This presentation was given as keynote at MLH's HackconEU 2015. It covers the need to run quality events for hackathon attendees that ensure a healthy and respectful environment.
Information on the Living wall Project- Amman, based on the article: Taibeh, Y. (2009) "A wall with a spirit – the living wall project Amman”, MEADA, 2009/1, p. 44-51
Can government innovate and leverage innovation ?
Yes it can - Chief Disrupter has been repurposing methods from tech and start up to support government and NGOs embrace change and participate in the Innovation economy.
Building Out Your Editorial Calendar 4.24.13Kapost
Using four content pillars to build out your editorial calendar and stick to your content marketing strategy for the entire year.
How do I build a content marketing strategy and stick to it?
How do I know what content to use as pillars?
How do I track my content production to know if I'm hitting my goals?
How do I navigate my Editorial Calendar to follow my content marketing strategy?
Information on the Living wall Project- Amman, based on the article: Taibeh, Y. (2009) "A wall with a spirit – the living wall project Amman”, MEADA, 2009/1, p. 44-51
Can government innovate and leverage innovation ?
Yes it can - Chief Disrupter has been repurposing methods from tech and start up to support government and NGOs embrace change and participate in the Innovation economy.
Building Out Your Editorial Calendar 4.24.13Kapost
Using four content pillars to build out your editorial calendar and stick to your content marketing strategy for the entire year.
How do I build a content marketing strategy and stick to it?
How do I know what content to use as pillars?
How do I track my content production to know if I'm hitting my goals?
How do I navigate my Editorial Calendar to follow my content marketing strategy?
"Selfie" was the word of the year for 2013 and Brands have become obsessed with them. Check out the Infographic and get insights on how and how much brands use Selfies.
Scala in-practice-3-years by Patric Fornasier, Springr, presented at Pune Sca...Thoughtworks
3 years ago, Springer decided to use Scala on a large, strategic project. This talk is about the journey the development teams made. Why did they choose Scala in the first place? Did they get what they hoped for? What challenges and surprises did they encounter along the way? And, most importantly, are they still happy with their choice?
Speech "The Future Of Social Networks: Where We Are Today" given on Thursday, Jan. 22, 2008 to the San Francisco American Marketing Association at the offices of Adaptive Path. Focus is primarily on the marketing and advertising opportunities in social media in the future.
Smartwatches and fitness trackers like Jawbone Up and Fitbit are getting lots of media exposure but are people really buying them?
New report finds that not many people own one, but the future is promising. Read our commentary: http://ondeviceresearch.com/blog/wearable-technology-tipping-point
Simple steps on how to get started with your new DTEK50 secure smartphone powered by Android. This quick how-to guide will help you make the most of DTEK50 with information on how to use the Content Transfer app, regain control of your privacy, and take dazzling photos with DTEK50’s cameras.
Global Messaging Trends: WeChat, Facebook, Bots, and AppsAndrew Schorr
Grata's keynote presentation at CHat Beijing April 24, 2016 discussing the latest trends in messaging. The other presentations from the event can be found here: http://chinachannel.co/chat-beijing-presentations
While smartphone usage is increasing year over year, single apps get less and less attention. This opens up an opportunity to turn this problem into a strength: moving your app into the background by turning core services into an invisible app. The invisible app is a concept that became apparent in the last few years; businesses like Uber have moved central parts of the app interaction into the background without requiring the user to confirm central decisions over and over.
Braintree, a PayPal company, is partnering with various companies that fall into the invisible app category. In this talk Tim will share his lessons learned from mentoring startups and innovative companies that tried to achieve being “invisible”, while maintaining security, profitability and most important: a great user experience.
Amongst the technologies that will be covered are tokenization and leveraging user uniqueness based on smartphone usage behavior. A wide array of sensors - like GPS, Bluetooth LE, and WiFi - supports this concept and can be leveraged creatively to get closer to being “invisible”.
This talk was given as keynote at the summer edition of Geek Picnic 2015 in Moscow.
Software Engineering is a profession that a lot of people call themselves without applying the principles and best practices that differentiate them from a Developer. This presentation is about differences between a Developer and a Software Engineer and why it is crucial.
University of Houston, conducted it's fall hackathon, CodeRED in November. CodeRED used HackerEarth's hackathon management tool - Sprint to collect submissions, evaluate submissions and coordinate with the participants during the hackathon.
"Selfie" was the word of the year for 2013 and Brands have become obsessed with them. Check out the Infographic and get insights on how and how much brands use Selfies.
