Borrador de Mapa estratégico de diseño de un portal web / intranet que impulse / facilite integración y articulación de los distritos productivos / gobiernos locales a través de una plataforma web con diferentes interesados, para desarrollar en su locación un mejor lugar para vivir y trabajar.
Esta lamina es una versión reducida del mapa estratégico que he elaborado como borrador, pendiente de conectar con las perspectivas financieras, cliente/ciudadano, procesos internos, aprendizaje y crecimiento. Articula procesos con empresas / emprendedor / ciudadano / gobiernos locales / demás interesados.
Vulnerability Management: How to Think Like a Hacker to Reduce RiskBeyondTrust
Watch the full webinar recording here: https://www.beyondtrust.com/resources/webinar/vulnerability-management-how-to-think-like-a-hacker-to-reduce-risk/
This is the presentation from Security MVP, and CEO at CQURE, Paula Januszkiewicz's thought-provoking webinar on how to get inside the mind of a hacker to better manage risk and shore up organizational cyber-defenses.
Pen testing is not enough! And, while identifying, classifying, remediating, and mitigating vulnerabilities are all cornerstones of effective vulnerability management, in practice, they are often inadequately implemented.
Often, the best-designed strategies and VM implementations rely on experience.
Check out the presentation to get a taste of the webinar:
- Learn how to improve vulnerability identification and strengthen your systems
- Look over the shoulder of an expert, as Paula a demo of how to exploit systems and how (from the hacker perspective) you can learn to defuse such exploits!
Watch the webinar: https://www.beyondtrust.com/resources/webinar/vulnerability-management-how-to-think-like-a-hacker-to-reduce-risk/
Defense in Depth: Implementing a Layered Privileged Password Security Strategy BeyondTrust
Tune in to the full webinar recording here: https://www.beyondtrust.com/resources/webinar/defense-depth-implementing-layered-privileged-password-security-strategy/?access_code=eb6de71b465f16507cadfb2347a9d98f
In this presentation from the live webinar of security expert and TechVangelist Founder/Chief, Nick Cavalancia explores how to apply the defense-in-depth, layered security approach to enterprise password management. Also included in this webinar is an overview of BeyondTrust's PowerBroker Password Safe, the leading solution for enterprise password management.
Derek Milroy, IS Security Architect at U.S. Cellular Corporation, defined “vulnerability management” and how it affects today’s organizations during his presentation at the 2014 Chief Information Security Officer (CISO) Leadership Forum in Chicago on Nov. 19. In his presentation, “Enterprise Vulnerability Management/Security Incident Response,” Milroy noted vulnerability management has different meanings to different organizations, but an organization that utilizes vulnerability management processes can effectively safeguard its data.
According to Milroy, an organization should develop its own vulnerability management baselines to monitor its security levels. By doing so, Milroy said an organization can launch and control vulnerability management systems successfully. In addition, Milroy pointed out that vulnerability management problems occasionally will arise, but a well-prepared organization will be equipped to handle such issues: “Problems are going to happen … You have to work with your people. This can translate to any tool that you’re putting in place. Make sure your people have plans for what happens when it goes wrong, because it’s going to [happen] every single time.”
Milroy also noted that having actionable vulnerability management data is important for organizations of all sizes. If an organization evaluates its vulnerability management processes regularly, Milroy said, it can collect data and use this information to improve its security: “The simplest rule of thumb for vulnerability management, click the report, hand the report to someone. Don’t ever do that. There is no such thing as a report from a tool that you can just click and hand to someone until you first tune it and pare it down.”
- See more at: http://www.argylejournal.com/chief-information-security-officer/enterprise-vulnerability-managementsecurity-incident-response-derek-milroy-is-security-architect-u-s-cellular-corporation/#sthash.Buh6CzLS.dpuf
Borrador de Mapa estratégico de diseño de un portal web / intranet que impulse / facilite integración y articulación de los distritos productivos / gobiernos locales a través de una plataforma web con diferentes interesados, para desarrollar en su locación un mejor lugar para vivir y trabajar.
