Goutama Bachtiar is an IT advisor, auditor, consultant and trainer with 16 years of experience working with IT governance, risk, security, compliance and management. He has advised 6 companies and written over 300 publications. The presentation discusses opportunities in data analytics, big data, cloud computing and the Internet of Things. It also addresses management concerns regarding business productivity, alignment between IT and business strategies, and ensuring reliable and efficient IT systems. Emerging roles for IT professionals are also discussed such as chief technology officer, chief information officer and other C-level IT roles.
Valuing Information Management and IT ArchitectureGoutama Bachtiar
Delivered in guest lecture session for International Business Accounting Program, Faculty of Business and Management, Petra Christian University, Surabaya, East Java, Indonesia.
Any business having unsecured revolving balances have to worry about potential fraud. Why? Fraud occurences typically show an inverse proportion to an organization's customer centricity, ie, more customer centricity higher the likelihhod of a fraud occurring.
#IBMInsight session presentation "Mitigate Risk, Combat Fraud and Financial Crimes"
The Issue of fraud, challenges, fighting fraud as an enterprise endeavor, IBM Smarter counter fraud framework and IBM Counter Fraud business services
More at ibm.biz/BdEPRH
Valuing Information Management and IT ArchitectureGoutama Bachtiar
Delivered in guest lecture session for International Business Accounting Program, Faculty of Business and Management, Petra Christian University, Surabaya, East Java, Indonesia.
Any business having unsecured revolving balances have to worry about potential fraud. Why? Fraud occurences typically show an inverse proportion to an organization's customer centricity, ie, more customer centricity higher the likelihhod of a fraud occurring.
#IBMInsight session presentation "Mitigate Risk, Combat Fraud and Financial Crimes"
The Issue of fraud, challenges, fighting fraud as an enterprise endeavor, IBM Smarter counter fraud framework and IBM Counter Fraud business services
More at ibm.biz/BdEPRH
This presentation explains Information Governance. Learn what it takes to improve the value of information, manage information risks, and reduce information costs.
White Paper: The Business Case for IT Governance in the Age of Digital Transf...SDI Presence LLC
Why is strong #ITGovernance a strategic mandate in light of business’ use of evolving digital technologies throughout their organization?
SDI Presence assesses the management challenges of legacy and emerging IT throughout an organization and effective processes establishing for #ITGovernance framework in the first of our new “Building Smarter Organizations” white paper series: “The Business Case for an IT Governance in the Age of Digital Transformation”
There is growing discussion in many organizations on monetizing data, not only as a revenue source, but as a balance sheet item. John will cover some of the new and more interesting methods being kicked around for measuring data as an asset.
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
Your data has value to your organisation and to relevant data sharing partners. It has been expensively obtained. It represents a valuable asset on which a return must be generated. To achieve the value inherent in the data you need to be able to make it appropriately available to others, both within and outside the organisation.
Organisations are frequently data rich and information poor, lacking the skills, experience and resources to convert raw data into value.
These notes outline technology approaches to achieving compliance with data privacy regulations and legislation while providing access to data.
There are different routes to making data accessible and shareable within and outside the organisation without compromising compliance with data protection legislation and regulations and removing the risk associated with allowing access to personal data:
• Differential Privacy – source data is summarised and individual personal references are removed. The one-to-one correspondence between original and transformed data has been removed
• Anonymisation – identifying data is destroyed and cannot be recovered so individual cannot be identified. There is still a one-to-one correspondence between original and transformed data
• Pseudonymisation – identifying data is encrypted and recovery data/token is stored securely elsewhere. There is still a one-to-one correspondence between original and transformed data
These technologies and approaches are not mutually exclusive – each is appropriate to differing data sharing and data access use cases
The data privacy regulatory and legislative landscape is complex and getting even more complex so an approach to data access and sharing that embeds compliance as a matter of course is required.
Appropriate technology appropriately implemented and operated is a means of managing and reducing risks of re-identification by making the time, skills, resources and money necessary to achieve this unrealistic.
Technology is part of a risk management approach to data privacy. There is wider operational data sharing and data privacy framework that includes technology aspects, among other key areas. Using these technologies will embed such compliance by design into your data sharing and access facilities. This will allow you to realise value from your data successfully.
Fintech workshop Part I - Law Society of Hong Kong - XccelerateHenrique Centieiro
What is fintech? What are the technologies leveraging Fintech? How AI, Blockchain, Cloud and Data Analytics are changing the financial world?
