Presentation given an EduERP at the University of Lagos in February 2013. Objective was to educate university CIOs on what to look for in software used for student management.
Creating Content with Brand Consistency
Content Organization
Content Calendars
Social Media Scheduling
Blog Orgainzation
Categories
Permalinks
Content for Passive Income
E-books
E-courses
Presentation given an EduERP at the University of Lagos in February 2013. Objective was to educate university CIOs on what to look for in software used for student management.
Creating Content with Brand Consistency
Content Organization
Content Calendars
Social Media Scheduling
Blog Orgainzation
Categories
Permalinks
Content for Passive Income
E-books
E-courses
Most of the world still lags behind #IPv6 deployment and it isn't for lack of technical ability to do so. This presentation proposes that the problem is business and proposes a framework that any company can follow to guarantee a successful IPv6 deployment
12 Reasons Users Prefer Outlook Over GmailWhy Microsoft
More and more customers and partners are realizing that they love Outlook. These organizations listened to their employees and decided that Office 365 was the right choice to keep their businesses productive. There are a number of capabilities that they call out as missing in Gmail. Here are a few reasons that come up consistently with users who prefer using Outlook over Gmail.
Presentation on how to manage the email overload many of us face today as educators. Strategies are described that help email users make the most of the communication tool.
How many hours every week does your inbox gobble up? How many hours every day?
Enough is enough. Take control of your inbox and add hours of free time back in your day. We'll show you how.
Check out our exclusive presentation deck on how to reach Inbox Zero!
It seems these days that being able to write a professional, business-like email is a crucial skill. Here are some writing tips on how to compose emails people reply to and how to get what you want. The email subject line will help you get through, but the body of your message also matters. And it matters a great deal. Here are few writing tips that will make your emails desirable, short & sweet.
Time management: Taking Control of your email inboxJosue Sierra
Learn about the cost and negative impact of poor email management and an out-of-control inbox. Also, learn the action-based approach to achieve a "zero inbox" with your email. Increase your productivity by learning to be a better email sender and a better manager of your email inbox.
You can follow me @jmsierra on Twitter or go to www.josuesierra.net.
This is a presentation to accompany a blog post I wrote on how to think and use email more effectively as a professional.
https://www.linkedin.com/pulse/20140906155710-22963483-how-to-love-your-email-again?trk=mp-reader-card
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing.
GDPR and EA - Commissioning a web site Part 4. The nature of the webAllen Woods
Fourth of eight decks written to provide overview guidance of the way the web works for small to medium sized enterprises. It takes a quasi OSI 7 layer analogy to explain, from chips to the net itself how connectivity is established
Superfast Business - The future of business presentationSuperfast Business
Superfast Business - offers fully funded support to help ambitious businesses in the South West with a focus on rural areas identify, maximise and profit from the opportunities that superfast broadband and new technologies present. They have a team of expert advisers, a programme of events on hot topics offering inspirational insights and practical solutions and access to IT specialists and knowledge.
The service is aimed at businesses who have heard superfast broadband is coming to their area or are already experiencing good connection speeds and fulfill ERDF eligibility criteria.
Register on their website today to see if your business is able to access the full support package and keep up to date with the latest technologies and information.
w: www.superfastbusiness.co.uk
e: info@superfastbusiness.co.uk
t: 0845 603 8593
How to be a Network Engineer in a Programmable AgeHank Preston
'Software Defined Network', 'Infrastructure as Code', 'Cloud', and 'Programmability' are trends that have already changed the nature of being a Network Engineer. That's yesterday's news... today we have 'NetDevOps', 'Network Reliability Engineering (NRE)', and whatever comes tomorrow. In this session we will explore the evolution of networking, the network engineer, and network operations. We'll look back fondly on the early days of networking, when it was simple. The biggest concerns we had were the number of Spanning-Tree instances to run and which side of the OSPF vs EIGRP debate we were on that day. We'll consider the impact Cloud, Open Source, DevOps, Python, and we can't forget 'SD-Everything' that the Network Renaissance has brought us. We'll dive into the challenges and opportunities that NetDevOps offers as we adopt the culture, technical methods, strategies, and best practices from DevOps.
You'll laugh, you'll groan, you might even get angry, but that's okay. Come join the evolution of the Network Engineer with open eyes and learn how to jumpstart your own transformation - Become the NetDevOps Engineer!
As every thing becomes connected, leaders are using the Internet of Things and Artificial Intelligence on Cloud to reinvent how they operate and create value. Join us to learn how companies are using IoT insights for operational excellence, product and service design, and sustainable differentiation.
