How should universities prepare information graduates for the working world?Hazel Hall
This document discusses how universities can better prepare information graduates for careers. It outlines the current state of library and information science programs in the UK, including the types of courses offered and their focuses. It also describes the curriculum structure of sample undergraduate and postgraduate programs at Napier University. The document notes challenges in attracting students and meeting employer needs. It proposes ways for industry professionals to contribute their expertise to university programs through advisory boards, module content, placements, and dissertation topics. The breakout session is intended to have participants collaboratively design a sample Masters program.
Future IT Jobs & How to Work in IT if You Are not a GeekSergey Dmitriev
Future IT jobs will be available even for those without technical backgrounds. Bioinformaticians analyze human genome data like new "hackers". IT increasingly intersects with other fields creating new opportunities where technology meets real-world problems. The document profiles Russian IT leaders from companies like Opera Software, Veeam, i-Free, Yota, and organizers of NerdCamp discussing future trends in technology.
This is a discussion about the future of jobs. What is a job? Whose job is it to create jobs? Can an economy continue to grow without creating jobs? ...
Best Computer Jobs for the Future | High Pay & Fast GrowthITCareerFinder
The document summarizes the top 10 fastest growing IT jobs from 2012 to 2020 based on growth rate, new jobs created, average salary, and training requirements. The top 3 jobs are mobile application developer, database administrator, and software engineer/developer, all expected to grow over 30% with average salaries over $80,000. The document provides details on factors driving growth for each job and sources used.
University of Lincoln, School of Computer Sciencemdoughty
The document provides information about computer science and games computing degree programs at the University of Lincoln's School of Computer Science. It summarizes the school's facilities, the types of courses offered, career prospects, and highlights a graduate who found success after studying games computing. The school aims to provide research-driven education to equip students with skills for the technology industry.
Celebrating the Release of Computing Careers and DisciplinesRandy Connolly
Talk given at CANNEXUS 2020 on the release of our Computing Careers and Disciplines booklet, which has gone on to be downloaded over 200000 times since its release.
Public Computing Intellectuals in the Age of AI CrisisRandy Connolly
This talk advocates for a conceptual archetype (the Public Computer Intellectual) as a way of practically imagining the expanded possibilities of academic practice in the computing disciplines, one that provides both self-critique and an outward-facing orientation towards the public good.
How should universities prepare information graduates for the working world?Hazel Hall
This document discusses how universities can better prepare information graduates for careers. It outlines the current state of library and information science programs in the UK, including the types of courses offered and their focuses. It also describes the curriculum structure of sample undergraduate and postgraduate programs at Napier University. The document notes challenges in attracting students and meeting employer needs. It proposes ways for industry professionals to contribute their expertise to university programs through advisory boards, module content, placements, and dissertation topics. The breakout session is intended to have participants collaboratively design a sample Masters program.
Future IT Jobs & How to Work in IT if You Are not a GeekSergey Dmitriev
Future IT jobs will be available even for those without technical backgrounds. Bioinformaticians analyze human genome data like new "hackers". IT increasingly intersects with other fields creating new opportunities where technology meets real-world problems. The document profiles Russian IT leaders from companies like Opera Software, Veeam, i-Free, Yota, and organizers of NerdCamp discussing future trends in technology.
This is a discussion about the future of jobs. What is a job? Whose job is it to create jobs? Can an economy continue to grow without creating jobs? ...
Best Computer Jobs for the Future | High Pay & Fast GrowthITCareerFinder
The document summarizes the top 10 fastest growing IT jobs from 2012 to 2020 based on growth rate, new jobs created, average salary, and training requirements. The top 3 jobs are mobile application developer, database administrator, and software engineer/developer, all expected to grow over 30% with average salaries over $80,000. The document provides details on factors driving growth for each job and sources used.
University of Lincoln, School of Computer Sciencemdoughty
The document provides information about computer science and games computing degree programs at the University of Lincoln's School of Computer Science. It summarizes the school's facilities, the types of courses offered, career prospects, and highlights a graduate who found success after studying games computing. The school aims to provide research-driven education to equip students with skills for the technology industry.
Celebrating the Release of Computing Careers and DisciplinesRandy Connolly
Talk given at CANNEXUS 2020 on the release of our Computing Careers and Disciplines booklet, which has gone on to be downloaded over 200000 times since its release.
