Prof. Architectural Engineering TUD, Thijs Asselbergs heeft het 1e exemplaar van het Booosting boek Digitaal Vakmanschap in de Architectuur ontvangen en promoot o.a. verschillende intelligente ontwikkelingen van afstudeerders binnen zijn vakgroep, zoals die van Anneloes de Kof en Cas van de Zanden.
Congres Digitaal Vakmanschap in de Architectuur, 15 juni TU Delft.
Info boek Digitaal Vakmanschap in de Architectuur via booosting.nl.
A quick look at 4 principles to keep in mind as the worlds of marketing and user experience converge from the VP of Product Experience at Refinery29
Presented at Internet Summit in Raleigh, NC, & Digital Summit in Detroit & Dallas in 2015
Booosting bestuurslid Peter Fraanje (directeur NVTB) over Japanse prefabwoningen in de jaarlijkse uitgave van Stedebouw & Architectuur over innovaties in materialen en producten; de Innovatiecatalogus 2017.
Unlocking the Magic of Monads with Java 8JavaDayUA
This code-heavy session demystifies what monads are and outlines reasons why you would even want to introduce them into your code. We’ll take a look at the traditional definition for monads and offer a corresponding type definition in Java. We’ve selected a sample Java 8 implementation of a ‘Promise’ monad, which represents the result of async computation to help us answer practical questions about monads. Also, we'll go over the Laws of Monads and show that you can have a proper monad in Java, if you are brave enough to allow the underlying platform change the rules a bit. PS. You won’t be penalised or ridiculed during this session for your (lack of) Haskell knowledge!
An IT Support Specialist is a professional who assists individuals and organizations in resolving technical issues related to computer software, hardware, networks, and systems. Their primary role involves providing technical support and troubleshooting assistance to end-users, with the ultimate goal of maintaining the smooth operation of technology infrastructure.
Here are some key responsibilities and skills commonly associated with an IT Support Specialist:
Responsibilities:
1. Responding to user inquiries and providing prompt technical support via various channels (phone, email, chat, or in-person)
2. Diagnosing and resolving hardware and software issues on desktops, laptops, printers, and other devices
3. Installing, configuring, and updating software applications and operating systems
4. Assisting in network setup, troubleshooting network connectivity, and resolving internet-related problems
5. Troubleshooting and resolving issues with email, file sharing, and other communication platforms
6. Conducting system backups and ensuring data integrity and security
7. Collaborating with other IT team members to escalate complex issues and collaborate on resolving them
8. Documenting solutions and maintaining knowledge bases and technical documentation for future reference
9. Educating users on basic computer operations, best practices, and security measures
Skills:
1. Strong technical knowledge of operating systems (Windows, macOS, Linux) and software applications
2. Proficiency with networking concepts, protocols, and troubleshooting tools
3. Knowledge of hardware components and the ability to diagnose and repair hardware issues
4. Experience in managing Active Directory, user accounts, and group policies
5. Familiarity with ticketing systems and remote support tools
6. Excellent problem-solving and analytical thinking skills
7. Effective communication and customer service skills to assist users of varying technical backgrounds
8. Ability to work independently and collaboratively in a team-oriented environment
9. Adaptability and willingness to learn new technologies and keep up with industry trends
Overall, an IT Support Specialist is responsible for ensuring that technology systems and equipment function seamlessly, providing reliable support to users, and contributing to the overall productivity and efficiency of an organization's IT infrastructure.
I have over sixteen years of experience with numerous industries and specialty areas Insurance, Banking, Telecommunications, Retail, Life Sciences, Manufacturing, and Score carding in the design, development, implementation, and support of information technology systems across a variety of hardware environments. I'm knowledgeable in all aspects of designing and constructing efficient data warehouses, operational data stores, and data marts, and have performed as a lead database designer/modeler and application specialist with direct responsibility for managing project teams. I'm adept at translating business needs into physical design specifications and providing quality deliverable that exceed client expectations.
Seasoned professional with over a decade of experience in Information Technologies with emphasis in written technical communications, layout and design using current software technology. Results-driven, proactive approach to learning new technologies in order to deliver exemplary results. Extensive experience in leading and building cohesive and collaborative teams.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
1. Cathie Satonick
PO Box 666, Kannapolis, NC 28082
csatonick@yahoo.com
Ph: 704-345-3572
ProfessionalSummary
Service-oriented SharePoint Analyst with 10 year background in Information
Systems. Core competencies include SharePoint, Visio and MS Project as well as
excellent communication and time management skills. Handles tasks with accuracy
and efficiency.
Skills
Customer and Personal Service Speaking
Time Management Computers and Electronics
Education and Training Communications and Media
SharePoint/Designer/Infopath Visio and MS Project
Experience
IT Processing Technician Sep 2010-Jun 2016
Cardinal Innovations Healthcare Kannapolis, NC
Offer specific training programs to help workers maintain or improve job
skills.
Present information using a variety of instructional techniques or formats,
such as role playing, simulations, team exercises, group discussions, videos, or
lectures.
Implement electronic document processing, retrieval, and distribution
systems in collaboration with other information technology specialists.
Review or update web page content or links in a timely manner, using
appropriate tools.
Collaborate with web developers to create and operate internal and external
web sites, or to manage projects, such as e-marketing campaigns.
Provide training or technical assistance in web site implementation or use.
Evaluate testing routines or procedures for adequacy, sufficiency, and
effectiveness.
Systems Help Analyst Feb 2005-Feb 2009
Cardinal Logistics Kannapolis, NC
Use computers for various applications, such as database management or word
processing.
Create, maintain, and enter information into databases.
Train and assist staff with computer usage.
Answer user inquiries regarding computer software or hardware operation to
resolve problems.
2. Refer major hardware or software problems or defective products to vendors
or technicians for service.
Executive Secretaries and Executive Administrative Assistants Feb 2003-Feb 2005
Crown American Hotels Charlotte, NC
Manage and maintain executives' schedules.
Conduct research, compile data, and prepare papers for consideration and
presentation by executives, committees and boards of directors.
Prepare agendas and make arrangements, such as coordinating catering for
luncheons, for committee, board, and other meetings.
Education
60 hours Information Systems
University of North Carolina at Charlotte Charlotte, NC