What are the consequences of a failed project?
○ Is failure seen as an endpoint -- a negative outcome
to an endeavor -- or merely a step in the
development process?
● How do you talk about “failure” with your colleagues?
Supervisors? Stakeholders? Patrons? Reports? What kind
of language do you use?