Public Computing Intellectuals in the Age of AI CrisisRandy Connolly
This talk advocates for a conceptual archetype (the Public Computer Intellectual) as a way of practically imagining the expanded possibilities of academic practice in the computing disciplines, one that provides both self-critique and an outward-facing orientation towards the public good.
Lightning Talk given at the start of the celebration evening for the ten-year anniversary of our Bachelor of Computer Information Systems at Mount Royal University.
Facing Backwards While Stumbling Forwards: The Future of Teaching Web Develop...Randy Connolly
Talk given at SIGCSE'19. Web development continues to grow as an essential skill and knowledge area for employed computer science graduates. Yet within the ACM CS2013 curriculum recommendation and within computing education research in general, web development has been shrinking or even disappearing all together. This paper uses an informal systematic literature review methodology to answer three research questions: what approaches are being advocated in existing web development education research, what are current trends in industry practice, and how should web development be taught in light of these current trends. Results showed a significant mismatch between the type of web development typically taught in higher education settings in comparison to web development in industry practice. Consequences for the pedagogy of web development courses, computer science curriculum in general, and for computing education research are also discussed.
Mid-semester presentation for my Computers & Society course at Mount Royal University. Has some technical detail about how the internet works, web protocols, data centres, and typical security threats.
The document provides a summary of modern web development topics covered in 3 sentences or less:
Modern Web Development topics covered include the infrastructure of the internet, client-server communication models, the need for server-side programs, web architecture patterns, JavaScript's central role, front-end frameworks, cloud computing models, microservices architecture, and containers. Web development has become more complex with client-side logic, front-end frameworks, and the rise of cloud, microservices, and containers, which allow for more modular and scalable application development. Future trends discussed include progressive web apps, microservices architecture, and containers as a lightweight deployment mechanism for microservices.
Helping Prospective Students Understand the Computing DisciplinesRandy Connolly
Presentation at Cannexus 2018 in Ottawa in which we discussed the results of our three-year research project on student understandings of the computing disciplines and described the 32-page full-color booklet for advisers and prospective students.
This document discusses the process of constructing a textbook on web development. It covers planning the textbook's topics and structure, writing the content over 7 months while splitting chapters with a co-author, undergoing review processes, redrawing over 120 diagrams in a new style, and producing a second edition with additional content such as JavaScript and CSS3. Key challenges included navigating copyright issues, outsourcing production, and ensuring diversity in illustrations. The document provides insight into the lengthy efforts required to research, write, and produce a college textbook.
Talk given at University of Applied Sciences at Krems , Austria for Master Forum 2017. Provides a rich overview of contemporary web development suitable for managers and business people.
Disrupting the Discourse of the "Digital Disruption of _____"Randy Connolly
Talk given at University of Applied Sciences for Management and Communication in Vienna in January 2017. It critically interrogates the narrative of digital disruption. It will describe some of the contemporary psychological and social research about the digital lifeworld and make some broader observations about how to best think about technological change.
Every year at our new student orientation, I used to give this talk to our first year students. Instead of telling them what they should do to achieve success, we thought it would be more effective and humourous to tell them instead how best to fail your courses. This was the last version of this talk from 2017.
Red Fish Blue Fish: Reexamining Student Understanding of the Computing Discip...Randy Connolly
This 2016 presentation (for a paper) updates the findings of a multi-year study that is surveying major and non-major students’ understanding of the different computing disciplines. This study is a continuation of work first presented by Uzoka et al in 2013, which in turn was an expansion of work originally conducted by Courte and Bishop-Clark from 2009. In the current study, data was collected from 668 students from four universities from three different countries. Results show that students in general were able to correctly match computing tasks with specific disciplines, but were not as certain as the faculty about the degree of fit. Differences in accuracy between student groups were, however, discovered. Software engineering and computer science students had statistically significant lower accuracy scores than students from other computing disciplines. Consequences and recommendations for advising and career counselling are discussed.
Constructing and revising a web development textbookRandy Connolly
A Pecha Kucha for WWW2016 in Montreal. Web development is widely considered to be a difficult topic to teach successfully within post-secondary computing programs. One reason for this difficulty is the large number of shifting technologies that need to be taught along with the conceptual complexity that needs to be mastered by both student and professor. Another challenge is helping students see the scope of web development, and their role in an era where the web is a part of everyday human affairs. This presentation describes our 2014 textbook and our plans for a second edition revision (which will be published in early 2017).
