The document summarizes research from focus groups on how users manage self-disclosure and privacy concerns with the rise of social media platforms. The focus groups found:
1) Active users have a higher level of self-disclosure, sharing personal information, thoughts, and experiences, while semi-active users disclose less.
2) Privacy-conscious users disclose little to no information due to concerns about privacy, while others are less concerned.
3) Trust in a platform depends on its appearance, reputation, and familiarity through regular use.
4) Peer pressure and social norms strongly influence levels of use and disclosure to stay connected and informed.
5) Expected benefits like social integration can outwe
Presentation for the Graduate Certificate in Higher Education at Deakin University by Colin Warren & Joyce Seitzinger. Covers online identity, personal learning networks, mobile learning, visual learning, filtering, sharing, digital curation and creation of artefacts.
Managing Professional Information Overload (KASL District I version)Heather Braum
The document summarizes a workshop presented by Heather Braum on managing professional information overload. The workshop covered defining information overload, acknowledging that one cannot keep up with everything, and learning to skim information. Braum provided tips on using tools like Evernote, bookmarks, dashboards, and social networks. She also shared additional resources on the topic and contact information.
White Space Creativity - Frontend Conference CH 2014Denise Jacobs
The document summarizes Denise R. Jacobs' presentation at the Frontend CH Conference in Zurich, Switzerland on creative flow and how to maximize creativity. The presentation discusses how creativity occurs in the brain during alpha waves, and strategies like daydreaming, playing, and mindfulness can help access this state. It also suggests tapping into imagination and one's subconscious for new ideas, and trusting the creative process by listening to ideas and letting them take form. The overall message is that creativity is a skill that can be developed by understanding how the brain works creatively and leveraging techniques to stay in a state of flow.
Joint presentation for the Graduate Certificate in Higher Education at Deakin University by Colin Warren & Joyce Seitzinger. Covers online identity, personal learning networks, mobile learning, visual learning, filtering, sharing, digital curation and creation of artefacts.
Infinite Possibilities - How Interactive Conference, San FranciscoDenise Jacobs
Sometimes making choices in our career paths is difficult. Wouldn't it be helpful to have guidelines to help us make decisions that open up your options rather than shut them down? Discover how choosing creativity, a growth mindset, finding your Flow, and being a Maker puts you on the path of having infinite possibilities in your career, creating a clear path to a future where you can not only be awesome, but also do meaningful work.
My career and future document discusses Apryl Lyn Cote's career goals and plans for the future. It outlines her interest in pursuing a career in graphic design or marketing and her plans to enroll in a college program to study one of these fields. The document also mentions gaining work experience through internships to help determine the best career path and build her resume.
Striking a Balance: Middle Ground in Front-End DevelopmentNathan Smith
The document discusses balancing design and development in front-end work. It addresses stereotypes between designers and developers, and describes front-end developers as "midfielders" who ensure designers get credit and backend developers can focus on their work. The document also covers topics like web standards, accessibility, version control systems, frameworks, team dynamics and more.
Discover why at times we feel on fire with creativity — and at other times we don’t. We'll explore the neuroscience of creativity, productivity techniques, and emerging practices that spur innovation and help our brains work best. Beware: This session challenges the standard norms for concentration, focus, and productivity and may change how you work — for the better. Presented at AdobeMax 2013.
Presentation for the Graduate Certificate in Higher Education at Deakin University by Colin Warren & Joyce Seitzinger. Covers online identity, personal learning networks, mobile learning, visual learning, filtering, sharing, digital curation and creation of artefacts.
Managing Professional Information Overload (KASL District I version)Heather Braum
The document summarizes a workshop presented by Heather Braum on managing professional information overload. The workshop covered defining information overload, acknowledging that one cannot keep up with everything, and learning to skim information. Braum provided tips on using tools like Evernote, bookmarks, dashboards, and social networks. She also shared additional resources on the topic and contact information.
White Space Creativity - Frontend Conference CH 2014Denise Jacobs
The document summarizes Denise R. Jacobs' presentation at the Frontend CH Conference in Zurich, Switzerland on creative flow and how to maximize creativity. The presentation discusses how creativity occurs in the brain during alpha waves, and strategies like daydreaming, playing, and mindfulness can help access this state. It also suggests tapping into imagination and one's subconscious for new ideas, and trusting the creative process by listening to ideas and letting them take form. The overall message is that creativity is a skill that can be developed by understanding how the brain works creatively and leveraging techniques to stay in a state of flow.
