This deck was delivered to a public servant middle managers community. It aims at helping them guide their employees through the bureaucratic culture and innovate successfully.
This document discusses the relationship between socio-economic status and youth health. It defines key terms like youth, socio-economic status, income, education, health, and physical activity. Lower socio-economic status can negatively impact youth health through limited access to nutritious food, health information, and medical care due to lower income and education levels. Cultural factors also influence dietary behaviors for some youth. Overall, socio-economic status is an important determinant of youth health.
Automoblox has appointed Gameplay as the exclusive distributor of its products in the Middle East. Gameplay can be contacted via telephone at +971 4 4539618, fax at +971 4539619, or email at info@gameplay-me.com for inquiries about Automoblox products and sales in the region.
The document discusses key concepts related to socioeconomic class including left and right wing politics, neo-liberalism, egalitarianism, social class, social status, socialism, and capitalism. It then examines theories of social reproduction and cultural capital, how socioeconomic class is measured, and the role schools play in transmitting cultural capital and potentially reproducing social inequalities.
The document discusses the "long tail" concept as it applies to internal communications within organizations. It notes that there are far more niche opportunities for internal communications down the long tail, and that lower costs for reaching niches allows demand to spread further down the tail. As more filters drive demand down the tail, the overall demand curve flattens and the total demand of niches can rival that of mainstream communications.
This document provides guidance on how public servants can enact positive change and foster innovation in their work through strategic and ethical "scheming". It recommends networking within and outside one's team, with both new and experienced colleagues, using online forums, and maintaining connections over time. The goal is to identify opportunities, gain support, and overcome obstacles while upholding integrity.
This document discusses the relationship between socio-economic status and youth health. It defines key terms like youth, socio-economic status, income, education, health, and physical activity. Lower socio-economic status can negatively impact youth health through limited access to nutritious food, health information, and medical care due to lower income and education levels. Cultural factors also influence dietary behaviors for some youth. Overall, socio-economic status is an important determinant of youth health.
Automoblox has appointed Gameplay as the exclusive distributor of its products in the Middle East. Gameplay can be contacted via telephone at +971 4 4539618, fax at +971 4539619, or email at info@gameplay-me.com for inquiries about Automoblox products and sales in the region.
The document discusses key concepts related to socioeconomic class including left and right wing politics, neo-liberalism, egalitarianism, social class, social status, socialism, and capitalism. It then examines theories of social reproduction and cultural capital, how socioeconomic class is measured, and the role schools play in transmitting cultural capital and potentially reproducing social inequalities.
The document discusses the "long tail" concept as it applies to internal communications within organizations. It notes that there are far more niche opportunities for internal communications down the long tail, and that lower costs for reaching niches allows demand to spread further down the tail. As more filters drive demand down the tail, the overall demand curve flattens and the total demand of niches can rival that of mainstream communications.
This document provides guidance on how public servants can enact positive change and foster innovation in their work through strategic and ethical "scheming". It recommends networking within and outside one's team, with both new and experienced colleagues, using online forums, and maintaining connections over time. The goal is to identify opportunities, gain support, and overcome obstacles while upholding integrity.
La toxoplasmosis causa necrosis celular y reacción inflamatoria, con proliferación de taquizoitos en la fase aguda y quistes con bradizoitos en la fase crónica, pudiendo afectar músculos, corazón, pulmones, cerebro, ojos y embarazo, con manifestaciones que incluyen fiebre, adenopatías, uveítis, corio retinitis, hidrocefalia, y secuelas neurológicas e irreversibles en la forma congénita.
Web 1.0 focused on a one-way delivery of information while Web 2.0 enables collaboration and sharing through technologies like blogs, wikis, podcasts, and social networking sites. Understanding these Web 2.0 tools is important for governments to harness collaborative creativity and enable change. This document discusses key Web 2.0 concepts and their examples like RSS, blogs, and social bookmarking, and emphasizes how asking questions is important to understanding how to leverage these new technologies.
The document discusses ozone depletion, its causes, effects, and potential solutions. It defines the ozone layer and depletion, noting a large hole observed over the poles. The worst affected region is Antarctica, where ozone levels have dropped over 50% since 1975. Main causes of depletion include chlorofluorocarbons (CFCs), sulfur, and stratospheric clouds containing chlorine and bromine. Depletion leads to increased UV rays and consequences like higher skin cancer rates, reduced crop yields, and damage to planktons and eyes. Suggested solutions include phasing out pollutants, international cooperation, and destroying CFCs.
