The document summarizes a presentation on the use of electronic resources by teachers and students at the Institute of Professional Studies (IPS) and other faculties of the University of Allahabad. It outlines the objectives to study availability and use of e-resources, and compare use between IPS and other faculties. It also presents hypotheses about relationships between e-resource availability/use and faculty type. The methodology describes a cross-sectional study of 100 teachers and 100 students across IPS and other faculties via questionnaires, observation, and interviews. Key findings are that 32% of IPS students consult librarians for help, while 35% of IPS students are satisfied with existing IT infrastructure.
The document discusses different types of pronouns, including personal pronouns. Personal pronouns can be subjective, objective, or possessive. Subjective personal pronouns act as the subject of a sentence, objective personal pronouns act as the object, and possessive personal pronouns indicate possession. Examples are provided to illustrate the different types of personal pronouns.
This document describes a website created by Pratap using the Joomla content management system. The website was developed for the FIFA Women's World Cup 2015 and hosted on neq3hosting. It includes features like responsive design, social media integration, live scores, articles about host cities, and user registration/login functions. Analytics data shows visits from different countries and details on devices, browsers, networks, and operating systems used by visitors.
Running of the bulls is part of a Spanish festival where bulls are led into the city center for a bullfight. Over time, people began running in front of the bulls for fun, turning it into a popular festival. To participate, runners must be over 18 and pay attention to signals like rockets that indicate when the bulls are released. While 15 people have died over 100 years, animal welfare groups have protested the event as cruel to the bulls, with 42 bulls killed at the last festival.
This document discusses different concepts of time and encourages viewing one's work and spiritual life through the lens of God's time rather than natural time. It references Bible verses about Jesus Christ and his second coming. It also discusses types of sin and the importance of confessing sin to God. The document ends by offering to pray for anyone who shares their prayer requests.
This document provides an introduction to HTTPS (Hypertext Transfer Protocol Secure), which combines the HTTP protocol with SSL/TLS encryption to create a secure channel over an insecure network. It discusses why HTTPS is needed to securely transmit confidential data like credit card numbers over the internet, compared to the insecure HTTP protocol. The document also compares HTTP and HTTPS, explaining that HTTPS should be used when transmitting sensitive information that requires encryption, such as passwords or financial details.
Research on Open Educational Resources & Open Textbooks from BC, CanadaChristina Hendricks
Slides from three research studies about open textbooks & other open educational resources focusing on students in postsecondary institutions in British Columbia, Canada.
The document discusses different types of pronouns, including personal pronouns. Personal pronouns can be subjective, objective, or possessive. Subjective personal pronouns act as the subject of a sentence, objective personal pronouns act as the object, and possessive personal pronouns indicate possession. Examples are provided to illustrate the different types of personal pronouns.
This document describes a website created by Pratap using the Joomla content management system. The website was developed for the FIFA Women's World Cup 2015 and hosted on neq3hosting. It includes features like responsive design, social media integration, live scores, articles about host cities, and user registration/login functions. Analytics data shows visits from different countries and details on devices, browsers, networks, and operating systems used by visitors.
Running of the bulls is part of a Spanish festival where bulls are led into the city center for a bullfight. Over time, people began running in front of the bulls for fun, turning it into a popular festival. To participate, runners must be over 18 and pay attention to signals like rockets that indicate when the bulls are released. While 15 people have died over 100 years, animal welfare groups have protested the event as cruel to the bulls, with 42 bulls killed at the last festival.
This document discusses different concepts of time and encourages viewing one's work and spiritual life through the lens of God's time rather than natural time. It references Bible verses about Jesus Christ and his second coming. It also discusses types of sin and the importance of confessing sin to God. The document ends by offering to pray for anyone who shares their prayer requests.
This document provides an introduction to HTTPS (Hypertext Transfer Protocol Secure), which combines the HTTP protocol with SSL/TLS encryption to create a secure channel over an insecure network. It discusses why HTTPS is needed to securely transmit confidential data like credit card numbers over the internet, compared to the insecure HTTP protocol. The document also compares HTTP and HTTPS, explaining that HTTPS should be used when transmitting sensitive information that requires encryption, such as passwords or financial details.