Henrique works as Innovation Project Manager implementing Fintech and Blockchain Projects for the Financial Industry
Find me here: linkedin.com/in/henriquecentieiro
Presentation to introduce information governance. This should be used in conjunction with the paper I published on my website. A full information governance methodology, with research included from the foremost authorities on data governance.
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningCognizant
For the digital enterprise, architecture of all varieties must evolve strategically in step with technological capabilities and business imperatives. Such a multidimensional approach includes automation, AI, analytics, big data management and digitization as a holistic phenomenon.
IBM Solutions Connect 2013 - Getting started with Big DataIBM Software India
You've heard of Big Data for sure. But what are the implications of this for your organisation? Can your organisation leverage Big Data too? If you decide to go ahead with your Big Data implementation where do you start? If these questions sound familiar to you then you've stumbled upon the right presentation. Go through the presentation to:
a. Learn more on Big data
b. How Big data can help you outperform in your marketplace.
c. How to proactively manage security and risk
d. How to create IT agility to underpin the business
Also, learn about IBM's superior Big Data technologies and how they are helping today's organisations take smarter decisions and actions.
8 reasons you need a strategy for managing information...before it's too lateJohn Mancini
Highlights from a keynote presentation that complements AIIM's free e-book -- 8 reasons you need a strategy for managing information...before it's too late.
E-book available at http://www.aiim.org/8things
Planning Information Governance and Litigation ReadinessRich Medina
Presentation on Information Governance, Litigation Readiness, E-Discovery, and Records Management. Given at the AIIM-Wisconsin / Milwaukee Bar Association 6th Annual Electronic Discovery Conference on November 1, 2013.
Digital Transformation 101 — How Will It Affect Your Business?PECB
Digital transformation means adapting to not only new technologies that are available but also changes in customer expectations, societal shifts, and industry disruptions. Businesses, in responding to these shifts, are needing to become more customer-focused, agile, adaptive to new opportunities, and efficient in order to stay competitive. Digital transformation is how they can rise to meet these expectations at scale.
As businesses undergo digital transformation they implement technology, processes, and big data to solve traditional business problems. These digitized strategies and new business models open up the potential for new streams of income, new partnerships, and a broader reach for the brand.
The webinar will covered:
• What is Digital Transformation?
• How will it affect your business operations?
• How to adapt in the Digital Transformation era?
YouTube video: https://youtu.be/e-GjiwCzUPg
Data Driven Decisions - Big Data Warehousing Meetup, FICOCaserta
Predictive analytics has always been about the future, and the age of big data has made that future an increasingly dynamic place, filled with opportunity and risk.
The evolution of advanced analytics technologies and the continual development of new analytical methodologies can help to optimize financial results, enable systems and services based on machine learning, obviate or mitigate fraud and reduce cybersecurity risks, among many other things.
Caserta Concepts, Zementis, and guest speaker from FICO presented the strategies, technologies and use cases driving predictive analytics in a big data environment.
For more information, visit www.casertaconcepts.com or contact us at info@casertaconcepts.com
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
Organizations lose an estimated five percent of annual revenues to fraud, totaling nearly $1 trillion in the U.S. alone. Cyber criminals are more organized and better equipped than ever, and continue to evolve their strategies in order to undermine even the strongest protections.
We continue to hear about major security breaches across all industries, but what is being done to fix the problem? There must be a tight interlock between risk, security, fraud and financial crimes management. Current solutions are proving inadequate as point solutions and a corporate silo mentality directly contribute to the risk of fraudulent activities going undetected.
Our webinar covered:
-How IBM’s Smarter Counter Fraud initiative can help public and private organizations prevent, identify and investigate fraudulent activities
-Real-world use cases including how one financial institution stopped $1M in fraud in the first week after implementing a counter-fraud solution
-Perficient’s multi-tiered approach to help guide successful business outcomes
It’s time to stop the bad guys with IBM Smarter Counter Fraud and Perficient – learn how now!
Business Intelligence, Data Analytics, and AIJohnny Jepp
Data is the new currency. In this session, best practices on data collection, management dashboards, and used cases will be shared using Azure Data Services.