Esta lamina es una versión reducida del mapa estratégico que he elaborado como borrador, pendiente de conectar con las perspectivas financieras, cliente/ciudadano, procesos internos, aprendizaje y crecimiento. Articula procesos con empresas / emprendedor / ciudadano / gobiernos locales / demás interesados.
Vulnerability Management: How to Think Like a Hacker to Reduce RiskBeyondTrust
Watch the full webinar recording here: https://www.beyondtrust.com/resources/webinar/vulnerability-management-how-to-think-like-a-hacker-to-reduce-risk/
This is the presentation from Security MVP, and CEO at CQURE, Paula Januszkiewicz's thought-provoking webinar on how to get inside the mind of a hacker to better manage risk and shore up organizational cyber-defenses.
Pen testing is not enough! And, while identifying, classifying, remediating, and mitigating vulnerabilities are all cornerstones of effective vulnerability management, in practice, they are often inadequately implemented.
Often, the best-designed strategies and VM implementations rely on experience.
Check out the presentation to get a taste of the webinar:
- Learn how to improve vulnerability identification and strengthen your systems
- Look over the shoulder of an expert, as Paula a demo of how to exploit systems and how (from the hacker perspective) you can learn to defuse such exploits!
Watch the webinar: https://www.beyondtrust.com/resources/webinar/vulnerability-management-how-to-think-like-a-hacker-to-reduce-risk/
Defense in Depth: Implementing a Layered Privileged Password Security Strategy BeyondTrust
Tune in to the full webinar recording here: https://www.beyondtrust.com/resources/webinar/defense-depth-implementing-layered-privileged-password-security-strategy/?access_code=eb6de71b465f16507cadfb2347a9d98f
In this presentation from the live webinar of security expert and TechVangelist Founder/Chief, Nick Cavalancia explores how to apply the defense-in-depth, layered security approach to enterprise password management. Also included in this webinar is an overview of BeyondTrust's PowerBroker Password Safe, the leading solution for enterprise password management.
Derek Milroy, IS Security Architect at U.S. Cellular Corporation, defined “vulnerability management” and how it affects today’s organizations during his presentation at the 2014 Chief Information Security Officer (CISO) Leadership Forum in Chicago on Nov. 19. In his presentation, “Enterprise Vulnerability Management/Security Incident Response,” Milroy noted vulnerability management has different meanings to different organizations, but an organization that utilizes vulnerability management processes can effectively safeguard its data.
According to Milroy, an organization should develop its own vulnerability management baselines to monitor its security levels. By doing so, Milroy said an organization can launch and control vulnerability management systems successfully. In addition, Milroy pointed out that vulnerability management problems occasionally will arise, but a well-prepared organization will be equipped to handle such issues: “Problems are going to happen … You have to work with your people. This can translate to any tool that you’re putting in place. Make sure your people have plans for what happens when it goes wrong, because it’s going to [happen] every single time.”
Milroy also noted that having actionable vulnerability management data is important for organizations of all sizes. If an organization evaluates its vulnerability management processes regularly, Milroy said, it can collect data and use this information to improve its security: “The simplest rule of thumb for vulnerability management, click the report, hand the report to someone. Don’t ever do that. There is no such thing as a report from a tool that you can just click and hand to someone until you first tune it and pare it down.”
- See more at: http://www.argylejournal.com/chief-information-security-officer/enterprise-vulnerability-managementsecurity-incident-response-derek-milroy-is-security-architect-u-s-cellular-corporation/#sthash.Buh6CzLS.dpuf
1
Memory
Tiffany Daniels, M.S.
1
Let’s Start With a Memory
Challenge
• I’m going to read you a grocery list. Use
whatever memory strategies that you
think will be most effective to memorize
the items. When I am done, write down
as many items as you can remember.
You do not have to remember them in
order.
2
Key Terms
• Memory - The retention of information
over time through the processes of
encoding, storage, & retrieval.
• Encoding - Process by which
information gets into memory storage
• Storage - Retention of information over
time and the representation of
information in memory.
• Retrieval - The memory process of
taking information out of storage.
