Wagner’S Global Achievement Gap, Chapter 2guestd7caadd0
Wagner's "Learning Walks" provide some insight but do not present a complete picture of what happens in a classroom. Multiple visits over time are needed to understand classroom dynamics. Wagner likes seeing active student engagement through peer-led activities, open-ended projects, and collaborative work. He does not like passive learning like worksheets, individual work, or straight lecturing. There is disagreement around the need for balancing engaging activities with direct teaching of content and skills, as different teaching methods suit different students' learning styles.
The document discusses top tech trends including going mobile, hacker spaces, cloud computing, publishing, ebooks, big data, crowdsourcing and provides links for additional information on each topic. It encourages the reader to think big, start small, and move fast when exploring new technologies. Contact information is provided for any questions.
Pine Island, Florida is located on an island in the Gulf of Mexico, with warm temperatures year-round. The population is around 10,000 in the summer and 16,000 in the winter. Real estate ranges from $599,000 for homes with pools to $1,295,000 for larger homes with guest houses. Schools and hospitals serve the community, while local businesses provide food, supplies and activities for residents and visitors to enjoy.
Going Global: Preparing Students to be Citizens of the worldLucy Gray
This document discusses the importance of preparing students to be global citizens and connecting classrooms globally. It argues that we must teach students 21st century skills like collaboration, problem solving, and digital literacy to address complex global problems. Recommendations include having students learn about other cultures through travel or immersion experiences, teaching from a global perspective, and connecting classrooms through projects on platforms like iEARN. The goal is for students and teachers to become knowledgeable, critical thinkers aware of world events who can learn and work collaboratively across networks.
This document provides recipes for a 3-course dinner for two, including a cherry tomato and cucumber salad, herbed chicken fettuccine, and individual blueberry trifles. The salad combines tomatoes, cucumber, feta cheese, mint, oregano and shallots dressed with olive oil. The pasta dish mixes chicken, onion, bell pepper, garlic, broth and cream cheese. The trifle layers pound cake, blueberries, whipped mascarpone cream and Grand Marnier in glasses.
Wagner’S Global Achievement Gap, Chapter 2guestd7caadd0
Wagner's "Learning Walks" provide some insight but do not present a complete picture of what happens in a classroom. Multiple visits over time are needed to understand classroom dynamics. Wagner likes seeing active student engagement through peer-led activities, open-ended projects, and collaborative work. He does not like passive learning like worksheets, individual work, or straight lecturing. There is disagreement around the need for balancing engaging activities with direct teaching of content and skills, as different teaching methods suit different students' learning styles.
The document discusses top tech trends including going mobile, hacker spaces, cloud computing, publishing, ebooks, big data, crowdsourcing and provides links for additional information on each topic. It encourages the reader to think big, start small, and move fast when exploring new technologies. Contact information is provided for any questions.
Pine Island, Florida is located on an island in the Gulf of Mexico, with warm temperatures year-round. The population is around 10,000 in the summer and 16,000 in the winter. Real estate ranges from $599,000 for homes with pools to $1,295,000 for larger homes with guest houses. Schools and hospitals serve the community, while local businesses provide food, supplies and activities for residents and visitors to enjoy.
Going Global: Preparing Students to be Citizens of the worldLucy Gray
This document discusses the importance of preparing students to be global citizens and connecting classrooms globally. It argues that we must teach students 21st century skills like collaboration, problem solving, and digital literacy to address complex global problems. Recommendations include having students learn about other cultures through travel or immersion experiences, teaching from a global perspective, and connecting classrooms through projects on platforms like iEARN. The goal is for students and teachers to become knowledgeable, critical thinkers aware of world events who can learn and work collaboratively across networks.
This document provides recipes for a 3-course dinner for two, including a cherry tomato and cucumber salad, herbed chicken fettuccine, and individual blueberry trifles. The salad combines tomatoes, cucumber, feta cheese, mint, oregano and shallots dressed with olive oil. The pasta dish mixes chicken, onion, bell pepper, garlic, broth and cream cheese. The trifle layers pound cake, blueberries, whipped mascarpone cream and Grand Marnier in glasses.