Video accessible at bit.ly/APACSummitOnDemand
Shwetank Sheel
Chief Executive Officer
Just Analytics
Poonam Sampat
Cloud Solution Architect - Data & AI
Microsoft Asia Pacific
Are you exploring the best way for your business to save expenses, enhance margin, or reinvest in the coming years? Check out the top technological advancements in business that are beneficial for business expansion and that result in a technology roadmap that has an impact on a number of the organization's strategic goals.
For more information, see: https://www.albiorixtech.com/blog/technology-trends-in-business/
#technology #technologytrends #webappdevelopment #mobileappdevelopment #softwaredevelopment
This presentation explains Information Governance. Learn what it takes to improve the value of information, manage information risks, and reduce information costs.
White Paper: The Business Case for IT Governance in the Age of Digital Transf...SDI Presence LLC
Why is strong #ITGovernance a strategic mandate in light of business’ use of evolving digital technologies throughout their organization?
SDI Presence assesses the management challenges of legacy and emerging IT throughout an organization and effective processes establishing for #ITGovernance framework in the first of our new “Building Smarter Organizations” white paper series: “The Business Case for an IT Governance in the Age of Digital Transformation”
There is growing discussion in many organizations on monetizing data, not only as a revenue source, but as a balance sheet item. John will cover some of the new and more interesting methods being kicked around for measuring data as an asset.
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
Your data has value to your organisation and to relevant data sharing partners. It has been expensively obtained. It represents a valuable asset on which a return must be generated. To achieve the value inherent in the data you need to be able to make it appropriately available to others, both within and outside the organisation.
Organisations are frequently data rich and information poor, lacking the skills, experience and resources to convert raw data into value.
These notes outline technology approaches to achieving compliance with data privacy regulations and legislation while providing access to data.
There are different routes to making data accessible and shareable within and outside the organisation without compromising compliance with data protection legislation and regulations and removing the risk associated with allowing access to personal data:
• Differential Privacy – source data is summarised and individual personal references are removed. The one-to-one correspondence between original and transformed data has been removed
• Anonymisation – identifying data is destroyed and cannot be recovered so individual cannot be identified. There is still a one-to-one correspondence between original and transformed data
• Pseudonymisation – identifying data is encrypted and recovery data/token is stored securely elsewhere. There is still a one-to-one correspondence between original and transformed data
These technologies and approaches are not mutually exclusive – each is appropriate to differing data sharing and data access use cases
The data privacy regulatory and legislative landscape is complex and getting even more complex so an approach to data access and sharing that embeds compliance as a matter of course is required.
Appropriate technology appropriately implemented and operated is a means of managing and reducing risks of re-identification by making the time, skills, resources and money necessary to achieve this unrealistic.
Technology is part of a risk management approach to data privacy. There is wider operational data sharing and data privacy framework that includes technology aspects, among other key areas. Using these technologies will embed such compliance by design into your data sharing and access facilities. This will allow you to realise value from your data successfully.
Fintech workshop Part I - Law Society of Hong Kong - XccelerateHenrique Centieiro
What is fintech? What are the technologies leveraging Fintech? How AI, Blockchain, Cloud and Data Analytics are changing the financial world?
Henrique works as Innovation Project Manager implementing Fintech and Blockchain Projects for the Financial Industry
Find me here: linkedin.com/in/henriquecentieiro
Presentation to introduce information governance. This should be used in conjunction with the paper I published on my website. A full information governance methodology, with research included from the foremost authorities on data governance.
Digital Enterprise Architecture: Four Elements Critical to Solution EnvisioningCognizant
For the digital enterprise, architecture of all varieties must evolve strategically in step with technological capabilities and business imperatives. Such a multidimensional approach includes automation, AI, analytics, big data management and digitization as a holistic phenomenon.
IBM Solutions Connect 2013 - Getting started with Big DataIBM Software India
You've heard of Big Data for sure. But what are the implications of this for your organisation? Can your organisation leverage Big Data too? If you decide to go ahead with your Big Data implementation where do you start? If these questions sound familiar to you then you've stumbled upon the right presentation. Go through the presentation to:
a. Learn more on Big data
b. How Big data can help you outperform in your marketplace.
c. How to proactively manage security and risk
d. How to create IT agility to underpin the business
Also, learn about IBM's superior Big Data technologies and how they are helping today's organisations take smarter decisions and actions.
8 reasons you need a strategy for managing information...before it's too lateJohn Mancini
Highlights from a keynote presentation that complements AIIM's free e-book -- 8 reasons you need a strategy for managing information...before it's too late.
