Sustainable Connectivity after the Emergency Response Phasenicholas njoroge
World Vision is a Christian relief and development organization working in 99 countries. It focuses on helping children, families, and communities overcome poverty and injustice. World Vision responds to both natural disasters and conflicts. In 2015, it helped around 5 million children affected by emergencies. For disaster responses, World Vision aims to reach 20% of all affected children. It emphasizes preparedness through staff training, prepositioned supplies, and emergency funds. Technology like satellite communications and rapid deploy kits are used, but sustainability is a challenge once initial responses end. Potential solutions discussed include equipment leasing, shared services between organizations, and working with private sector partners to transition technologies into local communities.
Agnes Mbuya gave a presentation on the humanitarian ICT roadmap and standardization at the NETHOPE Africa Summit 2017. She discussed the current situation and different technology building blocks like mobile devices, connectivity, and cloud computing. She emphasized the need to position ICT professionals as strategic partners for the sector and leverage new technologies like blockchain, augmented reality, and artificial intelligence. Her presentation provided a vision for transforming the sector through collaboration, eliminating waste, adopting innovations, and standardizing processes.
The document summarizes a NetHope Africa Chapter meeting held in Nairobi, Kenya in June 2017. It provides background on Yves Monsenepwo's experience as the Regional IT Coordinator for IRC in Central and West Africa. It also briefly describes Business Relationship Management and its purpose of ensuring alignment between business and IT needs. Finally, it outlines some of the services provided by IRC's Business Relationship Management team to support relationships between regional, country, and local IT teams.
This document discusses best practices for data centers, covering hardware performance, high availability (HA), capacity planning, and security. It addresses choosing the right hardware, benchmark testing, HA considerations like power and cooling, clustering, disaster recovery, capacity planning factors like current and future utilization, and security risks and mitigations like physical security, patching, and data backup. The goal is to provide guidance on optimizing data center operations and ensuring continuous service availability.
This document discusses best practices in network and infrastructure management. It defines best practices and lists several frameworks for information technology (IT) best practices such as ITIL, ISO27001, and COBIT. Specific areas of focus for network infrastructure management are discussed, including change management, configuration management, and knowledge management. Change management aims to minimize the impact of changes, configuration management involves identifying and recording IT components, and knowledge management involves documenting processes. The organization discussed is implementing ITIL best practices using the ServiceNow platform for areas like incident management, problem management, and change management.
Presentation by Ayoo Osen Odicoh, Senior Gender Advisor, UN Office for the Coordination of Humanitarian Affairs (UNOCHA), Regional Office for Southern and Eastern Africa Region
ICT for Development (ICT4D) in Plan Internationalnicholas njoroge
Plan International works in over 70 countries to advance children's rights and gender equality. In Kenya, they are implementing several digital technology projects including a digital birth registration system using mobile phones, a child protection case management system, and a school attendance biometric project. These projects aim to improve access to services, monitoring, and data collection. Challenges have included infrastructure issues, differences in partner processes, and ensuring technical solutions work within existing government systems. Lessons focus on comprehensive needs assessments, building on past initiatives, linking to global goals, and strengthening digital capacity among stakeholders.
Sustainable Connectivity after the Emergency Response Phasenicholas njoroge
World Vision is a Christian relief and development organization working in 99 countries. It focuses on helping children, families, and communities overcome poverty and injustice. World Vision responds to both natural disasters and conflicts. In 2015, it helped around 5 million children affected by emergencies. For disaster responses, World Vision aims to reach 20% of all affected children. It emphasizes preparedness through staff training, prepositioned supplies, and emergency funds. Technology like satellite communications and rapid deploy kits are used, but sustainability is a challenge once initial responses end. Potential solutions discussed include equipment leasing, shared services between organizations, and working with private sector partners to transition technologies into local communities.
Agnes Mbuya gave a presentation on the humanitarian ICT roadmap and standardization at the NETHOPE Africa Summit 2017. She discussed the current situation and different technology building blocks like mobile devices, connectivity, and cloud computing. She emphasized the need to position ICT professionals as strategic partners for the sector and leverage new technologies like blockchain, augmented reality, and artificial intelligence. Her presentation provided a vision for transforming the sector through collaboration, eliminating waste, adopting innovations, and standardizing processes.