Nais Co A Schools Of The Future 21st Century Capacities 11 09guestd7caadd0
- The document discusses that every few hundred years, Western civilization undergoes a sharp transformation where society rearranges itself in many ways over a few short decades.
- It notes that we are currently living through such a transformation according to Peter Drucker from 1993.
- It then lists seven essential capacities that schools of the future need to focus on to prepare students for the 21st century, including analytical thinking, communication skills, leadership, digital literacy, global awareness, adaptability and ethical decision making.
The document discusses the importance of education for children's future success and earning potential. It notes that most future jobs will require education beyond high school and that those with college degrees earn significantly more over their lifetimes. It emphasizes creating a home environment that encourages learning and expresses high expectations, as well as being involved in a child's education. Reading aloud to children is highlighted as preparing them for learning to read and keeping them engaged. Parental involvement is cited as critically important to student achievement.
Ginger has many health benefits such as treating colds, allergies, inflammation, arthritis, and digestive issues. It contains anti-viral, anti-toxic, and anti-fungal properties. Ginger also helps lower cholesterol, reduces pain, and may protect against cancer and aging disorders. It is used to treat a variety of conditions both internally and topically.
The Panama Canal connects the Atlantic and Pacific oceans through the Isthmus of Panama. It features the Gatun Locks which raise and lower ships up to 85 feet between Gatun Lake and the oceans, allowing ships to travel between the two oceans without having to navigate around the southern tip of South America.
Low self-esteem affects the way you see yourself, do your job, and relate with the people around you. Learn to overcome it with these quick tips.
More themed slides: https://slideshop.com/Themed-Slides
The document discusses the use of QR codes in libraries. It provides an overview of what QR codes are, how they work, examples of their use in libraries, considerations for implementing them like accessibility and security, and best practices. The presentation includes polls to gauge audience experience with QR codes and encourages discussion of current uses and challenges with QR codes in libraries.
The QR Question: QR Codes in Academic LibrariesKrista Godfrey
The document discusses the use of QR codes in academic libraries. It provides an overview of what QR codes are and how they can function as hyperlinks to webpages and other information. The document then discusses different ways libraries have implemented QR codes, such as linking to library resources and mobile sites. It also covers some potential issues with QR code usage, such as accessibility, the digital divide, and whether the intended audience would use them. Overall, the document serves to explore how libraries are using QR codes and provide some best practices to consider when implementing them.
How To Make a LOT More Money as a ConsultantJames Serra
James will show you how to double your income by going from a salaried permanent employee to an independent consultant. James will discuss: Differences between perm, consulting, contracting; Understanding how placement/consulting companies work; Salary vs W2 vs 1099; Certifications; Developing the needed technical and communication skills; Interviewing and resume tips; How to negotiate; Networking yourself; and the additional risks and higher expectations that go with being a consultant.
This document discusses QR codes, including what they are, how they are used in education, and how to create them. QR codes are a type of two-dimensional barcode that can store more data than traditional barcodes. They were invented in 1994 to track vehicle parts. The document provides several examples of how QR codes are used in educational settings, such as linking to supplemental course materials, eBooks, and multimedia guides. It also describes tools for generating QR codes and considerations for ensuring they can be easily scanned.
This document provides an overview of QR codes including what they are, how to create them, and how to scan them. It also discusses several ways QR codes can be used in education, such as linking to educational videos or websites, creating scavenger hunts, and adding additional information to textbooks, worksheets, or posters. The document shares many free online QR code creator tools and scanner apps that can be used by teachers and students. Overall, the document aims to educate about QR codes and inspire different ways they could be incorporated into classroom learning.
Mobile Technology to support Learning and Teachningcawa
This document discusses using mobile technology for learning and teaching. It provides examples of how smartphones and tablets can enhance education through tools like QR codes, ebooks, mind mapping apps, digital note taking, audio recording, and creating digital stories. Barriers to mobile learning like equipment issues and network charges are addressed. The document also explores optical character recognition software options to make paper documents accessible digitally, including Microsoft OneNote, Google Docs, and the Prizmo app.