Joint presentation for the Graduate Certificate in Higher Education at Deakin University by Colin Warren & Joyce Seitzinger. Covers online identity, personal learning networks, mobile learning, visual learning, filtering, sharing, digital curation and creation of artefacts.
Infinite Possibilities - How Interactive Conference, San FranciscoDenise Jacobs
Sometimes making choices in our career paths is difficult. Wouldn't it be helpful to have guidelines to help us make decisions that open up your options rather than shut them down? Discover how choosing creativity, a growth mindset, finding your Flow, and being a Maker puts you on the path of having infinite possibilities in your career, creating a clear path to a future where you can not only be awesome, but also do meaningful work.
My career and future document discusses Apryl Lyn Cote's career goals and plans for the future. It outlines her interest in pursuing a career in graphic design or marketing and her plans to enroll in a college program to study one of these fields. The document also mentions gaining work experience through internships to help determine the best career path and build her resume.
Striking a Balance: Middle Ground in Front-End DevelopmentNathan Smith
The document discusses balancing design and development in front-end work. It addresses stereotypes between designers and developers, and describes front-end developers as "midfielders" who ensure designers get credit and backend developers can focus on their work. The document also covers topics like web standards, accessibility, version control systems, frameworks, team dynamics and more.
Discover why at times we feel on fire with creativity — and at other times we don’t. We'll explore the neuroscience of creativity, productivity techniques, and emerging practices that spur innovation and help our brains work best. Beware: This session challenges the standard norms for concentration, focus, and productivity and may change how you work — for the better. Presented at AdobeMax 2013.
Fedora Plus Curators Makes Quality Metadataecaldwel
Using the JQUERY XML Editor from UNC, SOLR and Django with Fedora, Brown University Library has built an editor for its repository that curators can use to edit the metadata (MODS) for their respective collections
HB 493 supports Florida tourism by promoting the state on Orbitz's website. Orbitz features a Florida homepage that highlights promotions, responses to events like the BP oil spill, partnerships with Convention and Visitors Bureaus, a travel index for the state, and live broadcasts from Florida locations to promote tourism to different markets around the country. The bill would encourage Orbitz's ongoing efforts to advertise Florida as a travel destination.
This curriculum vitae summarizes the applicant's work experience from 1997 to the present. They have held various administrative and clerical roles through temporary agencies. They also owned and operated an art gallery and gift shop business for two years. Prior to that, they were the managing partner at a real estate company, where they oversaw administrative duties. They have over 20 years of experience in administrative, customer service, and business management roles.
The document appears to be a conversation in another language between several individuals discussing cars, criminal activities like smuggling heroin, and violence including references to killing and fighting. They also mention looking for someone the feds are after and preparing faster cars to use against another person. The document switches between multiple speakers and has an informal conversational tone.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
The document summarizes the event of Rasulullah (SAW) going to Taa'if to spread the message of Islam. It details how he was rejected by the chieftains and locals, ridiculed, harmed, and pelted with stones until blood flowed from his feet. Despite this, when Rasulullah (SAW) made dua to Allah SWT to destroy the people of Taa'if, he instead prayed that Allah guides their offspring to Islam. The event demonstrates Rasulullah's (SAW) perseverance in da'wah despite facing hardship, and his mercy in not seeking revenge even when given the opportunity. It is used to emphasize continuing da'wah efforts among Muslims
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
Reduce waste by using fewer disposable items and materials. Reuse items like containers and bags instead of immediately throwing them away. Recycle materials like paper, plastic, glass, and metal by putting them in the proper recycling bins to be made into new products.
A 'digital generation': sustaining connections in the Information AgeDr Mariann Hardey
This document summarizes research into the digital habits and social behaviors of young people often referred to as the "iGeneration". It finds that they are immersed in digital media and focused on shared interactive online environments. Their social lives involve constant connectivity through various devices and platforms. They seek to occupy multiple online profiles to represent themselves and stay connected in real-time. Not being connected online takes on social meaning. Their interactions are fast-paced and they feel the need to continuously update their status and networks.
Social software is kind of a big deal right now. In the open-source spirit of transparency and dissection, let's talk about what makes social technology creepy, what makes it fun, and how to hack things to maximize your desired outcome.
Bridging the gap between our online and offline social networkPaul Adams
A 30 minute talk I gave at the IA Summit 2010. If you find the content useful in your work, I'd love to hear your stories and examples to inform a book I'm writing. Please get in touch!
padday at gmail dot com
What's Going On Behind The Screen With College Students - OLC InnovatePaul Brown
Originally presented at the Online Learning Consortium's (OLC) Innovate conference in New Orleans in April of 2016. Provides an overview of research on college students developmental and educational experiences online.