E-book available at http://www.aiim.org/8things
Planning Information Governance and Litigation ReadinessRich Medina
Presentation on Information Governance, Litigation Readiness, E-Discovery, and Records Management. Given at the AIIM-Wisconsin / Milwaukee Bar Association 6th Annual Electronic Discovery Conference on November 1, 2013.
Digital Transformation 101 — How Will It Affect Your Business?PECB
Digital transformation means adapting to not only new technologies that are available but also changes in customer expectations, societal shifts, and industry disruptions. Businesses, in responding to these shifts, are needing to become more customer-focused, agile, adaptive to new opportunities, and efficient in order to stay competitive. Digital transformation is how they can rise to meet these expectations at scale.
As businesses undergo digital transformation they implement technology, processes, and big data to solve traditional business problems. These digitized strategies and new business models open up the potential for new streams of income, new partnerships, and a broader reach for the brand.
The webinar will covered:
• What is Digital Transformation?
• How will it affect your business operations?
• How to adapt in the Digital Transformation era?
YouTube video: https://youtu.be/e-GjiwCzUPg
Data Driven Decisions - Big Data Warehousing Meetup, FICOCaserta
Predictive analytics has always been about the future, and the age of big data has made that future an increasingly dynamic place, filled with opportunity and risk.
The evolution of advanced analytics technologies and the continual development of new analytical methodologies can help to optimize financial results, enable systems and services based on machine learning, obviate or mitigate fraud and reduce cybersecurity risks, among many other things.
Caserta Concepts, Zementis, and guest speaker from FICO presented the strategies, technologies and use cases driving predictive analytics in a big data environment.
For more information, visit www.casertaconcepts.com or contact us at info@casertaconcepts.com
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
Organizations lose an estimated five percent of annual revenues to fraud, totaling nearly $1 trillion in the U.S. alone. Cyber criminals are more organized and better equipped than ever, and continue to evolve their strategies in order to undermine even the strongest protections.
We continue to hear about major security breaches across all industries, but what is being done to fix the problem? There must be a tight interlock between risk, security, fraud and financial crimes management. Current solutions are proving inadequate as point solutions and a corporate silo mentality directly contribute to the risk of fraudulent activities going undetected.
Our webinar covered:
-How IBM’s Smarter Counter Fraud initiative can help public and private organizations prevent, identify and investigate fraudulent activities
-Real-world use cases including how one financial institution stopped $1M in fraud in the first week after implementing a counter-fraud solution
-Perficient’s multi-tiered approach to help guide successful business outcomes
It’s time to stop the bad guys with IBM Smarter Counter Fraud and Perficient – learn how now!
Business Intelligence, Data Analytics, and AIJohnny Jepp
Data is the new currency. In this session, best practices on data collection, management dashboards, and used cases will be shared using Azure Data Services.
Video accessible at bit.ly/APACSummitOnDemand
Shwetank Sheel
Chief Executive Officer
Just Analytics
Poonam Sampat
Cloud Solution Architect - Data & AI
Microsoft Asia Pacific
Are you exploring the best way for your business to save expenses, enhance margin, or reinvest in the coming years? Check out the top technological advancements in business that are beneficial for business expansion and that result in a technology roadmap that has an impact on a number of the organization's strategic goals.
For more information, see: https://www.albiorixtech.com/blog/technology-trends-in-business/
#technology #technologytrends #webappdevelopment #mobileappdevelopment #softwaredevelopment
It is a fascinating, explosive time for enterprise analytics.
It is from the position of analytics leadership that the enterprise mission will be executed and company leadership will emerge. The data professional is absolutely sitting on the performance of the company in this information economy and has an obligation to demonstrate the possibilities and originate the architecture, data, and projects that will deliver analytics. After all, no matter what business you’re in, you’re in the business of analytics.
The coming years will be full of big changes in enterprise analytics and data architecture. William will kick off the fifth year of the Advanced Analytics series with a discussion of the trends winning organizations should build into their plans, expectations, vision, and awareness now.
Data analytics tools help organizations derive insights from vast amounts of data, enabling informed decision-making, identifying trends and patterns, personalizing customer experiences, optimizing processes, and driving innovation and competitive advantage.
Keynote presentation from IBM Solutions Connect 2013 covering topics such as changing business world today and how technologies can help organisations cope with this change and move forward.
