This document discusses measuring social media and determining return on investment (ROI). It begins with an introduction of the speaker and session goals. Various metrics for measuring social media are then presented and discussed, including numbers of likes, shares, comments, and words in posts. Participants debate whether ROI can be determined from social media and most feel it depends on the specific application. Key points are that the purpose and goals must be defined upfront to guide meaningful measurement and determine if any metrics represent a true ROI. Examples of metrics for marketing, sales, and customer care applications are also provided.
1) Voice calls and SMS/MMS were the most common activities that led smartphone users to choose their main phone, chosen by 64% and 60% of users respectively.
2) Microbrowsing, listening to music, and using GPS/navigation services have increased in popularity over the past quarter as phone activities that influenced choice of device.
3) Over 6.5 million mobile phone users in Italy accessed mobile internet services like instant messaging, email, browsing, and social networks in the past 30 days, a 7% increase over the previous quarter.
This document discusses how Volume helps businesses optimize their social media presence. It begins by noting that large organizations often have many existing social media accounts across platforms like Facebook, Twitter, YouTube and LinkedIn. Volume's approach is to first map out a business's "SociVerse" by categorizing all relevant social media accounts. It then scores each account based on factors like content, activity and audience size. The accounts can then be optimized or consolidated to improve their quality, impact and value. The example provided discusses how Volume helped Oracle Hardware attract users and advocates to its emerging social media real estate after acquiring Sun Microsystems by developing a hub-and-spoke social media marketing model across multiple channels.
Newsletter subscriber networks provide an opportunity for brands to reach a highly engaged audience. Email remains one of the most widely used digital platforms, with people spending over 25 minutes per hour on their mobile devices using email. Newsletter subscribers have opted into regular content from trusted publishers, and will give their full attention to email content for an average of 28 seconds per message. This engaged audience can be reached through banner ads and sponsorship placements within newsletters, delivering click through rates that are 2-10 times higher than typical digital channels.
The world of Journalists is changing. Their business model seems to vanish. That is not really true. Their world is only shifting. This lecture focus on the change brought to Journalists by Big Data.
Big Data is "hype-term" but “being data-driven” creates new possibilities for Journalists. The talk goes through the 5 V's of Big Data and why we should focus on small Data.
Several use-cases for Journalists are discussed from Influencers over Reach Metrics to Trend Prediction and Content Validation. A few tools supporting the Journalistic work are introduced.
How well did leWeb go? More then 70.000 articles? What is important? See more then pure numbers?
1) Which Story is important?
2) Did Karl Lagerfeld create an impact?
3) How are articles spreading?
4) and many more metrics.
This document discusses the importance of asking the right questions, measuring the right data, and learning from actions taken based on insights gained. It advocates focusing on small, relevant data rather than large datasets. Examples show how identifying influencers based on connectivity within networks can provide useful insights. Prediction and recommendations are also discussed as important outcomes of an ask-measure-learn approach, but the document cautions that correlation does not always indicate causation or the truth.
Lutz Finger (@LutzFinger) has co-founded Fisheye Analytics, a company, which measures the SPREAD of a message next to other metrics about the social chatter.
Our clients include the World Economic Forum, International Olympic Committee, Eli Lilly and Nikon. Try us out!
1) Voice calls and SMS/MMS were the most common activities that led smartphone users to choose their main phone, chosen by 64% and 60% of users respectively.
2) Microbrowsing, listening to music, and using GPS/navigation services have increased in popularity over the past quarter as phone activities that influenced choice of device.
3) Over 6.5 million mobile phone users in Italy accessed mobile internet services like instant messaging, email, browsing, and social networks in the past 30 days, a 7% increase over the previous quarter.