This document discusses the benefits of observable or transparent work practices in software development. It notes that many software people already work observably by default due to creating technologies that support practices like blogging, documentation of work processes, and iterative development with feedback. However, it also acknowledges that not all software people choose to work observably, and explores some of the reasons why including lack of time and preference for privacy over performance. It argues that working observably can amplify one's efforts and help share knowledge more broadly through network effects.
The document discusses the evolving nature of online identity. It notes that as more people use social networks and share personal information online, identities are becoming tied more closely to real names and social connections rather than anonymous usernames. This is leading to the rise of the "social web" where people are openly interacting and sharing information about themselves and what they are doing online. Activity streams that show what people are doing are becoming an important way to understand others and get recommendations.
Fedora Plus Curators Makes Quality Metadataecaldwel
Using the JQUERY XML Editor from UNC, SOLR and Django with Fedora, Brown University Library has built an editor for its repository that curators can use to edit the metadata (MODS) for their respective collections
HB 493 supports Florida tourism by promoting the state on Orbitz's website. Orbitz features a Florida homepage that highlights promotions, responses to events like the BP oil spill, partnerships with Convention and Visitors Bureaus, a travel index for the state, and live broadcasts from Florida locations to promote tourism to different markets around the country. The bill would encourage Orbitz's ongoing efforts to advertise Florida as a travel destination.
This curriculum vitae summarizes the applicant's work experience from 1997 to the present. They have held various administrative and clerical roles through temporary agencies. They also owned and operated an art gallery and gift shop business for two years. Prior to that, they were the managing partner at a real estate company, where they oversaw administrative duties. They have over 20 years of experience in administrative, customer service, and business management roles.
The document appears to be a conversation in another language between several individuals discussing cars, criminal activities like smuggling heroin, and violence including references to killing and fighting. They also mention looking for someone the feds are after and preparing faster cars to use against another person. The document switches between multiple speakers and has an informal conversational tone.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
The document summarizes the event of Rasulullah (SAW) going to Taa'if to spread the message of Islam. It details how he was rejected by the chieftains and locals, ridiculed, harmed, and pelted with stones until blood flowed from his feet. Despite this, when Rasulullah (SAW) made dua to Allah SWT to destroy the people of Taa'if, he instead prayed that Allah guides their offspring to Islam. The event demonstrates Rasulullah's (SAW) perseverance in da'wah despite facing hardship, and his mercy in not seeking revenge even when given the opportunity. It is used to emphasize continuing da'wah efforts among Muslims
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
Reduce waste by using fewer disposable items and materials. Reuse items like containers and bags instead of immediately throwing them away. Recycle materials like paper, plastic, glass, and metal by putting them in the proper recycling bins to be made into new products.
A 'digital generation': sustaining connections in the Information AgeDr Mariann Hardey
This document summarizes research into the digital habits and social behaviors of young people often referred to as the "iGeneration". It finds that they are immersed in digital media and focused on shared interactive online environments. Their social lives involve constant connectivity through various devices and platforms. They seek to occupy multiple online profiles to represent themselves and stay connected in real-time. Not being connected online takes on social meaning. Their interactions are fast-paced and they feel the need to continuously update their status and networks.
Social software is kind of a big deal right now. In the open-source spirit of transparency and dissection, let's talk about what makes social technology creepy, what makes it fun, and how to hack things to maximize your desired outcome.
Bridging the gap between our online and offline social networkPaul Adams
A 30 minute talk I gave at the IA Summit 2010. If you find the content useful in your work, I'd love to hear your stories and examples to inform a book I'm writing. Please get in touch!
padday at gmail dot com
What's Going On Behind The Screen With College Students - OLC InnovatePaul Brown
Originally presented at the Online Learning Consortium's (OLC) Innovate conference in New Orleans in April of 2016. Provides an overview of research on college students developmental and educational experiences online.
This document discusses the benefits of observable or transparent work practices in software development. It notes that many software people already work observably by default due to creating technologies that support practices like blogging, documentation of work processes, and iterative development with feedback. However, it also acknowledges that not all software people choose to work observably, and explores some of the reasons why including lack of time and preference for privacy over performance. It argues that working observably can amplify one's efforts and help share knowledge more broadly through network effects.