Certus Accelerate - Building the business case for why you need to invest in ...Certus Solutions
Becoming an analytically driven or cognitive business is a journey.
Businesses will be able to rapidly capitalize on new opportunities if they have invested in the foundations of their information management systems.
Data analytics can immensely impact and improve a business’s decision-making processes. From better strategies to profits, explore the full scope of analytics.
Data analytics can immensely impact and improve a business’s decision-making processes. From better strategies to profits, explore the full scope of analytics.
How Insurers Can Tame Data to Drive InnovationCognizant
To thrive among entrenched rivals and compete more effectively with digital natives, insurers will need to get their data right. That will mean moving to more responsive, AI-enabled architectures that accelerate data management and deliver insights that drive business performance.
In this white paper, we’ll spread the light on such issues as:
- What big data is
- How data science creates a real value in retail
- 5 big data use-cases revealing how retail companies can turn their customers’ data in action
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxstilliegeorgiana
Project 3 – Hollywood and IT
· Find 10 incidents of Hollywood portraying IT security incorrectly
· You can use movies or TV episodes
· Write 2-5 paragraphs for each incident. Use supporting citations for each part.
· What has Hollywood portrayed wrong? Describe the scene and what is being shown. Make sure to state whether it is partially wrong or totally fictitious.
· How would you protect/secure against what they show (answers might include install firewall, load Antivirus etc.)
· Use APA formatting for your sources on everything.
· Make sure to put your name on assignment.
Big Data and Social Media
Colgate Palmolive
Agenda Of socail media use
Buisness intellegence and Social media concenpts
Intellegent organization
Data Anaylysis and Data trustworthiness
Conclusion
Buisness intellegence and Social media concenpts
No-Hassle Documentation
Gain Trusted Followers
Spy on Competition
Learn Customer Demographics
Research and Analyze Events
Advertise More Accurately
Intellegent organization
They consistently use (big) data proactively
They know exactly where they want to go: all-round vision
They continuously discuss business matters: alignment
They talk to each other regarding positive and negative performance
They know their customers through and through
They think and work in an agile way
Data Anaylysis and Data trustworthiness
Data completeness and accuracy
Data credibility
Data consistency
Data processing and algorithms
Data Validity
Conclusion
How Colgate benefit from Big Data and Social Media
Social media increases sales and customers
Big data shows popular trends and popular companies
All around they are both beneficial
Big Data can find trends that can benefit you greatly
Criteria
Title Page:
Name, Contact info, title of Presentation
Slide 1
Adenda : Topic you going to cover in order
Slide 2
Discuss how big data, social media concepts and knowledge to successfully create business intellegence (Support your bullets points with data, analysis, charts)
Slide 3
Describe how big data can be used to build an intelligent organization
Slide 4
Discuss the importance of data source trustworthiness and data analysis
Slide 5
Conclusion
Slide 6
Big Data And Business Intelligence
Business Value With Big Data
For business to survive in a competitive environment, organizational change requires improved governance, sponsorship, processes, and controls, in addition to new skill sets and technology all work in harmony to deliver the benefits of big data. See Fig. 13.2
Data science has taken the business world by storm. Every field of study and area of business has been affected as companies realize the value of the incredible quantities of data being generated. But to extract value from those data, one needs to be trained in the proper data science skills. The R programming language has become the de fac to programming language for data science. Its flexibility, power, sophistication, and expressiveness have ma ...
Similar to Riding and Capitalizing the Next Wave of Information Technology (20)
Discussing how to deal with frauds occurred in e-banking channels by implementing end-to-end controls (deterrent, preventive, detective, responsive, corrective and recovery), the line of defences as well as deploying numerous anti-fraud strategies.
Utilizing Internet for Fraud Examination and InvestigationGoutama Bachtiar
1st Session titled Redefining Fraud, Examination, Investigation and Cyber Crime delivered for Indonesia's Risk Management Certification Agency named Badan Sertifikasi Manajemen Resiko (BSMR).
The seminar itself titled 'Preventing Fraud within E-Channels in Banking Sector'.
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
Delivered in a guest lecture session conducted for Faculty of Communication Science, Padjadjaran University, West Java, Indonesia. It includes the topic on Indonesia's Laws #14 Year of 2008 on Disclosure of Public Information.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Riding and Capitalizing the Next Wave of Information Technology
1. Riding and Capitalizing
the Next Wave of
Information Technology
Goutama Bachtiar
IT Advisor, Auditor, Consultant and Trainer
@goudotmobi
2. My Professional Profile
16 years of experience with exposure in IT Governance,
Risk, Security, Compliance, Assurance and Management.