This document discusses how Volume helps businesses optimize their social media presence. It begins by noting that large organizations often have many existing social media accounts across platforms like Facebook, Twitter, YouTube and LinkedIn. Volume's approach is to first map out a business's "SociVerse" by categorizing all relevant social media accounts. It then scores each account based on factors like content, activity and audience size. The accounts can then be optimized or consolidated to improve their quality, impact and value. The example provided discusses how Volume helped Oracle Hardware attract users and advocates to its emerging social media real estate after acquiring Sun Microsystems by developing a hub-and-spoke social media marketing model across multiple channels.
Newsletter subscriber networks provide an opportunity for brands to reach a highly engaged audience. Email remains one of the most widely used digital platforms, with people spending over 25 minutes per hour on their mobile devices using email. Newsletter subscribers have opted into regular content from trusted publishers, and will give their full attention to email content for an average of 28 seconds per message. This engaged audience can be reached through banner ads and sponsorship placements within newsletters, delivering click through rates that are 2-10 times higher than typical digital channels.
The world of Journalists is changing. Their business model seems to vanish. That is not really true. Their world is only shifting. This lecture focus on the change brought to Journalists by Big Data.
Big Data is "hype-term" but “being data-driven” creates new possibilities for Journalists. The talk goes through the 5 V's of Big Data and why we should focus on small Data.
Several use-cases for Journalists are discussed from Influencers over Reach Metrics to Trend Prediction and Content Validation. A few tools supporting the Journalistic work are introduced.
How well did leWeb go? More then 70.000 articles? What is important? See more then pure numbers?
1) Which Story is important?
2) Did Karl Lagerfeld create an impact?
3) How are articles spreading?
4) and many more metrics.
This document discusses the importance of asking the right questions, measuring the right data, and learning from actions taken based on insights gained. It advocates focusing on small, relevant data rather than large datasets. Examples show how identifying influencers based on connectivity within networks can provide useful insights. Prediction and recommendations are also discussed as important outcomes of an ask-measure-learn approach, but the document cautions that correlation does not always indicate causation or the truth.
Lutz Finger (@LutzFinger) has co-founded Fisheye Analytics, a company, which measures the SPREAD of a message next to other metrics about the social chatter.
Our clients include the World Economic Forum, International Olympic Committee, Eli Lilly and Nikon. Try us out!
The document discusses the shortage of data analytics skills and talent in the United States by 2018. It is estimated that there will be a shortage of 140,000 to 190,000 people with deep analytical skills, as well as 1.5 million managers and analysts able to use big data analysis to make effective decisions. The document provides tips on how to be data-driven, including asking the right questions, measuring the right data, taking action and learning from results. It emphasizes that data alone is useless - it is action based on information that counts.
The media industry is well positioned. They could have "better" data (in the meaning of better for placing advertisements) than many social networks. However they need to embrace data and become a data driven organization.
Lutz Finger analyzes in his talk (video: http://youtu.be/mzWBXUc1QWo) the two main worries the media industry has today: Reach / Expertise - in both areas they are faced with competition from new social media channels.
He shows that BigData and Analytics is the only way out of the issue. Media companies could become the leader in Media Data and in Media Analytics.
Social Data can give an even better and in-depth view on your customers. However please mind that it is not about 'more data'. It is about the 'right data' put to work.
A) Start wit the question
B) Combine Structured and Unstructured Data
C) Apply continuous machine learning
The document discusses the future of social CRM and the social CRM market landscape. It explores two main topics: 1) the integration landscape and key players in the social CRM market and 2) whether there will be dominance by large companies in the future of social CRM. A list of 24 winners of the CRM Watchlist 2012 is also presented, including major players like Salesforce, Microsoft, Oracle, and SAP.
Making sense of your data doesn't require mountains of data; it requires a systematic approach that leads to actionable insights. But how to get there? This keynote (given at "Predictive Analytics and Business Insights") shows how to extract significant business value from big data with Ask-Measure-Learn, a system that helps you ask the right questions, measure the right data, and then learn from the results. Using this system can help you learn to:
* Focus on business-related questions
* Find measures that have high causation, a low error rate and a low cost
* Create actionable insights by starting with predictions, benchmarks or recommendations
The business world is increasingly adopting the Moneyball principle of using data to predict and gain a competitive advantage in healthcare, telecommunications, retail, media, energy, and many other industries. Some argue that organizations that do not possess strong data and the skills to create value out of it will not survive. How can companies leverage data - sometimes described as the “new gold” - for consumer insights, improved processes or new product ideas? Can data assets be leveraged effectively for the overall business?
