Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event,...Martin Leyrer
EU-Legislation demands 'accessible' websites, often leaving details or exact specifications on what that means out. In this session, we will have a look at the most often cited 'specifications', the Web Content Accessibility Guidelines (WCAG) 1.0 and 2.0 and how to interpret them. I will show a few free tools that can help a Notes Developer to asses what needs to be done to make a website 'compliant'. And of course I will offer quick tips and easy to implement 'hacks' to make an existing web application more 'accessible', sharing along the way a few best practices and experiences from the work I have done so far.
The document discusses various professional practices for web development including proper coding techniques, layout, use of images and other multimedia, adherence to web standards, avoiding plagiarism, and respecting copyright laws. Key practices include commenting code for clarity, using indentation and spacing for readability, choosing appropriate image formats and sizes, validating code, and continually learning new skills and technologies.
The document outlines the topics to be covered in a Lightroom workshop, including:
1. Understanding the basics of Lightroom and how to organize photoshoots.
2. Learning how to navigate the Lightroom workspace and modules for importing, exporting, cataloging, metadata management, and quick fixes like watermarking.
3. Discussing techniques like enabling personal styles, sharing experiences, and trying non-glamorous photo experiments.
The workshop will also cover how to organize photographs, figure out files, and why Lightroom may be preferable to other software.
How to Build a Blog for the Construction Industry and Market With It is a presentation for the CONEXPO-CON/AGG 2011 audience, teaching professional blog techniques to save time while building a new customer base.
Colin McLean gave a presentation on SQL injection vulnerabilities and hacking. He demonstrated how easily a hacker could exploit an SQL injection flaw to extract sensitive data like usernames, passwords and bank account information from a vulnerable web application. He emphasized that awareness is key to mitigating hacking threats, as most modern attacks require user interaction, such as clicking a malicious link. Abertay University offers various cybersecurity training courses to help improve awareness.
How to release every week? Case study of Continuous Integration from VNDirectĐới Học viện Agile
The document outlines an approach for releasing software weekly despite working with a legacy system. It recommends fully covering tests, adding features incrementally, and avoiding big bang deployments. Current statistics show 70% unit test coverage, 1500 acceptance tests, resolving technical debt within 5 days, and no critical issues. Challenges include difficulty testing legacy code, conflicts with vendors, and coordination issues with pairing and mob programming.
This document provides a step-by-step guide to using a class website. It instructs the user to:
1. Log in to their class website by scrolling to the bottom of the page and clicking "LOG IN NOW".
2. Wait for the page to fully load, indicated by the disappearance of a green loading circle.
3. Show their family the different pages on the site, like videos and slideshows, to impress potential employers with their work.
4. Always log out of sites for security, to prevent others from accessing private information.
This document discusses web accessibility for people with disabilities. It covers visual, hearing, physical, and cognitive/neurological disabilities. For each type of disability, it provides guidelines on making web content accessible, such as including alt text for images, closed captions for videos, keyboard support, avoiding distracting elements, using correct HTML structures and headings, providing text alternatives for non-text content, ensuring sufficient color contrast and more. It emphasizes that accessibility is important for compliance, business, and inclusiveness in web design and development.
Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event,...Martin Leyrer
EU-Legislation demands 'accessible' websites, often leaving details or exact specifications on what that means out. In this session, we will have a look at the most often cited 'specifications', the Web Content Accessibility Guidelines (WCAG) 1.0 and 2.0 and how to interpret them. I will show a few free tools that can help a Notes Developer to asses what needs to be done to make a website 'compliant'. And of course I will offer quick tips and easy to implement 'hacks' to make an existing web application more 'accessible', sharing along the way a few best practices and experiences from the work I have done so far.
The document discusses various professional practices for web development including proper coding techniques, layout, use of images and other multimedia, adherence to web standards, avoiding plagiarism, and respecting copyright laws. Key practices include commenting code for clarity, using indentation and spacing for readability, choosing appropriate image formats and sizes, validating code, and continually learning new skills and technologies.
The document outlines the topics to be covered in a Lightroom workshop, including:
1. Understanding the basics of Lightroom and how to organize photoshoots.
2. Learning how to navigate the Lightroom workspace and modules for importing, exporting, cataloging, metadata management, and quick fixes like watermarking.
