We looked at the data. Here’s a breakdown of some key statistics about the nation’s incoming presidents’ addresses, how long they spoke, how well, and more.
The ppt is basically about techniques in public speaking which will help students overcome their stage fright as they apply these strategies when speaking in a large audience. Speaking in public is never easy however this become possible if one applies all the techniques.
We looked at the data. Here’s a breakdown of some key statistics about the nation’s incoming presidents’ addresses, how long they spoke, how well, and more.
The ppt is basically about techniques in public speaking which will help students overcome their stage fright as they apply these strategies when speaking in a large audience. Speaking in public is never easy however this become possible if one applies all the techniques.
The act of speech can be performed by understanding the language, such as refusing someone or requesting for something. In many cultures and regions, the refusing strategies are different. According to Austin (1962) cited in (Al-Kahtani, 2005), “speech act is defined as functional element of any interaction or communication”.
Presentation done by Jon Wright at the CLIL-Workshop in Catalonia 2011, at the Department of Education (Departament d'Ensenyament, Generalitat de catalunya,Barcelona 2011). organized by the Servei de Llengües estrangeres.
It is a tremendous challenge to deliver quality emergency services education. The hurdles that have to be overcome by program directors and individual educators to meet objectives and help students achieve competencies can be discouraging at best. That's why we have to stick together. Here is a treasure-trove of top-tips for educators.
The design of a standards-based classroom is rooted in best practices; however, many Chinese teachers feel very attached to their textbooks and struggle with how to incorporate standards-based activities into their classrooms. Participants will discuss the most important elements of a standards-based classroom and will practice meaningful exercises that can be replicated in their own teaching. Presenters will describe their aims for student proficiency and demonstrate the critical components of a 21st-century classroom. Participants will explore innovative strategies for moving students to the next proficiency level as per ACTFL guidelines.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
More Related Content
Similar to Insights from Conducting Research in China
The act of speech can be performed by understanding the language, such as refusing someone or requesting for something. In many cultures and regions, the refusing strategies are different. According to Austin (1962) cited in (Al-Kahtani, 2005), “speech act is defined as functional element of any interaction or communication”.
Presentation done by Jon Wright at the CLIL-Workshop in Catalonia 2011, at the Department of Education (Departament d'Ensenyament, Generalitat de catalunya,Barcelona 2011). organized by the Servei de Llengües estrangeres.
It is a tremendous challenge to deliver quality emergency services education. The hurdles that have to be overcome by program directors and individual educators to meet objectives and help students achieve competencies can be discouraging at best. That's why we have to stick together. Here is a treasure-trove of top-tips for educators.
The design of a standards-based classroom is rooted in best practices; however, many Chinese teachers feel very attached to their textbooks and struggle with how to incorporate standards-based activities into their classrooms. Participants will discuss the most important elements of a standards-based classroom and will practice meaningful exercises that can be replicated in their own teaching. Presenters will describe their aims for student proficiency and demonstrate the critical components of a 21st-century classroom. Participants will explore innovative strategies for moving students to the next proficiency level as per ACTFL guidelines.
Similar to Insights from Conducting Research in China (20)
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Insights from Conducting Research in China
1. Insights from Conducting Research in China Tips and Lessons Learned for UX Researchers Christy Harper @Christyy41
2. 2 In today’s global economy, researchers must develop the capability to conduct and coordinate research in diverse cultural environments. As globalization of technology expands, research in emerging markets becomes critical to success. Objective: This presentation discusses some of the practical difficulties that cross-cultural researchers experience and provides lessons learned from multiple research activities in China.
3. Agenda Overview of Research Lessons learned for Preparation and Recruiting Tips for Conducting Research Challenges with Analysis Conclusion Questions 3
5. Preparation and Recruiting Decide if you are going to hire translators or use someone who speaks English and has human factors or other research experience. 5
6. Preparation and Recruiting Be prepared to conduct some training in the art of asking leading vs. non leading questions Give examples Practice Education vs. English skills 6
7. Preparation and Recruiting If you are doing field work be prepared to have at least 2 translator/researchers 7
10. Tips for Conducting Research Set the expectations We were very clear with people that each session would be attended by 2 Chinese and 2 or 3 Westerners or foreigners That pictures and recordings would be taken of them and their environment That all family members were expected to participate 10
11. Tips for Conducting Research Know what to expect Observe the local customs Be prepared for weather 11
12. Tips for Conducting Research Realize that this is a social visit so allow time Prepare to meet friends and neighbors Get ready to practice English with them 12
13. Tips for Conducting Research Notice your environment Note what is shown and not shown to the interviewers What is used and what is dusty or sitting on a shelf 13
14. Tips for Conducting Research Understand the concept of saving face But be prepared to push back when it is necessary 14
15. Challenges with Analysis Decide if you will want to have all of the sessions translated and transcribed Debriefing immediately is key 15
16. Challenges with Analysis During debriefing ask a lot of questions of the interviewers. Make sure you are on the same page Take notes of key learnings and emerging themes throughout the process 16
I have been involved in multiple research activities in China, including ethnographic research in homes, schools and businesses. For my initial effort, we examined the home technology use and needs of single adults, married couples and families. Additionally, we studied stores and outlets to understand the purchase process. We also visited parks, restaurants and other local venues to better understand the culture. In another effort, our team conducted contextual inquiries in schools with teachers, parents, students, and school administrators. This activity was followed up with home visits of some student families and continued in other countries. Through these activities and collaborating with colleagues who were conducting similar research, lessons were learned and each research project became easier to conduct.