The document summarizes a NetHope Africa Chapter meeting held in Nairobi, Kenya in June 2017. It provides background on Yves Monsenepwo's experience as the Regional IT Coordinator for IRC in Central and West Africa. It also briefly describes Business Relationship Management and its purpose of ensuring alignment between business and IT needs. Finally, it outlines some of the services provided by IRC's Business Relationship Management team to support relationships between regional, country, and local IT teams.
This document discusses best practices for data centers, covering hardware performance, high availability (HA), capacity planning, and security. It addresses choosing the right hardware, benchmark testing, HA considerations like power and cooling, clustering, disaster recovery, capacity planning factors like current and future utilization, and security risks and mitigations like physical security, patching, and data backup. The goal is to provide guidance on optimizing data center operations and ensuring continuous service availability.
This document discusses best practices in network and infrastructure management. It defines best practices and lists several frameworks for information technology (IT) best practices such as ITIL, ISO27001, and COBIT. Specific areas of focus for network infrastructure management are discussed, including change management, configuration management, and knowledge management. Change management aims to minimize the impact of changes, configuration management involves identifying and recording IT components, and knowledge management involves documenting processes. The organization discussed is implementing ITIL best practices using the ServiceNow platform for areas like incident management, problem management, and change management.
Presentation by Ayoo Osen Odicoh, Senior Gender Advisor, UN Office for the Coordination of Humanitarian Affairs (UNOCHA), Regional Office for Southern and Eastern Africa Region
ICT for Development (ICT4D) in Plan Internationalnicholas njoroge
Plan International works in over 70 countries to advance children's rights and gender equality. In Kenya, they are implementing several digital technology projects including a digital birth registration system using mobile phones, a child protection case management system, and a school attendance biometric project. These projects aim to improve access to services, monitoring, and data collection. Challenges have included infrastructure issues, differences in partner processes, and ensuring technical solutions work within existing government systems. Lessons focus on comprehensive needs assessments, building on past initiatives, linking to global goals, and strengthening digital capacity among stakeholders.
Fortinet Network Security Appliance - Case Study, CARE USAnicholas njoroge
- CARE USA implemented Fortinet network security appliances across its offices globally to simplify and centralize its previously convoluted and localized ICT systems.
- The Fortinet appliances provide capabilities such as network segmentation, centralized threat management, application control and web filtering to improve security. They also enable remote management, dynamic reporting and VPN access.
- The solution deployed Fortigate appliances tailored to office sizes, with models for medium/enterprise and small offices. This provided standardized setups for firewall policies, QoS, UTM security services and WIFI access across CARE USA's network.
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Studynicholas njoroge
The document provides an overview of the Standard Network Platform (SNP) which aims to decrease ICT footprint and costs in country programs. The SNP standardizes technology and configurations agency-wide using Cisco networking equipment, virtualized Windows servers, and centralized management systems. It discusses features like content filtering, optimization of global traffic, and network services. Challenges and ongoing support processes are also outlined.
The document discusses a NETHOPE Africa Chapter meeting focused on ICT in emergencies. It outlines Isaac Kwamy's presentation on disaster management and ICT timelines. Kwamy discussed (1) using ICT for risk warning, preparedness, mitigation, and transition; (2) developing technology policies and pre-positioning technology for rapid deployment during emergencies; and (3) the three phases of emergency response - initial provision of basic ICT services, deployment of reliable infrastructure over 10 weeks, and maintaining systems for 3-12 months as they transition to permanent status.
This document discusses cloud adoption strategies for non-profits. It outlines the key business and technology drivers for moving to the cloud, including cost savings, efficiency, agility and assurance. It then describes common cloud adoption approaches like cloud experimentation, opportunistic cloud, and cloud-first strategies. The document provides recommendations for executing a cloud adoption strategy, including cataloging applications, acquiring cloud skills, and addressing governance issues. It poses questions for discussion and provides additional resources on preparing an IT organization for cloud adoption.
