This short-but-thorough presentation from IWMI’s Valentine J Gandhi provides a valuable introduction to the gender analysis in agricultural research. Covering the many reasons for undertaking gender-sensitive research and the tools available for the job, it also looks at the skills required in an effective gender researcher, and ways to analyze and interpret results.
This project has been created for EDRD*6000 Qualitative Methods- a graduate level course at the School of Environmental Design and Rural Development at the University of Guelph. Please reference the author or appropriate sources when using any of the information presented here.
This short-but-thorough presentation from IWMI’s Valentine J Gandhi provides a valuable introduction to the gender analysis in agricultural research. Covering the many reasons for undertaking gender-sensitive research and the tools available for the job, it also looks at the skills required in an effective gender researcher, and ways to analyze and interpret results.
This project has been created for EDRD*6000 Qualitative Methods- a graduate level course at the School of Environmental Design and Rural Development at the University of Guelph. Please reference the author or appropriate sources when using any of the information presented here.
The session presents gender analysis tools that can be used during project design, implementation and evaluation. The gender analysis tools will help to make the development intervention gender sensitive, so that the benefits of project reach both women and men.
Online Advocacy for Gender Equality and Women's RightsJagriti Shankar
Gender Consultant Jagriti explains how people are using social media for making their voices heard, and reaching out to people and administrators. And what is the potential to use this medium for advancing the gender cause.
The session presents gender analysis tools that can be used during project design, implementation and evaluation. The gender analysis tools will help to make the development intervention gender sensitive, so that the benefits of project reach both women and men.
Online Advocacy for Gender Equality and Women's RightsJagriti Shankar
Gender Consultant Jagriti explains how people are using social media for making their voices heard, and reaching out to people and administrators. And what is the potential to use this medium for advancing the gender cause.
Science Forum 2013 (www.scienceforum13.org)
Breakout Session 9: Farm Size, Urbanization and the Links from Agriculture to Nutrition and Health
Agnes Andersson Djurfeldt, Lund University
"Understanding the gender dimensions of vulnerability to climate change” acti...NAP Global Network
The presentation "Understanding the gender dimensions of vulnerability to climate change" by Tonni Brodber, UN Women, delivered at the Climate Change and Gender Focal Points Workshop in Jamaica in September 2018.
“Gender equality is more than a goal in itself. It is a precondition for meeting the challenge of reducing poverty, promoting sustainable development and building good governance.”
- Kofi Annan
The practice of treating everyone fairly and justly regardless of age, with special consideration to the structural factors that privilege some age groups over others.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Christine Okali, Institute of Development Studies "Gender Planning Framework"
1. Gender Planning Frameworks
• attempts to translate the ideas of academic gender
analysis and/or feminism into practical tools and
guidelines for development planners and practitioners
• used to train people who are not gender/women in
development specialists about WHY gender is an issue
in development, as well as HOW gender is an issue in
development, usually in the context of very short courses
- one to three days
• used as a basis for gender policy in many development
agencies. Increasingly the frameworks are being used in
combination to suit institutional and development needs
• aiming to equip development planners and practitioners
with a common understanding and language to analyse
important gender issues in their work
• quite different from one another. They have different
priorities, uses and limitations.
2. Need to use frameworks with care
While they aid analysis, raise awareness and
assist in thinking through the planning process:
• none of the gender planning frameworks say all
there is to say about gender analysis.
• It is important that frameworks are used to
stimulate rather than restrict thinking about
gender issues.
• it can be useful to look at a number of
frameworks in order to think through which
approach best suits a particular situation.
3. Three Common Frameworks
• Moser: distinguishes between practical and
strategic interests in planning for empowerment
and focuses on concerns about workloads of
women.
• Harvard: Concerned with making gender
divisions of labour, roles in decision-making and
levels of control over resources, visible.
• Longwe: Directly concerned with creating
situations within which inequality, discrimination
and subordination are addressed.
4. The Harvard Framework- focus on households
Concepts and Tools: Details data needed for
planning. Implies women’s gender concerns are
to close the gaps (in workloads, decision-making
etc.) between themselves and men. Suggests
there are three main data sets required:
• Who does what, when, where and in how much
time? Called an ‘activity profile’
• Who has access and control (i.e. decision-
making) over what resources? Called an ‘access
and control profile’
• Who has access and control over benefits?
