Exploring the mental wellbeing of the public relations professionStephen Waddington
The #FuturePRoof report lifts the lid on mental health in the public relations profession, and attempts to characterise the issue, signpost potential solutions, and identify best practice.
What Do We Do with Distance Education Research Findings? Developing New Instr...Tanya Joosten
Let’s talk about how to interpret research findings from several National Distance Education and Technological Advancement (DETA) Research Center-supported studies. In this session, we’ll determine what these findings mean for us and our institutions, turn these results into new or altered practices in our online programs, and diffuse these innovative practices across our institutions for students, instructors/faculty, support staff, and administrators.
Tanya Joosten, University of Wisconsin-Milwaukee
Rachel Cusatis, University of Wisconsin-Milwaukee
Moderator: Terrie Nagel, University of Missouri, Columbia
Capgemini reports on the major 2017 trends in the payments industry which revolve around three core areas of payment instruments, regulatory and industry initiatives, and key stakeholder strategies. Currently, the global payments industry is undergoing a paradigm shift with an influx of technology, demographic, and regulatory dynamics. While the customer facing part of the value chain continues to witness high levels of innovation, service providers are still grappling with back-end infrastructure enhancements. Trends such as new opportunities in the payments industry in terms of adoption of Open Application Programming Interfaces (APIs), growth in digital payments, innovation in cross-border payments, and challenges from the entry of alternative service providers are impacting the industry in terms of fostering competition, nurturing innovation, and enhancing process and system-related efficiencies.
Improvement in Rogue Access Points - SensePost Defcon 22SensePost
A supporting slide deck for SensePost's Defcon 22 talk. It contains more useful written information, that the picture heavy version we presented at the conference. You can see the conference video at https://www.youtube.com/watch?v=i2-jReLBSVk and can get the code at https://github.com/sensepost/mana
The Marketer's Guide To Customer InterviewsGood Funnel
A step-by-step guide on how to doing customer interviews that reveal revenue-boosting insights. This deck is made exclusively for marketers & copywriters.
The Be-All, End-All List of Small Business Tax DeductionsWagepoint
Read the full article with even more details at https://blog.wagepoint.com/h/i/289427271-the-comprehensive-list-of-small-business-tax-deductions/185037
An immersive workshop at General Assembly, SF. I typically teach this workshop at General Assembly, San Francisco. To see a list of my upcoming classes, visit https://generalassemb.ly/instructors/seth-familian/4813
I also teach this workshop as a private lunch-and-learn or half-day immersive session for corporate clients. To learn more about pricing and availability, please contact me at http://familian1.com
Hoe we kunnen zorgen dat iedereen profiteert van robotisering | ConferentieSo...Matthijs Pontier
Hoe we kunnen zorgen dat iedereen profiteert van robotisering Dr. Matthijs Pontier
2. Waarom ontwikkelen we technologie? Evolutionaire vooruitgang Het laten voortbestaan van (menselijk) leven Om ons welzijn te vergroten Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
3. Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
4. Vrij delen van informatie, kunst en cultuur Evidence-based policy met een lange-termijn visie Zelfbeschikking stimuleren zonder dat dit ten koste gaat van rechten Vertrouwen burgers vs Wantrouwen ‘macht' Enthousiast over tech, maar alert op risico’s Tech to empower people; niet om te onderdrukken Basis principes PPNL Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
5. Welzijn en autonomie vergroten Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
6. Cars that free your time to do other things
7. Drinking Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
8. Road safety ;) Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
9. Road safety Matthijs Pontier, 22-03-2016 TU/e, How self-driving cars are going to change the future of mobility
10. Less road rage
11. More room for people and plants
12. Boosting highway capacity 273%
13. Boosting Highway capacity Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
14. Save energy
15. Gedeelde verantwoordelijkheid Stop met het bouwen van nieuwe wegen Stop met het bouwen van nieuwe parkeerplaatsen Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zor
16. Governments are lagging behind Governments are lagging behind
17. Monopolization Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
18. Hoe groter het bedrijf Hoe groter het machtscentrum Hoe groter de kans dat een bedrijf deze macht op een verkeerde manier gaat gebruiken
19. Need to stop corporate surveillance Regulate Big Business vs More freedom for small startups
20. Unequal power distribution
21. Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
22. Techno-progressivism Democratiseer de ontwikkeling van technologie Kosten, risico’s en opbrengsten worden eerlijk gedeeld Ontwikkel technologie op zo’n manier dat het welzijn bevordert
23. Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
24. Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016
25. Als technologie voor je denkt Vertellen programmeurs dan
Exploring the mental wellbeing of the public relations professionStephen Waddington
The #FuturePRoof report lifts the lid on mental health in the public relations profession, and attempts to characterise the issue, signpost potential solutions, and identify best practice.