Advisor at six companies.
ISACA International Subject Matter Expert, Certification
Exam and QAE Developer.
Project Management Institute International Program
Evaluator, Certification Exam and Study Materials
Developer.
Reviewer Panel at three international journals.
Have audited and consulted 30+ companies.
Have written, edited and reviewed 300+ manuscripts,
articles and pieces in ICT, business and management
spaces.
Have attained 65 international certifications under his belt.
2
3. To d a y ’s Se s s i o n
IT and Management: Exploring Opportunities
and Overcoming Challenges
Addressing Management Concerns and
Influencing Factors
Valuing Agility and Consumerization
Comprehending Strategic Planning and
Competitive Models
Ever Wonder How Important IT to Your (IT)
Careers?
3
4. IT AND MANAGEMENT:
EXPLORING THE OPPORTUNITIES
AND
OVERCOMING THE CHALLENGES
4
5. Data Analytics
Specialized software, capabilities, and components
exploring huge volumes of data to provide greater
insight and intelligence rapidly.
It includes:
Locating and collecting reliable data from multiple
sources in various formats.
Preparing data for analysis by organizing,
standardizing, removing duplicates and data
cleansing.
Performing correct and verifying analyses, and in the
end do the reporting.
5
6. What’s Data Analytics for?
To help organizations achieving business
outcomes:
• Grow their customer base
• Retain the most profitable customers
• Continuously improve operational efficiency
• Transform and automate financial processes
• Detect and deter fraud
6
7. Real World Examples
Overstock.com
“We’re not trying to use social media as
a sales piece as much as an information
gathering piece”.
“Finding out what our customers want;
whether they like a product; and how
could we sell it better”.
7
8. Real World Examples (cont’d)
Best Buy.
Electronics retailer Best Buy learned
how unpopular the restocking fees were
through social media.
They changed its product-return policies,
eliminating fees that were hurting sales.
8
9. Real World Examples (cont’d)
Starbucks.
Coffee retailer Starbucks prepared to monitor
customers’ tweets on a new coffee flavor on the
day it was introduced by capitalizing on Social
Media Analytics.
A huge majority of tweets were about the
complaints on the coffee’s higher price rather than
its’ intense taste.
By the next day, they had dropped the price.
9
10. Data Analytics Challenges
“Messy” data
Data (e.g., tweets, posts, clickstreams,
images, videos, audios) that hardly be
organized in a way that a
computer/application/software could easily
process.
Data sources
Smartphones, feature phones, social media
(social networks, micro blogs, forum, mailing
lists), wearable devices, other mobile devices
and even more machines (TV, AC,
Refrigerator, etc).
10
12. How “BIG” are They?
Source Type Big Data Usage Popular Sources
12
Social Data
• Provides insight for companies on
consumer behavior and buying patterns
• Can be integrated with CRM (Customer
Relationship Management) data for
analysis of customer behavior
Facebook, Twitter, Google+,
and
LinkedIn
Machine Data
• Can be real-time data from sensors that
track parts and monitor machinery, also
called the Internet of Things
• Includes web logs that can track user
behavior online
Location data such as NFC
and
RFID chip readings
Transactional
Data
• Helps large retailers and B2B (Business
to Business) companies in customer
segmentation
• Helps to track data transactions related
to product IDs, prices, payment
information, manufacturer date, etc.
Retail websites
such as Amazon.
Com, eBay and Domino’s
pizza chain
Credit: GreyCampus
13. Benefits of Big Data
Big Data Analytics Benefits Proportion Of Businesses Reporting Benefits
Better social Influencer marketing 61%
More accurate business insights 45%
Segmentation of customer base 41%
Identifying sales and market opportunities 38%
Automated decisions for real-time process 37%
Detection of fraud 33%
Quantification of risks 30%
Better planning and forecasting 29%
Identifying cost drivers 29%
Credit: GreyCampus
14. Cloud Computing
• Method of providing shared computing resources
that include applications, storage, computing,
networking, development, and deployment
platforms, as well as business processes.
• Offers easy availability of computing resources to
an application
• Allows us paying for these services accordingly,
depending on what and how much we use.
