An overview of the Hawaii "Eyes & Ears" Early Detection Network program, February 2010. The Hawaii Early Detection Network is working to increase public awareness of invasive species early detection and engage communities in Hawaii to monitor of their own neighborhoods for invasive plants and animals.
This presentation was designed for natural resource professionals and conservation staff to learn about some of the newest invasive plant and animal threats on the island of Maui. This presentation was originally presented by NBII Pacific Basin Information Node and the Maui Invasive Species Committee to the the West Maui Watershed Partnership on August 14, 2008
An overview of the Hawaii "Eyes & Ears" Early Detection Network program, February 2010. The Hawaii Early Detection Network is working to increase public awareness of invasive species early detection and engage communities in Hawaii to monitor of their own neighborhoods for invasive plants and animals.
This presentation was designed for natural resource professionals and conservation staff to learn about some of the newest invasive plant and animal threats on the island of Maui. This presentation was originally presented by NBII Pacific Basin Information Node and the Maui Invasive Species Committee to the the West Maui Watershed Partnership on August 14, 2008
Community Hacking Talk: Cracking The Code to Vibrant CommunitiesLaís de Oliveira
This talk is a preview of the book being published as blog at www.hackingcommunities.com
Topic: Community building.
Communities have the power to move crowds.
Building communities matters if you are in business, looking to grow a loyal customers base, build better teams or become an industry leader.
It also matters if you are a real estate developer trying to move people into your new township, an astrophysicist looking to validate a theory or a single mother looking for homeschooling advice. If you’re doing anything that adds value to the world, you need people around it. You need a community.
What if you could own the process of design, engineering, and creation of your community?
Why Hacking Communities?
It means to "crack the community code," bringing in practical steps based on experience and incorporating new, live and changing practices from the online to the offline world.
Communities are the first and most important level of human organization. We are wired to belong because that's how we survived and excelled as a species. Language, as a result of constant interaction between people, allowed us to harness the energy of ideas into action Communities powered the first form of entrepreneurship and every revolutionary moment in history started from a belief turned into reality by many individuals who spread that abstract idea.
Every person intuitively knows how to build communities but, in the last 20 years, we have rearranged ourselves thanks to technology.
Mobility and connectivity have changed the way we interact, consume and go to places.
What's next?
We need better communities suited to our new world.
Questions: What differentiates it from marketing? How is it different from any random gathering, from a small group to crowd? How are events different from your SEO strategy? What line separates your regular clients from a community?
The purpose of this book/blog is to answer these questions. This project is the result of a series of conversations with people who have been building real communities around the world.
We hope you enjoy and join the conversation. :)
Brand U! Social Media 101 for Doctoral StudentsSara Stetson
This talk was prepared for the New England Doctoral Student Conference at Rivier University. Students from the schools of education and psychology engage in a discussion about social media, 21st century skills, digital identity development and personal branding. Students learn about LinkedIn, Twitter, and other social media applications they can use to develop a personal brand. Students begin thinking about how to build a digital portfolio.
Bill Balderaz gave this presentation to Southwestern City Schools' parents and teachers. Cyberbullying is becoming an increasing concern, and this presentation shares some tips on how parents and teachers can recognize and prevent cyberbullying.
ONLINE SAFETY conference for Parents in Escuela Americana - What every parent should know about impact of new technologies on their children - www.ideaworks.la - @rokensa
Personal Branding and Internet Safety for Middle schoolRodolfo Salazar
Conference for Teens and pre teens about the consius and safe use of social media - how everything thay do in the web may enhance or negatively affect their personal brand for the present and the future - American School - 2010
¿Necesitas ayuda personalizada?
http://ideaworksweb.com
Student presentation on Internet Safety-
guidelines for security percautions with social networking websites, cyberbullying, sexting, and phishing scams.
With the growth in technology, users are able to connect with people all around the world. With social media sites such as Facebook and Twitter, people are often found to be sharing too much information. This flipbook analyzes the motivations behind over sharing and its consequences.
In 2014, feminist discourse within the games community came under attack from the “anti-SJW” movement of #GamerGate. The movement brought with it new levels of understanding of the personal risk undertaken by progressive voices in conservative communities, with tactics including trolling, doxxing, swatting, and revenge porn all rising in popularity and visibility. I will examine #GamerGate’s rhetorical strategies and particularly their emphasis on owning language, encouraging a culture of silence through fear while using apparent marginalized voices (the #notyourshield campaign) as part of a fake news strategy for creating the illusion of a diverse coalition of support. With many of the same figures and news sources involved in GamerGate now continuing to rise as part of the so-called alt-right, these tactics and their impact demonstrate the consequences of visibility, particularly for women and nonbinary individuals engaging with the current discourse on social media.
The information network created by Sir Tim Berners-Lee in 1990 to connect people to knowledge has become an important place to navigate who and what we know, as well as who we think we are. But how much of a revolution is it? This lecture will trace some of the most important developments in social uses of information technologies in order to ultimately argue that the Web does offer unprecedented opportunities to access information and galvanise communities of practice, but that the impact of this new medium will reflect an evolution rather than a revolution of communication practices.
An overview of Web research areas of interest to social scientists presented at Brunel University 3 March 2010, including an overview of my attempts to understand social influence online for my PhD thesis (http://alekskrotoski.com/tags/phd). includes general findings and an overview of the themes discussed in BBC2's Virtual Revolution series.