From Digital essays to the formal model, building the capability of digital n...ftip002
The document discusses adapting teaching methods to engage digital native students in foundation certificate education programs. It proposes using digital essays and technology tools to develop students' critical thinking skills and understanding of formal academic writing. Specific strategies include having students brainstorm topics, storyboard digital essays, and transfer processes from digital to traditional essays. The goal is to incorporate students' digital capabilities while still achieving academic rigor.
This 10-step document provides instructions for creating a portrait video using iMovie on a Mac. The steps include opening iMovie, creating a new project, recording a video clip using the iSight camera, selecting the best clip, exporting it as a QuickTime video, and saving the video file in the Movies folder for sharing or playback.
The document maps an organization's internal policies to Gartner's Hype Cycle model. The Hype Cycle model represents the maturity and adoption of technologies through different stages - vacuum, recession, resurgence, and diminishing returns. The document shows how different policy levers, such as appropriation and risk thresholds, should be applied through each stage of the Hype Cycle to guide an appropriate culture of technology usage within the organization.
Este documento proporciona una guía para el diagnóstico de pacientes con dolor abdominal. Detalla los pasos en la anamnesis, examen físico e investigaciones complementarias, así como criterios para el tratamiento y manejo quirúrgico o médico de acuerdo a los hallazgos. El objetivo es identificar la causa subyacente del dolor a través de una evaluación sistemática.
Lecture on New Zeland demograhics taken from the 2006 New Zealand Statistics cesus and also looks at research on effectiveness for teachers in classrooms.
Coaching involves instruction, teaching, and training athletes to develop and improve in their chosen sport. Effective coaching depends on maximizing an athlete's potential while recognizing long-term needs and keeping a balanced view of participation and fair play. Coaching styles vary and include authoritarian, business-like, and intense approaches. When developing coaching strategies, it is important to consider the perspectives of players, spectators, parents, and athletes to improve coaching quality over time.
Scheming Virtutously, presented at You and the Evolving Public Service, Calga...Nicholas Charney
The document discusses coordination problems that arise from an unequal distribution of work output among people in institutions. It notes that typically 20% of people produce 80% of the output, creating management, structure, and exclusion issues. It suggests embracing cooperative systems and virtuously scheming both inside and outside teams by marshaling support, gathering evidence, and bending rules when needed to drive small victories without becoming a "dead hero."
Why Can’t the Business Get Behind Streaming?! With Becky Gandillon | Current ...HostedbyConfluent
Why Can’t the Business Get Behind Streaming?! With Becky Gandillon | Current 2022
Technologists understand that Kafka is reliable and durable; fast and fault-tolerant. It handles use cases both large and small. So why isn't it being used everywhere by everyone? Because the technology itself isn't the answer. As an engineer-turned-data-guru, it took me way too long to figure that out. No technology will make a difference in any business without the proper buy-in from stakeholders (including non-technical stakeholders), enablement support, and carefully crafted adoption frameworks. During this session, you'll learn about how to communicate the value of technology decisions to non-technical co-workers or stakeholders. And we'll talk about some very specific buy-in, enablement, and adoption activities and suggestions for supporting streaming implementations.
1. The document discusses systems thinking and applying it to business and innovation.
2. It emphasizes understanding how all parts of a system work together and influence each other, as well as identifying high-leverage opportunities to improve the system.
3. The key lessons are to take a holistic view of the system, understand how different elements impact each other through feedback loops, and use an active learning approach of testing ideas in small cycles to drive iterative improvement of the overall system.
Change Agents: How to Effectively Influence Intractable Corporate Cultures Keith Conway
It’s no secret that trying to change corporate culture is hard. This is primarily due to the fact that large corporations are complex systems and fundamentally averse to change. This reluctance is rooted in a systematic misalignment of shared vision, shared values, and shared culture within the organization. This talk defines a new method of business transformation by illustrating how to effectively influence corporate cultures towards collective action. To achieve that end, we outline an iterative framework along three main vectors: assess the people and environment, craft a narrative, then utilize timing to deliver your message for maximum impact. If you have ever been frustrated by a lack of political will within your own organization, come and join us. You will learn how to become a change agent yourself, how to create other change agents, then finally how to transform your corporation into a change agent.