The document discusses the evolving nature of online identity. It notes that as more people use social networks and share personal information online, identities are becoming tied more closely to real names and social connections rather than anonymous usernames. This is leading to the rise of the "social web" where people are openly interacting and sharing information about themselves and what they are doing online. Activity streams that show what people are doing are becoming an important way to understand others and get recommendations.
The document discusses guidelines for government employees participating in virtual communities and social media. It shares perspectives from several colleagues on identifying one's agency, using personal vs work profiles and contact information, maintaining political neutrality, and managing one's image or avatar across different platforms. Guidelines vary by agency but generally involve transparency about one's role and maintaining separation between personal and professional activities online.
Being Good Digital Partners With College Students On #SocialMediaPaul Brown
Originally presented at the Colorado College Personnel Association Conference in February 2016. Discusses the developmental journeys of college students online and how to be good educational partners.
Hello, everyone. I would like to introduce myself to this network and spread word about myself because you have seen my first PowerPoint upload.
I want to take the time to progress my public recognition even further, by showing off my own profile, as well as what I want to do.
I've split up the process of what I want to do into five very important stages that you can also use it for your advantage. I'm describing each stage and what I've done, what I'm doing, and what I want to do.
Please take the time to follow this as well as do what's at the end of this presentation, which is simply following me on some sites. Anyway, have fun and please leave comments!
Ever get the impression that Facebook, Twitter and the like are just "for the kids"? How about us old folks, you know, people over thirty. Can we get any value out of this social networking "stuff"? Sure we can. This presentation runs through some of "the stuff" (Facebook, Twitter, LinkedIN), and shares some considerations for using them in a safe, effective manner, whether it is to build and promote a strong personal brand online, maintain a strong personal and professional network, or all of the above.
The document provides guidance on managing personal information and privacy settings on Facebook to balance personal and professional use. It recommends:
1. Creating customized "Friend Lists" to organize contacts into groups and selectively sharing information.
2. Carefully controlling access to personal information like birthdays, hometowns, and contact details that could aid identity theft.
3. Making profile details like employer, education, and activities appropriate to share professionally by restricting sensitive details to personal lists.
4. Regularly reviewing settings and content to ensure a professional online presence is maintained.
Is Writing More Important Than Programminglegendsland
The document is a transcript of a talk given by Jeff Atwood where he discusses the importance of writing and blogging for software developers. He argues that writing is more important than just programming. He shares his experience of starting a successful blog and how it has had a bigger impact on his career than any software he developed. He encourages the audience to take risks early in their career, move to areas with more opportunities, and to start blogging to develop important communication skills.
The document provides a UX case study for an app called MobileMeet aimed at helping shy and socially anxious people feel more comfortable meeting new people at social events. It details the discovery process including user surveys and interviews that found key factors like conversations, energy levels, confidence and connection are important for social interactions. Competitive analyses showed existing apps were not well suited. Prototyping focused on essential features like checking in to locations, viewing nearby users, and requesting to meet up. User feedback validated including profile details like occupation. The prototype screens showed the sign up, check in, profiles and meetup request features of the MobileMeet app.
The document discusses building a public persona to help one's career. It notes that having some online presence through platforms like blogs, Twitter, LinkedIn allows people to learn about you before meeting and gives you more credibility in job interviews. The document then shares the author's experience gradually building their profile over years through minimal efforts like blogging, attending meetups, speaking at conferences, and connecting with others online and in person. Maintaining an online presence is presented as a low-effort way to positively impact one's career.
This document provides biographical information and work experience for Raechel Alexis Gasparac, a visual artist. It summarizes her education and focus on fine arts. It also outlines her experience in graphic design, illustration, and multimedia work. She has over 11 years of experience and owns her own studio, R.A.G. Studios, where she does contracted work. The document includes examples of her artwork and game design concepts.
You are a scientist. You are busy. You want to be on social media but don't know where to start. Then this presentation is for you. Three easy ways to start within 10 minutes.
The document discusses the benefits of lawyers using social networking tools like Facebook, Twitter, and LinkedIn to establish relationships and promote their practice. It provides tips for setting up an interesting profile, engaging with contacts at networking sites as if at a party, using blogging to further relationships, and tools to help manage a social media presence. Effective social networking is portrayed as a long-term commitment to building online communities and relationships through regular, valuable contributions over time.
Cognitive distortions are the everyday errors that we make in translating the thoughts, ideas, and things we see around us, using words. These are 10 of the top cases of distorted thinking that we have all made, at one time or another. melaniecgallo.com
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Gor 2009 Taddicken Jers Schenk
1. Research project [funded by DFG]:
“The diffusion of the media innovation Web 2.0: Determinants and effects from a user’s perspective”
Social Web and Self-Disclosure = Participation vs. Privacy?