8th of 8 slide decks aimed at helping small to medium enterprises illustrating some of the issues to be considered when commissioning a web site for the first time. Final, summary slide deck. This deck also contains links to other, hopefully useful links on information management architectures that we hope people will find useful
The industry move towards wearables is all the rage and taking advantage of these new devices doesn’t have to mean learning a whole new platform. For example the Microsoft Band is a multi-function wearable device that works with your smart phone to help you track heart rate, steps, calorie burn, sleep quality and be productive with email and calendar alerts and more. While you can quickly and easily build an app for the Band in just a few minutes how can you be sure the back end is up to the scale you’d need to support potential massive growth if it were to take off? Enter the cloud and tools available that we can use to load test and explore the performance characteristics of the solution. In this session we’ll take a look at what’s possible and walk thru the scenario to see first hand how it is done.
Most of the world still lags behind #IPv6 deployment and it isn't for lack of technical ability to do so. This presentation proposes that the problem is business and proposes a framework that any company can follow to guarantee a successful IPv6 deployment
12 Reasons Users Prefer Outlook Over GmailWhy Microsoft
More and more customers and partners are realizing that they love Outlook. These organizations listened to their employees and decided that Office 365 was the right choice to keep their businesses productive. There are a number of capabilities that they call out as missing in Gmail. Here are a few reasons that come up consistently with users who prefer using Outlook over Gmail.
Presentation on how to manage the email overload many of us face today as educators. Strategies are described that help email users make the most of the communication tool.
How many hours every week does your inbox gobble up? How many hours every day?
Enough is enough. Take control of your inbox and add hours of free time back in your day. We'll show you how.
Check out our exclusive presentation deck on how to reach Inbox Zero!
It seems these days that being able to write a professional, business-like email is a crucial skill. Here are some writing tips on how to compose emails people reply to and how to get what you want. The email subject line will help you get through, but the body of your message also matters. And it matters a great deal. Here are few writing tips that will make your emails desirable, short & sweet.
Time management: Taking Control of your email inboxJosue Sierra
Learn about the cost and negative impact of poor email management and an out-of-control inbox. Also, learn the action-based approach to achieve a "zero inbox" with your email. Increase your productivity by learning to be a better email sender and a better manager of your email inbox.
You can follow me @jmsierra on Twitter or go to www.josuesierra.net.
This is a presentation to accompany a blog post I wrote on how to think and use email more effectively as a professional.
https://www.linkedin.com/pulse/20140906155710-22963483-how-to-love-your-email-again?trk=mp-reader-card
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing.
GDPR and EA - Commissioning a web site Part 4. The nature of the webAllen Woods
Fourth of eight decks written to provide overview guidance of the way the web works for small to medium sized enterprises. It takes a quasi OSI 7 layer analogy to explain, from chips to the net itself how connectivity is established
Superfast Business - The future of business presentationSuperfast Business
Superfast Business - offers fully funded support to help ambitious businesses in the South West with a focus on rural areas identify, maximise and profit from the opportunities that superfast broadband and new technologies present. They have a team of expert advisers, a programme of events on hot topics offering inspirational insights and practical solutions and access to IT specialists and knowledge.
The service is aimed at businesses who have heard superfast broadband is coming to their area or are already experiencing good connection speeds and fulfill ERDF eligibility criteria.
Register on their website today to see if your business is able to access the full support package and keep up to date with the latest technologies and information.
w: www.superfastbusiness.co.uk
e: info@superfastbusiness.co.uk
t: 0845 603 8593
How to be a Network Engineer in a Programmable AgeHank Preston
'Software Defined Network', 'Infrastructure as Code', 'Cloud', and 'Programmability' are trends that have already changed the nature of being a Network Engineer. That's yesterday's news... today we have 'NetDevOps', 'Network Reliability Engineering (NRE)', and whatever comes tomorrow. In this session we will explore the evolution of networking, the network engineer, and network operations. We'll look back fondly on the early days of networking, when it was simple. The biggest concerns we had were the number of Spanning-Tree instances to run and which side of the OSPF vs EIGRP debate we were on that day. We'll consider the impact Cloud, Open Source, DevOps, Python, and we can't forget 'SD-Everything' that the Network Renaissance has brought us. We'll dive into the challenges and opportunities that NetDevOps offers as we adopt the culture, technical methods, strategies, and best practices from DevOps.
You'll laugh, you'll groan, you might even get angry, but that's okay. Come join the evolution of the Network Engineer with open eyes and learn how to jumpstart your own transformation - Become the NetDevOps Engineer!