Community Hacking Talk: Cracking The Code to Vibrant CommunitiesLaís de Oliveira
This talk is a preview of the book being published as blog at www.hackingcommunities.com
Topic: Community building.
Communities have the power to move crowds.
Building communities matters if you are in business, looking to grow a loyal customers base, build better teams or become an industry leader.
It also matters if you are a real estate developer trying to move people into your new township, an astrophysicist looking to validate a theory or a single mother looking for homeschooling advice. If you’re doing anything that adds value to the world, you need people around it. You need a community.
What if you could own the process of design, engineering, and creation of your community?
Why Hacking Communities?
It means to "crack the community code," bringing in practical steps based on experience and incorporating new, live and changing practices from the online to the offline world.
Communities are the first and most important level of human organization. We are wired to belong because that's how we survived and excelled as a species. Language, as a result of constant interaction between people, allowed us to harness the energy of ideas into action Communities powered the first form of entrepreneurship and every revolutionary moment in history started from a belief turned into reality by many individuals who spread that abstract idea.
Every person intuitively knows how to build communities but, in the last 20 years, we have rearranged ourselves thanks to technology.
Mobility and connectivity have changed the way we interact, consume and go to places.
What's next?
We need better communities suited to our new world.
Questions: What differentiates it from marketing? How is it different from any random gathering, from a small group to crowd? How are events different from your SEO strategy? What line separates your regular clients from a community?
The purpose of this book/blog is to answer these questions. This project is the result of a series of conversations with people who have been building real communities around the world.
We hope you enjoy and join the conversation. :)
Brand U! Social Media 101 for Doctoral StudentsSara Stetson
This talk was prepared for the New England Doctoral Student Conference at Rivier University. Students from the schools of education and psychology engage in a discussion about social media, 21st century skills, digital identity development and personal branding. Students learn about LinkedIn, Twitter, and other social media applications they can use to develop a personal brand. Students begin thinking about how to build a digital portfolio.
Bill Balderaz gave this presentation to Southwestern City Schools' parents and teachers. Cyberbullying is becoming an increasing concern, and this presentation shares some tips on how parents and teachers can recognize and prevent cyberbullying.
ONLINE SAFETY conference for Parents in Escuela Americana - What every parent should know about impact of new technologies on their children - www.ideaworks.la - @rokensa
Personal Branding and Internet Safety for Middle schoolRodolfo Salazar
Conference for Teens and pre teens about the consius and safe use of social media - how everything thay do in the web may enhance or negatively affect their personal brand for the present and the future - American School - 2010
¿Necesitas ayuda personalizada?
http://ideaworksweb.com
Student presentation on Internet Safety-
guidelines for security percautions with social networking websites, cyberbullying, sexting, and phishing scams.
With the growth in technology, users are able to connect with people all around the world. With social media sites such as Facebook and Twitter, people are often found to be sharing too much information. This flipbook analyzes the motivations behind over sharing and its consequences.
In 2014, feminist discourse within the games community came under attack from the “anti-SJW” movement of #GamerGate. The movement brought with it new levels of understanding of the personal risk undertaken by progressive voices in conservative communities, with tactics including trolling, doxxing, swatting, and revenge porn all rising in popularity and visibility. I will examine #GamerGate’s rhetorical strategies and particularly their emphasis on owning language, encouraging a culture of silence through fear while using apparent marginalized voices (the #notyourshield campaign) as part of a fake news strategy for creating the illusion of a diverse coalition of support. With many of the same figures and news sources involved in GamerGate now continuing to rise as part of the so-called alt-right, these tactics and their impact demonstrate the consequences of visibility, particularly for women and nonbinary individuals engaging with the current discourse on social media.
The information network created by Sir Tim Berners-Lee in 1990 to connect people to knowledge has become an important place to navigate who and what we know, as well as who we think we are. But how much of a revolution is it? This lecture will trace some of the most important developments in social uses of information technologies in order to ultimately argue that the Web does offer unprecedented opportunities to access information and galvanise communities of practice, but that the impact of this new medium will reflect an evolution rather than a revolution of communication practices.
An overview of Web research areas of interest to social scientists presented at Brunel University 3 March 2010, including an overview of my attempts to understand social influence online for my PhD thesis (http://alekskrotoski.com/tags/phd). includes general findings and an overview of the themes discussed in BBC2's Virtual Revolution series.
from a presentation at the ExPERT Centre at Uni of Portsmouth on 8 May 2008. An* overview of three areas: online social psychology and identity, measruring relationships in SL (my research to date) and online research methods.
from the VBusiness Expo on 26 April 2008. An overview of the different approaches and challenges to researching online identity in social virtual worlds and online games
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
UiPath Test Automation using UiPath Test Suite series, part 5
Playing With People In The Metaverse
1. Playing with people in the metaverse Or, How To Think Ethically When The Bombs Are Dropping and You’ve Got A Rocket Launcher Strapped To Your Back
2.
3.
4.
5.
6. Representativeness Men 80% in Fantasy titles 20-28 years old Students or techy-types Women 20% of Fantasy-based games 60% of The Sims Online 30-45 years old In a Relationship 70% play with partner