Krueger, R.A./Casey, M.A. (2000): Focus Groups. Thousand Oaks.
Exploring how users manage this dilemma via Focus Groups
Monika Taddicken, Cornelia Jers, Michael Schenk
General Online Research Conference
1 Vienna, April 7th, 2009
2. Background
• Social Web / Web 2.0: variety of different applications, but based on the
same principles (“user-generated content“, “architecture of participation“)
• Social Web requires users to disclose information
• Heightened self-disclosure in computer-mediated-communication
(e. g. Joinson 2001, Tidwell/Walther 2002, Suler 2004)
• Self-disclosure =
“the telling of the previously unknown so that it becomes shared knowledge“
(Joinson et al. 2008)
“the process of making the self known to others“ (Jourard/Lasakow 1958)
• Privacy cost on users
• Growing concerns about the reasonable handling of
personal information in the Social Web
What influences the self-disclosure of Social Web users?
3. Method
• 5 Focus Groups with semi-active and active users
• Recruiting participants
Via flyers in households in Stuttgart, blogs, and web forums
Screening via web survey
• Classification of activity level
Passive use: only reading or watching
Semi-active use: writing comments or rating content of others
Active use: presenting information, generating content
• Participants
30 males, 16 females, aged between 18 and 44 years, different levels of education
4. To give an impression:
“I like to present myself, I wanna show who I am.“
“I wouldn‘t just think of possible
consequences. […] I‘m not aware of it.
Actually, the current discussion gives me a
“I don‘t disclose any private
reality check.“
pictures about me, I‘d never
upload a photoalbum of my last
holiday! … Only party pictures.“
“Well, I upload pictures, including pictures not
adequate for HR managers. …. If I do it,
hopefully noone else does it. […] And if I delete
it, it‘s gone.“
“No Saturday-night-drunk-in-the-ditch-picture.“
5. Results
1) Level of Activity
Active users = high level of disclosure:
Personal information (names, addresses, pictures):
“Why shouldn‘t I reveal my real name?“
“I do have a XING account, but I use it rarely. I just have this account, that‘s it. I‘m using my studiVZ account
frequently, a lot of my friends use it as well. I have uploaded at least 200, 300 pictures, then
I‘ve linked on about another 100 or so. And that way, we do a lot of picture exchanges, too. “
Thoughts and opinions:
“I read a lot and if I find something I think ‚okay, that‘s nonsense, absolutely not
correct‘, he gets my opinion via trackback. That‘s it.“
Experiences:
“I rather report afterwards than write about my future activities. I wouldn‘t have written
‚hey, I will be there and there the day after tomorrow‘ into my blog, but maybe I‘ll write next week that I‘ve been
here.“
6. Results
1) Level of Activity
Semi-active users = low(er) level of disclosure:
don‘t write into it. I just don‘t feel like it. Too time-consuming. And it will get me nowhere.“
“Well, I
You
“But you can register with any name. You don‘t have to disclose your real e-mail-address or something.
can set up an e-mail-address only for those purposes, then it works out… without revealing
any personal data, if you doesn‘t want to.“
“I personally don‘t do it [comment and generate content], but I think this is very
very important.“
I wouldn‘t have the
“I‘m wondering why someone would write a blog. […] That‘s kind of… I don‘t know,
idea to do so. Because I think I better could discuss things in real life.“
Active users high(er) level of disclosure
Semi-active users low(er) level of disclosure
7. Results
1) Level of Activity
I use my nickname, apart from that
quot;In forums, discussion forums, elsewhere, I use my avatar,
noone knows anything. I‘m personally non existent in the Internet.“
“I‘m often under my real name… or always. And I only use my regular e-mail-address. I haven‘t
had a lot of problems with spams during the last years, because I do it rarely and I only use applications
which look seriously. I‘ve quitted doing something else.“
“At least for a rough impression, that I know who I‘m dealing with. Okay, many pictures are faked, that‘s another
story. I publish at least a profile photo, doesn‘t matter where. A picture of my face,
identifiable, so that everyone knows who I am. That‘s just part of the game!“
Active users high(er) level of disclosure
Semi-active users low(er) level of disclosure
8. Results
2) Privacy Concerns
Privacy worriers = low level of disclosure / no disclosure:
“I only read blogs, I don‘t post anything. I don‘t want do disclose private information.“
“Well, I disclose those information I would tell someone at the trainstation while
waiting for the train. That‘s really not too much.“
“Some day I passed on to let only my friends see my profile. In the beginning, I didn‘t
care about it, but it‘s a fact that the whole world can look at it. And there are still some things not everyone
needs to know. Private things, just for friends.“
Privacy unworriers = … :
“I find it annoying to mind it. I don‘t care at all who‘s interested in my life, I‘ve nothing to hide.“
“May be I‘m a little bit naive, but I think that this recent hype ‚Oh my god, they want to abuse our data‘ is much
overweighted. I don‘t know. May be I underrate it. Might be. But I think, nothing real can happen
to me. If someone knows I have a partner or am married or so, so what?“
9. Results
3) Trustworthiness of Application
Depends on
• “how it looks like“
“I‘m often under my real name… or always. And I only use my regular e-mail-address. I haven‘t had a lot of
problems with spams during the last years, because I do it rarely and I only use applications which
look seriously. I quitted doing someything else.“
• the reputation
“I‘m always very cautious in the beginning. When I become aware of somethin new, I keep an eye on it first.