3. Discussing techniques like enabling personal styles, sharing experiences, and trying non-glamorous photo experiments.
The workshop will also cover how to organize photographs, figure out files, and why Lightroom may be preferable to other software.
How to Build a Blog for the Construction Industry and Market With It is a presentation for the CONEXPO-CON/AGG 2011 audience, teaching professional blog techniques to save time while building a new customer base.
Colin McLean gave a presentation on SQL injection vulnerabilities and hacking. He demonstrated how easily a hacker could exploit an SQL injection flaw to extract sensitive data like usernames, passwords and bank account information from a vulnerable web application. He emphasized that awareness is key to mitigating hacking threats, as most modern attacks require user interaction, such as clicking a malicious link. Abertay University offers various cybersecurity training courses to help improve awareness.
How to release every week? Case study of Continuous Integration from VNDirectĐới Học viện Agile
The document outlines an approach for releasing software weekly despite working with a legacy system. It recommends fully covering tests, adding features incrementally, and avoiding big bang deployments. Current statistics show 70% unit test coverage, 1500 acceptance tests, resolving technical debt within 5 days, and no critical issues. Challenges include difficulty testing legacy code, conflicts with vendors, and coordination issues with pairing and mob programming.
This document provides a step-by-step guide to using a class website. It instructs the user to:
1. Log in to their class website by scrolling to the bottom of the page and clicking "LOG IN NOW".
2. Wait for the page to fully load, indicated by the disappearance of a green loading circle.
3. Show their family the different pages on the site, like videos and slideshows, to impress potential employers with their work.
4. Always log out of sites for security, to prevent others from accessing private information.
This document discusses web accessibility for people with disabilities. It covers visual, hearing, physical, and cognitive/neurological disabilities. For each type of disability, it provides guidelines on making web content accessible, such as including alt text for images, closed captions for videos, keyboard support, avoiding distracting elements, using correct HTML structures and headings, providing text alternatives for non-text content, ensuring sufficient color contrast and more. It emphasizes that accessibility is important for compliance, business, and inclusiveness in web design and development.
The document discusses web accessibility, providing information on the following key points in 3 sentences:
1) It defines 5 main categories of disabilities that can be affected by accessibility barriers: vision, deaf/hard-of-hearing, motor, cognitive, and seizure-related.
2) It summarizes the Web Content Accessibility Guidelines (WCAG) 2.0, which contains principles, guidelines, and success criteria to make web content more accessible to people with disabilities.
3) It provides tips for making web content more accessible, such as using alternative text for images, adding table headers, ensuring sufficient color contrast, and using clear form labels.
Web accessibility is a crucial component of how we construct our websites today, some with legal requirements to ensure our websites cater to clients of all abilities and disabilities. But how much do we actually know about web accessibility, it's implications and it's implementation? How much do we know about the accessibility of the latest technologies like HTML5 and WAI-ARIA? And can we use these now? Once you begin to think about web accessibility and accessibility in general, you start to see the world in a very different way.
In this talk, Tady Walsh, will take us through website accessibility, starting at the very beginning and will continue up to and including today's technologies. He will discuss, not only how to cater for the various types of disabilities our website visitors may have, but also the way we as developers and designers should be thinking about website accessibility, in every step of our work.
Bio: Tady is a project manager and information architect with Arekibo Communications. With a background in front-end development, he has been working and thinking about web site design and development for the past 15 years. He's a vocal supporter of cool design, good user experience and considerate development methods. His thoughts and opinions can be found on twitter as @tadywankenobi, on his website at http://www.tadywalsh.com and also on Arekibo's blog http://blog.arekibo.com.
The document discusses the history of browser wars between Netscape and Internet Explorer in the late 1990s. It covered how the browsers were deliberately incompatible to gain market share, but this approach did not work as users did not care about the browser. It then discusses compatibility patterns for dealing with browser differences, and examines some extensions made by browsers like Internet Explorer that eventually became standards. The document concludes by considering whether another browser war could emerge between current browsers like Internet Explorer, Firefox, Chrome and Safari.