This document provides an overview of curl, an open source command line tool and library for transferring data with Internet protocols. It discusses curl's history starting in 1998, its widespread usage across operating systems, CPU architectures, and planets. It also outlines curl's many supported features and protocols, large number of contributors and commits, extensive testing, and commitment to security and open development. The future of curl is discussed in the context of the growing Internet of Things and connectivity of everyday devices and appliances.
QR stands for Quick Response code
Invented in 1994 by the Toyota Motors subsidiary Denso Wave to track vehicles and parts during the manufacturing process
It is a two dimensional barcode, typically seen as a white square with black geometric shapes
It is basically a type of barcode which is readable by any camera-enabled smart phone
QR codes allow users to encode text, URLs or other data that can be scanned by smartphone cameras and linked to websites or other online content. While some question if QR codes are just a trend, others argue they provide added value and convenience by allowing easy access to mobile-optimized content from print materials. Libraries have implemented QR codes in various ways, such as linking catalog records, guides and tutorials to additional online resources accessible from mobile devices.
This document provides information about QR codes, including what they are, why they are used, and how to read, create, and use them. QR codes can encode various types of data in a machine-readable format. They are commonly used for interactive content and linking the physical world with the digital world. The document discusses how QR codes offer benefits like high data capacity even in small spaces and being readable from any direction. It also provides examples of using QR codes for applications like product information, interactive field trips, and linking physical objects to digital content. Frequently asked questions about QR codes are addressed as well.
What is Blockchain and why should we care?Paul Johnston
Blockchain is a distributed ledger or database that records transactions in a way that makes it difficult or impossible to change, hack, or cheat the system. It was originally developed for the digital currency Bitcoin but is now being explored for other uses. However, the document argues that blockchain is not well-suited for most applications and should only be used in very specific cases where there is no trust between parties, data must be immutable, or regulation cannot be relied upon. In most situations, a traditional centralized database is more practical and suitable.
QR codes can hold more data than traditional barcodes and can be scanned from any angle using smartphone cameras. They allow inclusion of various types of data like web links, contact information, maps, and video. The document provides examples of how archives can use QR codes in exhibits, finding aids, maps, and surveys to provide additional digital content to patrons. It also explains how to create and scan QR codes using free online generators and smartphone apps.
QR codes can hold more information than traditional barcodes and can be scanned from any angle using smartphone cameras. They allow inclusion of multimedia content like maps, contact information, and video tutorials. The document provides examples of how archives can use QR codes in exhibits, finding aids, maps, and surveys to provide additional digital content to patrons and help promote collections and services. It also explains how to create and scan QR codes using free online generators and smartphone apps.
Blockchain Solution in China eCommerceEdward Tsang
- Taeltech provides a complete anti-counterfeiting solution using RFID/NFC chips and blockchain to track product authenticity.
- They use Hyperledger Fabric for its permissioned blockchain network and Ethereum for its ERC20 token. The two blockchains are linked to peg loyalty points on Hyperledger to the ERC20 token.
- Taeltech has built a WeChat mini-program e-commerce solution integrated with Magento backend and uses Hyperledger Fabric to store product and order data in a decentralized manner among partners.
Universal design principles like equitable use, flexibility in use, and perceptible information are important considerations for URL shorteners and QR codes. URL shorteners like Bit.ly create memorable shortened URLs and allow users to track back to the original long URL. Bit.ly also generates QR codes, which can be scanned by mobile devices to access web content. QR codes see increasing use in education for multimedia access. More information on examining QR codes is available from Speech Techie. Contact information is provided for the presenter.
Nais Co A Schools Of The Future 21st Century Capacities 11 09guestd7caadd0
- The document discusses that every few hundred years, Western civilization undergoes a sharp transformation where society rearranges itself in many ways over a few short decades.
- It notes that we are currently living through such a transformation according to Peter Drucker from 1993.
- It then lists seven essential capacities that schools of the future need to focus on to prepare students for the 21st century, including analytical thinking, communication skills, leadership, digital literacy, global awareness, adaptability and ethical decision making.
