The document discusses strategies for making astronomy accessible to people with disabilities. It begins by providing statistics on the number of people worldwide living with disabilities, including visual and hearing impairments. It then introduces the concept of Universal Design for Learning (UDL) as a framework for creating inclusive educational materials and activities. The key principles of UDL are to provide multiple means of representation, action/expression, and engagement. The rest of the document provides examples of strategies in line with UDL principles for developing inclusive astronomy education resources, such as tactile models and exhibits, adapted planetarium shows, and real-time telescope observations.
Articulating Our Impact: Strategies for Holistic Library Assessmentchar booth
This document discusses holistic assessment strategies for library assessment. It presents rubrics used at the Claremont Colleges to evaluate student information literacy (IL) skills through analyzing first-year seminar papers and senior theses. Rubrics were customized for each institution and mapped to student IL competencies. Assessment results were used for accreditation, campus initiatives, and the Assessment in Action project to investigate the impact of librarian instruction on student work.
Sm edit 2015 01-15 the space overview and open call presentation - bristolTheSpaceArts
The Space is a digital arts platform launched in 2014 as a partnership between the BBC and Arts Council England. It provides a free public space for audiences and artists worldwide to explore, express, and enjoy digital art. The Space commissions around 50 new digital art projects per year from both emerging and established artists and works with influential partners in the UK arts councils and creative industries. Its goals are to open up digital art to large international audiences, push the boundaries of the art form, and act as an online research and development lab.
Sm edit 2015 01-15 the space overview and open call presentation - cambridgeTheSpaceArts
The Space is a digital arts platform launched in June 2014 as a partnership between the BBC and Arts Council England. It provides a free public space for audiences and artists around the world to explore and enjoy digital art. The Space has influential partners and commissions over 50 new digital art projects per year from established and emerging artists. It highlights recent projects such as works by Jeremy Deller, Marina Abramovic, and the National Theatre of Scotland. The Space also issues open calls for submissions and holds creative competitions to find new digital talent.
Is Agile in your DNA | Portland Global Scrum Gathering 2023Dave Sharrock
Agile has been around for a while. The Agile Manifesto was penned in 2001. By 2010 CIO Magazine had Agile identified as one of the top 3 trends any technology-minded leader should be actively incorporating into their organizations. And today, Agile is so well entrenched that it feels like we have always been Agile.
Now for the hard part. Agile is a mindset. A philosophy on how to approach product delivery. The practices and frameworks will fade in and out of the spotlight, but, as Marty Cagan has said, the core Lean and Agile principles are, hopefully, here to stay. But this is the riskiest part of the journey. We think we have this agility thing in our DNA and can start looking to the future. This is the moment that John Kotter described as institutionalizing change.
We will discuss how to understand where you are on your agile journey. Is agility in your DNA, or still an outlier in how you get work done? How can we visualize what agility looks like in our organization? How can we understand what remains to be done to lock in the agile mindset?
Specifically, we will look at five dimensions across your organization, and evaluate how strongly agility is in the DNA of your organization. From this perspective, we can identify opportunities to strengthen the change and where to move on, confident in the knowledge of a job well done. Come and learn how to peel back the covers on your organizational agility.
2015 01-29 the space overview and open call presentation - newcastleTheSpaceArts
The Space is a digital arts organization launched in June 2014 as a partnership between the BBC and Arts Council England. It provides a free public online space for audiences and artists worldwide to explore, express, and enjoy digital art. Notable projects include collaborations with artists Marina Abramovic, Akram Khan, and Thabisioselekale Gwangwa. The Space accepts open calls for digital art projects and awards fellowships for original, inspiring works that could impact digital culture.
David Gevorkyan graduated from AUA in 2008. He discusses big data, data science, and how eHarmony uses these fields to create successful relationships. eHarmony collects vast amounts of user data through detailed questionnaires and analyzes this data using algorithms to make compatibility match recommendations to users.
This document provides an overview of The Space, a pioneering partnership between the BBC and Arts Council England to commission digital artworks and make them freely available online. It launched in June 2014 and has commissioned over 50 new projects each year from both emerging and established artists around the world. The Space acts as an online laboratory for internet-based art and has influential partners like the British Council. It highlights several past artworks and also details open calls for new artists to apply for commissions and fellowships through a simple online application process.
The document discusses strategies for making astronomy accessible to people with disabilities. It begins by providing statistics on the number of people worldwide living with disabilities, including visual and hearing impairments. It then introduces the concept of Universal Design for Learning (UDL) as a framework for creating inclusive educational materials and activities. The key principles of UDL are to provide multiple means of representation, action/expression, and engagement. The rest of the document provides examples of strategies in line with UDL principles for developing inclusive astronomy education resources, such as tactile models and exhibits, adapted planetarium shows, and real-time telescope observations.