3
Encoding
• Requires selective attention
• Divided attention - occurs when a person
must attend to several things at once
• Selective/Sustained attention (focusing on
one thing for a prolonged period of time) is
better than divided attention in terms of
retrieval
4
Encoding
• Levels of Processing Model (Craik &
Lockhart 1972)
• Shallow level: The sensory of physical
features are analyzed.
• Intermediate level: The stimulus is
recognized and given a label.
• Deepest level: Information is processed
semantically, in terms of meaning.
5
“All I see is a bunch of ink on
this page! I’m so zoned out, I’m
not even making out the words!”
“I am reading the words but
I don’t understand it. I keep
reading the same line over
and over!”
“Not only do I understand
what I just read, but I can
apply it to myself, create
examples, and even share
what I learned with a friend!”
6
2
Encoding
• An individual’s memories are better if he or
she uses the deepest processing level.
• Memories are also better if using
elaboration when encoding.
• Elaboration: extensiveness of processing
at any given level of memory.
• Self-references, generating examples, and
using imagery are better than simple rote
memorization
7
Encoding
• Flashcards are a type of rote memorization –
how effective are they in the long term?
• It is also important to be motivated to
remember
• How easy is it to encode, store, and retrieve
information for your least favorite class?
8
Memory Storage
• The Atkinson-Shiffrin Theory (1968)
• Storage involves 3 separate systems
• Sensory Memory: time frames of a fraction
of a second to several seconds
• Short-Term Memory (STM): time frames up
to 30 seconds
• Long Term Memory (LTM): time frames up
to a lifetime
9
Sensory Memory
• Includes:
• Iconic memory (visual sensory memory) -
we can remember things that quickly flash
before our eyes
• Echoic memory (auditory sensory memory)
- we can remember sounds after the fact,
even if we weren’t attending to them.
10
Short-Term Memory
• Capacity is 7 ± 2 (called “Miller’s Magical
Number)
• Means we can usually remember on
average, between 5-9 items in a list
(example: phone numbers, Social Sec. #)
• Can improve short-term memory by using
rehearsal and chunking.
11 ...
Classmate post 11. How memories formed at the following levelsVinaOconner450
Classmate post 1:
1. How memories formed at the following levels?
· Molecular: What is long-term potentiation (LTP)?
Long term potentiation is strengthened synaptic connections through frequent activation. LTP is associated with changes in gene transcription in the neurons and is important for increased responsiveness of long lasting LTP. LTP also increases the strength of synapses by making them more sensitive to glutamate and increased activation in the future.
· Cellular: How is the hippocampus important for memory?
The hippocampus is important for memory due to its role in the overall in processing new declarative information and consolidation. Declarative memory looks like what a person knows and can tell others. This falls into two categories of semantic memory and episodic memory. This region of the brain is the important in controlling emotions, motivation and memory through the information that is processed. The hippocampus uses spatial maps and neurons to increase its ability to determine if information will be encoded, consolidated, and then retrieved for future use. Without the hippocampi in one’s brain, there is no longer a memory processing center, and no new information can enter the brain for processing and future storing. Without this region of the brain, memory does not exist.
· System: How widely are memories distributed in the brain?
Memories are stored somewhat widely, but different types of memories are stored in different places. Long term declarative memory is distributed throughout the medial temporal lobe, hippocampus, and amygdala. This includes semantic memory that deals with storage in the cortex, right frontal lobe, and temporal regions. Semantic memory is also stored in the cortex but especially in the temporal lobes. Long term nondeclarative memory is not dependent on the medial temporal lobes in the same way that declarative memory is. Skill learning and motor coordination memory, such as performing a task or remembering how to perform a task are distributed in the basal ganglia, motor cortex and cerebellum. Conditioning memory, like my body remembering that I am hungry at noon, is distributed to the cerebellum, hippocampus and cortex.
2. How would you distinguish amnesia from normal forgetting? When would you call an absent-minded person amnesic?
I would be able to distinguish amnesia from normal forgetting by looking at the degree of damage or clutter of information that needs to be recalled. A person with amnesia has had damage to their hippocampus and would have no memory or at least partial lack of memory either from the point of injury forward or from an amount of time before the injury and forward. A forgetful person may be suffering from too many things to remember, or they were not paying attention to the information that was given to them. Disruption to the memory process will complicate the encoding and consolidation processes.