Research on Open Educational Resources & Open Textbooks from BC, CanadaChristina Hendricks
Slides from three research studies about open textbooks & other open educational resources focusing on students in postsecondary institutions in British Columbia, Canada.
Structural and individual factors that influence the selection of open (and c...Rajiv Jhangiani
This document summarizes research on factors that influence faculty selection and use of open educational resources (OER) and commercial textbooks. It finds that while awareness of OER is moderate, many faculty who select course materials are unaware or know little about OER. The top factors influencing selection are content quality, ease of use, and cost to students. While faculty perceive OER quality as similar to commercial resources, non-users view OER quality as lower. Many faculty are aware that textbook costs affect students but receive frequent queries about alternatives.
Online LIS education: towards the right balance of flexibility and engagementRAILS7
This document summarizes research on balancing flexibility and engagement in online library and information science (LIS) education. The research found that most LIS students value the flexibility of online learning but struggle with isolation and lack of interaction. While students found online forums engaging, they missed in-person cues and found it difficult to form relationships online. Graduates were also less comfortable communicating in online environments compared to current students. The study highlights challenges with motivation, guidance from instructors, and barriers to learning when communication is primarily online.
This document summarizes the teaching practices of ICT student teachers at the Faculty of Education in the Czech Republic. It discusses the structure of the teaching practice program, including activities expected of student teachers such as planning and teaching lessons, assisting teachers, and supporting computer networks in schools. It also examines common challenges student teachers face, such as a lack of guidance on lesson planning and differences in student ICT abilities. Student teachers report learning about classroom management and technology issues in schools. They appreciate the support provided through Moodle but note that teaching practice is too short. The document provides insights into teaching practices from the perspective of ICT student teachers.
EVALUATING THE USABILITY OF LIBRARY SERVICES AS PERCEIVED.pptxJoyceAgrao
The researchers wanted to understand students' perceptions of their school library services and how the library helps students' learning. They observed that some students did not understand the importance of library services. The researchers surveyed 50 Grade 12 students at Teodoro M. Luansing College of Rosario to evaluate the usability of the library services in terms of age, gender, relevance of information, adequacy of details, and simplicity of the library system. They used a questionnaire to collect data on students' expectations of the library and how it helps them gather information.
This document summarizes the key findings of a study on the use of microblogging in academic research in Romania. The study found that while microblogging is slowly being adopted by Romanian researchers, there is still some concern about using tools like microblogs and blogs for research. Over 70% of respondents used microblogging for professional communication and collaboration, but less than 25% used it for inquiring or building learning communities. Microblogging provides benefits like collective intelligence and networking, but also disadvantages like privacy/ethics concerns. Overall microblogging is on an upward trend for supporting Romanian research.
Impact of Open Textbook Adoption on Teaching and LearningREA Brasil
Research Examining the Impact of Open Textbook Adoption on Teaching and Learning: Early Findings
Presentation at CCCOER Meeting , June 22, 2010
Clare Mortensen, Institute for the Study of
Knowledge Management in Education
Licença: CC-BY-SA
Fonte: http://www.slideshare.net/oercommons/iskme-slides-ccotc-062110-sent
Two surveys were conducted two years apart to assess the dental community's perspectives on the consolidation of the dentistry library into the main health sciences library. The surveys found that study space and the distance to the new library location were still primary concerns. Print materials remained heavily used despite expectations, and dissatisfaction decreased in the second survey, possibly due to increased services and resources over time. Future plans include better promotion of services and more emphasis on electronic resources and involvement in the curriculum.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Structural and individual factors that influence the selection of open (and c...Rajiv Jhangiani
This document summarizes research on factors that influence faculty selection and use of open educational resources (OER) and commercial textbooks. It finds that while awareness of OER is moderate, many faculty who select course materials are unaware or know little about OER. The top factors influencing selection are content quality, ease of use, and cost to students. While faculty perceive OER quality as similar to commercial resources, non-users view OER quality as lower. Many faculty are aware that textbook costs affect students but receive frequent queries about alternatives.