Articulating Our Impact: Strategies for Holistic Library Assessmentchar booth
This document discusses holistic assessment strategies for library assessment. It presents rubrics used at the Claremont Colleges to evaluate student information literacy (IL) skills through analyzing first-year seminar papers and senior theses. Rubrics were customized for each institution and mapped to student IL competencies. Assessment results were used for accreditation, campus initiatives, and the Assessment in Action project to investigate the impact of librarian instruction on student work.
Sm edit 2015 01-15 the space overview and open call presentation - bristolTheSpaceArts
The Space is a digital arts platform launched in 2014 as a partnership between the BBC and Arts Council England. It provides a free public space for audiences and artists worldwide to explore, express, and enjoy digital art. The Space commissions around 50 new digital art projects per year from both emerging and established artists and works with influential partners in the UK arts councils and creative industries. Its goals are to open up digital art to large international audiences, push the boundaries of the art form, and act as an online research and development lab.
Sm edit 2015 01-15 the space overview and open call presentation - cambridgeTheSpaceArts
The Space is a digital arts platform launched in June 2014 as a partnership between the BBC and Arts Council England. It provides a free public space for audiences and artists around the world to explore and enjoy digital art. The Space has influential partners and commissions over 50 new digital art projects per year from established and emerging artists. It highlights recent projects such as works by Jeremy Deller, Marina Abramovic, and the National Theatre of Scotland. The Space also issues open calls for submissions and holds creative competitions to find new digital talent.
Is Agile in your DNA | Portland Global Scrum Gathering 2023Dave Sharrock
Agile has been around for a while. The Agile Manifesto was penned in 2001. By 2010 CIO Magazine had Agile identified as one of the top 3 trends any technology-minded leader should be actively incorporating into their organizations. And today, Agile is so well entrenched that it feels like we have always been Agile.
Now for the hard part. Agile is a mindset. A philosophy on how to approach product delivery. The practices and frameworks will fade in and out of the spotlight, but, as Marty Cagan has said, the core Lean and Agile principles are, hopefully, here to stay. But this is the riskiest part of the journey. We think we have this agility thing in our DNA and can start looking to the future. This is the moment that John Kotter described as institutionalizing change.
We will discuss how to understand where you are on your agile journey. Is agility in your DNA, or still an outlier in how you get work done? How can we visualize what agility looks like in our organization? How can we understand what remains to be done to lock in the agile mindset?
Specifically, we will look at five dimensions across your organization, and evaluate how strongly agility is in the DNA of your organization. From this perspective, we can identify opportunities to strengthen the change and where to move on, confident in the knowledge of a job well done. Come and learn how to peel back the covers on your organizational agility.
2015 01-29 the space overview and open call presentation - newcastleTheSpaceArts
The Space is a digital arts organization launched in June 2014 as a partnership between the BBC and Arts Council England. It provides a free public online space for audiences and artists worldwide to explore, express, and enjoy digital art. Notable projects include collaborations with artists Marina Abramovic, Akram Khan, and Thabisioselekale Gwangwa. The Space accepts open calls for digital art projects and awards fellowships for original, inspiring works that could impact digital culture.
David Gevorkyan graduated from AUA in 2008. He discusses big data, data science, and how eHarmony uses these fields to create successful relationships. eHarmony collects vast amounts of user data through detailed questionnaires and analyzes this data using algorithms to make compatibility match recommendations to users.
This document provides an overview of The Space, a pioneering partnership between the BBC and Arts Council England to commission digital artworks and make them freely available online. It launched in June 2014 and has commissioned over 50 new projects each year from both emerging and established artists around the world. The Space acts as an online laboratory for internet-based art and has influential partners like the British Council. It highlights several past artworks and also details open calls for new artists to apply for commissions and fellowships through a simple online application process.
This PDF presentation focuses on eye-kon's portfolio of interior CGIs.
We also produce exterior CGIs, photo-montages, fly-throughts and animations, immersive Virtual Reality content and much more. Please visit us on https://eye-kon.com/
California Science Center (USC CSCI 588)Sunny Chiu
This document describes the redesign of the California Science Center's website and mobile app. It discusses converting the website content to better suit a mobile app interface with features like navigation buttons, scroll views, and exhibition pages. The design process focused on universal accessibility, preventing errors, and reducing memory load. It concludes by noting the content and design will be updated further based on user feedback.