I don’t honestly know if I would call an absent-minded person amnes ...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
1
Memory
Tiffany Daniels, M.S.
1
Let’s Start With a Memory
Challenge
• I’m going to read you a grocery list. Use
whatever memory strategies that you
think will be most effective to memorize
the items. When I am done, write down
as many items as you can remember.
You do not have to remember them in
order.
2
Key Terms
• Memory - The retention of information
over time through the processes of
encoding, storage, & retrieval.
• Encoding - Process by which
information gets into memory storage
• Storage - Retention of information over
time and the representation of
information in memory.
• Retrieval - The memory process of
taking information out of storage.
3
Encoding
• Requires selective attention
• Divided attention - occurs when a person
must attend to several things at once
• Selective/Sustained attention (focusing on
one thing for a prolonged period of time) is
better than divided attention in terms of
retrieval
4
Encoding
• Levels of Processing Model (Craik &
Lockhart 1972)
• Shallow level: The sensory of physical
features are analyzed.
• Intermediate level: The stimulus is
recognized and given a label.
• Deepest level: Information is processed
semantically, in terms of meaning.
5
“All I see is a bunch of ink on
this page! I’m so zoned out, I’m
not even making out the words!”
“I am reading the words but
I don’t understand it. I keep
reading the same line over
and over!”
“Not only do I understand
what I just read, but I can
apply it to myself, create
examples, and even share
what I learned with a friend!”
6
2
Encoding
• An individual’s memories are better if he or
she uses the deepest processing level.
• Memories are also better if using
elaboration when encoding.
• Elaboration: extensiveness of processing
at any given level of memory.
• Self-references, generating examples, and
using imagery are better than simple rote
memorization
7
Encoding
• Flashcards are a type of rote memorization –
how effective are they in the long term?
• It is also important to be motivated to
remember
• How easy is it to encode, store, and retrieve
information for your least favorite class?
8
Memory Storage
• The Atkinson-Shiffrin Theory (1968)
• Storage involves 3 separate systems
• Sensory Memory: time frames of a fraction
of a second to several seconds
• Short-Term Memory (STM): time frames up
to 30 seconds
• Long Term Memory (LTM): time frames up
to a lifetime
9
Sensory Memory
• Includes:
• Iconic memory (visual sensory memory) -
we can remember things that quickly flash
before our eyes
• Echoic memory (auditory sensory memory)
- we can remember sounds after the fact,
even if we weren’t attending to them.
10
Short-Term Memory
• Capacity is 7 ± 2 (called “Miller’s Magical
Number)
• Means we can usually remember on
average, between 5-9 items in a list
(example: phone numbers, Social Sec. #)
• Can improve short-term memory by using
rehearsal and chunking.
11 ...
Classmate post 11. How memories formed at the following levelsVinaOconner450
Classmate post 1:
1. How memories formed at the following levels?
· Molecular: What is long-term potentiation (LTP)?
Long term potentiation is strengthened synaptic connections through frequent activation. LTP is associated with changes in gene transcription in the neurons and is important for increased responsiveness of long lasting LTP. LTP also increases the strength of synapses by making them more sensitive to glutamate and increased activation in the future.
· Cellular: How is the hippocampus important for memory?
The hippocampus is important for memory due to its role in the overall in processing new declarative information and consolidation. Declarative memory looks like what a person knows and can tell others. This falls into two categories of semantic memory and episodic memory. This region of the brain is the important in controlling emotions, motivation and memory through the information that is processed. The hippocampus uses spatial maps and neurons to increase its ability to determine if information will be encoded, consolidated, and then retrieved for future use. Without the hippocampi in one’s brain, there is no longer a memory processing center, and no new information can enter the brain for processing and future storing. Without this region of the brain, memory does not exist.
· System: How widely are memories distributed in the brain?
