Weakness and strength of Primary and secondary dataMfaume
Diagnosis is a critical process that involves data collection, interpretation and identification of problem area. Critically discuss the method of data collection and provide their strength and weakness in diagnosis process.
GCE Sociology Revision (AQA)- Unit 1 Theories of the family (3)Haleema Begum
For AQA GCE Sociology Unit 1 Chapter 1 , Theories of the family Revision. Print out as a handout, it is a good way to revise. Application, Interpretation and Analysis tips are also included. All derived from the AS Sociology Revision Guide. Good luck!!!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Weakness and strength of Primary and secondary dataMfaume
Diagnosis is a critical process that involves data collection, interpretation and identification of problem area. Critically discuss the method of data collection and provide their strength and weakness in diagnosis process.
GCE Sociology Revision (AQA)- Unit 1 Theories of the family (3)Haleema Begum
For AQA GCE Sociology Unit 1 Chapter 1 , Theories of the family Revision. Print out as a handout, it is a good way to revise. Application, Interpretation and Analysis tips are also included. All derived from the AS Sociology Revision Guide. Good luck!!!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Research methods topic 1 choosing a research method
1. Research methods topic 1- choosing a research method
Types of data:
Sociologists use a wide variety of different methods to obtain data:
Primary and secondary sources of data.
Quantitative and qualitative data.
1) Primary data=information collected by sociologists themselves for their own purposes.Data
observed or collected directly from first-hand experience- always original as it is collected by
the investigator. This is used to test a hypothesis (an untested theory).
Methods include:
Social surveys: written questionnaire or interview.
Participant observation: sociologist joins in with the activities of the group he/she is studying.
Experiments: rarely use laboratory experiments- sometimes use field experiments and the
comparative method.
Sociologists may be able to gather precisely the information they need to test their hypotheses.
However doing so can often be costly and time-consuming.
2) Secondary data= data collected by someone else, but which the sociologist can then use.
Methods include:
Official statistics: produced by the government on a wide range of issues, such as crime, divorce,
health and unemployment, as well as other statistics produced by businesses and other
organisations.
Documents: E.g. diaries, letters, official reports, novels, newspapers and television broadcasts.
Quick and cheapway of research, since someone else has already produced the information.
However those who produce it may not be interested in the same questions as sociologists and so
secondary sources may not provide exactly the information sociologists needed.
3) Quantitative data= refers to the information gathered in numerical form.
Methods:
Official statistics=e.g. How many girls passed five or more GCSES or on the percentages on
marriages ending in a divorce.
4) Qualitative data= gives a ‘feel’ of what something is like
E.G.
What it’s like to get good GCSE results or for ones marriage to end in a divorce.
Evidence gathered by participant observation aims to give us a sense of what it feels like to be a
member of a particular group.
2. Research methods topic 1- choosing a research method
In depth interviews- gives insight into other persons shoes
This method produces rich descriptions of people’s feelings and experiences.
Quantitative data Qualitative data
Primary sources Questionnaires, structured Participant observation,
interviews. unstructured interviews.
Secondary sources Official statistics Letters, newspapers, articles.
3. Research methods topic 1- choosing a research method
Factors influencing choices of methods: PERVERT
1) practical issues:
Time and money
Personal skills and characteristicse.g. participant observation requires the ability to mix easily
with other people as well as good powers of observations.
Amount of people
Funding bodies
Subject matter- it may be harder to study a particular group or subject by one method than by
another. E.g. harder for a male to study an all-female group by means of participant observation.
2) Ethical issues= moral issues of right and wrong.
Informed consent- should have the right to refuse
Privacy and confidentiality- should keep the identity of research participants secret in order to
help to prevent possible negative effects. They should also respect the privacy of research
participants.
Vulnerable groups- special care should be taken to those who are vulnerable e.g. because of their
age, disability.
Effects on research participants- harmful effects e.g. psychological. Researchers should prevent
this.
Covert research- when researcher’s identity and research purpose is hidden from the people
being studied. This creates ethical problems, such as deceiving or lying to people in order to gain
informed consent.
3) Theoretical issues=refers to the questions of what we think society is like and whether we can
obtain an accurate, truthful picture of it.
Validity= true, genuine picture of topic being studied- allows the researcher to get closer to the
truth.
E.g. qualitative methods- participant observation gives us a more valid, truthful account of
what it is like to be a member of a group.
4. Research methods topic 1- choosing a research method
Reliability= when repeated- same results obtained.
E.g.quantitative data- written questionnaires.
Representativeness= whether or not the people we study are a typical cross- section of the
group we are interested in.
Sample- ensure its representative of typical of the wider population, we can then use findings to
make generalisations.
Large scale quantitative surveys-more likely to produce representative data.
Methodological perspective: Sociologists choice of method is also influenced by their
methodological perspective- their view of society and how we should study it.
There are two contrasting perspectives on the choice of methods:
Positivists
Interpretivists
Positivists:
Quantitative data
Seek to discover patterns of behaviour
Sociology= science
Interpretivists:
Qualitative data
Seek to understand social actors meanings
Sociology= not a science
Functionalists and Marxists often take a positivist approach. They see society as a large scale
structure that shapes our behaviour.
Interactionists favour an interpretivists approach. They see society on a micro level of society-
focussing on small scale- face to face interactions.
The sociologist’s theoretical perspective is usually the most important factor when choosing a
research method. Whenever possible, they will want to obtain the type of data- quantitative or
qualitative – that their perspective views as most appropriate.
However practical and ethical factors usually limit the choice of method. Time, resources,
access, consent, privacy- restrictions of their choice.
Choice of topic:
5. Research methods topic 1- choosing a research method
1) Theoretical perspective:
2) Society’s values:Sociologists are influenced by society’s values. As society’s values change over
time so does the focus of research.
3) Funding bodies: Most research requires funding from an external body e.g. government
agencies. As the funding body is paying for the research, it will determine the topic to be
investigated. E.g. one of the major concerns of new labour governments after 1997 was the ‘social
exclusion of some disadvantaged groups. As a result, government departments were keen to fund
research projects to investigate the causes and effects of social exclusion.
4) Practical factors: e.g. inaccessibility of certain situations may also restrict which subjects they
study e.g. male participating in an all-female group (participant observation )