What Do We Do with Distance Education Research Findings? Developing New Instr...Tanya Joosten
Let’s talk about how to interpret research findings from several National Distance Education and Technological Advancement (DETA) Research Center-supported studies. In this session, we’ll determine what these findings mean for us and our institutions, turn these results into new or altered practices in our online programs, and diffuse these innovative practices across our institutions for students, instructors/faculty, support staff, and administrators.
Tanya Joosten, University of Wisconsin-Milwaukee
Rachel Cusatis, University of Wisconsin-Milwaukee
Moderator: Terrie Nagel, University of Missouri, Columbia
Capgemini reports on the major 2017 trends in the payments industry which revolve around three core areas of payment instruments, regulatory and industry initiatives, and key stakeholder strategies. Currently, the global payments industry is undergoing a paradigm shift with an influx of technology, demographic, and regulatory dynamics. While the customer facing part of the value chain continues to witness high levels of innovation, service providers are still grappling with back-end infrastructure enhancements. Trends such as new opportunities in the payments industry in terms of adoption of Open Application Programming Interfaces (APIs), growth in digital payments, innovation in cross-border payments, and challenges from the entry of alternative service providers are impacting the industry in terms of fostering competition, nurturing innovation, and enhancing process and system-related efficiencies.
Improvement in Rogue Access Points - SensePost Defcon 22SensePost
A supporting slide deck for SensePost's Defcon 22 talk. It contains more useful written information, that the picture heavy version we presented at the conference. You can see the conference video at https://www.youtube.com/watch?v=i2-jReLBSVk and can get the code at https://github.com/sensepost/mana
The Marketer's Guide To Customer InterviewsGood Funnel
A step-by-step guide on how to doing customer interviews that reveal revenue-boosting insights. This deck is made exclusively for marketers & copywriters.
The Be-All, End-All List of Small Business Tax DeductionsWagepoint
Read the full article with even more details at https://blog.wagepoint.com/h/i/289427271-the-comprehensive-list-of-small-business-tax-deductions/185037
An immersive workshop at General Assembly, SF. I typically teach this workshop at General Assembly, San Francisco. To see a list of my upcoming classes, visit https://generalassemb.ly/instructors/seth-familian/4813
I also teach this workshop as a private lunch-and-learn or half-day immersive session for corporate clients. To learn more about pricing and availability, please contact me at http://familian1.com
Hoe we kunnen zorgen dat iedereen profiteert van robotisering | ConferentieSo...Matthijs Pontier
Hoe we kunnen zorgen dat iedereen profiteert van robotisering Dr. Matthijs Pontier
2. Waarom ontwikkelen we technologie? Evolutionaire vooruitgang Het laten voortbestaan van (menselijk) leven Om ons welzijn te vergroten Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
3. Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
4. Vrij delen van informatie, kunst en cultuur Evidence-based policy met een lange-termijn visie Zelfbeschikking stimuleren zonder dat dit ten koste gaat van rechten Vertrouwen burgers vs Wantrouwen ‘macht' Enthousiast over tech, maar alert op risico’s Tech to empower people; niet om te onderdrukken Basis principes PPNL Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
5. Welzijn en autonomie vergroten Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
6. Cars that free your time to do other things
7. Drinking Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
8. Road safety ;) Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
9. Road safety Matthijs Pontier, 22-03-2016 TU/e, How self-driving cars are going to change the future of mobility
10. Less road rage
11. More room for people and plants
12. Boosting highway capacity 273%
13. Boosting Highway capacity Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
14. Save energy
15. Gedeelde verantwoordelijkheid Stop met het bouwen van nieuwe wegen Stop met het bouwen van nieuwe parkeerplaatsen Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zor
16. Governments are lagging behind Governments are lagging behind