A Primer on Web Accessibility for TeamsMikey Ilagan
This document provides an overview of web accessibility for teams. It discusses why accessibility is important, who the target audience is for accessible websites, common accessibility concerns, and how different roles can get involved in improving accessibility. The primer covers topics such as assistive technology, labeling elements, color contrast, tab order, focus management, ARIA attributes, and tools for testing accessibility. It emphasizes designing with accessibility in mind from the start and using native HTML elements which have built-in accessibility features rather than custom elements.
Accessible Design and Content in 20 MinutesMarli Mesibov
Looking for a quick-n-dirty guide to accessible content and design? Here's a 20min talk I gave to my team on content and design. It's full of tips and tricks.
Parallel session on 'An Introduction to WAI-ARIA' given by Dan Jackson, City University at the Institutional Web Management Workshop 2009, University of Essex, 28 - 30 July 2009.
See http://iwmw.ukoln.ac.uk/iwmw2009/sessions/jackson/ and
http://lanyrd.com/2009/iwmw09/srfxk/
<p>Security design is an important, but often neglected, component of system design. In this session, Douglas Crockford, creator of Javascript Object Notation, will outline the security issues that must be considered in the architecture of Ajax applications.</p>
<p>The design of the browser did not anticipate the needs of multiparty applications. The browser’s security model frustrates useful activities and allows some very dangerous activities. This talk will look at the small set of options before us that will determine the future of the Web.<br />
During this session, attendees will:</p>
<ul>
<li>Learn why effective security is an inherent feature of good design;</li>
<li>Experience a real-time demo of a Ajax client/server system based on sound security principles</li>
<li>See how to apply secure design to rich web applications.</li>
</ul>
This document provides instructions for creating an MP3 player using HTML and Flash. It discusses embedding MP3 files using Flash embedding code and parameters. It also discusses using Greasemonkey and the Del.icio.us Playtagger userscript to automatically generate inline Flash players for linked MP3 files on webpages and to save MP3 links to a Del.icio.us account for creating playlists.
CSS3 and a brief introduction to Google Maps API v3 Jeffrey Barke
CSS3 is the latest evolution of Cascading Style Sheets, the style sheet language used for describing the presentation of web pages. It adds new features and extends existing ones, though browser support is still evolving. The document discusses CSS3 features and browser support, recommendations for using CSS3, and provides an introduction to the Google Maps API version 3.
The Ember.js Framework - Everything You Need To KnowAll Things Open
All Things Open 2014 - Day 2
Thursday, October 23rd, 2014
Yehuda Katz
Founder of Tilde
Front Dev 1
The Ember.js Framework - Everything You Need To Know
Beginner’s Guide to WCAG 2.0 – Know Your Way Around Web Accessibility RulesJohn McNabb
Need to settle an argument on when alt text is required? Ever wonder how text size relates to colour contrast? When is link text good enough? Look it up in the official reference – WCAG 2! Don’t rely on opinions – defend your findings by pointing to actual Success Criteria. Learn when to fall back on a Guideline, or even a Principle.
This document discusses accessibility in web design from concept to implementation. It begins by defining accessibility and outlining who benefits from accessible design, including users, clients, and search engines. It then provides examples of real-life situations where accessibility is important and guidelines for understanding audience needs. The document outlines trends in accessibility like adhering to web standards and standards harmonization. It offers guidance for wireframing, designing, and creating accessible content, forms, images, tables, lists and more. The conclusion emphasizes that accessibility is an ongoing process rather than a single product.
DevOps Patterns & Antipatterns for Continuous Software Updates @ NADOG April ...Baruch Sadogursky
The document discusses patterns and antipatterns for continuous software updates. It describes challenges with continuous updates including things that can go wrong with updates and solutions like local rollbacks, over-the-air updates, continuous rather than batch updates, automated deployments, frequent updates, state awareness, progressive delivery, observability, rollbacks, and feature flags. The goal is to transition to extremely tiny and frequent updates, called Liquid Software, to provide an illusion of software flowing continuously from development to the target.