The document discusses the importance of education for children's future success and earning potential. It notes that most future jobs will require education beyond high school and that those with college degrees earn significantly more over their lifetimes. It emphasizes creating a home environment that encourages learning and expresses high expectations, as well as being involved in a child's education. Reading aloud to children is highlighted as preparing them for learning to read and keeping them engaged. Parental involvement is cited as critically important to student achievement.
Ginger has many health benefits such as treating colds, allergies, inflammation, arthritis, and digestive issues. It contains anti-viral, anti-toxic, and anti-fungal properties. Ginger also helps lower cholesterol, reduces pain, and may protect against cancer and aging disorders. It is used to treat a variety of conditions both internally and topically.
The Panama Canal connects the Atlantic and Pacific oceans through the Isthmus of Panama. It features the Gatun Locks which raise and lower ships up to 85 feet between Gatun Lake and the oceans, allowing ships to travel between the two oceans without having to navigate around the southern tip of South America.
Low self-esteem affects the way you see yourself, do your job, and relate with the people around you. Learn to overcome it with these quick tips.
More themed slides: https://slideshop.com/Themed-Slides
The document discusses the use of QR codes in libraries. It provides an overview of what QR codes are, how they work, examples of their use in libraries, considerations for implementing them like accessibility and security, and best practices. The presentation includes polls to gauge audience experience with QR codes and encourages discussion of current uses and challenges with QR codes in libraries.
The QR Question: QR Codes in Academic LibrariesKrista Godfrey
The document discusses the use of QR codes in academic libraries. It provides an overview of what QR codes are and how they can function as hyperlinks to webpages and other information. The document then discusses different ways libraries have implemented QR codes, such as linking to library resources and mobile sites. It also covers some potential issues with QR code usage, such as accessibility, the digital divide, and whether the intended audience would use them. Overall, the document serves to explore how libraries are using QR codes and provide some best practices to consider when implementing them.
How To Make a LOT More Money as a ConsultantJames Serra
James will show you how to double your income by going from a salaried permanent employee to an independent consultant. James will discuss: Differences between perm, consulting, contracting; Understanding how placement/consulting companies work; Salary vs W2 vs 1099; Certifications; Developing the needed technical and communication skills; Interviewing and resume tips; How to negotiate; Networking yourself; and the additional risks and higher expectations that go with being a consultant.
This document discusses QR codes, including what they are, how they are used in education, and how to create them. QR codes are a type of two-dimensional barcode that can store more data than traditional barcodes. They were invented in 1994 to track vehicle parts. The document provides several examples of how QR codes are used in educational settings, such as linking to supplemental course materials, eBooks, and multimedia guides. It also describes tools for generating QR codes and considerations for ensuring they can be easily scanned.
This document provides an overview of QR codes including what they are, how to create them, and how to scan them. It also discusses several ways QR codes can be used in education, such as linking to educational videos or websites, creating scavenger hunts, and adding additional information to textbooks, worksheets, or posters. The document shares many free online QR code creator tools and scanner apps that can be used by teachers and students. Overall, the document aims to educate about QR codes and inspire different ways they could be incorporated into classroom learning.
Mobile Technology to support Learning and Teachningcawa
This document discusses using mobile technology for learning and teaching. It provides examples of how smartphones and tablets can enhance education through tools like QR codes, ebooks, mind mapping apps, digital note taking, audio recording, and creating digital stories. Barriers to mobile learning like equipment issues and network charges are addressed. The document also explores optical character recognition software options to make paper documents accessible digitally, including Microsoft OneNote, Google Docs, and the Prizmo app.
This document provides an overview of curl, an open source command line tool and library for transferring data with Internet protocols. It discusses curl's history starting in 1998, its widespread usage across operating systems, CPU architectures, and planets. It also outlines curl's many supported features and protocols, large number of contributors and commits, extensive testing, and commitment to security and open development. The future of curl is discussed in the context of the growing Internet of Things and connectivity of everyday devices and appliances.