As every thing becomes connected, leaders are using the Internet of Things and Artificial Intelligence on Cloud to reinvent how they operate and create value. Join us to learn how companies are using IoT insights for operational excellence, product and service design, and sustainable differentiation.
8th of 8 slide decks aimed at helping small to medium enterprises illustrating some of the issues to be considered when commissioning a web site for the first time. Final, summary slide deck. This deck also contains links to other, hopefully useful links on information management architectures that we hope people will find useful
The industry move towards wearables is all the rage and taking advantage of these new devices doesn’t have to mean learning a whole new platform. For example the Microsoft Band is a multi-function wearable device that works with your smart phone to help you track heart rate, steps, calorie burn, sleep quality and be productive with email and calendar alerts and more. While you can quickly and easily build an app for the Band in just a few minutes how can you be sure the back end is up to the scale you’d need to support potential massive growth if it were to take off? Enter the cloud and tools available that we can use to load test and explore the performance characteristics of the solution. In this session we’ll take a look at what’s possible and walk thru the scenario to see first hand how it is done.
These were prepared to teach the module "Emerging Technologies" for the 3rd year Undergraduates of the Asia Pacific Institue of Information Technology, Colombo-2, Sri Lanka (Remotely)
ITCamp 2019 - Andy Cross - Machine Learning with ML.NET and Azure Data LakeITCamp
ML.NET is an open source, machine learning framework built in .NET and runs on Windows, Linux and macOS. It allows developers to integrate custom machine learning into their applications without any prior expertise in developing or tuning machine learning models. Enhance your .NET apps with sentiment analysis, price prediction, fraud detection and more using custom models built with ML.NET
In this Session, Andy will show not only the core of ML.NET but best practices around Azure Data Lake and data in general when using .NET
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp
Not sure what Cloud DevOps means, or what a DevOps team should focus on? In this presentation you will understand how Governance of IT resources in the Cloud is different than on premises. We will discuss aspects like: resources security, cost monitoring and control, performance optimization and scalability improvements, policies and compliance - all with examples on Microsoft Azure.
The Implementing AI: Running AI at the Edge, hosted by KTN and eFutures, is the second event of the Implementing AI webinar series.
To make products more intelligent, more responsive and to reduce the data generated, it is advantageous to run AI on the product itself, as opposed to in the cloud.
The focus of this webinar was the opportunities and challenges of moving the AI processing to “the Edge”. The webinar had four presentations from experts covering overviews of the opportunity, implementation techniques and case studies.
Find out more: https://ktn-uk.co.uk/news/just-launched-implementing-ai-webinar-series
Cloud has proved to be one of the most transformative technologies of the modern age, it has signalled a fundamental shift from large on-site IT estates to Cloud based solutions which deliver greater agility, elasticity and predictability. Cloud has also served as an important enabler of many of the core emerging technology trends, particularly: Big Data, IoT and the shift to Mobile.
For many businesses this shift has given rise to a profound cultural revolution within the organisation and a core change in the nature of IT as a discipline. In this regard, IT has evolved from a background technical role and become much more central, business-focussed and service orientated.
At a market level, Cloud has also enabled the facilitation of rapid development and scalability of high growth businesses. Many start-ups simply would not have been able to grow at the same pace if it had not been for Cloud technology. The elasticity of the Cloud has served as a springboard to rapid testing, and the fail-fast culture, which have proved to be a crucial element of recent market disruptions.
Whilst Cloud technology has brought a lot of valuable attributes to the table, Cloud services come with an array of contractual complications and distinctions. IT leaders must navigate an increasing range of options, balance the benefits of public, private and hybrid options, while still ensuring overarching culpability for their organisations data security and compliance requirements.
This conference will bring senior technologists together to discuss the business impact of Cloud, and provide a valuable forum for knowledge exchange, discussion and cross-pollination. The programme will contextualise the evolution of Cloud technology, with presentations spanning trends, research, solutions, challenges and practical use cases.
The conference is organised by DIGIT with support from ScotlandIS and will be free for IT Leaders to attend.
ITCamp 2019 - Andrea Saltarello - Implementing bots and Alexa skills using Az...ITCamp
Thanks to the recently released v4 of the Bot Framework SDK, creating your first bot is a breeze; still, implementing a production viable one is no easy task since several aspects must be taken into account such as user authentication, integration within existing apps, multi language support, technical considerations (e.g.: Azure Functions vs. MVC Core, Blob Storage vs. CosmosDB) and, last but not least, operational costs.
Moreover, you might want to reuse your bot’s Azure hosted, Cognitive Services-backed code to address Amazon’s Alexa users to avoid the need to implement (and evolve) it twice.
Eager to learn how to do that for real? Don’t miss this code-based talk then.
