Presented as a webcast for Western New York Library Resources Council on April 6, 2011.
Presented as a webcast for METRO on Aug 16, 2010.
Given as a webinar for Nylink Feb 19, 2010.
Presented at the Long Island Library Resources Council November 16, 2009.
Presented at the Law Library Association of Greater New York (LLAGNY) on May 1, 2009.
Previous version presented at NEASIS&T Mobile Mania, November 5, 2008.
In this slide I present you an awareness about cyber security and crimes for students. Targeted audience are students aged 14-17 years of age. I also present common mistakes we all do in our lives that lead to cyber insecurities
In this slide I present you an awareness about cyber security and crimes for students. Targeted audience are students aged 14-17 years of age. I also present common mistakes we all do in our lives that lead to cyber insecurities
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
Online scams and frauds are one of the oldest tools in the box of cybercriminals. In this presentation, we help you understand:
a. The various types of online scams
b. Tips to stay safe from such scams
c. How Quick Heal can help prevent such scams
The presentation is all about the e-commerce infrastructures pertaining to the internet, web and mobile. It include class discussion about augmented reality, HTML 5 advantages / disadvantages and mobile apps benefits. Topics include e-commerce web store requirements, background about internet, html, web servers, websites and web browsers. The presentation was used during the Doctor in Information Technology Advance E-Commerce Course at the University of the East - Manila Campus.
this presentation highlight the importance of computer security. computer viruses and other harmful software can infect our computers and damage computer hardware and software. computer user must know about the different security measures to protect computer from these threats. this presentation presents material about different ways of computer security and moral guidelines for ethical use of computer.
Slides for a college course at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610.
Instructor: Sam Bowne
Class website: https://samsclass.info/123/123_S17.shtml
PowerPoint Version: https://graphicriver.net/item/website-proposal-powerpoint-template/19640240
Keynote Version: https://graphicriver.net/item/website-proposal-keynote-template/19635176
This presentation template is designed to provide quickly and qualitatively your website proposal to the potential client. You will find all necessary sections in this template, and you need to enter only your data and images.
Abstract: Implementation of Information & Communication Technology has changed t he way people
access and communication information. Users want easy and instant access to relevant information.
So putting pressure on library professionals to think out of the box for meeting their information
needs. Application of mobile phones to provide library and information services are significant step in
this direction. The development of mobile technology has resulted in shifting the academic
environment from traditional to mobile learning setting. This paper high-light the assumption of
mobile technology in library services, its purpose, literature review various devices, advantages,
disadvantages and prerequisites for implementing mobile based services etc.
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
Online scams and frauds are one of the oldest tools in the box of cybercriminals. In this presentation, we help you understand:
a. The various types of online scams
b. Tips to stay safe from such scams
c. How Quick Heal can help prevent such scams
The presentation is all about the e-commerce infrastructures pertaining to the internet, web and mobile. It include class discussion about augmented reality, HTML 5 advantages / disadvantages and mobile apps benefits. Topics include e-commerce web store requirements, background about internet, html, web servers, websites and web browsers. The presentation was used during the Doctor in Information Technology Advance E-Commerce Course at the University of the East - Manila Campus.
this presentation highlight the importance of computer security. computer viruses and other harmful software can infect our computers and damage computer hardware and software. computer user must know about the different security measures to protect computer from these threats. this presentation presents material about different ways of computer security and moral guidelines for ethical use of computer.
Slides for a college course at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610.
Instructor: Sam Bowne
Class website: https://samsclass.info/123/123_S17.shtml
PowerPoint Version: https://graphicriver.net/item/website-proposal-powerpoint-template/19640240
Keynote Version: https://graphicriver.net/item/website-proposal-keynote-template/19635176
This presentation template is designed to provide quickly and qualitatively your website proposal to the potential client. You will find all necessary sections in this template, and you need to enter only your data and images.
Abstract: Implementation of Information & Communication Technology has changed t he way people
access and communication information. Users want easy and instant access to relevant information.
So putting pressure on library professionals to think out of the box for meeting their information
needs. Application of mobile phones to provide library and information services are significant step in
this direction. The development of mobile technology has resulted in shifting the academic
environment from traditional to mobile learning setting. This paper high-light the assumption of
mobile technology in library services, its purpose, literature review various devices, advantages,
disadvantages and prerequisites for implementing mobile based services etc.
Anytime, anywhere, any device: mobile technologies in libraries
Mobile technology is increasingly becoming the preferred method of internet access by teenage users, and what better way for libraries to be perceived as useful and relevant than to provide instant, online, 24/7 access to reliable information using this technology? Hear how universities, schools and public libraries are marketing their services using mobile phones and devices.
Emerging Technologies for Librarians: Keeping Up & Staying FreshJennifer Koerber
When technology changes at an explosive pace, how can librarians stay on top of what might be the next device to walk through the school doors? Jennifer Koerber will focus on 3-5 emerging technologies, their place in libraries, and how to stay on top of what’s coming next as a part of evolving ourselves as librarians. Participants will brainstorm ways to evolve all their strengths, skills and interests into the next big thing.
Presentation at the MA School Library Association's Digital Day of Learning
This presentation was given on January 28, 2010, as part of Louisiana State University Libraries Tech Talks Series, facilitated by Digital Technologies Librarian Rebecca Miller
Mobile tools and services continue to be a dominant force that is changing the way libraries and their users access and use information. Learn ways that libraries can improve their mobile connection with their users, from creating accessible information to loaning hotspots and more. Don’t disappoint your mobile users! Join Chad as he highlights at least 5 ways to provide stellar mobile library services today.