Memories are stored somewhat widely, but different types of memories are stored in different places. Long term declarative memory is distributed throughout the medial temporal lobe, hippocampus, and amygdala. This includes semantic memory that deals with storage in the cortex, right frontal lobe, and temporal regions. Semantic memory is also stored in the cortex but especially in the temporal lobes. Long term nondeclarative memory is not dependent on the medial temporal lobes in the same way that declarative memory is. Skill learning and motor coordination memory, such as performing a task or remembering how to perform a task are distributed in the basal ganglia, motor cortex and cerebellum. Conditioning memory, like my body remembering that I am hungry at noon, is distributed to the cerebellum, hippocampus and cortex.
2. How would you distinguish amnesia from normal forgetting? When would you call an absent-minded person amnesic?
I would be able to distinguish amnesia from normal forgetting by looking at the degree of damage or clutter of information that needs to be recalled. A person with amnesia has had damage to their hippocampus and would have no memory or at least partial lack of memory either from the point of injury forward or from an amount of time before the injury and forward. A forgetful person may be suffering from too many things to remember, or they were not paying attention to the information that was given to them. Disruption to the memory process will complicate the encoding and consolidation processes.
I don’t honestly know if I would call an absent-minded person amnes ...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Monitoring Java Application Security with JDK Tools and JFR Events
Memory
1.
2. 1. If someone asked you what memory is (to define)
memory, what would you say?
2. Are there different types / kinds of memory? If so,
brainstorm some.
3. How important is the ability to remember? Why?
Explain your thoughts?
4. Without our memory we would not survive. Agree
or disagree, and explain your choice.
5. Without memories we would not know who we are.
Agree or disagree, and explain your choice.
3. The concept of memory is difficult to define.
Memory is one of those abilities that we take for
granted.
Certainly memory is related to learning.
Memory:
Is the system or process by which the products
or results of learning are stored for future use.
4. Serial Learning:
- Material that has been learned must be
repeated in the order which it was presented.
Examples:
- Phone numbers
- Simple procedure like how to make coffee
- Math equations
5. Paired-Associate Learning:
- Items to be recalled are learned in pairs. During recall,
one member of the pair is presented and the other is to
be recalled.
Example: Learning a foreign language, basic definition
study, etc.
Free Recall:
- When material that has been learned may be repeated in
any order. Here the task is to remember as many items as
possible, regardless of their order
Example: Essay Answers.
6. 1. Who was Herman Ebbinghaus?
2. What are nonsense syllables and why are
they important?
3. Explain the curve of forgetting.
4. What is a recognition test (provide an
example).
5. What is a relearning test? What does it
show?
7. Advertisers
have found a strategy that
emphasizes free recall. . . Use music.
How many commercials have you seen or
heard that did not include music or a jingle?
Advertisersassume that we are more likely to
remember brands and products if they are
associated with catchy phrases or jingles.
8. Surprisingly little research has been conducted to verify
this assumption
Results of research that has been done are mixed:
Some studies have yielded a positive correlation between
memory and music, some have found no relationship, and
still others have found that music can actually interfere
with recall.
Most psychologist conclude that items associated with
musical jingles or catchy phrases are easier to retrieve
from memory, but that pairing an item with music it
does not necessarily enhance recognition of those items
9.
10. •Be all that you can be •Tastes great, less filling
•Army •Miller Lite
•M'm, M'm good •Good to the last drop
•Campbell’s Soup •Maxwell House
•Waaay delicious •Don’t leave home without it
•Wendy’s •American Express
•Winston tastes good like a •Wassup?!
cigarette should •Budweiser
•Winston’s Cigarettes •Have it your way.
•A little dab'll do ya •Burger King
•Brule Cream •Got milk?
•Diamonds are forever •I’m Love’n it
•Debeers •McDonalds
•Just do it
•Nike
11. • Eat Fresh • Safeway
• Subway • Excelerate your Breath
• Have a Break • Excel
• Kit Kat • You’ll Find Us
• Betcha can’t have just one • Best Sleep Center
• Lay’s Chips • Think outside the Bun
• Makes a nice light snack • Taco Bell
• Coffee Crisp • The Best a Man can get
• Pure Nature • Gillette
• Disani • Do the Dew
• Be Kool • Mountain Dew
• Kool Aid • You can do it we can help
• Look, Ma, no cavities! • Home Depot
• Crest • What’s in your Wallet
• Zoom Zoom • Capital one
• Mazda • Is it in you?