Optimizing Library Resources for Screen ReadersNina McHale
This document summarizes Nina McHale's presentation on optimizing library resources for screen readers. The presentation covers accessibility standards, common accessibility issues like lack of image alternatives and poor document structure, and tools for validating accessibility. It demonstrates the JAWS screen reader and calls librarians to action in educating themselves and colleagues on accessibility best practices to ensure all patrons can access library resources.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
More Related Content
Similar to Fix The Future - Accessibility Testing Using Wave
The document discusses web accessibility, providing information on the following key points in 3 sentences:
1) It defines 5 main categories of disabilities that can be affected by accessibility barriers: vision, deaf/hard-of-hearing, motor, cognitive, and seizure-related.
2) It summarizes the Web Content Accessibility Guidelines (WCAG) 2.0, which contains principles, guidelines, and success criteria to make web content more accessible to people with disabilities.
3) It provides tips for making web content more accessible, such as using alternative text for images, adding table headers, ensuring sufficient color contrast, and using clear form labels.
Web accessibility is a crucial component of how we construct our websites today, some with legal requirements to ensure our websites cater to clients of all abilities and disabilities. But how much do we actually know about web accessibility, it's implications and it's implementation? How much do we know about the accessibility of the latest technologies like HTML5 and WAI-ARIA? And can we use these now? Once you begin to think about web accessibility and accessibility in general, you start to see the world in a very different way.
In this talk, Tady Walsh, will take us through website accessibility, starting at the very beginning and will continue up to and including today's technologies. He will discuss, not only how to cater for the various types of disabilities our website visitors may have, but also the way we as developers and designers should be thinking about website accessibility, in every step of our work.
Bio: Tady is a project manager and information architect with Arekibo Communications. With a background in front-end development, he has been working and thinking about web site design and development for the past 15 years. He's a vocal supporter of cool design, good user experience and considerate development methods. His thoughts and opinions can be found on twitter as @tadywankenobi, on his website at http://www.tadywalsh.com and also on Arekibo's blog http://blog.arekibo.com.
The document discusses the history of browser wars between Netscape and Internet Explorer in the late 1990s. It covered how the browsers were deliberately incompatible to gain market share, but this approach did not work as users did not care about the browser. It then discusses compatibility patterns for dealing with browser differences, and examines some extensions made by browsers like Internet Explorer that eventually became standards. The document concludes by considering whether another browser war could emerge between current browsers like Internet Explorer, Firefox, Chrome and Safari.
A Primer on Web Accessibility for TeamsMikey Ilagan
This document provides an overview of web accessibility for teams. It discusses why accessibility is important, who the target audience is for accessible websites, common accessibility concerns, and how different roles can get involved in improving accessibility. The primer covers topics such as assistive technology, labeling elements, color contrast, tab order, focus management, ARIA attributes, and tools for testing accessibility. It emphasizes designing with accessibility in mind from the start and using native HTML elements which have built-in accessibility features rather than custom elements.
Accessible Design and Content in 20 MinutesMarli Mesibov
Looking for a quick-n-dirty guide to accessible content and design? Here's a 20min talk I gave to my team on content and design. It's full of tips and tricks.
Parallel session on 'An Introduction to WAI-ARIA' given by Dan Jackson, City University at the Institutional Web Management Workshop 2009, University of Essex, 28 - 30 July 2009.
See http://iwmw.ukoln.ac.uk/iwmw2009/sessions/jackson/ and
http://lanyrd.com/2009/iwmw09/srfxk/
<p>Security design is an important, but often neglected, component of system design. In this session, Douglas Crockford, creator of Javascript Object Notation, will outline the security issues that must be considered in the architecture of Ajax applications.</p>
<p>The design of the browser did not anticipate the needs of multiparty applications. The browser’s security model frustrates useful activities and allows some very dangerous activities. This talk will look at the small set of options before us that will determine the future of the Web.<br />
During this session, attendees will:</p>
<ul>
<li>Learn why effective security is an inherent feature of good design;</li>
<li>Experience a real-time demo of a Ajax client/server system based on sound security principles</li>
<li>See how to apply secure design to rich web applications.</li>
</ul>
This document provides instructions for creating an MP3 player using HTML and Flash. It discusses embedding MP3 files using Flash embedding code and parameters. It also discusses using Greasemonkey and the Del.icio.us Playtagger userscript to automatically generate inline Flash players for linked MP3 files on webpages and to save MP3 links to a Del.icio.us account for creating playlists.