Emerging Technologies for Libraries and Librarians, 2013Jennifer Baxmeyer
Slides from a presentation given to students in Professor Andrew P. Jackson's "Organization and Management: Public Libraries" class in the Graduate School of Library and Information Studies at Queens College in Queens, NY.
Course Tech 2013, Gina M. Bowers-Miller, Using Mobile Technology in the Class...Cengage Learning
This presentation will share the use of mobile applications and devices in a computer course at Harrisburg Area
Community College. CIS 145,“Using Mobile Technologies” explored apps for tablets, laptops and cell phones.
Students in this course completed a group project using&comparing three different mobile devices&apps. The
projects and results will be shared as well as an overview of the favorite apps from the class. Projects included
Mind mapping, Zombie Preparedness,Cloud-based projects and more.
Presentation given at the Chartered Institute of Library and Information Professionals in Scotland (CILIPS) 2011 conference at the Mitchell Library, 7 June.
Similar to Libraries to Go: Mobile Tech in Libraries (20)
Empowering Creativity: Exploring Makerspaces and Engaging STEM Programming in...Ellyssa Kroski
Makerspaces are creative, DIY spaces where people can gather to create, invent, and learn. In libraries they often have 3D printers, software, electronics, craft and hardware supplies and tools, and more. Forward-thinking libraries are already building their own dedicated makerspaces and developing valuable STEM programming based on the tools and technologies found therein. Learn all about the essential tools and technologies found in makerspaces and how you can host engaging STEM programming using tech such as Raspberry Pis, wearable electronics, virtual reality, and robotics in your library whether you have a dedicated makerspace or not!
Ellyssa Valenti Kroski is the Director of Innovation & Engagement at the New York Law Institute as well as an award-winning editor and author of 75 books. She is a librarian, an adjunct faculty member at San Jose State University, and an international conference speaker.
DIY Escape Rooms & Immersive Experiences in the LibraryEllyssa Kroski
Escape rooms are immersive, live-action games in which a group of participants enter a room where they must solve puzzles and collect clues in order to "escape" or win the game. These engaging and captivating games can be designed around nearly any theme from zombies to pirates to detective dramas and are being used by libraries in a multitude of ways. They can be employed simply for outreach and to engage library patrons, for incorporating instruction and experiential learning outcomes, as well as for internal staff team-building and training. You too can create this type of captivating programming for your own library for both promotion and education!
Setting up a centralized knowledge base for your library can be a great way to collaboratively brainstorm ideas, gather specialized knowledge, organize instructional resources, and even replace intranets. Creating a private, personal knowledge base will keep you organized, store your files, and provide an online space for brainstorming, reading lists, project ideas, to-do lists, and even travel plans. Learn how to create your own personal and organizational repositories of information and knowledge with no technical skills required!
Presented at the IT-faggruppen interest group of the The Danish Librarian (Workers) Union: http://blog.it-faggruppen.dk in Copenhagen, Denmark on March 15, 2010.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
65. NYU Bobst Library
http://library.nyu.edu/ask
“We've been surprised at
the breadth of questions
we get and also the
depth of answers we are
able to give in such few
characters.”
- Margaret Smith, Physical Sciences
Librarian
80. Developing a Mobile Strategy
• Ask Questions
– Who are your patrons?
– Who’s using the mobile Web?
– What devices do your patrons use?
– Is it appropriate to go mobile at this time?
• Start small and experiment
• Consider opportunities of the mobile channel
– Information needs
– Location-aware applications/services
– Text alerts
81. 7 Reasons to Go Mobile
1. 3X as many phones
2. Mobile content=ubiquitous
3. Audience diversification
4. New service types, ie.
location-aware
5. New medium
6. The way of the future
7. It’s easier than you think!
83. #1 Take No Action
• You are likely already a part of the mobile Web
• Your site may not look bad
• Mobile may not be right for you
84. #2 Mobile Alerts
• Push content via text messages
http://www.broadtexter.com
85. #3 Mobile Style Sheets
• Mobile CSS (Cascading Style Sheet) for
handhelds
86. #4 Transcoded Websites
• Technology which reformats for display on
mobile devices
• Search engines produce transcoded versions
of sites in results lists
• Skweezer
– http://www.skweezer.com
• Mowser
– http://mowser.com
87. #5 Mobile-Only Websites
Mobile-
• Many different technologies and devices
• Mobile Websites from RSS feeds
– Winksite
• http://winksite.com
– MoFuse
• http://mofuse.com
88. #5 Mobile-Only Websites
Mobile-
• Mobile Website Development Tools
– Boopsie: http://www.boopsie2.com
– Zinadoo: http://zinadoo.com
– dotMobi: http://site.mobi
91. Mobile Marketing Tips
• Prominently advertise your mobile site on
your homepage, blog, and social networking
profiles.
• Create incentives such as rewards,
downloadable content, and tips for users to
try out your mobile website.
• Integrate “push” campaigns to drive traffic to
your mobile site.
107. Mobile Device Emulators
• iPhone and iPad
– http://www.puresimstudios.com/ibbdemo/
• Android
– http://developer.android.com/sdk/index.html
• Blackberry
– http://na.blackberry.com/eng/developers/browserdev/
• Symbian (Nokia)
– http://tinyurl.com/33rxvl5
• Opera
– http://tinyurl.com/29mdnfc
108. Articles, Reports, & Resources
• On the Move with the Mobile Web:
Libraries and Mobile Technologies
– http://eprints.rclis.org/15024
• M-Libraries on Library Success Wiki
– http://tinyurl.com/ct2fam