Business Relations and Engage - Save the Childrennicholas njoroge
This document provides an overview of Save the Children's IT department and their approach to business relations and engagement. It discusses Save the Children IT's global team structure, what they have achieved through business relations, and potential areas for collaboration with NetHope members. Key aspects of business relations covered include listening skills, relationship development, understanding the organization and individuals, effective communication, and representing both business and IT.
IT Strategy and Governance - SOS Children's Villagesnicholas njoroge
This document outlines SOS Children's Villages' ICT strategy and governance. It provides an overview of SOS, details of their income and expenditures in 2016, and their 2030 strategy. It then describes SOS ICT's mission to support digitalization and innovation across the organization. The document outlines SOS ICT's service focus and global governance structure. It provides organizational charts showing the international and regional ICT functions. Finally, it discusses the development of SOS ICT's 2017 strategy, which focuses on process analysis, digitalization, and improving their IT operating model.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Fortinet Network Security Appliance - Case Study, CARE USAnicholas njoroge
- CARE USA implemented Fortinet network security appliances across its offices globally to simplify and centralize its previously convoluted and localized ICT systems.
- The Fortinet appliances provide capabilities such as network segmentation, centralized threat management, application control and web filtering to improve security. They also enable remote management, dynamic reporting and VPN access.
- The solution deployed Fortigate appliances tailored to office sizes, with models for medium/enterprise and small offices. This provided standardized setups for firewall policies, QoS, UTM security services and WIFI access across CARE USA's network.
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Studynicholas njoroge
The document provides an overview of the Standard Network Platform (SNP) which aims to decrease ICT footprint and costs in country programs. The SNP standardizes technology and configurations agency-wide using Cisco networking equipment, virtualized Windows servers, and centralized management systems. It discusses features like content filtering, optimization of global traffic, and network services. Challenges and ongoing support processes are also outlined.
The document discusses a NETHOPE Africa Chapter meeting focused on ICT in emergencies. It outlines Isaac Kwamy's presentation on disaster management and ICT timelines. Kwamy discussed (1) using ICT for risk warning, preparedness, mitigation, and transition; (2) developing technology policies and pre-positioning technology for rapid deployment during emergencies; and (3) the three phases of emergency response - initial provision of basic ICT services, deployment of reliable infrastructure over 10 weeks, and maintaining systems for 3-12 months as they transition to permanent status.
This document discusses cloud adoption strategies for non-profits. It outlines the key business and technology drivers for moving to the cloud, including cost savings, efficiency, agility and assurance. It then describes common cloud adoption approaches like cloud experimentation, opportunistic cloud, and cloud-first strategies. The document provides recommendations for executing a cloud adoption strategy, including cataloging applications, acquiring cloud skills, and addressing governance issues. It poses questions for discussion and provides additional resources on preparing an IT organization for cloud adoption.
Business Relations and Engage - Save the Childrennicholas njoroge
This document provides an overview of Save the Children's IT department and their approach to business relations and engagement. It discusses Save the Children IT's global team structure, what they have achieved through business relations, and potential areas for collaboration with NetHope members. Key aspects of business relations covered include listening skills, relationship development, understanding the organization and individuals, effective communication, and representing both business and IT.
IT Strategy and Governance - SOS Children's Villagesnicholas njoroge
This document outlines SOS Children's Villages' ICT strategy and governance. It provides an overview of SOS, details of their income and expenditures in 2016, and their 2030 strategy. It then describes SOS ICT's mission to support digitalization and innovation across the organization. The document outlines SOS ICT's service focus and global governance structure. It provides organizational charts showing the international and regional ICT functions. Finally, it discusses the development of SOS ICT's 2017 strategy, which focuses on process analysis, digitalization, and improving their IT operating model.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Programming Foundation Models with DSPy - Meetup Slides
Meraki - Case Study, PATH International - Part 2
1. Meraki - PATH Case Study
HQ PERSPECTIVE
Seydou Belemvire
Systems Engineer
June 6th 2017
PATH/Eric Becker
2. A few years ago …
• Configuration (VPN etc …)
• Network monitoring and Alerting
• Bandwidth
• Traffic Shaping
• Mobile Device Management
• Threats Analysis and reporting
• Connectivity