Online LIS education: towards the right balance of flexibility and engagementRAILS7
This document summarizes research on balancing flexibility and engagement in online library and information science (LIS) education. The research found that most LIS students value the flexibility of online learning but struggle with isolation and lack of interaction. While students found online forums engaging, they missed in-person cues and found it difficult to form relationships online. Graduates were also less comfortable communicating in online environments compared to current students. The study highlights challenges with motivation, guidance from instructors, and barriers to learning when communication is primarily online.
This document summarizes the teaching practices of ICT student teachers at the Faculty of Education in the Czech Republic. It discusses the structure of the teaching practice program, including activities expected of student teachers such as planning and teaching lessons, assisting teachers, and supporting computer networks in schools. It also examines common challenges student teachers face, such as a lack of guidance on lesson planning and differences in student ICT abilities. Student teachers report learning about classroom management and technology issues in schools. They appreciate the support provided through Moodle but note that teaching practice is too short. The document provides insights into teaching practices from the perspective of ICT student teachers.
EVALUATING THE USABILITY OF LIBRARY SERVICES AS PERCEIVED.pptxJoyceAgrao
The researchers wanted to understand students' perceptions of their school library services and how the library helps students' learning. They observed that some students did not understand the importance of library services. The researchers surveyed 50 Grade 12 students at Teodoro M. Luansing College of Rosario to evaluate the usability of the library services in terms of age, gender, relevance of information, adequacy of details, and simplicity of the library system. They used a questionnaire to collect data on students' expectations of the library and how it helps them gather information.
This document summarizes the key findings of a study on the use of microblogging in academic research in Romania. The study found that while microblogging is slowly being adopted by Romanian researchers, there is still some concern about using tools like microblogs and blogs for research. Over 70% of respondents used microblogging for professional communication and collaboration, but less than 25% used it for inquiring or building learning communities. Microblogging provides benefits like collective intelligence and networking, but also disadvantages like privacy/ethics concerns. Overall microblogging is on an upward trend for supporting Romanian research.
Impact of Open Textbook Adoption on Teaching and LearningREA Brasil
Research Examining the Impact of Open Textbook Adoption on Teaching and Learning: Early Findings
Presentation at CCCOER Meeting , June 22, 2010
Clare Mortensen, Institute for the Study of
Knowledge Management in Education
Licença: CC-BY-SA
Fonte: http://www.slideshare.net/oercommons/iskme-slides-ccotc-062110-sent
Two surveys were conducted two years apart to assess the dental community's perspectives on the consolidation of the dentistry library into the main health sciences library. The surveys found that study space and the distance to the new library location were still primary concerns. Print materials remained heavily used despite expectations, and dissatisfaction decreased in the second survey, possibly due to increased services and resources over time. Future plans include better promotion of services and more emphasis on electronic resources and involvement in the curriculum.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Use of ICT
1. Use of e- Resources by the teachers and student of IPS
(Institute of Professional Studies) and other faculties of
University of Allahabad
Presentation by
Shikha Jaiswal
M.Phil. In Library and Information Science
Under the supervision of
Dr. T.N. Dubey
2. INTRODUCTION
E-resources are resources in which information is stored
electronically and which are accessible through electronic systems
and networks.
E-resources is a broad term that includes a variety of
different publishing models, including OPACs, CD-ROMs, online
database, e-journals, e-books, internet resource, print-on-demand
(POD), e-mail publishing, wireless publishing, electronic link and
web publishing etc.
Thus The term can be defined as “any electronic product that
delivers collection of data be it in text, numerical, graphical, or
time based, as a commercially available resource.”