Scala in-practice-3-years by Patric Fornasier, Springr, presented at Pune Sca...Thoughtworks
3 years ago, Springer decided to use Scala on a large, strategic project. This talk is about the journey the development teams made. Why did they choose Scala in the first place? Did they get what they hoped for? What challenges and surprises did they encounter along the way? And, most importantly, are they still happy with their choice?
Speech "The Future Of Social Networks: Where We Are Today" given on Thursday, Jan. 22, 2008 to the San Francisco American Marketing Association at the offices of Adaptive Path. Focus is primarily on the marketing and advertising opportunities in social media in the future.
Smartwatches and fitness trackers like Jawbone Up and Fitbit are getting lots of media exposure but are people really buying them?
New report finds that not many people own one, but the future is promising. Read our commentary: http://ondeviceresearch.com/blog/wearable-technology-tipping-point
Simple steps on how to get started with your new DTEK50 secure smartphone powered by Android. This quick how-to guide will help you make the most of DTEK50 with information on how to use the Content Transfer app, regain control of your privacy, and take dazzling photos with DTEK50’s cameras.
Global Messaging Trends: WeChat, Facebook, Bots, and AppsAndrew Schorr
Grata's keynote presentation at CHat Beijing April 24, 2016 discussing the latest trends in messaging. The other presentations from the event can be found here: http://chinachannel.co/chat-beijing-presentations
While smartphone usage is increasing year over year, single apps get less and less attention. This opens up an opportunity to turn this problem into a strength: moving your app into the background by turning core services into an invisible app. The invisible app is a concept that became apparent in the last few years; businesses like Uber have moved central parts of the app interaction into the background without requiring the user to confirm central decisions over and over.
Braintree, a PayPal company, is partnering with various companies that fall into the invisible app category. In this talk Tim will share his lessons learned from mentoring startups and innovative companies that tried to achieve being “invisible”, while maintaining security, profitability and most important: a great user experience.
Amongst the technologies that will be covered are tokenization and leveraging user uniqueness based on smartphone usage behavior. A wide array of sensors - like GPS, Bluetooth LE, and WiFi - supports this concept and can be leveraged creatively to get closer to being “invisible”.
This talk was given as keynote at the summer edition of Geek Picnic 2015 in Moscow.
Software Engineering is a profession that a lot of people call themselves without applying the principles and best practices that differentiate them from a Developer. This presentation is about differences between a Developer and a Software Engineer and why it is crucial.
University of Houston, conducted it's fall hackathon, CodeRED in November. CodeRED used HackerEarth's hackathon management tool - Sprint to collect submissions, evaluate submissions and coordinate with the participants during the hackathon.
A full weekend of massive green hacking where coders, developers, designers, entrepreneurs, hardware hackers, UX and UI specialists, scientists and others come together and brainstorm over a couple of days and build out their ideas in a short term innovation event.
Contents
I. Metaverse Ecosystem
-Metaverse Taxonomy
-Metaverse Examples
-Facebook Metaverse Vision
-Microsoft Metaverse Solution
-Nissan Metaverse Use Case
-Metaverse Industry Ecosystem
-Metaverse Next
II. ESG Sustainability
-ESG Sustainability Imperative
-UN Sustainable Development Goals (SDGs)
-ESG Digital Transformation (DX)
-The Fourth Wave of Environmentalism
-Microsoft AI for Earth Project
-UPCO2 Blockchain based Carbon Credits Token Project
-BlocPower: Fighting Climate Change with IoT & Data
-AI Blockchain IoT for ESG DX AT A Glance
-ESG DX Innovation Insights from Patents
-ESG DX for Sustainable Business Innovation & Growth
-ESG DX Forum
III. Metaverse for ESG Sustainability
-Dassault Systemes Digital Twins for Sustainability
-Microsoft Metaverse for Sustainability Use Cases
-Metaverse for Sustainable Smart City (ESG City) Development
Advancing Impact Measurement | Public Good App HouseTechSoup
Join us for an important discussion with three distinguished experts who are pioneering new approaches to impact assessment and funding:
💡 Raymond Cheng, Co-Founder of Open Source Observer: This free analytics suite offers a promising model for measuring the impact of contributions to the health of an ecosystem, with potential applications for nonprofit projects.
💡 Ken (bitbeckers) Beckers of Hypercerts: This protocol aims to streamline the process of funding and rewarding positive impact through a shared, decentralized database for impact claims and funding mechanisms.
💡 Laura (LauNaMu) Navarro, Founder of Metrics Garden Labs: By developing tools to measure the "soft" contributions of a community beyond code, Metrics Garden Labs is exploring new dimensions of impact assessment.