Computing is Not a Rock Band: Student Understanding of the Computing DisciplinesRandy Connolly
This presentation reports the initial findings of a multi-year study that is surveying major and non-major students’ understanding of the different computing disciplines. This study is based on work originally conducted by Courte and Bishop-Clark from 2009, but which uses a broadened study instrument that provided additional forms of analysis. Data was collected from 199 students from a single institution who were computer science, information systems/information technology and non-major students taking a variety of introductory computing courses. Results show that undergraduate computing students are more likely to rate tasks as being better fits to computer disciplines than are their non-major (NM) peers. Uncertainty among respondents did play a large role in the results and is discussed alongside implications for teaching and further research.
Citizenship: How do leaders in universities think about and experience citize...Randy Connolly
This presentation explores the concept of citizenship based on the experience of student leaders from a mid-sized university in western Canada. Five student leaders participated in semi-structured individual interviews to explore their experience with, and understanding of, citizenship. Interviews concentrated on personal view points and definitions of citizenship, explored whether or not there are “good” and “great” citizens, and the role universities play in fostering strong citizenship amongst its student body. The measurement of citizenship and opportunities to foster citizenship were also explored. Qualitative content analysis revealed five themes, including political participation, social citizenship/solidarity, engagement, transformative action and autonomy. Citizenship, while highly valued by this population, also appears to be impossible to measure. If post-secondary institutions are aiming to create better citizens, more work needs to be done to create a common understanding of the intended outcome. Based on these findings, a new potential model of citizenship is proposed, in line with the work of Dalton and others who emphasize a shift towards personal involvement over traditional political engagement. Further, these results suggest that students could benefit from understanding themselves as political agents, capable of inculcating change within the university context and beyond.
Presentation for a guest lecture for a colleague's Media History and Contemporary Issues course. She wanted me to cover technological determinism and social constructivism, as well as through in some content about my research on multitasking and online reading.
A longitudinal examination of SIGITE conference submission dataRandy Connolly
Presents our examination of submission data for the SIGITE conference between the years 2007-2012. SIGITE is an ACM computing conference on IT education. The presentation describes which external factors and which internal characteristics of the submissions are related to eventual reviewer ratings. Ramifications of the findings for future authors and conference organizers are also discussed. If you want to read the full paper, visit http://dl.acm.org/citation.cfm?id=2656450.2656465
This document is a chapter from a textbook on web development security. It covers several key security principles for web development, including the CIA triad of confidentiality, integrity and availability. It discusses risk assessment and management, including identifying actors, impacts, threats and vulnerabilities. Authentication methods like passwords, multifactor authentication and third party authentication are explained. The importance of authorization to define user privileges is also covered. Overall security practices like secure design, testing, policies and business continuity planning are recommended.
Is Human Flourishing in the ICT World of the Future Likely?Randy Connolly
The role that information and computing technology (ICT) plays in improving human flourishing is not always clear. This presentation examines current research on one aspect of ICT, namely electronic reading, to demonstrate that in this case the ICT in question may actually diminish flourishing. It begins with an overview of the idea of flourishing in positive psychology, and then presents research on electronic reading comprehension, multitasking and distraction, and online scanning behaviors. The paper then makes an argument about the close connection between reading and flourishing, and then concludes by hypothesizing that mindful‐based reading practices may mitigate some of the worst features of electronic reading.
Textbooks are an essential part of the student experience, but may seem a daunting prospect to write. This presentation describes my experience with a recently-written textbook. It covers such issues as: writing a prospectus, the current textbook market, writing schedules, production issues, and marketing.
This presentation is based on the third chapter of my textbook Fundamentals of Web Development. The book is published by Addison-Wesley. It can be purchased via http://www.amazon.com/Fundamentals-Web-Development-Randy-Connolly/dp/0133407152.
This book is intended to be used as a textbook on web development suitable for intermediate to upper-level computing students. It may also be of interest to a non-student reader wanting a single book that encompasses the entire breadth of contemporary web development.