(IFLA ISBD (ER)1)
3. Need AND IMPORTANCE
Electronic Resources are becoming very important
these days as they are more up-to-date, and can be accessed
anywhere, crossing all geographical boundaries. Such
resources add value while conducting R&D activities. Thus
the topic “Use of e- Resources by the teachers and student of
IPS (Institute of Professional Studies) and other faculties of
University of Allahabad” was selected to study the various e-
Allahabad
resources and analyze the availability in the Library.
4. OBJECTIVES
To know the availability of different types of
electronic resources and services in the libraries of IPS and
other faculties.
To compare the frequency of use of electronic
resources by the teachers and students of IPS and other
faculties.
To ascertain the advantages and the problems
experienced by the teachers and students while accessing and
using the electronic resources in the library.
5. HYPOTHESES
•HoIa: There is no significant relationship between the
availability of electronic resources (For students) and the
category of the faculties [IPS and other faculties of A.U.].
•HoIb: There is no significant relationship between the
availability of electronic resources (For Teachers) and the
category of the faculties [IPS and other faculties of A.U.].
6. • HoIIa: There is no significant relationship between the
use of collection type (By The Students) [Print Media and
e-resources] and the category of the faculties [IPS and
other faculties of A.U.].
• HoIIb: There is no significant relationship between the
use of collection type (By the Teachers) [Print Media and
e-resources] and the category of the faculties [IPS and
other faculties of A.U.].
7. MATERIAL AND METHODS
Study design : Cross sectional, descriptive study.
Population: Two different populations i.e. the teachers and the
students belonging to the IPS and the selective science
faculties were chosen for the study.
Sampling Technique: Purposive random sampling was applied
for selecting two different homogenous samples from the
two different populations i.e. teachers and the students
Sample A : comprises two comparative groups of teachers (i)
IPS(N=50 ) and (ii) other faculties (N = 50 ).
Size of Sample A =100
8. Sample B: Comprises two comparative groups of students
of (i) IPS ( N = 50 ) and (ii) other faculties ( N = 50 )
Size of Sample B =100
Data collection: Survey method through questionnaire along
with observation and interview techniques was employed for
data collection.
Statistical techniques: Chi-square-test was used to test null
Hypotheses at .05 level of significance[ p≤5%]
Software: SPSS version 12.0 was used for data analysis.
9. DATA ANALYSIS
FREQUENCY OF THE TEACHERS AND STUDENTS
TEACHERS OF IPS
STUDENTS OF IPS
TEACHERS STUDENTS
TEACHERS OF
OTHER FACULTY
STUDENTS OF
OTHER FACULTY
IPS 50 50
STUDENTS 50 50
Total 100 100
10. STUDENTS CONSULT THE PROBLEM WITH
YOU ENCOUNTER PROBLEMS,
WHOM DO YOU CONSULT
FACULT OTHER
LIBRARIAN Y USERS Total
Students IPS 50.0%
32.0% 17.0% 1.0%
OTHER 50.0%
14.0% 33.0% 3.0%
FACULTY
Total 46.0% 50.0% 4.0% 100.0%
YOU ENCOUNTER
40 PROBLEMS,
WHOM DO YOU
CONSULT
LIBRARIAN
FACULTY
30
OTHER USERS
Result: 32% students of IPS
and 14% of other faculties
20
consult with the librarian,
C
n
u
o
t
while17% students of IPS and
33% of other faculties consult
with the teachers. 1% students of
10
IPS 3% of other faculties
0
IPS OTHER FACULTY
consults with the other users.