This webinar will:
👉 Engage with leading experts and gain valuable insights into new strategies and mechanisms that are advancing impact measurement.
👉 See demonstrations of the latest tools and methods being developed to measure and enhance the impact of public good projects.
👉 Connect with a diverse community of nonprofits, developers, and open source enthusiasts, fostering meaningful collaborations and exchanges of ideas.
As we strive to create a more just and equitable world, it is essential that we work together to find better ways of evaluating and supporting the vital work done by nonprofits and public good technologists.
Video: https://youtu.be/4kLsZK3wK2Q
CHAPTERS
00:00 Opening Remarks and How to Engage
00:21 Introducing TechSoup and Its Mission
00:49 Spotlight on Event Partner: Funding the Commons
03:26 Introduction to Speakers and Their Innovations
04:31 Deep Dive into Open Source Observer with Raymond Cheng
13:59 Exploring Hypercerts with Ken Beckers
22:38 Evaluators in the Ecosystem: The Role and Impact
23:37 Introducing Funders to Validated Claims
24:10 VoiceDeck: A Marketplace for Journalistic Impact in India
26:29 Impact Garden: Standardizing Impact Data
35:05 Q&A Session: Insights on Impact Evaluation and Funding
CONTINUE LEARNING & BUILDING - Accelerating Makers is helping technology builders and nonprofits co-create purpose-built tools for public good: https://AcceleratingMakers.PublicGoodAppHouse.org
BROWSE - DWeb explainer documents and guides for civil society:
https://acceleratingmakers.publicgoodapphouse.org/resources
ATTEND - Live tech events for makers and nonprofit Leaders: https://events.techsoup.org/public-good-app-house/
This event is supported by an award from the Filecoin Foundation for the Decentralized Web.
Hosted by TechSoup on May 23, 2024.
https://events.techsoup.org/e/m4gprj/
Bring CSR activities to another level - HACKATHONSChallengeRocket
ChallengeRocket recently released the ebook focused on connecting hackathons (programming events) with sustainable development (CSR) for organizations active in all sectors. Case studies in publication show how innovative and socially responsible may be companies if they open the door for stakeholders to engage them in joint creation of ideas and solutions. Hackathon as a form of gaining unconventional ideas and reaching out to talented professionals is an important part of the modern corporate social responsibility strategy.
Content Partner of our ebook is Responsible Business Forum and Honorary Patronage - UN Information Center in Warsaw.
Part 1: The Art of Gathering Virtually: Experiential Design Lessons from Virt...Kent Bye
On Friday, November 20, 2020 at 8:30a PST, Voices of VR podcast host Kent Bye presented some lessons learned his exploration of the virtual conferences in VR from the early days of the pandemic. He also provides some feedback on the Architectural Association's Civic Program Preliminary Report: Distant Crowds: Architecture & Infrastructure of Virtual Gatherings 2020.
[Report] Code for Resilience: Code for VietnamHATCH! PROGRAM
Code for Resilience: Code for Vietnam được tổ chức nhằm tập hợp những nhà lập trình và những chuyên gia trong lĩnh vực ứng phó với thảm hoạ thiên nhiên, chung tay ứng dụng công nghệ cao vào dự báo, phòng tránh và giảm thiểu thiệt hại do thảm hoạ thiên nhiên gây ra tại Việt Nam.
--
Code for Resilience hay Chương trình lập trình giảm thiểu và phòng tránh thảm hoạ, là chuỗi chương trình hackathon toàn cầu của Quỹ toàn cầu về giảm nhẹ và phục hồi thiên tai (GFDRR) thuộc Ngân hàng Thế giới và tổ chức Code for Japan.
Năm 2014, Code for Resilience được tổ chức tại 10 thành phố đã và đang trực tiếp chịu những hậu quả nghiêm trọng của thảm hoạ thiên nhiên, bao gồm Hà Nội, Haiti, Nagoya, Manila, Bangalore, Ishinomaki, Dhaka, …
Đây là cuộc thi lập trình ứng dụng trên điện thoại di động, tập hợp những lập trình viên, những chuyên gia công nghệ và những chuyên gia về ứng phó thảm hoạ thiên nhiên, để phát triển những sáng kiến công nghệ trong cả phần cứng và phần mềm giải quyết những vấn đề và thách thức liên quan đến thảm hoạ thiên nhiên.
Sự kiện cho thấy tầm quan trọng của việc cùng chung sức ứng dụng công nghệ cao vào giải quyết những thách thức về giảm thiểu và quản lý thảm hoạ tại các nước thường xuyên chịu ảnh hưởng của thảm hoạ thiên nhiên nói riêng và toàn thế giới nói chung.