Our own experience tells us, that some people are more influential then others. A good run CRM system should therefore identify those “Opinion Leader”, “task makers” or “influencer” to treat them differently. But do they even exist? Lutz Finger (@LutzFinger) will look at anecdotal evidence as well as research to clarify how to measure influence. The findings:
# Influencers are often not wide-spreading… they are local.
# There not only a few dominating the rest… it is more network and peer pressure which influences.
# Influencers are often overestimated… 50% is homophily.
# Influence very much depends on the topic.
Rather than to look for influencers look for Broadcaster. However be aware that broadcaster only create awareness and not necessarily intention.
The video from the presentation: http://youtu.be/HgCNwUytjZI
This document outlines an agenda for a presentation on extracting business value from big data. The agenda covers topics such as asking the right questions, understanding that data alone is useless without action, decision trees, pitfalls with data like overfitting, and privacy and ethics. It provides examples of using data from companies like LinkedIn and discusses challenges that the media industry faces in leveraging customer data.
Bigit Keynote - Big Data & Critical ThinkingLutz Finger
BIGIT Technology Malaysia 2016, the Anchor Event of the Big Data Week Asia featuring concurrent conferences themed Data Security World Show and the 4th Big Data World Show will be held on 19th-20th September 2016 at KLCC Convention Centre, Malaysia.
As the leading Big Data World Show in Asia, BIGIT Technology Malaysia 2016 is co-organized with Malaysia Digital Economy Corporation (MDEC) - Malaysia's government agency leading the national Big Data Analytics initiative.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
The document discusses the shortage of data analytics skills and talent in the United States by 2018. It is estimated that there will be a shortage of 140,000 to 190,000 people with deep analytical skills, as well as 1.5 million managers and analysts able to use big data analysis to make effective decisions. The document provides tips on how to be data-driven, including asking the right questions, measuring the right data, taking action and learning from results. It emphasizes that data alone is useless - it is action based on information that counts.
The media industry is well positioned. They could have "better" data (in the meaning of better for placing advertisements) than many social networks. However they need to embrace data and become a data driven organization.
Lutz Finger analyzes in his talk (video: http://youtu.be/mzWBXUc1QWo) the two main worries the media industry has today: Reach / Expertise - in both areas they are faced with competition from new social media channels.
He shows that BigData and Analytics is the only way out of the issue. Media companies could become the leader in Media Data and in Media Analytics.
Social Data can give an even better and in-depth view on your customers. However please mind that it is not about 'more data'. It is about the 'right data' put to work.
A) Start wit the question
B) Combine Structured and Unstructured Data
C) Apply continuous machine learning
The document discusses the future of social CRM and the social CRM market landscape. It explores two main topics: 1) the integration landscape and key players in the social CRM market and 2) whether there will be dominance by large companies in the future of social CRM. A list of 24 winners of the CRM Watchlist 2012 is also presented, including major players like Salesforce, Microsoft, Oracle, and SAP.
Making sense of your data doesn't require mountains of data; it requires a systematic approach that leads to actionable insights. But how to get there? This keynote (given at "Predictive Analytics and Business Insights") shows how to extract significant business value from big data with Ask-Measure-Learn, a system that helps you ask the right questions, measure the right data, and then learn from the results. Using this system can help you learn to:
* Focus on business-related questions
* Find measures that have high causation, a low error rate and a low cost
* Create actionable insights by starting with predictions, benchmarks or recommendations
The business world is increasingly adopting the Moneyball principle of using data to predict and gain a competitive advantage in healthcare, telecommunications, retail, media, energy, and many other industries. Some argue that organizations that do not possess strong data and the skills to create value out of it will not survive. How can companies leverage data - sometimes described as the “new gold” - for consumer insights, improved processes or new product ideas? Can data assets be leveraged effectively for the overall business?