• Ingredients for life. • Gatorade
12. Theencoding-storage-retrieval model of memory
would serve our purpose well if we only had one type
of memory to store
However, we have at least three well-defined types of
memory:
Sensory Memory
Short Term Memory
Long Term Memory
14. Therefore the information processing model of
memory must be modified:
Encoding – “type” of storage – Retrieval
1. Sensory Memory:
- Storage of sensory events such as sights, sounds, and
tastes, with no further processing or interpretation
- Provides us with a very brief image of all the stimuli
that are present at a particular moment
- it is quite large
15. Lasts
only briefly about one half to one second,
depending on which sensory systems are involved
Sensoryinformation that is not selected for further
processing by higher brain centers is displaced by
incoming stimuli and may be lost completely
16. Once info has be selected from sensory memory, it is
transferred to our conscious awareness
Info must be processed in STM before it can be
transferred to more permanent storage in LTM
STM lasts only for a short period of time
Itappears that items are lost from STM in 10 -20
seconds
17. Forexample: one study found that participants’ recall
of a three-letter stimulus fell from 90% correct
immediately following the presentation of the
stimulus, to 5% correct after 18 seconds
There are two reasons for this:
1. Unless memories are practiced or rehearsed they
become weaker and fade away
2. To make room for new incoming information some
of the memories in STM are pushed out or displaced
18. For example: In the same experiment as above
participants counted backwards by threes (an
interfering task) after learning the three-letter
stimulus.
The result was that most Short Term information was
simply lost.
19. Theory states that we can hold approximately 7 (+-) 2
items in our STM
What about phone numbers that are 10 digits with the
area code?
Grouping or chunking things is the solution
STM is limited to five to nine items 7(+-)2, each of
those items may consist of a chunk or group of items
20. Initial15-20 second STM leads to a second phase
called working memory
Working memory – the intermediate processing stage
between STM and LTM, where attention and
conscious effort are brought to bear on the material
For example: you are in class listening to a lecture in
which a definition is mentioned. While you hold what
the teacher is saying in your STM, you retrieve word
meaning from LTM. Then you use Working memory
to make sense of the new sentence you just heard.
21. Memory stage that has a very large capacity and the
capability to store information relatively permanently
Rehearsalor practice is important in the transfer of
information from STM into LTM
Two types of memory rehearsal:
1. Maintenance Rehearsal
2. Elaborative Rehearsal
22. Maintenance Rehearsal: rehearsal used when we
want to save or maintain a memory for a specific
period of time.
Elaborative Rehearsal: Meaning is added to the
material to be remembered.
- This leads to more permanent memory and promotes
transfer of information into LTM.
23. Some
memory loss is due to fading or decay of
memories over time (Curve of Forgetting)
Other memory loss is caused by interference
There are two main types of memory interference:
Proactive Interference
Retroactive Interference
24. Proactive Interference:
Situation in which previously learned (old) information
hinders the recall of information learned more recently
(new information)
For example: You move into a new house but find
yourself still using your old address and phone number
Example 2: In January many people continue to write
the previous year’s date
25. 2. Retroactive Interference:
- Situation when information learned more recently
(new information) hinders the recall of information
learned previously (old information)
- Models of memory suggests that when a memory is
recalled from LTM and enters our consciousness, it may
be combined with new information that have been
received, creating a new memory.
- If this new modified memory is properly rehearsed it
may be transferred back to LTM for permanent storage
26. 1. What word was 26 Right
written under the
diamond at the end 2 Wrong
of the trailer?
2. What mode of 6 Right
Transportation
was used to 22 Wrong
weave between
cars
27. 3. What colour was the 4 Right
first helicopter?
24 Wrong
4. How old was the last
woman / girl in the
trailer?