QR stands for Quick Response code
Invented in 1994 by the Toyota Motors subsidiary Denso Wave to track vehicles and parts during the manufacturing process
It is a two dimensional barcode, typically seen as a white square with black geometric shapes
It is basically a type of barcode which is readable by any camera-enabled smart phone
QR codes allow users to encode text, URLs or other data that can be scanned by smartphone cameras and linked to websites or other online content. While some question if QR codes are just a trend, others argue they provide added value and convenience by allowing easy access to mobile-optimized content from print materials. Libraries have implemented QR codes in various ways, such as linking catalog records, guides and tutorials to additional online resources accessible from mobile devices.
This document provides information about QR codes, including what they are, why they are used, and how to read, create, and use them. QR codes can encode various types of data in a machine-readable format. They are commonly used for interactive content and linking the physical world with the digital world. The document discusses how QR codes offer benefits like high data capacity even in small spaces and being readable from any direction. It also provides examples of using QR codes for applications like product information, interactive field trips, and linking physical objects to digital content. Frequently asked questions about QR codes are addressed as well.
What is Blockchain and why should we care?Paul Johnston
Blockchain is a distributed ledger or database that records transactions in a way that makes it difficult or impossible to change, hack, or cheat the system. It was originally developed for the digital currency Bitcoin but is now being explored for other uses. However, the document argues that blockchain is not well-suited for most applications and should only be used in very specific cases where there is no trust between parties, data must be immutable, or regulation cannot be relied upon. In most situations, a traditional centralized database is more practical and suitable.
QR codes can hold more data than traditional barcodes and can be scanned from any angle using smartphone cameras. They allow inclusion of various types of data like web links, contact information, maps, and video. The document provides examples of how archives can use QR codes in exhibits, finding aids, maps, and surveys to provide additional digital content to patrons. It also explains how to create and scan QR codes using free online generators and smartphone apps.
QR codes can hold more information than traditional barcodes and can be scanned from any angle using smartphone cameras. They allow inclusion of multimedia content like maps, contact information, and video tutorials. The document provides examples of how archives can use QR codes in exhibits, finding aids, maps, and surveys to provide additional digital content to patrons and help promote collections and services. It also explains how to create and scan QR codes using free online generators and smartphone apps.
Blockchain Solution in China eCommerceEdward Tsang
- Taeltech provides a complete anti-counterfeiting solution using RFID/NFC chips and blockchain to track product authenticity.
- They use Hyperledger Fabric for its permissioned blockchain network and Ethereum for its ERC20 token. The two blockchains are linked to peg loyalty points on Hyperledger to the ERC20 token.
- Taeltech has built a WeChat mini-program e-commerce solution integrated with Magento backend and uses Hyperledger Fabric to store product and order data in a decentralized manner among partners.
Universal design principles like equitable use, flexibility in use, and perceptible information are important considerations for URL shorteners and QR codes. URL shorteners like Bit.ly create memorable shortened URLs and allow users to track back to the original long URL. Bit.ly also generates QR codes, which can be scanned by mobile devices to access web content. QR codes see increasing use in education for multimedia access. More information on examining QR codes is available from Speech Techie. Contact information is provided for the presenter.
The document discusses 2D barcodes and their uses in libraries. It provides information on what barcodes and 2D barcodes are, their advantages over traditional barcodes, and different types of 2D barcodes. It also describes how to generate 2D barcodes and gives examples of how the city of Manor is using them in their SmartTour program, which has deployed 24 QR codes across various city projects and locations at a total cost of $400 for the initial phase. The document concludes by suggesting potential future uses of QR codes and asking if the audience has any other questions.
How to Enhance Library Instruction with Mobile DevicesALATechSource
This document discusses how libraries can enhance instruction with mobile devices. It argues that how people learn has changed and is now informal, collaborative, student-centered and immersive. It provides examples of how libraries can use mobile technologies like QR codes, location-aware apps, augmented reality and screen casts to engage students. Some specific applications discussed include library orientations, research tips via text message, and getting instructional content outside the library walls. The document stresses the importance of usability testing and knowing your users when developing mobile services and content.
This document discusses AI and blockchain technologies. It provides an overview of how AI uses data from the past to predict the future, while blockchain allows anonymous and secure digital transactions. It then covers the history and applications of both AI, including machine learning, deep learning, IBM Watson and Google, as well as blockchain, including Bitcoin, Ethereum and Hyperledger. Finally, it discusses potential combinations of AI and blockchain, such as using AI to develop blockchain apps, providing AI services via blockchain, or integrating their features in applications.