This book will be the first in what will hopefully be a textbook series. Each book in the series will have the same topics and coverage but each will use a different web development environment. The first book in the series will use PHP.
To learn more about the book, visit http://www.funwebdev.com.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Lightning Talk given at the start of the celebration evening for the ten-year anniversary of our Bachelor of Computer Information Systems at Mount Royal University.
Facing Backwards While Stumbling Forwards: The Future of Teaching Web Develop...Randy Connolly
Talk given at SIGCSE'19. Web development continues to grow as an essential skill and knowledge area for employed computer science graduates. Yet within the ACM CS2013 curriculum recommendation and within computing education research in general, web development has been shrinking or even disappearing all together. This paper uses an informal systematic literature review methodology to answer three research questions: what approaches are being advocated in existing web development education research, what are current trends in industry practice, and how should web development be taught in light of these current trends. Results showed a significant mismatch between the type of web development typically taught in higher education settings in comparison to web development in industry practice. Consequences for the pedagogy of web development courses, computer science curriculum in general, and for computing education research are also discussed.
Mid-semester presentation for my Computers & Society course at Mount Royal University. Has some technical detail about how the internet works, web protocols, data centres, and typical security threats.
The document provides a summary of modern web development topics covered in 3 sentences or less:
Modern Web Development topics covered include the infrastructure of the internet, client-server communication models, the need for server-side programs, web architecture patterns, JavaScript's central role, front-end frameworks, cloud computing models, microservices architecture, and containers. Web development has become more complex with client-side logic, front-end frameworks, and the rise of cloud, microservices, and containers, which allow for more modular and scalable application development. Future trends discussed include progressive web apps, microservices architecture, and containers as a lightweight deployment mechanism for microservices.
Helping Prospective Students Understand the Computing DisciplinesRandy Connolly
Presentation at Cannexus 2018 in Ottawa in which we discussed the results of our three-year research project on student understandings of the computing disciplines and described the 32-page full-color booklet for advisers and prospective students.
This document discusses the process of constructing a textbook on web development. It covers planning the textbook's topics and structure, writing the content over 7 months while splitting chapters with a co-author, undergoing review processes, redrawing over 120 diagrams in a new style, and producing a second edition with additional content such as JavaScript and CSS3. Key challenges included navigating copyright issues, outsourcing production, and ensuring diversity in illustrations. The document provides insight into the lengthy efforts required to research, write, and produce a college textbook.
Talk given at University of Applied Sciences at Krems , Austria for Master Forum 2017. Provides a rich overview of contemporary web development suitable for managers and business people.
Disrupting the Discourse of the "Digital Disruption of _____"Randy Connolly
Talk given at University of Applied Sciences for Management and Communication in Vienna in January 2017. It critically interrogates the narrative of digital disruption. It will describe some of the contemporary psychological and social research about the digital lifeworld and make some broader observations about how to best think about technological change.
Every year at our new student orientation, I used to give this talk to our first year students. Instead of telling them what they should do to achieve success, we thought it would be more effective and humourous to tell them instead how best to fail your courses. This was the last version of this talk from 2017.
Red Fish Blue Fish: Reexamining Student Understanding of the Computing Discip...Randy Connolly
This 2016 presentation (for a paper) updates the findings of a multi-year study that is surveying major and non-major students’ understanding of the different computing disciplines. This study is a continuation of work first presented by Uzoka et al in 2013, which in turn was an expansion of work originally conducted by Courte and Bishop-Clark from 2009. In the current study, data was collected from 668 students from four universities from three different countries. Results show that students in general were able to correctly match computing tasks with specific disciplines, but were not as certain as the faculty about the degree of fit. Differences in accuracy between student groups were, however, discovered. Software engineering and computer science students had statistically significant lower accuracy scores than students from other computing disciplines. Consequences and recommendations for advising and career counselling are discussed.
Constructing and revising a web development textbookRandy Connolly
A Pecha Kucha for WWW2016 in Montreal. Web development is widely considered to be a difficult topic to teach successfully within post-secondary computing programs. One reason for this difficulty is the large number of shifting technologies that need to be taught along with the conceptual complexity that needs to be mastered by both student and professor. Another challenge is helping students see the scope of web development, and their role in an era where the web is a part of everyday human affairs. This presentation describes our 2014 textbook and our plans for a second edition revision (which will be published in early 2017).