Only 40 years ago, the rate of technologically driven change was such that companies could re-organize efficiently and economically over considerable periods of time, but about 30 years ago this changed as the arrival of new technologies accelerated. We effectively moved from a world of slow periodic changes to one where change became a continuum. The leading-edge sectors were fast to recognize and adopt this new mode of continual adaptation driven by new technologies. This saw these ever more efficient and expansive companies dominating some sectors. For the majority, however, it seems that this transition was not recognized until relatively recently, and a so new movement was born under the banner of digitalization. This not only impacts the way people work, it affects company operations and changes markets, and it does so suddenly!.
Perhaps the most impactive and recent driver of change in this regard has been COVID which saw the adoption of video conferencing and working as a survival imperative in much less than a month. This now stands as a beacon of proof that companies, organizations, and society, can indeed change and adapt to the new at a rate previously considered impossible. The big danger for digitalization programmes now is the simple-minded view that there are singular (magic) solutions that fit every company and organization, but this is not the case. The reality is that the needs and culture of an organization are not the same and may not be uniform from top to bottom.
Manufacturing necessitates very steep hierarchical management structures and tight control to ensure the consistency of the quality of products. On the other hand, a research laboratory or design company requires a low flat management hierarchy and an apparently relaxed level of control. This is absolutely necessary to foster creativity, innovation, and invention. This presentation gives practical examples of management and organizational, extremes. We then go on to highlight the need to embrace AI and Quantum Computing over the coming decade to deal with future technologies, operating
and market complexity.
Information Privilege - Critical Approaches to Access and Advocacychar booth
DLF Forum 2013 Closing Keynote in Austin, Texas. Video available at http://mediasite.engr.utexas.edu/UTMediasite/Play/15fef35f23364ca0bbe4f0ee5f04a3e71d
This document outlines tactics for leadership and innovation. It discusses how leadership is shifting from a top-down model to empowering others. Leaders of the future will have vision, empower others, and be agile and adaptive. Tactics for success include identifying stakeholders, setting clear goals, gaining feedback through quick wins and transparency. Gamification, engagement strategies, and crowdsourcing can help empower others and validate solutions. The presentation provides examples of successful government innovation delivery structures and resources for performance tools. It encourages starting by shifting mindsets, embracing constraints, and operating in a continuous state of beta.
CRC Hospital Shah Alam, Selangor (CRC HSAS) Newsletter
The Insiders - December 2020 Edition
Unit CRC, Tingkat 2,
Hospital Shah Alam
Persiaran Kayangan, Seksyen 7, 40000 Shah Alam,
Selangor
Contact: crc.hsas@gmail.com
Go for it, or Bail? Learning to Ride the Hype Cycle. char booth
The document discusses emerging technologies including mobile devices, wearable technology, and online learning. It covers affordances of these technologies such as collaboration, communication, and productivity. Design thinking principles are outlined including contextual investigation, testing and iteration. Considerations around empowerment, enhancement and sustainability of technologies are also mentioned. The source is from The Claremont Colleges and includes references to studies and instruments from scholarship databases.
Primeira coleção casual para a Fit Li. E esse foi o desafio, encontrar no estilo de nossas clientes peças além do esporte, oque a garota Fit Li usaria? Seguindo o conceito Resort como Alto Verão, surgiu a "LA MARINA" Aquela que vem do mar.
Digital Data Commons - Emergence of AI Blockchain ConvergenceGokul Alex
My Session on the Emergence of AI Blockchain Convergence in the perspective of a new digital data commons presented in the Blockchain Hackathon organised by #Accubits and #BHub on January 2nd and 3rd 2018.
A slide set to accompany an NKCS conversation on our emerging instructional coaching model... with the expert consultation of author, coach, and coach of coaches: Diane Sweeney. (www.dianesweeney.com)
Improve the Quality of Breaks with Kafka (Julian Stampfli, Spoud) Kafka Summi...HostedbyConfluent
Who is the best?
To answer this question once and for all we created a tool with which we can track scores, rankings and statistics. Why you might ask, it is simple, playing kicker, foosball or töggele is in our DNA. So is creating awesome tools with awesome components.
Kafka, especially integrated in Confluent Cloud, is one such component. Join us when we explain how we built a small utility to track games that we completely overengineered by using Kafka, KSQL, Quarkus and other fancy components. No matter what we tell others, we did it for fun. However, there are some real learnings we want to share that will help with building real-world streaming applications.