CSS3 and a brief introduction to Google Maps API v3 Jeffrey Barke
CSS3 is the latest evolution of Cascading Style Sheets, the style sheet language used for describing the presentation of web pages. It adds new features and extends existing ones, though browser support is still evolving. The document discusses CSS3 features and browser support, recommendations for using CSS3, and provides an introduction to the Google Maps API version 3.
The Ember.js Framework - Everything You Need To KnowAll Things Open
All Things Open 2014 - Day 2
Thursday, October 23rd, 2014
Yehuda Katz
Founder of Tilde
Front Dev 1
The Ember.js Framework - Everything You Need To Know
Beginner’s Guide to WCAG 2.0 – Know Your Way Around Web Accessibility RulesJohn McNabb
Need to settle an argument on when alt text is required? Ever wonder how text size relates to colour contrast? When is link text good enough? Look it up in the official reference – WCAG 2! Don’t rely on opinions – defend your findings by pointing to actual Success Criteria. Learn when to fall back on a Guideline, or even a Principle.
This document discusses accessibility in web design from concept to implementation. It begins by defining accessibility and outlining who benefits from accessible design, including users, clients, and search engines. It then provides examples of real-life situations where accessibility is important and guidelines for understanding audience needs. The document outlines trends in accessibility like adhering to web standards and standards harmonization. It offers guidance for wireframing, designing, and creating accessible content, forms, images, tables, lists and more. The conclusion emphasizes that accessibility is an ongoing process rather than a single product.
DevOps Patterns & Antipatterns for Continuous Software Updates @ NADOG April ...Baruch Sadogursky
The document discusses patterns and antipatterns for continuous software updates. It describes challenges with continuous updates including things that can go wrong with updates and solutions like local rollbacks, over-the-air updates, continuous rather than batch updates, automated deployments, frequent updates, state awareness, progressive delivery, observability, rollbacks, and feature flags. The goal is to transition to extremely tiny and frequent updates, called Liquid Software, to provide an illusion of software flowing continuously from development to the target.
Optimizing Library Resources for Screen ReadersNina McHale
This document summarizes Nina McHale's presentation on optimizing library resources for screen readers. The presentation covers accessibility standards, common accessibility issues like lack of image alternatives and poor document structure, and tools for validating accessibility. It demonstrates the JAWS screen reader and calls librarians to action in educating themselves and colleagues on accessibility best practices to ensure all patrons can access library resources.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
HCL Notes and Domino License Cost Reduction in the World of DLAU
Fix The Future - Accessibility Testing Using Wave
1. Let’s Fix the Future!
Accessibility Testing with WAVE
Kara Harkins
October 19, 2019
#TechRebalanced @kara_h
2. Getting a Bit Meta …
1) Background and Installing WAVE
2) Using WAVE
3) WAVE Examples
4) Other Accessibility Issues
Q&A sections are after each section.
Note that examples are for web but can help with general accessibility (like alt text).
I am always finding things to tweak on my own pages. Accessibility is never done.
4. Background
WCAG 2.* (3 levels)
§ Level A à Good!
§ Level AA àYay!!
§ Level AAA à WOW!!!
§ WCAG (Web Content Accessibility Guidelines) is a set of international standards.
Section 508
§ Current version is basically a copy/paste of WCAG 2.0.
§ Required for government and some others.
This is akin to the CRPD and ADA in the physical space.
5. Main Disability Issues
Hearing
Vision
Color Blindness
Physical Ability
Cognition (Often hardest accessibility issues for reengineering sites)
Neurodiversity (can include autism, ADHD, etc)
Learning Disabilities
Seizures, other issues
Some might overlap in some cases.
Yes, temporary disabilities are included.
6. Why Care?
Access for all is A Good Thing.
Promotes good coding.
See getting buy-in (next slide).
7. How to Convince Others (Getting Buy-In)
A must if government (and some others).