STUDENTS
11. TEACHERS CONSULT THE PROBLEM WITH
YOU ENCOUNTER PROBLEMS,WHOM DO
YOU CONSULT
LIBRARI FACULT OTHER OTHERS Total
AN Y USERS
Teachers IPS 50.0%
32.0% 10.0% 4.0% 4.0%
OTHER 50.0%
FACULTIE 8.0% 31.0% 9.0% 2.0%
S
Total 40.0% 41.0% 13.0% 6.0% 100.0%
YOU ENCOUNTER
40
Result: 32% teachers of IPS and
PROBLEMS,
WHOM DO YOU
CONSULT
LIBRARIAN
FACULTY
OTHER USERS
OTHERS
8% of other faculties consult with
30
the librarian, while10% teachers of
IPS and 31% of other faculties
consult with the teachers. 4%
C
20
n
u
o
t
teachers of IPS and 9% of other
10
faculties consult with the other
users
0
IPS OTHER FACULTY
TEACHERS
12. STUDENTS SATISFIED WITH EXISTING IT INFRASTRUCTURE
SATISFIED WITH
EXISTING IT
INFRASTRUCTURE
Total
YES NO
STUDENTS IPS 50.0%
35.0% 15.0%
OTHER 50.0%
26.0% 24.0%
FACULTY
Total 61.0% 39.0% 100.0%
SATISFIED WITH
40
EXISTING IT
INFRASTRUCTURE
YES
NO
Result: 35% students of IPS
30
and 26% of other faculties
were satisfied with existing
C
20
n
u
o
infrastructure.
t
10
0
IPS OTHER FACULTY
STUDENTS
13. TEACHERS SATISFIED WITH EXISTING IT INFRASTRUCTURE
TEACHERS
OTHER
IPS FACULTY Total
SATISFIED WITH YES 37.0% 21.0% 58.0%
EXISTING IT
INFRASTRUCTU
RE NO 13.0% 29.0% 42.0%
Total 50.0% 50.0% 100.0%
SATISFIED WITH
40
EXISTING IT
INFRASTRUCTURE
YES
NO
30
Result: 37% students of
IPS and 13% of other
20
faculties were satisfied
C
n
u
o
t
with existing
10
infrastructure.
0
IPS OTHER FACULTY
TEACHERS
14. CONVENIENCE IN ACCESSING THE E-RESOURCES BY STUDENTS
CONVENIENCE IN
ACCESSING THE E-
RESOURCES
NO Total
YES
STUDENTS IPS 50.0%
40.0% 10.0%
50.0%
OTHER FACULTY 23.0% 27.0%
Total 63.0% 37.0% 100.0%
CONVENIENCE IN
40
ACCESSING THE
E-RESOURCES
YES
NO
30 Result: 40% student of
IPS and 23 % of other
20
faculty were convenient
C
n
u
o
t
in accessing the e-
10
resources.
0
IPS OTHER FACULTY
STUDENTS
15. CONVENIENCE IN ACCESSING THE E-RESOURCES BY THE TEACHERS
TEACHERS Total
OTHER
IPS FACULTY
CONVENIENCE IN YES
ACCESSING THE 43.0% 33.0% 76.0%
E-RESOURCES
NO 7.0% 17.0% 24.0%
Total 50.0% 50.0% 100.0%
CONVENIENCE IN
50 ACCESSING THE
E-RESOURCES
YES
NO
40
30
Result: 43% teachers of IPS
and 33 % of other faculty
C
n
u
o
t
20
were convenient in accessing
10
the e-resources.
0
IPS OTHER FACULTY
TEACHERS
16. STUDENT’S VIEW OF IMPORTANCE OF E-RESOURCES VERSES TRADITIONAL
RESOURCES
E-RESOURCES DIMINISH THE
IMPORTANCE OF TRADITIONAL
RESOURCES
Total
YES NO
STUDENTS IPS 50.0%
9.0% 41.0%
OTHER 50.0%
14.0% 36.0%
FACULTY
Total 23.0% 77.0% 100.0%
50
E-RESOURCES
DIMINISH THE
IMPORTANCE OF
Result: According to the view of
large % of students of IPS i.e. 41%
TRADITIONAL
RESOURCES
YES
40 NO
and students of other faculty i.e.
30
36%, e-resources never diminish the
light of traditional resources.
C
n
u
o
t
20
Whereas 9% IPS students and 14%
10
other faculty students feel that e-
0
resources may replace traditional
IPS
STUDENTS
OTHER FACULTY
sources of information.