This document provides a guide for using QR codes in libraries, including suggestions for where to place QR codes in physical and online library spaces to link to useful information. It also lists tools for creating QR codes and smartphone apps for scanning codes. QR codes can link users to things like a library's mobile website, floor plans, collection information, and librarian profiles to improve access to digital resources.
The Bigger Picture: Using UX to Understand Student ResearchKrista Godfrey
Students rarely asked for help when conducting research and instead relied on love and breakup letters as well as facets. Ethnographic research including mapping, interviews, usability testing and observation revealed that students were motivated to find commonalities but did not see options for getting help, even when prompted, and preferred using facets to conduct research instead of seeking assistance.
Presented Nov 18, 2015
Brief introduction to the types of cloud services, how libraries are using the cloud and the future of the cloud in libraries.
Includes presentation notes
ALA cloud computing for libraries: an introduction Krista Godfrey
This document introduces cloud computing concepts for libraries. It defines cloud computing as on-demand access to shared computing resources like networks, servers, storage and services. The document outlines different types of cloud models (public, private, hybrid etc.) and services (IaaS, PaaS, SaaS). It discusses factors driving libraries' adoption of cloud technologies and lists examples of how libraries currently use the cloud. Both benefits and issues around security, cost and control are presented. The document aims to help libraries assess whether cloud computing meets their needs.
Cloud Computing for Libraries: An Introduction (ALA TechSource webinar) Ala c...Krista Godfrey
This document discusses cloud computing for libraries. It defines cloud computing as moving from procuring and deploying hardware to managing and provisioning services. The cloud allows libraries to access resources from anywhere rather than being confined to what is housed in the physical building. The document outlines the types of cloud services including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It discusses advantages like collaboration and cost savings but also issues around reliability, privacy, and security. The document considers implications of moving to the cloud for libraries and their users.
The document discusses the importance of usability testing for improving user experience on websites. It provides an overview of different usability testing methods like expert reviews, surveys, behavioral testing, card sorting, and A/B testing. These methods help identify usability issues and ensure the website is easy to use and useful. The document also lists different tools that can be used to conduct usability testing and analyze user behavior on a website. It emphasizes the need for iterative usability testing to continuously enhance the user experience.
This document provides an overview of usability testing techniques for websites. It lists different types of attitudinal testing like surveys and focus groups. It also discusses behavioural testing methods such as card sorting, paper prototyping, A/B testing, and task observation. Specific usability guidelines around writing for the web, fonts, consistency and space are also mentioned. The document promotes an iterative design process of understanding users, prototyping, evaluating, and implementing improvements. It concludes with contact information for the author.
This document discusses creating a culture of usability by focusing on usability in web design, physical spaces, signage, establishing a usability team, providing training, and allowing time for usability practices. It encourages considering usability across various domains and notes the benefits of doing so include improving user experience and satisfaction. The document is authored by Krista Godfrey and provides her contact information for any additional questions.
This document discusses libraries moving services to the cloud. It begins by defining cloud computing and the different types of cloud models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Examples are given of how libraries currently use each cloud model. Considerations for libraries transitioning to the cloud include budget, personnel needs, bandwidth requirements, and service level agreements. The presentation raises questions about reliability, control, and the risks of vendor lock-in.
The document discusses creating a culture of usability at an organization. It covers various usability testing tools like surveys, focus groups, card sorting, and task observation that can help evaluate a website or product. It also discusses establishing a usability team, providing training, and allocating time and resources to ensure usability is prioritized. The goal is to make usability part of standard practice and provide both users and the organization benefits.
Cloud computing for libraries an introductionKrista Godfrey
This document summarizes a presentation about cloud computing for libraries. The presentation introduces cloud computing and discusses what it is, the different types of cloud services, and the advantages and issues of using cloud services. It also provides examples of how libraries currently use and could further use cloud computing, including for infrastructure, platforms, software, instruction, marketing, and productivity. The presentation addresses considerations for libraries in moving services and operations to the cloud.