IronHacks Live: Info session #3 - COVID-19 Data Science ChallengePurdue RCODI
This IronHacks Live: Info Session provided details on the Summer 2020: COVID-19 Data Science Challenge hosted by the IronHacks Team at the Research Center for Open Digital Innovation (RCODI) at Purdue University.
Digital Transformation:
Business process re-engineering with digital technologies
Technology used to make existing work more efficient, now technology is transforming the work itself
Example: single shared item lookup process in blockchain supply chain
Productivity gains
Capital investment in technology
Data centers
Blockchain as a Service, Deep Learning nets
Skilled work force development
Train 1000 software developers
Hyperledger, Ethereum, Corda
Machine Learning, AI, Deep Learning
Scale efficiencies
Natural resources, regional strength, large companies
Manage global trade supply chain with blockchain/deep learning
Similar to HackconEU: Hackathons are for Hackers (20)
JSConf Asia: Node.js Authentication and Data SecurityTim Messerschmidt
This talk is an extended version of my session at HTML5DevConf. It was held on Friday Nov. 20th 2015 at DevFest Asia / JSConf Asia in Singapore.
The arena of proper authentication and data security standards is often some of the most misunderstood, confusing, and tricky aspects of building any Node site, app, or service, and the fear of data breaches with unencrypted or poorly encrypted data doesn’t make it any better.
We’re going to tackle this field, exploring the proper methodologies for building secure authentication and data security standards. We’ll run through:
- Building on top of OAuth 2 and OpenID Connect
- Node middleware services for authentication
- Working with proper hashing and salting algorithms, and avoiding others, for private user data
- Common auth and security pitfalls and solutions
In the end, we’re going to see that by understanding proper data security and authentication standards, pitfalls, and reasons for choosing one solution over another, we can make intelligent decisions on creating a solid infrastructure to protect our users and data.
These slides are the introduction to my workshop at Dublin Web Summit 2015. It goes into the integration of the Braintree v.zero SDK for Android and is then being followed up by a live integration.
Building a Mobile Location Aware System with BeaconsTim Messerschmidt
This talk got delivered at OSCON EU 2015. It covers the usage of Bluetooth LE Beacons in order to allow for real world interaction with users that you normally deal with through an API.
This is an extended version of the talk I gave at Web European Conference in Milan. It covers basic web application security threats and simple tweaks to our applications that help dealing with them.
The arena of proper authentication and data security standards is often some of the most misunderstood, confusing, and tricky aspects of building any Node site, app, or service, and the fear of data breaches with unencrypted or poorly encrypted data doesn’t make it any better. We’re going to tackle this field, exploring the proper methodologies for building secure authentication and data security standards. We’ll run through: * Building on top of OAuth 2 and OpenID Connect * Node middleware services for authentication * Working with proper hashing and salting algorithms, and avoiding others, for private user data * Common auth and security pitfalls and solutions In the end, we’re going to see that by understanding proper data security and authentication standards, pitfalls, and reasons for choosing one solution over another, we can make intelligent decisions on creating a solid infrastructure to protect our users and data.
User authentication in mobile and web applications is a very common and integral use case. Implementing basic authentication is an easy solution for developers but comes with several pitfalls that impair user experience like (re-)entering passwords, the need to create a new unique password or even just the input of personal data on a flaky keyboard while registering a new account.
In this talk the security flaws and UX implications of passwords will be discussed and Tim will highlight which different techniques exist that are able to offer a more mobile friendly flow. Highlighting authorization and authentication techniques like OAuth, OpenID Connect and even hardware features like Bluetooth Low Energy this talk will be interesting for anyone who's facing a situation where creating and storing user accounts matters.
Keynote that was being held at API Days 2014 in Paris. It covers the rapid growth of IoT and how developers can start applying their APIs in order to be ready for this new era of connected hardware.
This presentation was being held at Android Developer Days Ankara 2014. It covers the pure scale of mobile commerce and growth that we at PayPal witness.
After covering the basic topics and current situation it goes into upcoming trends like wearables and internet of things and how things will shape within the next 2-3 years.
This presentation was being held at Droidcon DE 2014. It covers the main issues with passwords in mobile and web applications and which alternative technolgoies can help resolving them.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Knowledge engineering: from people to machines and back
HackconEU: Hackathons are for Hackers
1. Tim Messerschmidt
Head of Developer Relations, International
Braintree
@Braintree_Dev / @SeraAndroid
Hackcon EU
Hackathons are for Hackers
#HackconEU