17. TEACHER’S VIEW OF IMPORTANCE OF E-RESOURCES
VERSES TRADITIONAL RESOURCES
TEACHERS Total
OTHER
IPS FACULTY
E-RESOURCES DIMINISH YES
THE IMPORTANCE OF 17.0% 19.0% 36.0%
TRADITIONAL RESOURCES
NO 33.0% 31.0% 64.0%
Total 50.0% 50.0% 100.0%
E-RESOURCES
Result: According to the view of large
no of teachers of IPS i.e. 33% , and
40 DIMINISH THE
IMPORTANCE OF
TRADITIONAL
RESOURCES
30
YES
NO
teachers of other faculty i.e. 31 %, e-
resources never diminish the light of
traditional resources. Whereas 17% IPS
C
n
u
o
20
t
teachers and 19% other faculty teachers
10
feel that e-resources may replace
traditional sources of information.
0
IPS OTHER FACULTY
TEACHERS
18. Ho1a : There is no significant relationship between the availability of
electronic resources (For students) and the category of the faculties.
E-RESOURCES df χ2 χ2 Result at .05
AVAILABLE IN tab cal
level of
LIBRARY significance
UNSATI CAN' 2 5.991 17.11 significant
SATISFA SFACTO T 3 relation ship
STUDENTS CTORY RY SAY Total
IPS 29 20 1 50
OTHER 9 38 3 50
FACULTY
Total 38 58 4 100
Result: χ2 cal (17.113) >
E-RESOURCES
40
AVAILABLE IN
LIBRARY
SATISFACTORY
UNSATISFACTOR
χ2 tab (5.991)
Y
CAN'T SAY
30
Ho1a is rejected. There is
significant relationship between
C
n
u
o
20
t
10 the availability of electronic
resources (For students) and the
category of the faculties
0
IPS OTHER FACULTY
STUDENTS
19. •HoIb: There is no significant relationship between the availability of
electronic resources (For Teachers) and the category of the faculties.
E-RESOURCES AVAILABLE df χ2 χ2 Result at .05 level of
IN LIBRARY tab cal
significance
SATISFA UNSATISF CAN'T 2 5.99 9.78 significant relation
TEACHE CTO ACTO SA 1 3 ship
RS RY RY Y Total
IPS 33 10 7 50
OTHER
FACU 18 23 9 50
LTY
Total 51 33 16 100
E-RESOURCES
25 AVAILABLE IN
LIBRARY
SATISFACTORY
Result: χ2 cal (9.783) >
UNSATISFACTOR
Y
20 CAN'T SAY
15
χ2tab (5.991) HoIIb
is rejected. Significant relationship
C
n
u
o
t
10
between the availability of electronic
5 resources (For Teachers) and the
category of the faculties.
0
IPS OTHER FACULTY
TEACHERS
20. HoIIa: There is no significant relationship between the use of
collection type (By The Students) and the category of the faculties
df χ2 χ2 Result at .05 level of
USE OF COLLECTIONS tab cal
significance
1 3.84 4.058 significant relation
PRINT NON PRINT 1 ship
STUDENT COLLECTI COLLE Total
S ON CTION
IPS 33 17 50
OTHER
FACUL 23 27 50
TY
Total 56 44 100
USE OF
40 COLLECTIONS
PRINT
COLLECTION
NON PRINT
COLLECTION
30 Result : χ2 cal (4.058) > χ2tab
(3.841) , Ho IIa is rejected. There is
significant relationship between the
C
20
n
u
o
t
use of collection type (By The
10
Students) and the category of the
faculties
0
IPS OTHER FACULTY
STUDENTS
21. HoIIb: There is no significant relationship between the use of collection
type (By the Teachers) and the category of the faculties
df χ2 χ2 Result at .05 level
tab cal
of
USE OF COLLECTIONS significance
PRINT NON PRINT 1 3.841 6.250
COLLECTI COLLECT
TEACHERS ON ION Total
IPS 38 12 50
OTHER 26
FACUL 24 50
TY
Total 64 36 100
USE OF
40
COLLECTIONS
PRINT
Result :
COLLECTION
NON PRINT
COLLECTION
Since χ2 cal
(6.250) > χ2tab (3.841) , Ho IIb is
30
rejected. There is significant
C
20
n
u
o
t
relationship between the use of
10 collection type (By the Teachers) and
the category of the faculties
0
IPS OTHER FACULTY
TEACHERS
22. CONCLUSION
Results show the availability of e-resources is more incase of
IPS(Institute of Professional Studies) library as compared to the
library of other faculties.