It may seem easier and more cost effective to hire translators but remember that translation is not an exact word for word substitution but an effort at recreating what you say and your intent into a similar sentence. Since ethnography and contextual inquiry are both art and science, we believe it is better to have someone who has some training and knowledge of human factors or other relevant discipline, which leads me to my next point.
We have found that regardless of training this is critically important when working from English to Chinese. We gave examples of leading vs. non leading questions, had one interviewer translate both while the other picked the correct one, this allowed them to discuss and refine the subtleties involved. While we found some knowledge and expertise of HF to be quite helpful, ultimately English skills were the most important. For example the difference between a Bachelors, Masters or PhD was less important than the level of English skill.
One option is to have one interview and one translate verbatim, or have one take notes while one conducts the interview and you simply observe. We have found a mix to be helpful. One researcher interviewed and took notes while the other also took notes and provided sporadic translation. Springing for two interviewers is also handy if you have several Western researchers on board. The taxis were only able to accommodate 3 people, so you will need one native Chinese speaker in each cab.
This has been particularly challenging. Again there are always problems with translations, once your screener is translated have someone else who speaks Chinese review it and read it back to you. It is also challenging to keep a consistent message that you do not want to be identified as the study sponsor, if this is the case. The best thing to do is to write it into the screener script, “This research is being conducted by a research company, we are not allowed to tell you the name of this company because then you would not be allowed to participate.” Recruit from large cities and the neighborhoods around the city center, we used Shanghai and BeijingRealize that you will be skewed toward a generally younger population than in the US
If possible, do some research, talk to other people from China or other researchers. Find out what to do so that you don’t offend people and find out what to expect that may be different for you. For example when we were outside of the city people would stop and openly stare at us; this is disconcerting for a Westerner but is not considered to be rude by the Chinese. Learn a few basic phrases, such as hello (ni hao) and thank-you (bu ke qi)There are few Western bathrooms and most do not provide paper so be prepared.
No Surprises! Recording is something they may not see as a positive experience so make sure they understand that it is part of the requirements. Do not surprise them with Westerners, they will want to prep for your visit. Be specific when asking each family member how they use technology, ask how they do something, sometimes they are not actually doing it themselves. (this happens in the US as well)
This goes back to a previous point about understanding the culture, in most homes we were expected to remove our shoes and they provided slippers or shoe covers for us to wear. Well for one large researcher, the shoe covers and slippers generally didn’t fit so we had to purchase a pair that would work, easily managed but greatly appreciated by our participants.Some homes/schools will not have heat or air conditioningIf you are visiting Shanghai in August or Beijing in winter, be prepared to dress not just for a quick walk from the cab but as you would if you would be remaining outside for a long period of time
People will dress up for your visit, offer you drinks and snacks and you should be prepared to accept their hospitality, even when they serve you warm sodas or hot water be gracious. Remember this too when eating/drinking before a session. Food and sharing are a big part of the culture, so you don’t want to offend them by not partaking. This is also a big deal; to have foreigners in their home, so don’t be surprised at the neighbors dropping by, grandma visiting, being put on webcam etc. Few people have the experience of speaking with a native English speaker, especially outside of the main city areas. This is truly a once in a lifetime opportunity for them, so be prepared to let them practice with you and ask questions about your lifestyle
This is a basic observational skill but it is particularly important in this type of research. Since you cannot understand the language you will have an inordinate amount of time to observe your surroundings, so take advantage of that.We also had foot massages, went to tea houses, immersed ourselves by visiting stores, parks, restaurants, tourist places etc. It is good to try to get a feel for the people that you are working with.
This is where cultural training can come in handy. There are many nuances to saving face and I have been told that there is no way to easily explain it to someone that is not Chinese. One participant asked that he not be videotaped. This condition was supposed to have been made clear in advance but the person had very bad acne, so we decided to film his surroundings and his products and then record his voice.On the other hand, we once recruited a family but the daughter decided not to talk to us and went to her grandmothers to watch her TV show. We asked a few times and they said no so we left gracefully. Later the recruiter informed them that they would be paid as a couple instead of as a family, so they invited us back to interview the daughter. When we arrived the second time we apologized for the mix up and thanked them for seeing us again. This put a potentially awkward situation at ease.Basically be considerate and make sure to not embarrass anyone
We have discovered that this is a very expensive and often unnecessary process. If you take the time to debrief completely following each participant and then spend some time discussing the activities with the interviewers, this expense can be avoided. After each session we scheduled an hour or so of downtime to review the interview while it was still fresh in both interviewers’ minds. This is also an excellent time to take advantage of their world renowned foot massages. Seriously, it is extremely important to review, given the language barrier. Keep this in mind when scheduling sessions. Never schedule back to back, in the field you will need debrief time and travel time, in the lab you should schedule a shorter debrief period but still review each session between participants, if you don’t want the added expense of transcription and translation.
We once spent a good deal of time discussing a family. Since the interviewer was saying “he” we wrote notes about the father, we asked questions that seemed to confuse our interviewer. After we had moved on to discussing what we thought was the mother, we finally realized that our interviewer had been discussing the mother, not the father all along. In Chinese there is no gender differentiation so the use of he/she is often confused. Even though the interviewers have notes, record the key learnings from each session. If you think there is an emerging theme, jot it down. Since you will not be reviewing each session make sure you have a good synopsis before you move on to the next event.
Though I mentioned that this is an expensive process it is not too expensive if you only do a few sessions. This really pays off for future activities. It is an excellent way to review interviewing techniques and give pointers to the interviewers for future activities. It is also a good way to spot check and make sure that your interviewers were not too leading throughout the sessions.