Assholes are Killing your Project (Monktoberfest)Donnie Berkholz
The strength of your community is the best predictor of your project's long-term viability. What happens when that community is gradually infiltrated by assholes, who infect everyone else with their constant negativity and personal attacks? Although someone may be a valuable technical contributor, that person will never contribute as much to the project as the many others who are scared away and demotivated.
This talk will teach you about the dramatic impact assholes are having on your organization today and will show you how you can begin to repair it.
Marcus Segal, Former COO Casino Division, Zynga - Common Mistakes Made By Tec...Techsylvania
The document discusses various topics related to starting and running a technology company, including raising money, hiring employees, company culture, and leadership. It provides advice on fundraising from sources like friends and family or venture capitalists. Some key statistics are presented on the likelihood of startups succeeding or failing. The importance of hiring and retaining talented people is discussed. Creating a culture of excellence through goals, accountability, and celebrating successes is also covered. Resources like books on entrepreneurship are recommended.
Why Lean Efforts fail - looking at cultural reasons why Lean dosen't work and...Ankit Patel
Video located at http://youtu.be/Cs18sO-PrOw
A 39 minute video on cultural reasons why Lean doesn't work at some companies and works well at other companies. It's true weather you are doing Lean in manufacturing, healthcare, start-ups, or any other industry it still applies. You'll also get 3 tools to help you diagnose and help you implement change properly.
Storytelling 360: Great Stories Start BEFORE the Research, And Don’t End With...Vital Findings
The most effective insights stories hook your audience long before the research starts, and continue after you deliver your report. Vital Findings’ Storytelling 360 approach creates stories that resonate more deeply and are more impactful by leveraging engagement strategies before, during and after the research. In this case study with diabetes tech company Dexcom from The Market Research Event, we demonstrate how we used the Storytelling 360 approach to make stakeholders an integral part of the insights story, creating major impact on marketing, targeting, and product development.
Startups and Smalltak - Presented at Smalltalks2014 Córdoba, Argentinasebastian sastre
Here are the slides of the talk I gave at Smalltalks2014 in November 2014, in Córdoba, Argentina.
It covers the basics of why startups matter and what they actually are. Then show some opportunities and challenges about them and for Smalltalk in particular. It closes with some questions and suggestions on how to raise the value of the community, hopefully resulting in increasing the chances to see more profitable portfolios.
Designing for What If (instead of as if) - Morgenbooster1508 A/S
Design, as a craft, has evolved. It has shifted from focusing solely on shapes and colors to encompassing a mindset and methodology that we can leverage to create anything – from meaningful digital solutions to societal change.
La toxoplasmosis causa necrosis celular y reacción inflamatoria, con proliferación de taquizoitos en la fase aguda y quistes con bradizoitos en la fase crónica, pudiendo afectar músculos, corazón, pulmones, cerebro, ojos y embarazo, con manifestaciones que incluyen fiebre, adenopatías, uveítis, corio retinitis, hidrocefalia, y secuelas neurológicas e irreversibles en la forma congénita.
Web 1.0 focused on a one-way delivery of information while Web 2.0 enables collaboration and sharing through technologies like blogs, wikis, podcasts, and social networking sites. Understanding these Web 2.0 tools is important for governments to harness collaborative creativity and enable change. This document discusses key Web 2.0 concepts and their examples like RSS, blogs, and social bookmarking, and emphasizes how asking questions is important to understanding how to leverage these new technologies.
The document discusses ozone depletion, its causes, effects, and potential solutions. It defines the ozone layer and depletion, noting a large hole observed over the poles. The worst affected region is Antarctica, where ozone levels have dropped over 50% since 1975. Main causes of depletion include chlorofluorocarbons (CFCs), sulfur, and stratospheric clouds containing chlorine and bromine. Depletion leads to increased UV rays and consequences like higher skin cancer rates, reduced crop yields, and damage to planktons and eyes. Suggested solutions include phasing out pollutants, international cooperation, and destroying CFCs.
From Digital essays to the formal model, building the capability of digital n...ftip002
The document discusses adapting teaching methods to engage digital native students in foundation certificate education programs. It proposes using digital essays and technology tools to develop students' critical thinking skills and understanding of formal academic writing. Specific strategies include having students brainstorm topics, storyboard digital essays, and transfer processes from digital to traditional essays. The goal is to incorporate students' digital capabilities while still achieving academic rigor.
This 10-step document provides instructions for creating a portrait video using iMovie on a Mac. The steps include opening iMovie, creating a new project, recording a video clip using the iSight camera, selecting the best clip, exporting it as a QuickTime video, and saving the video file in the Movies folder for sharing or playback.