Computer network architecture training helps you learn principles of computer networking, internet architecture, internet protocols, wireless networks and next generation networking.
# Learn About:
The basics of Ethernet and LAN, different Ethernet speeds, spanning tree algorithm, virtual LAN (VLAN), virtual private networks (VPN) and commonly used Wi-Fi which prepares you for technical details of network architecture.
The IPv4 and IPv6, the difference between them, importance of mobile IP, headers and subnets for IPv4 and IPv6.
The OSI reference model including its seven layers which is the most important topic in network architecture. Furthermore, the main layers of OSI reference model will be described in detail. For example, network layer routing, application layers, transport layer, network layer, and data link layers are covered in this training.
# Who Can Benefit from Computer Network Architecture Training
If you are an IT professional who specializes in network security, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of the computer network architecture training and will prepare yourself for your career.
#Training Objectives
Upon completion of the computer network architecture training course, the attendees are able to:
Understand the basic ideas and philosophy behind the network architecture
Get a clear idea of important protocols in TCP/IP networks
Understand the architecture for mobility, multicast and routing
Explain the virtual private networks, resource allocation and congestion control in network architecture
Identify and analyze strengths and weaknesses of various network layers
Identify alternative solutions in network architecture
Manage small networks including different architectures
Conduct the performance measurements and traffic analysis of internet architecture
#Training Outline
The computer network architecture training course consists of the following lessons, which can be revised and tailored to the client’s need:
Introduction to Computer Networks
Internet, HTTP, DNS, P2P
Socket, Ports
Congestion Control, Flow Control, TCP
Routing, Basic Graphs, IP
DSL Versus Cable, Aloha, CSMA, TDMA, Token, 802.11
Security RSA
Cellular Networks, Mobile Networks, Satellite Networks
Wireless Multi-hop Networks
Internetwork
Layers
Data Rate, Throughput and Bandwidth
Packets
Datagram Forwarding
Topology
Routing Loops
LAN and Ethernet
DNS
IP
Firewall
IETF and OSI
Epilog
Call us today at +1-972-665-9786. Learn more about this course audience, objectives, outlines, seminars, pricing , any other information. Visit our website link below.
Visit Tonex website for more information
https://www.tonex.com/training-courses/computer-network-architecture-training/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
6. Polytechnic
Click
Research Institute
to edit Master title style
“Everyone for themselves, …
University
National Lab
… God gov’t for us all”
Mukom Akong T. | www.afrinic.net | !4
7. “Let us connect educational
institutions so they can share
and collaborate.”
8. Research
Click to edit MasterInstitute style
title
University
National Lab
Polytechnic
Mukom Akong T. | www.afrinic.net | !6
9. Research
Click to edit MasterInstitute style
title
Research & Education Network
Part of national IT infrastructure
University
National Lab
Polytechnic
Mukom Akong T. | www.afrinic.net | !6
10. Research
Click to edit MasterInstitute style
title
Research & Education Network
Part of national IT infrastructure
University
National Lab
Polytechnic
Mukom Akong T. | www.afrinic.net | !6
11. Research
Click to edit MasterInstitute style
title
Research & Education Network
Part of national IT infrastructure
University
National Lab
Polytechnic
Mukom Akong T. | www.afrinic.net | !6
12. National IT Infrastructure: the simplistic view
“Fibre alone does not a national (or educational) network make”
digging
+ fibre + Internet +
Mukom Akong T. | www.afrinic.net | !7
services
13. Click to edit Master title style
Common view of services on a network
Mukom Akong T. | www.afrinic.net | !8
14. Click to edit Master title style
healthcare.gov.cm
university.edu.cm
e-services.gov.cm
Common view of services on a network
Mukom Akong T. | www.afrinic.net | !8
15. Click to edit Master title style
healthcare.gov.cm
university.edu.cm
e-services.gov.cm
Backbone network
(government ,
research & education
etc)
Common view of services on a network
Mukom Akong T. | www.afrinic.net | !8
16. But beyond the physical links, the domain
names and making modern networks work
are … Internet Protocol (IP) resources.