(benefit? food produced etc.)
5. Uses and Strengths of Harvard
Uses/strengths:
• micro/community level analysis for project planning -
practical, hands on
• establishes detailed base line information
• neutral/non-threatening “entry point” into gender analysis
- focuses on tangible, objective facts, and on men as
well as women, on difference rather than inequality
• easy to communicate to people who are not gender
specialists
• examination of tangible but not intangible resources, eg
social networks etc.
6. Limitations of Harvard
Limitations:
• Differences between men and women read as
disadvantage i.e. gaps that must need be filled/ gender
issues to be addressed, in order to achieve:
increases in productivity/ production
gender equity (50/50 % work/asset divisions?)
resource access and control (decision-making)
(Can ‘we’ give access and control over resources
and benefits?)
i.e. women’s empowerment?
7. Limitations of Harvard (2)
• over-simplifies what are usually complex relations – what
is ‘ownership’ in different contexts & between men and
women in different social relations?
• Suggests a level of permanency in gender roles that
denies the possibility and reality of changing gender
relations as a result of:
education
shifts in legal rights/
negotiation and bargaining between parties
concerned
roles as part of wider exchanges between kinsmen/
marital partners etc.
8. Conceptual Framework for Analysing Changing Gender Relations in Natural Resource
Research and Projects. Catherine Locke and Christine Okali. UEA. Norwich. 2000
Conceptual Understandings Generic Questions
Dynamic Analysis: Gender relations are formed and constantly
renegotiated and reconstructed by individuals and groups in direct
confrontations or through every day events.
1. What are the historical directions of change in gender
relations?
2. What is the nature of local gender relations?
3. What aspects of local gender relations are currently relatively
‘accepted’ and stable?
4. What aspects are currently highly contested, fluid or
changing?
Relational Analysis: The experiences and strategies of men and women
and their negotiations around separate and joint interests, both within
household and supra-household institutions, are integral to a gender
analysis.
1. How do women and men maintain and renegotiate gender
relations?
2. How are gender relations shaped by other social identities?
3. What is the nature of gender relations in different institutions?
4. How do women and men use these institutions to maintain
and renegotiate gender relations?
Social Analysis: Cultural constructions of gender are pervasive but also
highly specific and socially variable. Gender is an organising concept for
all aspects of social reality but the particular gender meaning of an act
cannot be read off from behaviour but depends on situational details.
1. What are local values about gender roles, resource allocations
and authority?
2. What are cultural perceptions of agricultural services and
technologies?
3. How are these two related?
Strategising: Women and men strategise to optimise their separate and
joint livelihoods and security, and junior and disadvantaged individuals
resist and contest powerful individuals. Strategies may not reflect local
cultural values about appropriate and acceptable behaviour.
1. What are the shared and separate livelihood interests of
women and men?
2. What strategies do women and men employ to advance their
joint and separate livelihood interests?
Bargaining: The relative bargaining power of women and men is
determined by concerns about household survival, extra-household
networks, economic variables and local understandings about legitimate
acts. Bargaining processes draw on and redefine cultural meanings.
1. What are the local understandings of the relative bargaining
positions of women and men?
2. How do women and men use these understandings in their
bargaining strategies?
3. How is this worked out at an individual level?
Valuing Outcomes: Women and men interpret and value the outcomes of
bargaining processes and interventions with respect to their own needs
and interests and their ongoing negotiations. Apparently similar outcomes
may have different implications and valued outcomes may be unrelated to
project objectives.
1. How do women and men strategise around interventions?
2. How do women and men experience and value outcomes?
9. Operating Principles - 1
VIGOROUSLY RESIST the notions that:
– the rural population is a collection of isolated,
atomised individuals with only individual
interests
– farmers, producers & others are neutral
actors with no gender, age, class or other
identities
– all rural areas are the same (shared history;
similar rates of change etc.)
10. Operating Principles - 2
QUESTION dominant narratives about:
– women & men in agriculture
– gender relations
– households & household decision-making
11. Operating Principles - 3
ALWAYS REMEMBER that:
– gender disadvantage is about social structure
– gender relations are maintained & re-negotiated
via dynamic processes
– men and women have multiple identities
– changes in gender relations are intrinsically
ambiguous