When I find out that some of my friends use it and are happy with it, I‘ll have a closer
look on it and maybe I‘ll register. But then I use it very intensely.“
• the habitualization of use
“I believe there‘s a lower inhibition threshold in studiVZ, because you are used to
everything. You already know a lot of people, it‘s a cosy atmosphere. You log in regularly,
then you just know everything and are less concerned. Who‘d be concerned about any
uncertainties at home? I wouldn‘t. I feel comfortable [in studiVZ].“
10. Results
4) Social Context
Peer-group pressure strongly influences level of use and disclosure.
“I only register if I know someone there. Especially studiVZ or something like that. To get to know
someone in the Internet, that‘s difficult for me. That‘s why I register nowhere.“
“If you aren‘t a member in a SNS you are completely socially excluded. I can talk
about myself: If I wasn‘t a user of all these SNS I would have no opportunity to keep in touch with all the people I
don‘t call. Several people directly asked me to join a network. That‘s where the whole life takes
place, you have groups founded for special purposes, such as organizing class reuninions or discussing the
With
next exam at university and so on. If you‘re not ‚in‘, you don‘t have any chance to get these information.
applications like that you have the advance to be socially integrated.“
Why doesn‘t he do
“Well, if someone doesn‘t do it, unlike everyone else, he‘d fall in a special category:
it? That‘s ominious. I think you definitely can use it – and that safely.“
11. Results
5) (Expected) Benefits
Expectations of benefits strongly influence level of usage and disclosure.
“I don‘t like it, but I value the service and the functions more, so I abandon a
piece of privacy.“
“Too much effort to write something. And it doesn‘t yield anything, at least nothing for
myself.“
“This would be totally ridiculous: Why should I rate something? I mean… what for?“
“I would. If I had something to publish, may be a stay abroad or something like this, may be after my diploma,
if I had done something, something professional… I would write a blog instead of something else, because it‘s
easier.“
12. Results
6) Data Management Possibilities
I disclose information, private information and pictures and what‘s going on my life, but
“On Facebook,
I do it secured that only my friends can have a look at it.“
7) Impression Management
“Blog, that means one is talking, many are listening. You can comment, but it‘s always related to the original
article. Bloggers are the people of Speaker‘s Corner, people who were standing in
the park and making their speeches.“
8) Awareness
“I think younger people show a higher self-disclosure. They just don‘t think about being in profession and
someone of the HR department could have a look on their private lifes. A 17-, 18-year old in school or an
undergraduate doesn‘t think about it. That‘s later on, I‘ve seen it at my friends. It started with students
doing an internship, they started concealing their names or made profiles
otherwise more anonymous. Not till then they are aware of their self-disclosure.“
13. Conclusions
Activity
Privacy
concerns Personal
information
Benefits
Social
context
Self- Thoughts and
opinions
Disclosure
Trustworthiness
Data
management
Impression
Experiences
management
Awareness
14. Conclusions
• Limitations:
Reported behaviour
No standardized evaluation
Factors missing
• Next steps:
Web survey with 3.000 participants in May 2009
Evaluation of self-disclosing behaviour and influencing factors
• Web-Researcher-Blog: http://webresearcherblog.wordpress.com/
15. Thank you for your attention!
http://beth.typepad.com/beths_blog/2007/06/variations-on-t.html
monika.taddicken@uni-hohenheim.de