Our own experience tells us, that some people are more influential then others. A good run CRM system should therefore identify those “Opinion Leader”, “task makers” or “influencer” to treat them differently. But do they even exist? Lutz Finger (@LutzFinger) will look at anecdotal evidence as well as research to clarify how to measure influence. The findings:
# Influencers are often not wide-spreading… they are local.
# There not only a few dominating the rest… it is more network and peer pressure which influences.
# Influencers are often overestimated… 50% is homophily.
# Influence very much depends on the topic.
Rather than to look for influencers look for Broadcaster. However be aware that broadcaster only create awareness and not necessarily intention.
The video from the presentation: http://youtu.be/HgCNwUytjZI
This document outlines an agenda for a presentation on extracting business value from big data. The agenda covers topics such as asking the right questions, understanding that data alone is useless without action, decision trees, pitfalls with data like overfitting, and privacy and ethics. It provides examples of using data from companies like LinkedIn and discusses challenges that the media industry faces in leveraging customer data.
Bigit Keynote - Big Data & Critical ThinkingLutz Finger
BIGIT Technology Malaysia 2016, the Anchor Event of the Big Data Week Asia featuring concurrent conferences themed Data Security World Show and the 4th Big Data World Show will be held on 19th-20th September 2016 at KLCC Convention Centre, Malaysia.
As the leading Big Data World Show in Asia, BIGIT Technology Malaysia 2016 is co-organized with Malaysia Digital Economy Corporation (MDEC) - Malaysia's government agency leading the national Big Data Analytics initiative.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
INSEAD MBA class Social Media
1. INSEAD
MBA
D12
28th
May
2012
Facebook
N
Online
News
Blog
Twi3er
Video
Measure
Social
Media
TV
Print
By
Lutz
Finger
Images
Forum
We
make
sense
out
of
media
2. Lutz
Finger
─
Quantum
Physicist
─
Journalist
─
Incubator
for
new
Media
─
MBA
04J
─
Sales
Manager
@
Dell
─
MBA
as
Partner
09D
Session
Goals:
● What
is
the
most
important
THING
in
measurements?
● What
are
the
piValls
in
Data
Mining
Social
Media?
4. on
average
300
words
per
answer
600
500
Are
those
Number
of
Words
400
300
charts
200
HELPFUL?
100
0
22.5.12
0:00
23.5.12
0:00
24.5.12
0:00
25.5.12
0:00
26.5.12
0:00
27.5.12
0:00
Day
#
of
Emails
by
the
hour
of
the
day
Data
is
only
then
4
helpful
if
it
results
Email
ReacFons
3
in
an
acFon.
2
1
Otherwise
it
is
just
0
noise.
1
2
5
10
11
12
13
14
16
17
18
22
Hours
4
5. Will
there
be
a
ROI?
no
yes
depends
Yes:
44%
20%
36%
No:
36%
depends:
20%
44%
Note:
• 26
answers
out
of
49
par_cipants
=
51%
par_cipa_on
• “I
hope”
or
“some_mes
it
surely
will”
=
“no”
5
6. Some
arguments
● a
very
subjec_ve
thing
to
measure
(Souhail
Khoury)
● can't
be
a
true
ROI
for
social
Media
which
is
you
cannot
model
the
human
brain
…
metrics
in
adver_sing
…
are
limited
-‐
(EPSTEIN
Jonathan)
● Social
Media
ROI
a
bit
a
false
discussion.
Has
anyone
ever
been
able
to
properly
measure
the
return
on
offline
adver_sement
(DE
JONCK
Jonathan)
● In
general,
no
ROI
would
mean
social
media
will
only
get
investment
from
hobbyists
and
enthusiasts.