14
16. Internet of Things (IoT)
“Things having identities and virtual
personalities operating in smart spaces using
intelligent interfaces to connect and
communicate within social, environmental,
and user contexts”. ~ IoT in 2020
“A proposed development of the internet in
which everyday objects have network
connectivity, allowing them to send and
receive data.” ~ Oxford Dictionary, 2013
16
26. Business, Information and IT
Business performance relies on quality of
information and IT Capabilities.
An organization’s accomplishment depends
on what IT can do for them.
Business and technology teams need to
align, collaborate and synergize on smart,
cost-effective, and collaborative data
management.
Implementation is the most influential key
success factor.
26
28. Business Productivity and Cost
Reduction
Increasing level of output, while
maintaining the same level of inputs.
Maintaining level of output, while
reducing the level of inputs.
Combination of the above two.
28
29. IT and Business Alignment
Starting from Organization Strategic Plan
towards IT Strategic Plan.
IT division/department have to understand
organizational objectives, goals, visions,
missions, strategies, risks, and
opportunities.
While the business must understand IT’s
capability and capacity.
29
30. Business Agility and Time to Market
Aggregatively, the markets have yet to
fully recovered from global recession.
An agile enterprise, with the ability to
adapt and respond rapidly, are the magic
words.
Furthermore, Agile becomes pretty
common Project Management
methodology.
30
31. Business Process Reengineering (BPR)
BP is a series of tasks performed by
people/systems designed to produce a
specific output/outcome.
Examples: customer ordering process,
credit approval and shipping a product.
1) Eliminating unnecessary non–value
added processes, 2) simplify and 3)
automate remaining processes to reduce
cycle time, labor, and costs.
31
32. IT Reliability and Efficiency
Accuracy, availability, security, and
accessibility of data and information
systems is a must.
Why? So the executives and
managements will put their trusts and
reliance within the systems.
32
33. Business Intelligence (BI)
Aimed to run the business more efficiently,
identify trends and relationships in
organizational data, create/capitalize the
advantage of business opportunities.
Required integration, computation, and
analysis of massive data repositories.
33
34. Cloud Computing
As known as cloud infrastructure or cloud
services.
Various computing and network
arrangements.
Enable anyone or any organization to
deploy tools that can scale on demand to
serve as many users as necessary.
34
35. Cloud Delivery Models
Cloud Model Description
IaaS
• Infrastructure as a Service (IaaS) Infrastructure refers to
hardware, storage, and network. This type of cloud can be used
as public and private both.
• Examples: virtual machines, load balancers, and network
attached storage.
PaaS
• Provides a platform to write and run user’s applications.
• Platform refers to the operating system, which is a collection of
middleware services and software development and deployment
tools.
• Examples: Windows Azure and Google App Engine (GAE).
SaaS
• Provides software that can be accessed from anywhere.
• They are offered on monthly or yearly contracts.
• For SaaS to work, the infrastructure (IaaS) and the platform
(PaaS) must be in place.
35
Credit: GreyCampus
36. Enterprise Resource Planning (ERP)
IT
Systems/Software/Services/Applications
supporting essential business processes
and operations.
Commercial or open-source packages
implemented as modules.
Examples of modules are: Sales and
Distribution, Material Management,
Human Capital Management, Finance and
Controllership.
36
37. Software as a Service (SaaS)
Pay-per-use arrangement.
As an option, instead of buying and
installing enterprise apps, users access it
from a SaaS vendor over a network via a
browser.
Anytime, anywhere as long as the internet
is there.
37
38. Collaboration and Workflow Tools
Power people to work together and
collaborate in (more) organized ways.
Allow us to manage our tasks more
efficiently and effectively.
Examples: Google Docs, Microsoft
Share Point, Office 365, and Skype.
38
40. Agile is more than just quick response
Responsive
IT capacity can be easily scaled up or
down as needed.
Flexible
Ability to quickly integrate new business
functions.
Easily (re)configure software or apps.
40
What Agile is All About
41. The migration of consumer technology into
enterprise environments.
Driven by mobile devices, data plan, apps,
platforms, social media, and telecommuting.
Above drivers become part of our personal
and professional life.
Flexi work time and flexi working environment
are adopted rapidly.
Bring Your Own Device (BYOD).
41
IT Consumerization
43. Defines plan on how a business will achieve its
mission, goals, and objectives.
