The document discusses contextual broadcasting using mobile devices. It describes how media has traditionally been "boxed" and isolated, but mobile devices allow inserting context into media through location awareness and other sensors. This allows filtering content by context to only surface relevant information. The document proposes a model for personal mobile context that incorporates activities, social connections, environment, temporal and spatial context, mental state, physiology, and interests to enable highly personalized contextual services and broadcasts.
A presentation on how we are preparing to step through 'boxed media' into the world of Life Media Covergence.
1. Boxed Media
2. The Mobile Medium
3. Future of Media
A decade ago, the higher education Web experience was segmented into walled gardens -- the public Web site, the course management system, online transactions, alumni communities, events calendars. The legacy of that structure was that our lifelong relationships with the college were interrupted as we students, faculty, staff, parents, and alumni moved from system to system.
The next-generation online ecosystem will let us re-organize these experiences, allowing for deepening engagement throughout our lives: from prospective student to elder alum. How will software like WordPress fit in? How can we evaluate, select, and configure systems to support our users' needs, rather than the other way around?
A presentation on how we are preparing to step through 'boxed media' into the world of Life Media Covergence.
1. Boxed Media
2. The Mobile Medium
3. Future of Media
A decade ago, the higher education Web experience was segmented into walled gardens -- the public Web site, the course management system, online transactions, alumni communities, events calendars. The legacy of that structure was that our lifelong relationships with the college were interrupted as we students, faculty, staff, parents, and alumni moved from system to system.
The next-generation online ecosystem will let us re-organize these experiences, allowing for deepening engagement throughout our lives: from prospective student to elder alum. How will software like WordPress fit in? How can we evaluate, select, and configure systems to support our users' needs, rather than the other way around?
Introducing a simple way of programing robots, hardware in general and various approaches developed by Microsoft Research Cambridge. The talk was held at the MSRC Christmas Lecture 2005.
Saiful hidayar santri indigo telkom republika pondok pesantren keresek garut ...Saiful Hidayat
Presentasi pada acara Santri Indigo di Pondok Pesantren Keresk Garut Jawa Barat pada tanggal 19 Mei 2010 yang diselenggarakan oleh TELKOM dan Republika dengan Topic Syiar Islam melalui pemanfaatan IT
Istance Designing Gaze Gestures For Gaming An Investigation Of PerformanceKalle
To enable people with motor impairments to use gaze control to play online games and take part in virtual communities, new interaction techniques are needed that overcome the limitations of dwell clicking on icons in the games interface. We have investigated gaze gestures as a means of achieving this. We report the results of an experiment with 24 participants that examined performance differences between different gestures. We were able to predict the effect on performance of the numbers of legs in the gesture and the primary direction of eye movement in a gesture. We also report the outcomes of user trials in which 12 experienced gamers used the gaze gesture interface to play World of Warcraft. All participants were able to move around and engage other characters in fighting episodes successfully. Gestures were good for issuing specific commands such as spell casting, and less good for continuous control of movement compared with other gaze interaction techniques we have developed.
Service Design for the Internet of the WorldDaniel Harris
When I had the pleasure of speaking to key telecoms and technology industry figures at November's Smart Device and Mobile User Experience Summit this is the question I attempted to address.
As always at Fjord, people come first. So when looking to provide sustainable design a future market within the Internet of Everything, we have to look at the economic and social situation that many people in the world are facing. In the west this looks like what the LifeStyle News Network is coining 'The Just Nots': aspiring and hard working citizens affected by increasing inflation, food prices, and housing costs; just not able to create the life they thought they were going to achieve.
It's likely that we'll have to design niche services and create flexible, open source brands to meet the needs of this generation – who are digitally native and happy to hack; they transcend the demographic driven models that brands have traditionally targeted.
We believe the experience of the Internet of Everything is a liquid experience, where platforms and even interfaces begin to disappear. This is our new challenge – how can we design liquid services to address the new needs that are emerging from from a age where digitally mature, and connected people want more value with less money?
차세대 쇼셜 네트워크 서비스에 대한 발표자료로서 2009년 2월 26일 KRnet 이다.
KRnet이란 'korea Internet Conference'로서 그 중 'Track : Convergence Promotion Services'에서 'Track : Convergence Promotion Services'의 발표자료이다. 발표제목은 'Next Social Network Service'이며 내용은 다음과 같다.