The document maps an organization's internal policies to Gartner's Hype Cycle model. The Hype Cycle model represents the maturity and adoption of technologies through different stages - vacuum, recession, resurgence, and diminishing returns. The document shows how different policy levers, such as appropriation and risk thresholds, should be applied through each stage of the Hype Cycle to guide an appropriate culture of technology usage within the organization.
Este documento proporciona una guía para el diagnóstico de pacientes con dolor abdominal. Detalla los pasos en la anamnesis, examen físico e investigaciones complementarias, así como criterios para el tratamiento y manejo quirúrgico o médico de acuerdo a los hallazgos. El objetivo es identificar la causa subyacente del dolor a través de una evaluación sistemática.
Lecture on New Zeland demograhics taken from the 2006 New Zealand Statistics cesus and also looks at research on effectiveness for teachers in classrooms.
Coaching involves instruction, teaching, and training athletes to develop and improve in their chosen sport. Effective coaching depends on maximizing an athlete's potential while recognizing long-term needs and keeping a balanced view of participation and fair play. Coaching styles vary and include authoritarian, business-like, and intense approaches. When developing coaching strategies, it is important to consider the perspectives of players, spectators, parents, and athletes to improve coaching quality over time.
Scheming Virtutously, presented at You and the Evolving Public Service, Calga...Nicholas Charney
The document discusses coordination problems that arise from an unequal distribution of work output among people in institutions. It notes that typically 20% of people produce 80% of the output, creating management, structure, and exclusion issues. It suggests embracing cooperative systems and virtuously scheming both inside and outside teams by marshaling support, gathering evidence, and bending rules when needed to drive small victories without becoming a "dead hero."
Why Can’t the Business Get Behind Streaming?! With Becky Gandillon | Current ...HostedbyConfluent
Why Can’t the Business Get Behind Streaming?! With Becky Gandillon | Current 2022
Technologists understand that Kafka is reliable and durable; fast and fault-tolerant. It handles use cases both large and small. So why isn't it being used everywhere by everyone? Because the technology itself isn't the answer. As an engineer-turned-data-guru, it took me way too long to figure that out. No technology will make a difference in any business without the proper buy-in from stakeholders (including non-technical stakeholders), enablement support, and carefully crafted adoption frameworks. During this session, you'll learn about how to communicate the value of technology decisions to non-technical co-workers or stakeholders. And we'll talk about some very specific buy-in, enablement, and adoption activities and suggestions for supporting streaming implementations.
1. The document discusses systems thinking and applying it to business and innovation.
2. It emphasizes understanding how all parts of a system work together and influence each other, as well as identifying high-leverage opportunities to improve the system.
3. The key lessons are to take a holistic view of the system, understand how different elements impact each other through feedback loops, and use an active learning approach of testing ideas in small cycles to drive iterative improvement of the overall system.
Change Agents: How to Effectively Influence Intractable Corporate Cultures Keith Conway
It’s no secret that trying to change corporate culture is hard. This is primarily due to the fact that large corporations are complex systems and fundamentally averse to change. This reluctance is rooted in a systematic misalignment of shared vision, shared values, and shared culture within the organization. This talk defines a new method of business transformation by illustrating how to effectively influence corporate cultures towards collective action. To achieve that end, we outline an iterative framework along three main vectors: assess the people and environment, craft a narrative, then utilize timing to deliver your message for maximum impact. If you have ever been frustrated by a lack of political will within your own organization, come and join us. You will learn how to become a change agent yourself, how to create other change agents, then finally how to transform your corporation into a change agent.
Assholes are Killing your Project (Monktoberfest)Donnie Berkholz
The strength of your community is the best predictor of your project's long-term viability. What happens when that community is gradually infiltrated by assholes, who infect everyone else with their constant negativity and personal attacks? Although someone may be a valuable technical contributor, that person will never contribute as much to the project as the many others who are scared away and demotivated.
This talk will teach you about the dramatic impact assholes are having on your organization today and will show you how you can begin to repair it.
Marcus Segal, Former COO Casino Division, Zynga - Common Mistakes Made By Tec...Techsylvania
The document discusses various topics related to starting and running a technology company, including raising money, hiring employees, company culture, and leadership. It provides advice on fundraising from sources like friends and family or venture capitalists. Some key statistics are presented on the likelihood of startups succeeding or failing. The importance of hiring and retaining talented people is discussed. Creating a culture of excellence through goals, accountability, and celebrating successes is also covered. Resources like books on entrepreneurship are recommended.