Why the org_matters_shorter.jzt.2018sept25Julie Tsai
Forrester Privacy & Summit 2018 at The Mayflower Hotel, D.C. Sept. 24-26, 2018
"Why the Org Matters: The Role of Privacy and Security in Organization Design"
Data Visualizations in Digital Products (ProductCamp Boston 2016)ProductCamp Boston
Visualizations around fixed datasets such as data journalism are very common, you see them in the New York Times every day, but what happens when data visualization is part of a digital product? These visualizations contain data that changes frequently based on user inputs or other sources. This talk covers examples and an approach on how to incorporate data visualization into your digital product, whether it be mobile, web or desktop.
About C. Todd Lombardo
C. Todd recently joined the team at Fresh Tilled Soil as Chief Design Strategist, helping clients solve product, design, and/or strategy problems. He has a Master’s Degree in Data Visualization from Maryland Institute College of Art.
His background is grounded in science, engineering, and design. He previously was Innovation Architect at Constant Contact’s InnoLoft, he facilitated product and service design sprints for a wide range of external startups and internal product teams. He is also a member of the adjunct faculty at Madrid’s prestigious IE Business School.
A teacher and speaker at heart, he frequently speaks at conferences and has directed five TEDx events in two countries. His book, Design Sprint was published by O’Reilly Media in the fall of 2015.
Blockchain Technology : Privacy Perspectives and Security ConcernsGokul Alex
My Session on the emerging contours of identity and privacy in the Digital World and how Blockchain is playing a decisive role in this landscape in the upcoming #FintechSummit, Bangalore on August 08, 2018. You can find further details on the Event Portal. https://lnkd.in/fbAmsqf
Instilling a can-do attitude and spirit of innovation isn’t just good for business, it’s good for morale, employee retention and acquisition, and customer happiness. In this presentation, we’ll take a look at the elements of intrapreneurship and how they can be applied to business large and small.
This document discusses neighborhood planning as a tool for sustainable territorial development. It provides context on neighborhood planning foundations and frameworks. It then focuses on a case study of developing a neighborhood plan for the area surrounding Pontifical Catholic University of Paraná (PUCPR) campus in Curitiba, Brazil. The plan aims to improve mobility and increase cycling by developing indicators, mapping bikeability/walkability, and through a memorandum of understanding between PUCPR and Dutch institutions to design urban infrastructure and safety strategies. The document emphasizes participatory planning processes and leveraging universities to address traffic and mobility issues in their surrounding neighborhoods.
This document summarizes evidence from 27 trials involving over 10,000 participants on the safety and efficacy of clot-dissolving drugs (thrombolytics) such as alteplase for treating acute ischemic stroke. The trials compared thrombolytics administered intravenously or intra-arterially within 4.5 hours of stroke onset to placebo or no treatment. Thrombolytics were found to improve outcomes after stroke but also increase the risk of serious bleeding in the brain. While thrombolytics can restore blood flow and reduce brain damage if given promptly, the risks and benefits were shown to depend on the time since stroke onset.
This document discusses intrusion detection systems, including common attack patterns like port, ping, and login sweeps. It outlines Snort as an example network-based intrusion detection system and provides Snort rule examples. Different types of intrusion detection systems are also covered, along with considerations for host-based versus network-based placement.
This document outlines key network protocols including ARP, SYN, FTP, ICMP, DNS, port scans, SYN floods, and the application layer. It discusses how these protocols work from the bit level up through data encapsulation using Ethernet, IP, and TCP. Specific topics covered include the three-way handshake, how ARP maps IP addresses to MAC addresses, SYN scans, the FTP protocol, ICMP, DNS name resolution, types of port scans, and SYN floods as a denial of service attack.
This PDF presentation focuses on eye-kon's portfolio of interior CGIs.
We also produce exterior CGIs, photo-montages, fly-throughts and animations, immersive Virtual Reality content and much more. Please visit us on https://eye-kon.com/
California Science Center (USC CSCI 588)Sunny Chiu
This document describes the redesign of the California Science Center's website and mobile app. It discusses converting the website content to better suit a mobile app interface with features like navigation buttons, scroll views, and exhibition pages. The design process focused on universal accessibility, preventing errors, and reducing memory load. It concludes by noting the content and design will be updated further based on user feedback.
Only 40 years ago, the rate of technologically driven change was such that companies could re-organize efficiently and economically over considerable periods of time, but about 30 years ago this changed as the arrival of new technologies accelerated. We effectively moved from a world of slow periodic changes to one where change became a continuum. The leading-edge sectors were fast to recognize and adopt this new mode of continual adaptation driven by new technologies. This saw these ever more efficient and expansive companies dominating some sectors. For the majority, however, it seems that this transition was not recognized until relatively recently, and a so new movement was born under the banner of digitalization. This not only impacts the way people work, it affects company operations and changes markets, and it does so suddenly!.