This document discusses Code Year, an initiative to make coding more accessible and affordable through $35 Raspberry Pi computers and community events like meetups and hacker spaces. Code Year aims to spark people's interest in coding by making it fun and communal, though questions remain if it will truly work for all and have lasting impact.
QR codes are two-dimensional barcodes that can contain URLs, text, or phone numbers to provide new hyperlinks. They are cheap and easy to create and use, and many libraries are using them to link physical spaces and materials to digital information. The document provides information on how to create QR codes using various generators and how to read them using different QR code readers. It also includes additional resources for learning more about using QR codes in libraries.
This document discusses two browser extensions - LibX and Zotero - that help with research. LibX allows users to search library resources directly from any webpage and identifies citations and links. Zotero is a tool to collect, organize, cite, and share research sources. It syncs across devices and allows for notes and tagging. The document argues these tools should be taught to support lifelong learning and ease of use for researchers.
This document appears to be a collection of image credits without accompanying images or text. It contains 5 instances of "[image credit]" with no other context provided.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Denso wave 1994\nubiquitous in japan \nnot augmented reality\nmost common is matrix type\n
\n
\n
\n
\n
\n
only 58% have downloaded apps\n
- start with examples in the wild from the crowd\n- show own qr code business cards\nJumpScan - online profile in one place via qr code(email, phone, bio, social feeds, website)\n
\n
\n
\n
UK group Stupid creating cards with mix tapes\nfr. Incredible Things\n
\n
\n
\n
University California Berkely\n
- instructional videos at point of need (Jason Fleming)\n
- links to subject guides in the stacks\n
layfette college - where in the librayr is carmen sandiago - interactive mystery\n
- ask what they are doing\n- library success wiki has lots of examples\n- also visit blog qrinlibs.blogspot.com\n- Sacramento PL - use qrcode to launch text service\n
lots out there - just google\nwolfram alpha now creates qr codes\n
\n
- possible in google analytics, is use campaign builder (unique urls, source, etc)\n- only good for codes in your own domain though\n
shorter links generally look better use bit.ly or goo.gl\n
High Capacity Colour Barcode\n- matrix less prone to error\n
\n
\n
- Alison Hicks and Caroline Sinkinson study of qr codes at University of Colorado at Boulder (lit search)\n- positioning of codes can be problematic\n- smaller screens hard to read \n- autism and dyslexia may have problems as codes often don’t have meaning or signpost the outcome of the activity when you look at it\n- smartphones seem to be a little more accessible...\n
does everyone have a smart phone or data plan?\nare there strong enough connections?\nhow tech savvy do you need to be?\nknow how to download an app? afford to do so?\n\n
UC Irvine (Danielle Kane and Jeff Schneidewind)\n- issues with VPN - if already signed into wifi, no problem but if linked to subscription eresource and scanned first, need to sign in. \n- Android didn’t work with VPN, so have to use data plan\n
cyberthugs replacing qrcodes with own stickers to lead to nefarious sites (UK)\n\n
\n
-Mobio Naked Facts Q3 2011 report\n- don’t know how many that actually is though\n- one study, 14 million mobile users (6.2%) scanned a QR code or a barcode. Some 58% of those users scanned a QR or bar code from their home, while 39% scanned from retail stores (http://bit.ly/xKThQF)\n
study done in fall 2010, 25-54 year olds (Austin and Williams)\n41% m, 58% f\n
study done in fall 2010, 25-54 year olds (Austin and Williams)\n41% m, 58% f\n
- study of over 500 students at 24 US colleges (across US but predominantly east) - youth marketing agency , late fall 2011\n- 81% students had smartphone\n- 80% had seen a qr code\n
\n
- still not huge uptake\n- be prepared to educate users or provide links for those who don’t want to use them\n\n
Emily Casper notes importance of getting outside libraries\n
\n
\n
- placement within resources (amount of white space, etc)\n- point of need\n
\n
\n
\n
\n
- qr codes have potential:\n- to bridge physical and virtual worlds\n- information at point of need\n- aid in assessment\n- have you had success?\n