17. Monopolization Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
18. Hoe groter het bedrijf Hoe groter het machtscentrum Hoe groter de kans dat een bedrijf deze macht op een verkeerde manier gaat gebruiken
19. Need to stop corporate surveillance Regulate Big Business vs More freedom for small startups
20. Unequal power distribution
21. Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
22. Techno-progressivism Democratiseer de ontwikkeling van technologie Kosten, risico’s en opbrengsten worden eerlijk gedeeld Ontwikkel technologie op zo’n manier dat het welzijn bevordert
23. Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016, Hoe kunnen we zorgen dat iedereen van robotisering profiteert
24. Dr. Matthijs Pontier, Sociale Innovatie, 16-12-2016
25. Als technologie voor je denkt Vertellen programmeurs dan
OpenIot & ELC Europe 2016 Berlin - How to develop the ARM 64bit board, Samsun...Chanwoo Choi
In the last period of twenty years ARM has been undisputed leader for processor's architecture in the embedded and mobile industry. With its 64 bit platform, ARM widens up its field of applicability. The ARMv8 introduces a new register set, it is compatible with its 32 bit predecessor ARMv7 and suits best those system that try to be amongst the high end performance devices. Tizen OS (tizen.org) is an open multi profile platform that can run on TV, mobile, cars and wearables. Samsung TM2 board based on Exynos5433, which patches has been recently posted to mainline, is an ARM 64bit board supported by Tizen 64bit. However, during the bring-up, the kernel developers have faced many challenges that will be presented in this session. The presentation will go through a number of issues and the way they have been solved in order to make Tizen run on a 64 bit platform.
Explains Windows PDB symbol files and corresponding memory analysis patterns.. Demonstrates how to verify symbolic references found in thread stack region and recognize ASCII and UNICODE fragments.
Many JavaScript roles are advertised as "Full Stack", but what does that really mean?
This talk takes a look at what could be meant by a stack and discusses the reasons to focus on first-principles rather than specific technologies.
Detecting Malicious Websites using Machine LearningAndrew Beard
We present a set of newly tuned algorithms that can distinguish between malicious and non-malicious websites with a high degree of accuracy using Machine Learning (ML). We use the Bro IDS/IPS tool for extracting the SSL certificates from network traffic and training the ML algorithms.
The extracted SSL attributes are then loaded into multiple ML frameworks such as Splunk, AWS ML and we run a series of classification algorithms to identify those attributes that correlate with malicious sites.
Our analysis shows that there are a number of emerging patterns that even allow for identification of high-jacked devices and self-signed certificates. We present the results of our analysis which show which attributes are the most relevant for detecting malicious SSL certificates and as well the performance of the ML algorithms.
Porting Valgrind to NetBSD and OpenBSD by Masao Uebayashieurobsdcon
Abstract
Valgrind is a proven opensource instrumentation framework Mainly known by its memory profiler
Valgrind executes applications in virtual CPU and memory dynamically disassembling target code into intermediate representation (IR) and converting into native code (JIT). This Dynamic Binary Instrumentation (DBI) is useful for users in that no recompilation of target is needed. However, implementing that idea is difficult and code becomes complex. My talk will examine Valgrind's internal especially around platform dependent code, like system call wrapper, memory management, and signal handling. We also mention things that are needed to port Valgrind to a new platform/cpu, for example, how to debug and test Valgrind itself, and source code structure, etc.
Speaker bio
Masao Uebayashi is a the founder of Tombi Inc., a small company based in Yokohama, Japan, where he concentrates on *BSD only development consultation. In the past he worked for Brains Corp., who first ported NetBSD to Renesas SuperH platform, and later IIJ, where he brought up NetBSD on OCTEON MIPS64 processor. After having done PowerPC, SuperH, MIPS, and ARM in the last 15 years, he has finally started learning x86.