Teachers and students of IPS (Institute of Professional Studies)
are using e-resources most frequently as compared to the teachers
and students of other faculties of University of Allahabad.
Majority of the teachers and students of IPS are getting the
relevant information through e-resources relevant information as
compared to the teachers and students of other faculties of
University of Allahabad.
23. Though the teachers and the students of IPS use the e-
resources more than the teachers and the students of other
faculty but they prefer print media as it is readily available in
their library .
The teachers and students of IPS reported more advantages
and less problems regarding the use of e-resources as
compared to the teachers and students of other faculties of
University of Allahabad.
24. Among the advantages the teachers and students reported the
following points:-----
o E-resources are more informative as various sites are available
at a time for any kind of subject matter.
o E- resources are reported as less time consuming, less
expensive and easy to get information by most of the teachers
and students of IPS.
25. Among the problems the teachers and students reported the
following points:-----
o E- resources are reported as more time consuming, more expensive
and difficult to get information by most of the teachers and students
of other faculties.
As regarding the impact of e-resources most of the teachers and
students reported that they reduce the work time, improve the
quality of work, facilitates the updating and saving the matter.
26. SUGESSIONS
Awareness for e-resources should be propagated and
enhanced among the students and teachers.
Libraries should be more equipped with computers and
relevant facilities.
Qualified Library professionals should be appointed in the all
the departments of different faculties.
Library orientation programs should be conducted to get
aware of the library resources among users.
27. Librarian must motivate users for better use of resources
available in the library as well as on the internet.
Library literacy programs for ICT concept must be started for
better use of available resources.
More and more studies should be done for increasing the use
of e-resources.
Kuvan. Kuvan, produced by Biomarin Pharmaceutical Inc., is a drug that, in some people with PKU, can enhance enzyme activity and lower blood phe levels. Kuvan is a form of the cofactor for the phenylalanine hydroxylase enzyme, called tetrahydrobiopterin or BH4. When given in sufficiently large doses, it can cause whatever residual enzyme activity exists to work harder and thereby reduce blood phe levels. It is most likely to be effective in those with significant residual enzyme activity, such as those with “variant” PKU or mild hyperphenylalaninemia. It is not possible to know in advance whether an individual with PKU will be responsive to the drug, so it must be tried for a length of time to determine if it will be effective. If it is effective, then a dosage requirement needs to be determined by the doctor. In rare cases, someone on the diet has been able to discontinue the diet entirely; but more typically, use of Kuvan has resulted in greater tolerance for dietary phenylalanine while the diet is still maintained.
Though the developing fetus may only be a carrier of the PKU gene, the intrauterine environment can have very high levels of phenylalanine, which can cross the placenta
Monthly blood tests help people with PKU track their progress with the diet. These blood tests measure phe build-up in the blood. Regular visits to the PKU clinic are an important opportunity for people with PKU to meet with the PKU team. During these visits, everyone on the team works together to give the best possible care and guidance for people with PKU. The visit should include a blood draw, a short exam by a pediatrician, and a chance to discuss ways to manage the low-phe food pattern. Food records are usually a 3 day diary of all foods and beverages eaten and the amounts consumed. These diaries should be accurate records of foods eaten. They will help the PKU clinic team to interpret blood phe levels and make adjustments to the food and formula prescription.