Perhaps the most impactive and recent driver of change in this regard has been COVID which saw the adoption of video conferencing and working as a survival imperative in much less than a month. This now stands as a beacon of proof that companies, organizations, and society, can indeed change and adapt to the new at a rate previously considered impossible. The big danger for digitalization programmes now is the simple-minded view that there are singular (magic) solutions that fit every company and organization, but this is not the case. The reality is that the needs and culture of an organization are not the same and may not be uniform from top to bottom.
Manufacturing necessitates very steep hierarchical management structures and tight control to ensure the consistency of the quality of products. On the other hand, a research laboratory or design company requires a low flat management hierarchy and an apparently relaxed level of control. This is absolutely necessary to foster creativity, innovation, and invention. This presentation gives practical examples of management and organizational, extremes. We then go on to highlight the need to embrace AI and Quantum Computing over the coming decade to deal with future technologies, operating
and market complexity.
Information Privilege - Critical Approaches to Access and Advocacychar booth
DLF Forum 2013 Closing Keynote in Austin, Texas. Video available at http://mediasite.engr.utexas.edu/UTMediasite/Play/15fef35f23364ca0bbe4f0ee5f04a3e71d
This document outlines tactics for leadership and innovation. It discusses how leadership is shifting from a top-down model to empowering others. Leaders of the future will have vision, empower others, and be agile and adaptive. Tactics for success include identifying stakeholders, setting clear goals, gaining feedback through quick wins and transparency. Gamification, engagement strategies, and crowdsourcing can help empower others and validate solutions. The presentation provides examples of successful government innovation delivery structures and resources for performance tools. It encourages starting by shifting mindsets, embracing constraints, and operating in a continuous state of beta.
CRC Hospital Shah Alam, Selangor (CRC HSAS) Newsletter
The Insiders - December 2020 Edition
Unit CRC, Tingkat 2,
Hospital Shah Alam
Persiaran Kayangan, Seksyen 7, 40000 Shah Alam,
Selangor
Contact: crc.hsas@gmail.com
Go for it, or Bail? Learning to Ride the Hype Cycle. char booth
The document discusses emerging technologies including mobile devices, wearable technology, and online learning. It covers affordances of these technologies such as collaboration, communication, and productivity. Design thinking principles are outlined including contextual investigation, testing and iteration. Considerations around empowerment, enhancement and sustainability of technologies are also mentioned. The source is from The Claremont Colleges and includes references to studies and instruments from scholarship databases.
Primeira coleção casual para a Fit Li. E esse foi o desafio, encontrar no estilo de nossas clientes peças além do esporte, oque a garota Fit Li usaria? Seguindo o conceito Resort como Alto Verão, surgiu a "LA MARINA" Aquela que vem do mar.
Digital Data Commons - Emergence of AI Blockchain ConvergenceGokul Alex
My Session on the Emergence of AI Blockchain Convergence in the perspective of a new digital data commons presented in the Blockchain Hackathon organised by #Accubits and #BHub on January 2nd and 3rd 2018.
A slide set to accompany an NKCS conversation on our emerging instructional coaching model... with the expert consultation of author, coach, and coach of coaches: Diane Sweeney. (www.dianesweeney.com)
Improve the Quality of Breaks with Kafka (Julian Stampfli, Spoud) Kafka Summi...HostedbyConfluent
Who is the best?
To answer this question once and for all we created a tool with which we can track scores, rankings and statistics. Why you might ask, it is simple, playing kicker, foosball or töggele is in our DNA. So is creating awesome tools with awesome components.
Kafka, especially integrated in Confluent Cloud, is one such component. Join us when we explain how we built a small utility to track games that we completely overengineered by using Kafka, KSQL, Quarkus and other fancy components. No matter what we tell others, we did it for fun. However, there are some real learnings we want to share that will help with building real-world streaming applications.
Why the org_matters_shorter.jzt.2018sept25Julie Tsai
Forrester Privacy & Summit 2018 at The Mayflower Hotel, D.C. Sept. 24-26, 2018
"Why the Org Matters: The Role of Privacy and Security in Organization Design"
Data Visualizations in Digital Products (ProductCamp Boston 2016)ProductCamp Boston
Visualizations around fixed datasets such as data journalism are very common, you see them in the New York Times every day, but what happens when data visualization is part of a digital product? These visualizations contain data that changes frequently based on user inputs or other sources. This talk covers examples and an approach on how to incorporate data visualization into your digital product, whether it be mobile, web or desktop.