Why Lean Efforts fail - looking at cultural reasons why Lean dosen't work and...Ankit Patel
Video located at http://youtu.be/Cs18sO-PrOw
A 39 minute video on cultural reasons why Lean doesn't work at some companies and works well at other companies. It's true weather you are doing Lean in manufacturing, healthcare, start-ups, or any other industry it still applies. You'll also get 3 tools to help you diagnose and help you implement change properly.
Storytelling 360: Great Stories Start BEFORE the Research, And Don’t End With...Vital Findings
The most effective insights stories hook your audience long before the research starts, and continue after you deliver your report. Vital Findings’ Storytelling 360 approach creates stories that resonate more deeply and are more impactful by leveraging engagement strategies before, during and after the research. In this case study with diabetes tech company Dexcom from The Market Research Event, we demonstrate how we used the Storytelling 360 approach to make stakeholders an integral part of the insights story, creating major impact on marketing, targeting, and product development.
Startups and Smalltak - Presented at Smalltalks2014 Córdoba, Argentinasebastian sastre
Here are the slides of the talk I gave at Smalltalks2014 in November 2014, in Córdoba, Argentina.
It covers the basics of why startups matter and what they actually are. Then show some opportunities and challenges about them and for Smalltalk in particular. It closes with some questions and suggestions on how to raise the value of the community, hopefully resulting in increasing the chances to see more profitable portfolios.
Designing for What If (instead of as if) - Morgenbooster1508 A/S
Design, as a craft, has evolved. It has shifted from focusing solely on shapes and colors to encompassing a mindset and methodology that we can leverage to create anything – from meaningful digital solutions to societal change.
No company, institution, government or agency can afford to contain and maintain all the resources they need in house. In a connected and fast changing world those needs are not static, they are dynamic and fast changing. So, outsourcing and insourcing, flexible working, BYOD, Social Networking, Open Access and Apps have become essential to flexibility and adaptability. But, perhaps more importantly ‘collaboration’ provides a prime element to success, that spans most sectors across the planet.
The various modes and tools of eCollaboration between people are well documented including: audio and video conferencing, connected white boards and meeting spaces are perhaps the most common. But there is far more when we include machines. People use and collaborate with machines at all levels, but increasingly the machines are autonomously collaborating.
“When things think, they want to link”
The inclusion of intelligence and smarts sees everything from our mobile devices to laptops, PCs, MainFrames and Super Computers starting to engage in cooperation and invisible conversations. The Cloud is amplifying this to our advantage with a growing range of apps backed up with distributed data, resources, networking, computing power and intelligences. Truth Engines and Intelligent Search and Find are also being developed to make available a range of new (easy to use) group and profession specific apps.
Most of us seem to spend more time locating information and the right people, than we devote to being creative and finding solutions. Our biggest challenge is to understand (in a shorter and shorter time frame), find the appropriate skill cells and get them all to come together as an effective team.
“The power to convene is both rare and coveted”
The old ways of working are falling by the wayside in the leading companies operating in the fastest moving sectors, whilst nothing much is happening (yet) at the other end of the market spectrum. But in this 21C the winners will be the global teams that connect, network and collaborate to maximise there creativity, and become the primary creators and solution finders.
You may have joined a WebEx call incorrectly based on whether a phone icon appears beside your name. If no icon appears, you will be unable to join breakout sessions and should hang up, disconnect from WebEx, and rejoin using the original link while entering your name and email. When interacting in WebEx, be prepared to use tools like the pointer and raise your hand. Positive deviance focuses on identifying uncommon practices among individuals that enable them to solve problems better than others facing the same issues. It involves defining the problem, determining positive deviants, discovering their solutions, designing ways to spread these practices, and tracking results.
CYCLES course (5): Systems and System ThinkingBryan Cassady
A lot of research has shown that systems are the key to innovation success.
Systems are made up of interrelated components of people and processes with a clearly defined, shared destination or goal.
Systems work best when everyone shares an understanding and commitment to the aim or purpose of the system.
The foundations are clarity and a commitment to learn, and improve.
Great companies have 3 characteristics that set them apart from the rest. These characteristics are:1. An ability to see and build on strengths 2. A commitment to build innovation eco-systems and 3. A commitment to ongoing action
Deliverables: Simplifying the challenges, structuring the learning process, getting better internally and in your eco-system.