17. Click to edit Master title style
I created
196.216.2.100
2001:42d0:0:406::100
machines to deal the
complex numbers
learn.afrinic.net
names are for
feeble-minded
humans
Every device on the Internet is uniquely identified by its IP address
Mukom Akong T. | www.afrinic.net | !10
18. Click to edit Master title style
ISP 1
AS 65431
University
A
AS 65434
Bank A
AS 65433
Gov!t
network
AS 65432
Every network on the Internet is uniquely identified by their
Autonomous System Number (ASN)
Mukom Akong T. | www.afrinic.net | !11
19. Ministry B
Click to edit Master title style
2001:db8:2000::/48
Ministry A
Ministry C
2001:db8:1000::/48
Gov!t network
ASN:
64500
IP Prefix: 2001:db8::/32
2001:db8:3000::/48
Having their own IP resources is good practice and lets an
organisation present, control and protect a unique Internet identity
Mukom Akong T. | www.afrinic.net |!12
20. ISP A network
ASN:
64500
IP Prefix: 2001:db8::/32
Gov!t (or HEI) network
ASN:
64500
IP Prefix: 2001:db8:d::/48
Internet
EVIL Inc network
ASN:
64500
IP Prefix: 2001:db8:a::/48
Click to edit Master title style
Without their own resources, a network depends on their ISP for both the
connection and the unique identify (IP + ASN) … along with potentially
shady neighbours.
Mukom Akong T. | www.afrinic.net |!13
21. Click to edit Master title style
Internet
ISP A
Gov!t (or HEI) network
ASN:
64500
IP Prefix: 2001:db8::/32
ISP B
Having their own IP resources helps a gov’t control their identity
(IP + ASN) and gives them connection redundancy to the Internet
Mukom Akong T. | www.afrinic.net | !14
22. We are running out of unique addresses to power the Internet
23. Click to edit Master title style
Finals state of IPv4 addresses per person by region
Mukom Akong T. | www.afrinic.net | !16
24. Click to edit Master title style
3 key ideas that will lead to a solution
Mukom Akong T. | www.afrinic.net | !17
25. Click to edit Master title style
1
IP Resource Planning
as a key component of
IT infrastructure
planning & strategy
3 key ideas that will lead to a solution
Mukom Akong T. | www.afrinic.net | !17
26. Click to edit Master title style
1
2
IP Resource Planning
as a key component of
IT infrastructure
planning & strategy
Seek IP Resource
independence from
ISPs for qualifying
networks
3 key ideas that will lead to a solution
Mukom Akong T. | www.afrinic.net | !17
27. Click to edit Master title style
1
2
3
IP Resource Planning
as a key component of
IT infrastructure
planning & strategy
Seek IP Resource
independence from
ISPs for qualifying
networks
Plan for IPv6 first (It!s
the future) while
managing IPv4 (the
present)
3 key ideas that will lead to a solution
Mukom Akong T. | www.afrinic.net | !17
28. Click to edit Master title style
•
•
•
•
•
How many devices will we connect?
How many institutions will we connect?
Do we want an end-to-end network?
How do we maintain network redundancy
For the next 1 year
Recommendation #1: Create an IP Addressing plan for the network
Mukom Akong T. | www.afrinic.net | !18
29. Click to edit Master title style
IPv4
Recommendation #2: Get IPv4 addresses you need NOW (while they last)
Mukom Akong T. | www.afrinic.net | !19
31. Click to edit Master title style
Fix global IPv4 address imbalance
Remain technologically relevant
Remove barrier to true broadband
Make cyber security easier
Prepare for the Internet of Things
Prepare for the smart home and grid
Recommendation #3: Create & implement the National IPv6 Action Plan
Mukom Akong T. | www.afrinic.net | !21
32. Click to edit Master title style
You don’t
support IPv6 in
your products, we
are not buying
from you!
Recommendation #4: Immediately update all ICT procurement to mandate IPv6
Mukom Akong T. | www.afrinic.net | !22
33. Click to edit Master title style
1 IP Resource Strategy Planning & training
2 One of the world’s best IPv6 courses
3 Testbeds & manuals for hands-on training
4 Turnkey training content & tools to share
How AFRINIC can help!
Mukom Akong T. | www.afrinic.net | !23
35. Click to edit Master title style
In a nutshell …
Mukom Akong T. | www.afrinic.net | !25
36. Click to edit Master title style
1
Research &
Educational networks
are the most effective
way for large-scale
sharing of educational
resources
In a nutshell …
Mukom Akong T. | www.afrinic.net | !25
37. Click to edit Master title style
1
2
Research &
Educational networks
are the most effective
way for large-scale
sharing of educational
resources
Good networks
require IP Resource
(address + ASN)
planning. Do yours.
In a nutshell …
Mukom Akong T. | www.afrinic.net | !25
38. Click to edit Master title style
1
2
3
Research &
Educational networks
are the most effective
way for large-scale
sharing of educational
resources
Good networks
require IP Resource
(address + ASN)
planning. Do yours.
Future-proof
educational ICTs by
mandating the
support IPv6
In a nutshell …
Mukom Akong T. | www.afrinic.net | !25