Woman Avg =24
Girl Avg = 18
5. Was anyone
wearing a watch? 19 Right
9 Wrong
28. 10 Techniques for Improving Memory:
Influential Factors:
1.Number of study sessions:
- Generally the greater the number of sessions the better the
learning and memory
2. Distribution of Study Sessions:
- Sessions should be spread out. Spaced practice is more
effective than massed practice
3. Meaningfulness of Material:
- If you attach meaning you will learn better and remember
longer
29. 4. Similarity of items:
- a group of items of the same general type will be
learned better than a group of dissimilar items
5. Serial Positioning:
- Items at the beginning and end of a study session or
list will be learned better than items in the middle of
the study session or list
6. Mnemonic Devices:
- When you are not able to attach authentic meaning
to information, creating associations to help you
remember the material will increase memory
30. 7. Imagery:
- Creating mental images or pictures in your mind
enhances recognition and recall of information
8. Grouping or Chunking:
- grouping similar items together into categories helps
to remember them better
9. Coding:
- Creating special codes to help learn material that
lack relevance
10. Exercise regularly – Both mind and body
31. What was his technique?
Walk a path several times
Then hang a memory on each significant part
of the path.
We are going to do that.
32. Walk a path in the school.
Classes are in session so you need to be silent.
As you walk the path create 10 anchors.
These could be rooms or teachers.
It should be some place where you have a memory.
Walk the path 4 times! Memorize the order of
your anchors.
Attach a memory technique on an anchor.
Try to have meaning to the association
Ex. Maybe Serial Positioning could be associated with the
Foods’ Lab (Cereal -> food, get it?)
33. Question #5 Will be discussed / presented and Handed
in by group:
1. Leader – Leads discussion / makes sure everyone has
contributed ideas
2. Recorder – Writes down group’s answers / thoughts
3. Focuser – Redirects the group back to the task at hand when
they get off task
4. Time Keeper – reminds group of time remaining so that task
gets complete
5. Reporter – Shares key points of the groups discussion with
the whole class
34. 3 Major types of LTM:
1. Procedural
Memory for making responses and performing
skilled actions.
35. 2. Semantic
Memory for general knowledge.
7-2 = ?
Alberta shares a border with BC
Big cities tend to be rather impersonal
Tip-Of-The-Tongue phenomenon. We will test
your semantic memory.
Write down your answers to each of the
following questions.
36. 1. Which ocean is adjacent to California?
2. Which type of engine is used to power an
automobile?
3. What do bears do in the winter?
4. What are 2 Manitoban lakes?
5. What is the capital of Saskatchewon?
6. Who was Canada’s first Prime Minister?
7. Where will the 2019 Olympics be held?
37. Name the province each of
the following cities are in:
1. Edmonton A
2. Dauphin M
3. Wistler B
4. Ottawa O
5. Medicine Hat S
6. Fort Nelson B
7. Fort Francis O
8. Abbotsford B
9. Flin Flon M
10. Moncton N
11. St. John’s N
12. Peterborough O
38. Personal experiences.
Also Called Flashbulb!
Think of a comera Take a picture and it will stay in
memory.
Here are some of mine:
May 25th 2002 4:03PM
35 cm of Snowfall Nov. 15th 2005
Nov 26th 2007
The death of Michael Jackson
Sep 11th 2001
39. Height from: 5’3 - 6’3
Weight from: 150 – 220 lbs
Age From: 17 - 37 years old
Shirt: Yellow, Green, White, Plaid
Pant Style: Khaki, Cargo, Dress, Slacks
Pant Colour: Cream, Tan, Beige, Dark, Black,
Brown, Green
Hair Style: Short, Spiky, Curly, Straight
5’10
Hair Colour: Black, Dark Brown, Light Brown,
Brown, Blonde 175 lbs
Mole
Brown Hair
Black Briefcase
White Necklace Yellow Shirt
Greenish Grey Dress Pants
Non-Athletic
Had a knife Glasses
“Looked like a white Boughen” old
21 years
40. French for “Already Seen”
There are 40 theories
70% of population stated to have experienced it
Most in ages 15 – 25
result from an overlap between the neurological systems
responsible for STM and those responsible for LTM. The events
would be stored into memory before the conscious part of the
brain even receives the information and processes it.
Disorders
Eye seeing faster than the other eye.
41. Eye- Witness Testimony
One of the most intriguing applications of the “encoding
specificity hypothesis” has been in the area of eye witness
testimony
Such testimony often play an important part in jury trials
Listen to story.