metadata/coreProperties.xml
Model2015-07-13T03:01:04Zthua3267thua32672016-08-11T01:35:03Z1.330R2015b
metadata/mwcoreProperties.xml
application/vnd.mathworks.simulink.modelSimulink ModelR2015b
metadata/mwcorePropertiesExtension.xml
8.6.0.264259
simulink/blockdiagram.xml
windows-1252
nSubCar=10;
nOFDMSym=12;
0.035000
on
off
UseLocalSettings
AllNumericTypes
UseLocalSettings
Overwrite
Run 1
120
UpdateHistoryNever
%<Auto>
%<Auto>
392815836
1.%<AutoIncrement:330>
off
off
disabled
off
on
off
off
on
off
off
on
on
on
on
off
on
on
on
off
off
off
on
on
off
off
normal
5
1
10
10
0
none
off
MATLABWorkspace
accel.tlc
accel_default_tmf
make_rtw
off
off
on
manual
normal
1
any
1000
auto
0
0
rising
0
off
off
off
off
off
on
off
on
on
off
off
off
landscape
auto
A4
centimeters
[1.270000, 1.270000, 1.270000, 1.270000]
1
off
off
200
white
black
white
off
normal
Helvetica
10
normal
normal
on
0
off
center
middle
black
white
off
Helvetica
10
normal
normal
off
Helvetica
9
normal
normal
off
on
on
off
none
default
autoscale
on
on
off
off
off
on
on
on
1
on
Sample based
[]
[]
Inherit: Inherit from 'Constant value'
off
inf
inf
off
4
none
off
short
10
off
off
-1
A
Tag
local
A
Tag
local
1
off
[]
[]
Inherit: auto
off
off
-1
Inherit
-1
auto
auto
off
off
on
One-based contiguous
3
{1,2,3}
Last data port
Error
off
on
[]
[]
Inherit: Inherit via internal rule
off
Floor
on
-1
off
1
[]
[]
Inherit: auto
off
off
-1
Inherit
-1
auto
auto
Dialog
held
[]
1-D array
[1,1]
system
''
[]
FromPortIcon
ReadWrite
All
off
off
off
off
-1
Auto
Auto
Auto
void_void
off
Inherit from model
Inherit from model
Inherit from model
Inherit from model
Inherit from model
off
UseLocalSettings
AllNumericTypes
UseLocalSettings
off
off
NONE
off
off
off
[-8, 0, 1928, 1056]
on
[1.270000, 1.270000, 1.270000, 1.270000]
125
simulink-default.rpt
137
Ideal upconverter, Channel and downconverter
[1, 1]
[685, 254, 785, 296]
39
off
off
[-8, -8, 1928, 1048]
off
[1.270000, 1.270000, 1.270000, 1.270000]
100
[75, 243, 105, 257]
-1
Port number
[235, 160, 300, 190]
7
ChanSelect
off
1
6
Inherit: Inherit via back propagation
[1, 1]
[235, 237, 305, 283]
2
1.32
Stateflow.Translate.translate
ExplicitOnly
on
off
MATLAB Function
off
[223, 338, 826, 833]
off
[1.270000, 1.270000, 1.270000, 1.270000]
100
21
[20, 101, 40, 119]
-1
Port number
[1, 1]
[270, 230, 320, 270]
11
1
Stateflow S-Function Simple_Resource_Grid_Start_Student_2016 3
[1, 2]
[180, 100, 230, 160]
10
sf_sfun
[1 2]
off
on
2
y
Auto
SignalName
[460, 241, 480, 259]
12
[460, 101, 480, 119]
-5
Port number
9
69::1#out:1
69::19#in:1
y
10
[0, 0]
69::19#out:2
69::5#in:1
11
69::20#out:1
69::21#in:1
12
69::19#out:1
69::20#in:1
[1, 1]
[235, 317, 305, 363]
11
1.32
Stateflow.Translate.translate
ExplicitOnly
on
off
MATLAB Function
off
[223, 338, 826, 833]
off
[1.270000, 1.270000, 1.270000, 1.270000]
100
21
[20, 101, 40, 119]
-1
Port number
[1, 1]
[270, 230, 320, 270]
11
1
Stateflow S-Function Simple_Resource_Grid_Start_Student_2016 8
[1, 2]
[180, 100, 230, 160]
10
sf_sfun
[1 2]
off
on
2
y
A ...