소셜네트워크 서비스란 쉽게 말해 ‘나의 프로필을 네트워크에 공유하여, 구인/구직에 실질적인 도움을 주는 웹 서비스의 일종이다. 그러나 쇼셜 네트워크란 아날로적 인맥망에서부터 시작하여 디지털 인맥망으로, 사회학에서부터 소프트웨어 개발학으로까지, 구인/구직의 연결망에서 관계의 매듭을 열어가는 연결망으로 발전 중에 있다. 본 강연은 네트워크 이론에 의한 수렴과 확산의 상호질서를 바
탕으로 소셜 서비스의 발전 과정과 그 의의를 진단한다. 특히 단문 서비스 중심의 소셜 서비스인 트위터(twitter), 이미지 기반의 소셜 서비스인 플리커(flickr), 동영상 맥락의 소셜 서비스인 유튜브(youtube), 프로필 중심의 소셜 서비스인 마이스페이스(myspace) 등이 각 매체의 허브로서 역할하며 어떻게 사회, 문화, 비즈니스적인 변화를 주는지를 소개한다. 강연을 통해 소셜 서비스의 각 허브들이 상
호작용하여 수렴되는 쇼셜 네트워크에서의 아이텐티가 어떻게 개인을 설명해주고 신뢰해주는 메커니즘을 가지는지를 분석할 예정이다. 즉 소셜 서비스란 개인과 집단의 신뢰의 증진을 위한 관계 맺기 서비스이다.
Introducing a simple way of programing robots, hardware in general and various approaches developed by Microsoft Research Cambridge. The talk was held at the MSRC Christmas Lecture 2005.
Saiful hidayar santri indigo telkom republika pondok pesantren keresek garut ...Saiful Hidayat
Presentasi pada acara Santri Indigo di Pondok Pesantren Keresk Garut Jawa Barat pada tanggal 19 Mei 2010 yang diselenggarakan oleh TELKOM dan Republika dengan Topic Syiar Islam melalui pemanfaatan IT
Istance Designing Gaze Gestures For Gaming An Investigation Of PerformanceKalle
To enable people with motor impairments to use gaze control to play online games and take part in virtual communities, new interaction techniques are needed that overcome the limitations of dwell clicking on icons in the games interface. We have investigated gaze gestures as a means of achieving this. We report the results of an experiment with 24 participants that examined performance differences between different gestures. We were able to predict the effect on performance of the numbers of legs in the gesture and the primary direction of eye movement in a gesture. We also report the outcomes of user trials in which 12 experienced gamers used the gaze gesture interface to play World of Warcraft. All participants were able to move around and engage other characters in fighting episodes successfully. Gestures were good for issuing specific commands such as spell casting, and less good for continuous control of movement compared with other gaze interaction techniques we have developed.
Service Design for the Internet of the WorldDaniel Harris
When I had the pleasure of speaking to key telecoms and technology industry figures at November's Smart Device and Mobile User Experience Summit this is the question I attempted to address.
As always at Fjord, people come first. So when looking to provide sustainable design a future market within the Internet of Everything, we have to look at the economic and social situation that many people in the world are facing. In the west this looks like what the LifeStyle News Network is coining 'The Just Nots': aspiring and hard working citizens affected by increasing inflation, food prices, and housing costs; just not able to create the life they thought they were going to achieve.
It's likely that we'll have to design niche services and create flexible, open source brands to meet the needs of this generation – who are digitally native and happy to hack; they transcend the demographic driven models that brands have traditionally targeted.
We believe the experience of the Internet of Everything is a liquid experience, where platforms and even interfaces begin to disappear. This is our new challenge – how can we design liquid services to address the new needs that are emerging from from a age where digitally mature, and connected people want more value with less money?
차세대 쇼셜 네트워크 서비스에 대한 발표자료로서 2009년 2월 26일 KRnet 이다.
KRnet이란 'korea Internet Conference'로서 그 중 'Track : Convergence Promotion Services'에서 'Track : Convergence Promotion Services'의 발표자료이다. 발표제목은 'Next Social Network Service'이며 내용은 다음과 같다.
소셜네트워크 서비스란 쉽게 말해 ‘나의 프로필을 네트워크에 공유하여, 구인/구직에 실질적인 도움을 주는 웹 서비스의 일종이다. 그러나 쇼셜 네트워크란 아날로적 인맥망에서부터 시작하여 디지털 인맥망으로, 사회학에서부터 소프트웨어 개발학으로까지, 구인/구직의 연결망에서 관계의 매듭을 열어가는 연결망으로 발전 중에 있다. 본 강연은 네트워크 이론에 의한 수렴과 확산의 상호질서를 바
탕으로 소셜 서비스의 발전 과정과 그 의의를 진단한다. 특히 단문 서비스 중심의 소셜 서비스인 트위터(twitter), 이미지 기반의 소셜 서비스인 플리커(flickr), 동영상 맥락의 소셜 서비스인 유튜브(youtube), 프로필 중심의 소셜 서비스인 마이스페이스(myspace) 등이 각 매체의 허브로서 역할하며 어떻게 사회, 문화, 비즈니스적인 변화를 주는지를 소개한다. 강연을 통해 소셜 서비스의 각 허브들이 상
호작용하여 수렴되는 쇼셜 네트워크에서의 아이텐티가 어떻게 개인을 설명해주고 신뢰해주는 메커니즘을 가지는지를 분석할 예정이다. 즉 소셜 서비스란 개인과 집단의 신뢰의 증진을 위한 관계 맺기 서비스이다.