About C. Todd Lombardo
C. Todd recently joined the team at Fresh Tilled Soil as Chief Design Strategist, helping clients solve product, design, and/or strategy problems. He has a Master’s Degree in Data Visualization from Maryland Institute College of Art.
His background is grounded in science, engineering, and design. He previously was Innovation Architect at Constant Contact’s InnoLoft, he facilitated product and service design sprints for a wide range of external startups and internal product teams. He is also a member of the adjunct faculty at Madrid’s prestigious IE Business School.
A teacher and speaker at heart, he frequently speaks at conferences and has directed five TEDx events in two countries. His book, Design Sprint was published by O’Reilly Media in the fall of 2015.
Blockchain Technology : Privacy Perspectives and Security ConcernsGokul Alex
My Session on the emerging contours of identity and privacy in the Digital World and how Blockchain is playing a decisive role in this landscape in the upcoming #FintechSummit, Bangalore on August 08, 2018. You can find further details on the Event Portal. https://lnkd.in/fbAmsqf
Instilling a can-do attitude and spirit of innovation isn’t just good for business, it’s good for morale, employee retention and acquisition, and customer happiness. In this presentation, we’ll take a look at the elements of intrapreneurship and how they can be applied to business large and small.
This document discusses neighborhood planning as a tool for sustainable territorial development. It provides context on neighborhood planning foundations and frameworks. It then focuses on a case study of developing a neighborhood plan for the area surrounding Pontifical Catholic University of Paraná (PUCPR) campus in Curitiba, Brazil. The plan aims to improve mobility and increase cycling by developing indicators, mapping bikeability/walkability, and through a memorandum of understanding between PUCPR and Dutch institutions to design urban infrastructure and safety strategies. The document emphasizes participatory planning processes and leveraging universities to address traffic and mobility issues in their surrounding neighborhoods.
This document summarizes evidence from 27 trials involving over 10,000 participants on the safety and efficacy of clot-dissolving drugs (thrombolytics) such as alteplase for treating acute ischemic stroke. The trials compared thrombolytics administered intravenously or intra-arterially within 4.5 hours of stroke onset to placebo or no treatment. Thrombolytics were found to improve outcomes after stroke but also increase the risk of serious bleeding in the brain. While thrombolytics can restore blood flow and reduce brain damage if given promptly, the risks and benefits were shown to depend on the time since stroke onset.
This document discusses intrusion detection systems, including common attack patterns like port, ping, and login sweeps. It outlines Snort as an example network-based intrusion detection system and provides Snort rule examples. Different types of intrusion detection systems are also covered, along with considerations for host-based versus network-based placement.
This document outlines key network protocols including ARP, SYN, FTP, ICMP, DNS, port scans, SYN floods, and the application layer. It discusses how these protocols work from the bit level up through data encapsulation using Ethernet, IP, and TCP. Specific topics covered include the three-way handshake, how ARP maps IP addresses to MAC addresses, SYN scans, the FTP protocol, ICMP, DNS name resolution, types of port scans, and SYN floods as a denial of service attack.
This document discusses memory, big data, and security information and event management (SIEM). It outlines how a SIEM infrastructure can be modeled after the human brain's memory to gather and analyze large amounts of data. Specifically, it proposes that machines should be adaptive, interactive, iterative and stateful, and contextual to effectively learn from data over time and identify security threats, similar to how the human brain functions. The document also mentions directed graphs and the five V's of big data - volume, velocity, variety, veracity, and value.
This document discusses different types and formats of data including unstructured, semi-structured, and structured data. It explains that unstructured data has no formal structure, semi-structured data has some defined tags but not a formal schema, and structured data has a formal schema and relationships defined. The document also covers topics like data encoding, compression, magic numbers, and different data formats like CSV, JSON, XML, and more.
Threat hunters collect internal and external data to establish hypotheses about potential threats. They hunt for information to identify real threats and determine an appropriate response. Open source intelligence includes data from social networks, crowd-sourced sites, wikis, and photographs that can provide information about people, organizations, technologies and more. Tools like Google dorking, the Wayback Machine and Shodan allow searching open webpages and networks for intelligence.
The document discusses converting data into information using NumPy and Pandas Python libraries. It covers topics like arrays and matrices, different data formats, NumPy operations for linear algebra and math, and Pandas for working with labeled data and performing analyses like sorting, filtering, and correlations. The goal is to understand how to structure and analyze data using these Python tools.