Vulnerabilities in TN3270 based ApplicationSensePost
A talk given at Hack in the Box Amsterdam and later DerbyCon in 2014 about a new class of vulnerabilities in TN3270 exposed applications by @singe (Dominic White). A video of the talk is available at https://www.youtube.com/watch?v=3HFiv7NvWrM and code can be found at https://github.com/sensepost
Home automation systems provide a centralized control and monitoring function for heating, ventilation and air conditioning (HVAC), lighting and physical security systems. The central control panel and various household devices such as security sensors and alarm systems are connected with each other to form a mesh network over wireless or wired communication links and act as a “smart home”. As you arrive home, the system can automatically open the garage door, unlock the front door and disable the alarm, light the downstairs, and turn on the TV. According to a study by the consulting firm AMA Research, in 2011, the UK home automation market was worth around £65 million with 12% increase on the previous year. The total number of home automation system installations in the UK is estimated to be 189000 by now. The home automation market in the US was worth approximately $3.2 billion in 2010 and is expected to exceed $5.5 billion in 2016.
Zigbee and Z-wave wireless communication protocols are the most common used RF technology in home automation systems. Zigbee is based on an open specification (IEEE 802.15.4) and has been the subject of several academic and practical security researches. Z-wave is a proprietary wireless protocol that works in the Industrial, Scientific and Medical radio band (ISM). It transmits on the 868.42 MHz (Europe) and 908.42MHz (United States) frequencies designed for low-bandwidth data communications in embedded devices such as security sensors, alarms and home automation control panels. Unlike Zigbee, no public security research on Z-Wave protocol was available before our work. Z-wave protocol was only mentioned once during a DefCon 2011 talk when the presenter pointed the possibility of capturing the AES key exchange phase without a demonstration.
The Z-Wave protocol is gaining momentum against the Zigbee protocol with regards to home automation. This is partly due to a faster, and somewhat simpler, development process. Another benefit is that it is less subjected to signal interference compared to the Zigbee protocol, which operates on the widely populated 2.4 GHz band shared by both Bluetooth and Wi-Fi devices.
Z-wave chips have 128-bit AES crypto engines, which are used by access control systems, such as door locks, for authenticated packet encryption. An open source implementation of the Z-wave protocol stack, openzwave , is available but it does not support the encryption part as of yet. Our talk will show how the Z-Wave protocol can be subjected to attacks.
Presentation by Grorg Christian Pranschkle at ZaCon 2 in 2010.
This presentation is about SNMP security The presentation begins with an overview of SNMP. SNMP security weaknesses and SNMP security in cisco apps are discussed. Frisk-0 a tool for SNMP Hacking developed by the presenter is also discussed.
Presentation by Jaco van Gaan at IIA in 2001.
This presentation is about the use of ethical hackers in business. The presentation begins with a series of discussions about hackers, what they do, how they do it and the different types of hackers.
Presentation by Haroon Meer at ReCon in 2005.
This presentation is about web application security. Various web application attacks like XSS, SQLi and directory traversal are discussed. The wikto and crowbar tools developed by sensepost are also discussed.
Putting the tea back into cyber terrorismSensePost
Presentation by Charl van der Walt, Roelof Temmingh and Haroon Meer at BlackHat USA 2003.
This presentation is about targeted, effective, automated attacks that could be used in countrywide cyberterrorism. A worm that targets internal networks is discussed as an example of such an attack.
Major global information security trends - a summarySensePost
Presentation by Luc de Graeve at internetix in 2004.
This presentation is a summery of global information security trends in the business environment .The presentation begins with an introduction to major global trends. Legal Issues, threats, technologies and solutions are discussed
Presentation by Marco Slaviero at the University of Pretoria to the Tuks Linux User Group in 2010.
The aim of this presentation is to promote information security. The presentation begins with a look at a few recent attacks. Cloud computing is briefly discussed. The presentation ends with a discussion on Amazon web services and its security.
Presentation by Charl der Walt and Francesco Geremla at The ITweb security summit in 2009.
This presentation is about the methodology behind version 2 of Sensepost's threat modeling tool, the corporate threat modeller.
Presentation by Marco Slaviero at the University of Pretoria to their masters class of 2008.
This presentation is an introduction to information security. The presentation starts with a look at the past and current state of network security. Penetration testing is discussed. SQL injection and XSS demonstrations are given
Presentaion by Charl van der Walt at the ITweb security summit 2010.
This presentation is an introduction to the security summit 2010. It introduces all the speakers.
Presentation by Charl de Walt in 2001.
The presentation aims to educate people that IT security is relevant to SA business. The presentation begins with examples of defaced SA company websites. Various attacks such as DDoS and semantic attacks are discussed. The presentation ends with a discussion on IP manipulation
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.