(BAJWA
Fawad)
● [Facebook]
…
banking
on
the
fact
that
they
can
turn
their
800+
million
subscriber
base
into
revenue
(BHATT
Chinmay)
● Social
media
is
more
of
a
tool,
and
its
ROI
would
depend
on
the
tool's
applica_on.
(PAVLOVA
Natalia)
● It
only
makes
sense
to
measure
what
you
can
achieve
(Willemijn
Stoffels)
● In
some
cases,
the
results
are
tangible
...
In
other
cases
intangible
(NANRA
Gagan)
6
9. …
thus
it
depends
on
the
applicaFon
Whether
there
is
an
ROI
depends
on
what
one
does
with
Social
Media.
There
are
many
applica_on
of
social
media,
which
have
indirect
effects
and
where
it
is
not
possible
to
link
it
to
an
ROI’s.
For
those
it
is
important
to
know:
The
WHY
someone
uses
social
media.
REASON
why
care?
QuesFon
B)
yes
no
Please
state
at
least
4
things
one
can
measure
in
social
media.
But
36%
please
tell
me
WHY
an
64%
organiza_on
should
care
about
this
measurement.
9
11. THE
QUESTION
“42
is
not
helpful!”
-‐
“it
would
have
been
simpler
of
course
to
have
know
what
the
actual
ques=on
was.”
One
needs
to
define
the
Ques_on/Reason
BEFORE
one
starts
to
Measure.
● ACTIONABLE
–
be
able
to
have
an
ac_on.
● MESURABLE
–
be
able
to
actual
measure
it.
11
12. …
will
there
be
ONE
quesFon?
Sales
&
Social
CRM
Adver_sing
&
Social
Biz
commerce
Intelligence
Social
Cus
Product
Care
Research
…
several
PR
&
Risk
Control
per
department
12
13. Example:
MarkeFng
/
Sales:
Purchase
/
Awareness
Service
Feedback
Reten_on
Use
Increase
Adver_sement
Improve
Customer
Care
Grow
Customer
Life_me
Efficiency
and
Usability
Value
•
Find
most
effec_ve
•
Reputa_on
•
Reten_on
Messaging
Management
•
Iden_fy
most
valued
•
Find
Brand
•
Create
WOW
Factor
experience
Ambassadors
•
Find
dissa_sfied
Clients
•
Spread
the
word
•
Control
Brand
Image
Also
possible:
HR,
Product
Development,
Security...
13
14. Example:
Customer
Care
WHAT
do
you
want
to
do?
Deflect as many calls online
to
WHOM?
Any low profile user
with
WHAT?
Answers by other super-users
through
WHICH
media
type?
Stack-Overflow
Till
WHEN?
6 month ramp-up
Measurement
of
Success
is
defined
by:
Name
of
Metric
Value
Measured
by
# of questions asked
Stack-Overflow
# of questions answered
1 000
Stack-Overflow
# of Super-users
internal
14
15. Social
Customer
Care:
Example
of
ROI
AssumpFons
● A
call
to
a
call
center
costs
25
Euro
● 40%
of
people
who
get
an
answer
to
a
ques_on
online
from
a
super-‐user,
will
not
call
in.
● 65%
of
all
ques_ons
posted
will
be
answered
by
super-‐user
● 1000
ques_ons
posted
each
year
NOTE:
No
tool
does
offer
you
those
measurements.
Savings
from
DIRECT
DEFLECTIONS
(1000
x
65%)*40%*15
Euro
=
6500
Good
measurement
are
specific
for
each
company
/
department
using
internal
data.
15
17. Metric
Votes
Structured
Data:
Engagement
14
Sen_ment
13
Measure
Visitors/Fans/Follower
11
Volume
9
Influencer
6
Velocity
6
Conversion
4
Reach
3
relevance
3
new
customer
2
Awareness
1
Channels
1
CusCare
issues
1
Frequency
of
Posts
1
Geography
1
Live
Time
Value
1
Most
Popular
Post
1
New
Ideas
1
Site
relevance
1
17
19. Reach
View
Great
Dane
Gaddafi
Slippers
Reach
is
the
tradi_onal
way
of
measuring.