The document discusses information security, defense mechanisms, and risks. It outlines concepts like data, information, knowledge and wisdom. It describes kill chain models used to investigate security incidents and defenses that use layers like deterrence, detection, protection, reaction, recovery, and auditing. The document also covers risks, costs, benefits, and harm from physical, economic, psychological and reputational impacts.
This document discusses cybersecurity, intelligence, and the differences between human and machine intelligence. It provides an overview of cybersecurity job roles and frameworks. It also covers types of intelligence including naturalist, musical, logical-mathematical, existential, and inter-personal. Humans are described as having advantages in areas like creativity, perception, memory, verbal skills, and reasoning compared to current computer capabilities. Motivations for cyberattacks include entertainment, hacktivism, financial gain, spying, and revenge.
The document discusses ARTiFACTS, a platform that uses blockchain technology to provide attribution for research works. It allows researchers to establish proof of authorship, protect and share research materials, and receive valid attribution and credit for any research output. Researchers, scholars, and publishers can integrate with the ARTiFACTS open platform. It provides a case study of its partnership with the journal JBBA, where researchers can link supporting files and publications to receive citations.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Introduction of Cybersecurity with OSS at Code Europe 2024
Keynote, Naseem Naqvi
1. 1T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Dr. Naseem Naqvi
FBBA FRCP(Edin) FHEA MAcadMed MSc (Blockchain & Cryptocurrency)
President,The British Blockchain Association
Editor in Chief,The JBBA
Founding Chair, Centre for Evidence-Based Blockchain (CEBB)
Opening Keynote
2nd Blockchain International Scientific Conference
11 March 2020, Edinburgh
www.linkedin.com/in/naseemnaqvi
2. 2T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
3/11/2020
3. 3T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
3/11/2020
4. 4T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
5. 5T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
6. 6T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
7. 7T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
8. 8T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
9. 9T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
10. 10T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
11. 11T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
12. 12T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
13. 13T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
14. 14T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
15. 15T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
16. 16T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
17. 17T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
3/11/2020
18. 18T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
3/11/2020
19. 19T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
3/11/2020
20. 20T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
21. 21T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
EVIDENCE BASED ROUTE
22. 22T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
What is the Evidence for
Evidence Based Decision Making?
• CUT failure rates by 50%
• INCREASE the number of RIGHT business decisions by SIX fold
• Achieves desired RESULTS 90% of the time
• EXCEEDS expectations in over 40% of the time
• 98% of Business executives FAIL to make Evidence-Based decisions
23. 23T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
What is the cost of not practicing Evidence
Based decision making?
24. 24T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
25. 25T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
26. 26T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
27. 27T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
28. 28T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
29. 29T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
30. 30T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
•Context and history of evidence-based
practice
•What is Evidence-based Blockchain (EBB)
•5 steps of EBB
•Summary and road ahead
31. 31T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
32. 32T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
33. 33T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
34. 34T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
35. 35T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Why should you scientifically
evaluate these opinions?
36. 36T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
37. 37T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Decision Making
38. 38T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Evidence Based Blockchain: EBB
“Conscientious, explicit, and judicious decision
making based on professional expertise and the best
available organisational, stakeholder and scientific
evidence.”
39. 39T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
July ‘17
to
Dec ‘17
Sources
of
Evidence
Professional
Expertise
Scientific
Evidence
Stakeholder/
Consortium
Evidence
Organisation
Evidence
40. 40T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Evidence Based Blockchain (EBB): 5 Steps
1. Formulate a precise question: (ASK)
2. Search of the Evidence, looking for answers to the question (ACQUIRE)
3. Critical appraisal of the evidence (APPRAISE)
4. Apply the results to your practice (APPLY)
5. Monitor any changes and evaluate (ASSESS)
41. 41T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
History timeline of Evidence Based Practice:
1970: Healthcare (SirArchibald Cochrane)
1990: Medical Education (Professors Guyatt & Sackett, McMaster University, Canada)
1998: Probation Services (Professor Peter Raynor, University ofWales)
1999: Social Care (National Institute of Clinical Excellence, NICE, UK)
2000: Nursing (Davies et al, University of St Andrews, UK)
2000: Criminal Justice (Professor David Farrington, University of Cambridge, UK)
2005: Employment and HR (Denise Rousseau, Carnegie Mellon University, USA)
2006: Management (Centre for Evidence Based Management,The Netherlands)
2018: Blockchain and Distributed Ledgers (The British Blockchain Association, UK)
42. 42T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
43. 43T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
44. 44T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
45. 45T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
46. 46T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
47. 47T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
48. 48T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
49. 49T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
50. 50T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
51. 51T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
52. 52T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
53. 53T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
54. 54T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
55. 55T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
56. 56T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
57. 57T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
58. 58T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
59. 59T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
60. 60T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
61. 61T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Which Problem does Evidence-Based Blockchain solve?