What cues were present when the accident was present?
What cues were present when the statement was made?
Is it possible for the drivers of the 2 cars to modify the memories
of the eye witness as they discussed the accident?
When you retrieve a memory from LTM it is placed in
STM. New information can then me added to the memory.
42. The” states that the effectiveness of memory retrieval is
directly related to the similarity of the cues present when
the memory was encoded.
43.
44. Eyewitness Continued…
The possibility that eyewitness reports may be inaccurate has
stimulated a large amount of psychological research
Psychologists have found that when a memory is retrieved from LTM,
it appears to be placed in STM for processing
While in STM it is possible to add new information to a memory and
then re-encode the modified memory
The next time you retrieve the new memory, your report may not
correspond exactly to what actually happened because the new
memory now contains the additional information
This effect was tested in several experiments conducted by Elizabeth
Loftus
45. American psychologist
Focus of her work was on human memory and how it can be
changed by facts, ideas, suggestions and other forms of post-
event information
Her interest in memory began with one of her first studies The
Lost in the Mall experiment.
Discovered what she termed as “False Memory Syndrome”
Discovered the “Misinformation Effect:
a memory bias that occurs when misinformation affects
people's reports of their own memory.
46. Famous Car Accident Reconstruction Experiment:
Experiment:
- Two groups of people watched a series of slides that
showed a collision between a red sports car and
another automobile
- One groups saw the red sports car approach a stop
sign at the intersection, the second group saw the
sports car approach a yield sign at the intersection
- After the slide presentation was complete the
participant were asked a series of questions about
what they had seen.
47.
48. For half of the participants in each group the questions
were consistent with what they had seen
For the participants in each group, the questions were
inconsistent with what really happened – if they had seen
a stop sign, the question referred to a yield sign, etc.
Finally, all participants were shown both pairs of slides
and asked to pick the one they had actually seen.
The results were startling:
49. 75% of individuals who were asked consistent
questions after seeing the slides correctly picked the
slide that they had seen
Only 40% of the participants asked the inconsistent
questions were able to select the slide they had
actually seen.
The experiment proved that questioning had altered
their memory of the incident
Loftus repeated a similar experiment, called the Crash
Experiment and found similar results.
Recently Loftus had found similar findings in what
became known as the “Bugs Bunny” experiment
50. In addition to demonstrating the memory –altering
effects of questioning. Loftus did many other
controversial experiments involving the accuracy of eye
witness testimonies.
Her findings all concluded three important things:
1. Participants have trouble distinguishing
between individuals of other races
2. Violence interferes with memory retrieval
3. The degree of confidence of an eye witness is
not related to the accuracy of the memory.
51. 1. Define Memory
2. Serial Paired-Association Free Recall
3. Herman Ebbinghaus and Non-Sense Syllables
4. Recognition and re-learning Test
1. Recognition: Test in which learning is measured by
th e ability to pick out obviously learned items from
a list that contains unfamiliar items ex high school
picture test.
52. 3 Stages of memory processing
Retrival Cue
Curve of Forgetting
The longer we waited the more we forgot
Atkinson – Shiffrin Model of Memory
Identify Three typses of Memory
Sensory Memory
Short Term Memory
George Miller 7 +- 2
Chunking
Working Memory
Long Term Memory
Maintenance Memory Rehersal
Elaboritive Memory Rehearsal
53. Levels of Processing:
Deeper processing of information increases the
likelihood that the information will be places in
LTM. Rehearsal is important but so is How we
rehearse.
Four Types of LTM
Tip of the Tongue
Flashbulb Memories
54. Semantic Networks
Network of related concepts that are linked together.
Ex Newspaper – Sunday, Reporter, Classified etc.
Schema
Groupings or cluster of knowledge about an object
or sequence of events.
Encoding Specificity
Five Techniques for improving Memory
What are Mnemonic Devices
57. Q1:What does it mean to have the ability to think?
That is, what is thinking?
Q2: What does it mean to be intelligent?
Q3:What are the characteristics of an intelligent
person?
Q4:Isintelligence a result of your genes (nature) or
you environment (nurture)?
Q5:Can a person learn intelligence?