Enough information to update your objectives and start another cycle.
CTO Universe Leadership Series: The Six Principles of PersuasionBrittanyShear
As senior tech leaders, we often fall prey to thinking that a “good idea” and logical case is sufficient to get the desired response and result. We might be trying to get our CEO on-board with investment in a new technology or a rearchitecture effort, or we might want culture or process changes by our team. Our “good idea” is simply the beginning. An idea must be communicated; a case must be made; and ultimately other people must be persuaded to get onboard.
Michael Carducci brings a fascinating background to this webinar. He’s a technologist and regularly works to help senior leaders improve their results. He’s also a professional mentalist and has been a student of psychology, human behavior and the principles of influence for nearly two decades.
The document discusses how as designers of the world through our decisions, we make ethical choices that impact others. It argues we should question norms and rules to understand whose voices are amplified and diminished. It also addresses issues like wrongful convictions, rehabilitation, and forgiveness, asking what tolerance for failure society has and who is accountable. Throughout, it emphasizes the need to rethink problems and issues from multiple perspectives.
This document discusses emerging technologies and their potential impacts. It covers topics like artificial intelligence, quantum computing, robotics, cyborgs, smart materials, fusion power, artificial life, malware, biobots, network bots, and more. The document notes that many of these technologies are still in early experimental stages and face challenges before being ready for widespread use. It also discusses debates around AI safety and the relationship between humans and increasingly intelligent machines.
Cleverwood friday session - Company culture and consultant workCleverwood Belgium
Whether on a short term mission to provide expert advice or on a longer term engagement, as a consultant you're confronted with the challenge of company culture. Company culture will affect every single aspect of your mission from information collection, to exploring possible solutions, to issuing recommendations, to facilitating decisions and coaching for their implementation. Culture is of particularly strong influence when you're dealing with change, evolution of core business assumptions and innovative practices, e.g. the integration of social media in the toolbox of marketers.
The document discusses major technological transformations such as the Agricultural, Industrial, and Information Revolutions. It focuses on how the development and distribution of information has become central to productivity and power. The document discusses concepts like innovation, convergence, flow, and fractals. It emphasizes smoothing transitions between transformations and developing high-performance knowledge management systems. The goal is to help organizations leverage disruption brought about by technological advances through principles of natural order, convergence, and flow.
Similar to Scheming Virtuously, presented to the National Managers's Community, Toronto, March 27 (20)
The document discusses how internal policies within organizations respond to new technologies as they progress through Gartner's Hype Cycle. It maps five stages of the policy response: 1) a policy vacuum emerges as risks increase with new technology appropriation, 2) use recedes after a policy is implemented due to lack of clarity, 3) use resumes as education increases understanding of the policy, 4) diminishing returns occur as the technology matures and behaviors become normalized. The maximum risk threshold triggers initial policy development, while education and outreach are needed to socialize the policy and encourage resumed use.
This document discusses how social media can be used to engage employees and drive innovation in organizations. It notes that social media is disrupting traditional barriers to engagement and information sharing. It argues that organizations should embrace more open sharing of information and ideas by removing filters, playing safe with appropriate technologies, building trust among employees, and establishing guardrails for social media use. By taking these steps, organizations can benefit from increased collaboration, learning, and productivity across employee groups.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
This document discusses key aspects of Web 2.0 including how it differs from Web 1.0, defines social media, explains the importance of social media for governments, and lists common tools like blogs, wikis, podcasts, and social networking sites. It aims to provide an overview of Web 2.0 concepts and technologies and encourage questions.
Networking Servants, presented at You and the Evolving Public Service, Calgar...Nicholas Charney
The document discusses the importance of networking and provides tips for how to network effectively. It shares an anecdote about how the author turned a chance conversation at a party into a job that supported him through college. The author explains that networking is about requesting or providing contacts and leads. Effective networking involves doing research, making introductions, looking for common interests, maintaining contacts over time, and turning contacts into jobs. The document provides dos and don'ts of networking and suggests ways to network both within and outside one's organization, including considerations for social media networking.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
I am a federal public servant; however the opinions expressed are my own and may not reflect the views of the Public Service of Canada, its Departments and/or Agencies, or their employees. Like all of my presentations, I have put this one together in spirit of the Clerk of the Privy Council’s call to get involved in Public Service renewal, and my own struggles to figure out what the hell that actually means. It took me a while to put together because, strictly speaking, it doesn’t form any part of my actual work duties.