What if your main user were temporarily disabled?
What if a new user is disabled?
What if a developer becomes disabled?
More users that can access site.
8. CMS (Content Management Systems)
Big help with accessibility as they already handle many things so you can focus on
accessibility of content.
Drupal of course (8 is great)
Wordpress
Joomla!
Various PHP/MySQL based systems
Commonspot, etc ….
9. Testing
Can you navigate without a mouse?
Is your HTML correct?
Run WAVE or another tool.
The BEST test is to use tests by people with various disabilities.
10. WAVE Installer
Extensions available for:
- Chrome
- Firefox
- Some Chromium based browsers like brave (edge will be chromium based
eventually)
- https://wave.webaim.org/extensions for more details
If none of these apply use https://wave.webaim.org .
These URLs will also be on the next slide.
11. Questions so Far? Install WAVE or Use Form
https://wave.webaim.org/extensions or https://wave.webaim.org
Start playing with it.
#TechRebalanced
@kara_h
13. WAVE Interface
In a browser click this:
OR
If no extension go to https://wave.webaim.org and use this form:
14. You Will Now See This on the Left
This is the summary panel and is shown by default.
The ‘no styles’ button is your page without styles.
The ‘contrast’ button is for testing color contrasts.
15. Details Tab
This keeps going on, click on the symbols for
more information. Note that not everything
here is an issue but things to be aware of.
18. Outline Tab
This goes on and on and is a good way of
seeing the structure. Note that the
h2 tags are indented from the h1,
which is what you would expect.
31. Colorblindness
Test for different conditions:
https://www.toptal.com/designers/colorfilter/
Also WAVE, contrast button, desaturate page.
32. Contrast
Check any proposed colors:
https://webaim.org/resources/contrastchecker/
Also a contrast checker in WAVE.
services articles resources community
Foreground Color
#0000FF
Lightness
Background Color
#FFFFFF
Lightness
Pass
Pass
WCAG AA:
WCAG AAA:
The five boxing wizards jump quickly.
Pass
Pass
WCAG AA:
WCAG AAA:
The five boxing wizards jump quickly.
PassWCAG AA:
Color Contrast
Checker
Contrast Ratio
8.59:1
permalink
Normal Text
Large Text
Graphical Objects and User Interface Components
WebAIM: Color Contrast Checker https://webaim.org/resources/contrastchecker/
1 of 2 3/20/19, 8:11 AM
33. Why CSS Stylesheets?
Allows overriding by users.
Trend for things like <font> tags is to go away.
Allows display code to be future proofed.
The more text the better for accessibility technologies.
Separating content and display is good design.
Use relative sizing rather than pixel sizing (general tip).
34. <img> Examples
NO
§ <img src=‘dog-2280748_960_720.jpg’>
§ <img src=‘dog-2280748_960_720.jpg’ alt=‘an animal’>
§ <img src=‘line.gif’ alt=‘a pretty line’>
YES
§ <img src=‘dog-2280748_960_720.jpg’ alt=‘brown puppy with tan spots sitting on a tan
couch’>
§ <img src=‘line.gif’ alt=‘’>
§ <img src=‘space.gif’ alt=‘’>
35. LINK Example
NO
Hardcoding a <STYLE></STYLE> section
Using style=‘…..’ in an element
Leaving out any attribute in the example below
YES
In <head> section -> <LINK rel=‘stylesheet’ type=‘text/css’ href=‘default.css’>
36. Form Element Example
NO
<p>University <input type=‘text’ id=‘universityname’></p>
YES
<p><label for=‘universityname’>University</label>
<input type=‘text’ id=‘universityname’></p>
38. Other Notes
Only use tables for data (use divs for positioning, CSS Grid for example).
Use headers in hierarchical order and do not skip them: H1, H2, H3, H4, etc.
Aria (for low vision) is simply tags, but beyond scope of this course.
Links should be descriptive, not just ‘click here’.
39. www.autisticadvocacy.org
Not wave but I always admire this control on their page, including that there are
options beyond them. Showing a commitment to accessibility like this really
drives traffic to your site as people will use the tools and appreciate them being
there.