62. 62T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
5 major challenges:
• Not asking the right questions
• Not searching for the right information
• Not evaluating the information
• Not applying the right information
• Not assessing the right outcomes
63. 63T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Evidence Based Blockchain (EBB): Five Steps
1. Formulate a precise question: (ASK)
2. Search of the Evidence, looking for answers to the question (ACQUIRE)
3. Critical appraisal of the evidence (APPRAISE)
4. Apply the results to your practice (APPLY)
5. Monitor any changes and evaluate (ASSESS)
64. 64T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
65. 65T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
66. 66T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
67. 67T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
68. 68T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Question: - Ask
Should I use blockchain in my Supply Chain business?
69. 69T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
70. 70T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
71. 71T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
72. 72T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
“P.I.C.O” Question
73. 73T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Question:
“..Compared to existing traditional database based [C]
infrastructure, does private permissioned blockchain [I] of
Hyperledger Fabric save time, reduce costs, improve food
integrity, and increase consumer satisfaction [O] in the tracking of
seafood [P] via the supply chain, based in India..”?
74. 74T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Formulate a precise question: (ASK)
75. 75T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Where to search for Evidence? - Acquire
76. 76T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
77. 77T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
78. 78T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
79. 79T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Where to Search for High Quality Evidence?
• DOAJ
• Semantic Scholar
• Microsoft Academic
• Scopus
• WorldCat
• Web of Science
• Library Catalogues
80. 80T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
81. 81T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
82. 82T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
83. 83T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
84. 84T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
85. 85T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
86. 86T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Appraise the Evidence
87. 87T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
88. 88T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
89. 89T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
90. 90T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
91. 91T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
92. 92T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
93. 93T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
94. 94T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
95. 95T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
96. 96T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
97. 97T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
98. 98T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
99. 99T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
100. 100T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
101. 101T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Assess Results
• Why
• When
• How
• Where
• What
• Input - > Out put - > Outcome - > Impact - > Influence
102. 102T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
103. 103T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
104. 104T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
105. 105T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
106. 106T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
107. 107T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Why are we not using EBB?
• Own beliefs – Cognitive biases
• Organisational culture
• Power / politics
108. 108T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Risks of not following EBB:
• Waste of resources
• Poor quality benchmarks and frameworks
• Ineffective Policymaking
• Funding
109. 109T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
How to follow EBB:
• As an individual
• As an organisation
110. 110T H E B R I T I S H B L O C K C H A I N A S S O C I A T I O N w w w . b r i t i s h b l o c k c h a i n a s s o c i a t i o n . o r g |
Editor's Notes
How do we know what works?
How can we make better decisions? We make 35,000 decisions in a day (86,400 seconds a day)
4 people in an ecosystem:
Inventor/ Vendor/ suppliers
User
Investor
Regulator/ Policymaker/ Government
System 1 is primarily located in the limbic area, what we used to call “the reptilian brain”. It is largely automatic, instinctual, and unconscious. This is very important because that is a part of the brain that keeps us alive in dangerous situations and makes sure we pay attention to things like hunger, procreation, and rest. It is also hedonistic and mainly considers whether a possible action will make us feel good or satisfy a need. Oh, and it doesn’t “think” using words! So, forget about trying to convince System 1 to be rational!
System 2 is primarily located in the frontal area of the brain. This is one of the last parts of the brain to develop in the transition from childhood to adulthood. If you wonder why your teenager looks sort of like an adult, but certainly doesn’t act like an adult; that’s why! These areas of the brain use conscious, logical “thought”. This is where our adult ability to reflect, deliberate, and analyze is happening. Unfortunately, it works much slower than System 1. In a race between the two, System 2 will always lose. It takes more energy and resources than System 1. It is also in the part of our skull that is quite sensitive to injury (e.g., concussions, sports injuries) and infection. Because it was the last part of our human brain to evolve, many scientists believe it is more prone to processing errors, too.
So, that part of our brain that makes us most “human” is also the part that is most sensitive to being harmed and having functional errors.
In other words, out of every $100 spent, the government should dedicate $1 to making sure the other $99 actually works.
The final step, which is often overlooked, is to monitor any changes and repeat the process.
Process of carefully and systematically examining research to judge its trustworthiness, its value, and relevance in a particular context.”
IMPACT: “ Recorded or otherwise auditable occasion of influence from research on another individual or organization, demonstrated by references to, citations of or a discussion of the research or the researcher’. (LSE)