20. New
Measurements:
ReacFons
No
?
Name
No
Name
Gaddafi
Social
Sharing
clicks
(est)
FB
Comments
Monster
Slipper
FB
Likes
FB
Shares
Twi3er
Shares
Blind
Dane
Buzz
Shares
0
20000
40000
60000
80000
100000
120000
Social
Media
Impact
(SMI)
21. Warning…
Measurements
● Any
Measurement
–
if
successful
–
will
be
lead
to
gaming.
Examples:
Klout,
google
rank,
etc
● Any
Measurement
is
most
of
the
_mes
an
index
and
not
the
truth.
● Measurements
can
not
be
easily
compared.
21
22. Metric
Votes
Engagement
14
Measure
Sen_ment
13
Visitors/Fans/Follower
11
Volume
9
Influencer
6
Velocity
6
Conversion
4
Reach
3
relevance
3
new
customer
2
Awareness
1
Channels
1
CusCare
issues
1
Frequency
of
Posts
1
Geography
1
Live
Time
Value
1
Most
Popular
Post
1
New
Ideas
1
Site
relevance
1
22
23. Follower
Count
might
mislead
you.
Which
of
those
two
is
more
important?
It
depends
on:
• Who
you
want
to
reach?
• What
you
want
to
say?
• The
average
community
reac_on.
24. …
there
are
tools
to
measure
this
as
of
Mai
2012
Company
Metric
Name
Value
Twi3er
Followers
1,556,602
Twinangulate
Combined
Reach
120,310,807
Klout
True
Reach
56,000
Twi3er
Grader
Rank
2,987
out
of
10,997,926
How
Sociable
Magnitude
4,4
out
of
10
Fisheye
Analy_cs
Influence
High
Peer
Index
Audience
94
Twitanalyzer
Effec_ve
Reach
1,630,000
Twitanalyzer
Poten_al
Reach
3,060,000
24
25. …
thus
do
not
compare
easily
There
are
100+
social
media
plaVorms
out
there
For
each
Media
Type
there
are
10+
things
one
can
measure.
For
each
Measurement
there
are
10+
companies
measuring
it.
10.000+
METRICS…
all
different
…
not
easy
to
compare
25
26. Metric
Votes
Engagement
14
Measure
Sen_ment
13
Visitors/Fans/Follower
11
Volume
9
Influencer
6
Velocity
6
Conversion
4
Reach
3
relevance
3
new
customer
2
Awareness
1
Channels
1
CusCare
issues
1
Frequency
of
Posts
1
Geography
1
Live
Time
Value
1
Most
Popular
Post
1
New
Ideas
1
Site
relevance
1
26
28. Telefonica
–
is
this
bad?
C.
Alierta:
“It
is
evident
that
internet
search
engines
use
our
networks
without
paying
us
anything,
which
is
good
for
them
and
a
disgrace
for
us”
“hypocrisy”
Alierta
is
“Alierta
contra
google”
“greedy”
Context
is
key!
…
Blogs
…
Tweets
…
Facebook
…
25.000
views
on
the
28
video.
29. Summary
1)
One
needs
to
define
the
Ques_on
BEFORE
one
starts
to
Measure
● ACTIONABLE
–
be
able
to
have
an
ac_on.
● MEASURABLE
–
be
able
to
actual
measure
it.
2)
Good
measurement
are
specific
for
each
company
/
department
–
combining
as
well
internal
data.
3)
Social
Media
is
not
Social
Media.
Each
tool
comes
with
a
specific
set
of
Measurements
and
Measurement
Companies.
Comparing
is
not
easy.
4)
Sen_ment
is
the
worst
measurement
–
context
is
key
for
it.
29
30. Thanks…
Over
to
you
now…
please
measure
me!
30