Long-term direction of our business
Overall plan for deploying our resources
List down any trade-offs
Identify any resources to share
Our position compared to competitors
How to achieve competitive advantage over
rivals in order to maximize profitability
43
Let’s Start with a Strategy
44. Scanning and reviewing of political, social,
economic, and technical factors of an
organization.
SWOT
Evaluation of strengths and weaknesses
(internal) and opportunities and threats
(external).
44
Then Strategic Analysis
45. Take this as an Example
• Strengths: market leader; highly-achiever
workforce; sophisticated business software
• Weaknesses: assurance, risk and
compliance;
• Opportunities: Positive economic outlook;
a developing market; ability to create a new
market, product or service
• Threats: Price wars by competitors; Low
barrier to entry
45
47. Here Comes the Strategic Planning
“A series of strategic activities an
organization selects and arranges its
businesses or services to achieve goals
and objectives even when unexpected
events disrupt its businesses, products, or
services.”
47
49. What IT Have Been Doing These
Days?
IT creates (new) markets, (new)
businesses, (new) products, and (new)
careers.
New technologies such as 4G networks,
wearable devices, Machine-to-Machine
communication, embedded sensors, IPv6.
49
51. Chief Technology Officer (CTO)
Evaluate the latest and most innovative
technologies.
Determine how they could be implemented
for competitive advantage.
Develop technical standards, deploy
technology, and supervise resources who
deal with the daily IT operational activities
51
52. Chief Information Officer (CIO)
While CTOs are more concerned with
technology itself, whereas CIOs are much
more concerned with biz applications and
how to manage them.
Manage businesses IT systems and
functions, creates and delivers IT
strategies.
Focus more onto the IS and employees
within their organizations.
52
53. Other CxOs
Chief Information Security Officer (CISO)
Identifying, developing, implementing and
maintaining Information Security policies,
processes and procedures across the
organizations.
Chief Data Privacy Officer (CDPO)
Responsible for Data Privacy both
customers and employees within their
organizations.
53
54. References
Information Technology for Management:
Advancing Sustainable, Profitable Business
Growth 9th Edition, authored by Turban,
Volonino and Wood, published by John Wiley
and Sons, Inc., 2013.
54
Slide Timings:
3 – 4 minutes
Suggested Instructor Notes:
Use this slide to discuss the structure, sources, and types of Big Data.
Mention the three types of data.
Slide Instructions:
Load the on-screen elements one by one.
Click the presentation to move to the next slide.
Slide Timings:
2 – 3 minutes
Suggested Instructor Notes:
Use this slide to explain the application of Big Data in different areas of business.
Ask the participants to explain each of the benefits listed on the slide.
Slide Instructions:
Load the text.
Load the image.
Click the presentation to move to the next slide.
Slide Timings:
3 – 4 minutes
Suggested Instructor Notes:
Use this slide to define the relation between cloud and big data.
Tell participants that earlier businesses had to buy computing resources and carry the overhead or send work out to external organizations. Now, they can simply move the task to a public cloud.
Tell participants that they have been hearing about cloud computing for the past few years and some of you may be using it also.
The cloud is a cluster or grid that rents computing resources to users.
Discuss the flexibility offers by cloud computing to business organizations
Slide Instructions:
Load each block one by one.
Click the presentation to move on the next slide.
Slide Timings:
2 – 3 minutes
Suggested Instructor Notes:
Use this slide to check participant’s understanding of distributed computing.
Ask the participants to solve the given problem. You can ask the participants to volunteer for the solution to the question given here.
Encourage the participants to explain their solution. Appreciate a correct response so that the participants are encouraged to participate in class discussions. Lead them to the correct solution.
Slide Instructions:
Load the question.
Click the presentation to move on the next slide.
Slide Timings:
3 – 4 minutes
Suggested Instructor Notes:
Use this slide to explain the different types of cloud delivery models.
Describe each type of cloud model with its uses.
Give scenario for using each type of cloud computing model.
Give real life examples of using each type of cloud model.
Also ask participants to suggest that where these types of model can be used.
Encourage participants to take part in class discussion.
Tell participants that they will have to explain why cloud computing is suitable for Big Data analytics in the final certification examination.
EXAM CHECK: In the certification examination, you will be able to explain why cloud computing is suitable for Big Data
analytics?
Slide Instructions:
Load the lead-in line then table.
Click the presentation to move on the next slide.