Computing is Not a Rock Band: Student Understanding of the Computing DisciplinesRandy Connolly
This presentation reports the initial findings of a multi-year study that is surveying major and non-major students’ understanding of the different computing disciplines. This study is based on work originally conducted by Courte and Bishop-Clark from 2009, but which uses a broadened study instrument that provided additional forms of analysis. Data was collected from 199 students from a single institution who were computer science, information systems/information technology and non-major students taking a variety of introductory computing courses. Results show that undergraduate computing students are more likely to rate tasks as being better fits to computer disciplines than are their non-major (NM) peers. Uncertainty among respondents did play a large role in the results and is discussed alongside implications for teaching and further research.
Citizenship: How do leaders in universities think about and experience citize...Randy Connolly
This presentation explores the concept of citizenship based on the experience of student leaders from a mid-sized university in western Canada. Five student leaders participated in semi-structured individual interviews to explore their experience with, and understanding of, citizenship. Interviews concentrated on personal view points and definitions of citizenship, explored whether or not there are “good” and “great” citizens, and the role universities play in fostering strong citizenship amongst its student body. The measurement of citizenship and opportunities to foster citizenship were also explored. Qualitative content analysis revealed five themes, including political participation, social citizenship/solidarity, engagement, transformative action and autonomy. Citizenship, while highly valued by this population, also appears to be impossible to measure. If post-secondary institutions are aiming to create better citizens, more work needs to be done to create a common understanding of the intended outcome. Based on these findings, a new potential model of citizenship is proposed, in line with the work of Dalton and others who emphasize a shift towards personal involvement over traditional political engagement. Further, these results suggest that students could benefit from understanding themselves as political agents, capable of inculcating change within the university context and beyond.
Presentation for a guest lecture for a colleague's Media History and Contemporary Issues course. She wanted me to cover technological determinism and social constructivism, as well as through in some content about my research on multitasking and online reading.
A longitudinal examination of SIGITE conference submission dataRandy Connolly
Presents our examination of submission data for the SIGITE conference between the years 2007-2012. SIGITE is an ACM computing conference on IT education. The presentation describes which external factors and which internal characteristics of the submissions are related to eventual reviewer ratings. Ramifications of the findings for future authors and conference organizers are also discussed. If you want to read the full paper, visit http://dl.acm.org/citation.cfm?id=2656450.2656465
This document is a chapter from a textbook on web development security. It covers several key security principles for web development, including the CIA triad of confidentiality, integrity and availability. It discusses risk assessment and management, including identifying actors, impacts, threats and vulnerabilities. Authentication methods like passwords, multifactor authentication and third party authentication are explained. The importance of authorization to define user privileges is also covered. Overall security practices like secure design, testing, policies and business continuity planning are recommended.
Is Human Flourishing in the ICT World of the Future Likely?Randy Connolly
The role that information and computing technology (ICT) plays in improving human flourishing is not always clear. This presentation examines current research on one aspect of ICT, namely electronic reading, to demonstrate that in this case the ICT in question may actually diminish flourishing. It begins with an overview of the idea of flourishing in positive psychology, and then presents research on electronic reading comprehension, multitasking and distraction, and online scanning behaviors. The paper then makes an argument about the close connection between reading and flourishing, and then concludes by hypothesizing that mindful‐based reading practices may mitigate some of the worst features of electronic reading.
Textbooks are an essential part of the student experience, but may seem a daunting prospect to write. This presentation describes my experience with a recently-written textbook. It covers such issues as: writing a prospectus, the current textbook market, writing schedules, production issues, and marketing.
This presentation is based on the third chapter of my textbook Fundamentals of Web Development. The book is published by Addison-Wesley. It can be purchased via http://www.amazon.com/Fundamentals-Web-Development-Randy-Connolly/dp/0133407152.
This book is intended to be used as a textbook on web development suitable for intermediate to upper-level computing students. It may also be of interest to a non-student reader wanting a single book that encompasses the entire breadth of contemporary web development.
This book will be the first in what will hopefully be a textbook series. Each book in the series will have the same topics and coverage but each will use a different web development environment. The first book in the series will use PHP.
To learn more about the book, visit http://www.funwebdev.com.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.