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
How can a digital marketing consultant help your business? In this resource we'll count the ways. 24 additional marketing resources are bundled for free.
Why user data is core to the next wave of mobile innovation, including the role of Big Data. This presentation to Ericsson VPs visiting Ericsson Silicon Valley, so has a service provider perspective.
Mobile Communities - Future Trends and ChallengesWilli Schroll
Session presentation at CommunityCamp 2008 Berlin, ccb08; 2008-11-01, 2008-11-02, post hoc produced, with new charts and slides
// slideshow has been presented too at MobileCamp Dresden 2009, 2009-04-25 #mcdd09 and at InfoCamp Berlin 2008 (informationarchitecture)
Be A Mobile Design Hero: Transform Your Web Design Knowledge Into Mobile Desi...Vinny Wu
Kim Lenox (Consumer Electronics Industry)
This workshop is for web designers interested in shifting their careers toward designing for mobile devices. Kim Lenox of Adaptive Path, will describe what makes mobile different from the web and how to design for mobile context of use. Join Kim for this workshop and learn how your current web design background can be leveraged to design compelling mobile products.
Inside the Google Glass Interaction Layer — Presentation given at the Qualcom...roses/foundation
This presentation was given at the Qualcomm Research Center discussing the nuances of the Google Glass Interaction Layer.
Here were a few of the topics covered throughout the evening:
How does the Google Glass’ interaction layer work and what constitutes good design when designing interactions for the device.
First we will define ‘what an interaction is’ on Google Glass. We will proceed to identify and classify good use cases from bad ones and then address where there is a margin for innovation surrounding those various use cases
A Mobile Centric View of Silicon Valley - January 2011Lars Kamp
A presentation held at Opinno in San Francisco to a delegration from PromoMadrid. Goal was to provide a quick overview of major trends in mobile in 30 min.
A lecture on research directions in Augmented Reality as part of the COSC 426 class on AR. Taught by Mark Billinghurst from the HIT Lab NZ at the University of Canterbury.
Mainstream mobile devices are being loaded with sensors. These devices can be used to create experiences that are tailored, adaptive and responsive to the way people live and work. Location-awareness allows devices to respond to place, networked address books enable socially rich communication experiences, and motion and gestural sensors empower designers to respond to context of use. All these elements are creating a ’sensitive ecosystem’; mobile devices that adapt gracefully to context and use.
This presentation will explore some of the design and technology trends that are shaping design for mobile devices, show examples of devices and services that are starting to take advantage of these trends, then explain how designers need to rethink design problems to take advantage of this technological ground-shift.
Presented at Web Direction South '08.
Jo Caudron is gepassioneerd door technologie en media en een veelgevraagd spreker op het vlak van
digitale en nieuwe media. Hij is de
auteur van ‘Haal meer uit Sociale Media’ en ‘Media Morgen: overleven onze klassieke media de radicale impact van internet, social media en mobile’. Hij vertelt hoe hij je sociale mediastrategie zou aanpakken.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
3. 1. BOXED MEDIA
http://www.flickr.com/photos/butterflypsyche/2913481850/
4. What is
BOXED MEDIA? Box
width
Media contained in an isolated environment.
Fixed in two dimensions (length X width).
Main purpose of media is to consume it. length
34. FROM CONTENT TO CONTEXT
Content Service
Content pipes Service pipes
based on based on
Interests Verbs
Media Mobile
Box Medium
Overload Relevance
Waste Filtered
Static Context Dynamic Context
watching or reading, etc Shopping, working, eating out
35. AUTOMATIC DOOR RETAIL PEOPLE COUNTER
Contextual Services are already all around you.
Many times disguised as simple small services
36. Communication
Context Content
How will we
use contextual
services?
http://www.flickr.com/photos/skyshanghai/2400793508/
37. LOCAL GLOBAL
Networks Mobile Contextual
of sensors Services
and devices medium Communication 2.0
Sensing, computing and communicating
Physical objects Trusted personal
Physical and
in intelligent sensing and
digital world fuse
environments computing devices
Inspiration: Nokia Mobile Gateway