Alan Page - Test Innovation For Everyone - EuroSTAR 2012TEST Huddle
EuroSTAR Software Testing Conference 2012 presentation on Test Innovation For Everyone by Alan Page. See more at: http://conference.eurostarsoftwaretesting.com/past-presentations/
Ben McAllister - The Science of Good Design: A Dangerous Ideabolt peters
Ben's article in the Atlantic challenged the notion that design research can be truly objective or quantitative. At URF, he expanded on this theme with additional thoughts for researchers, and open it up for a broad discussion.
Couldn’t make it to SxSW Interactive this year? Don’t worry, the Social Media Club of Fort Worth has you covered! For our April speaker event, several SMCFW members who attended SxSW served as the presenters. Each speaker took five minutes to give their own mini presentation and talk to the group about their favorite SxSW session, speaker or conference experience.
Scaling up is hard and deadly if done wrong. A study by Startup Genome analyzed the results of 3,200 start-ups they found that of the majority of start-ups failed. That shouldn’t come as a surprise to anyone. What is more important is they found, 70% failed because of premature or faulty scaling.
A solution is “Nail it, then scale it” approach to growing your business. To make it easy to remember the approach we have boiled things down to a simple “ABCs” formula:
A = Ask for help
B = Build ideas together
C = Clarify
S = Build in Systems for growth
Alan Page - Test Innovation For Everyone - EuroSTAR 2012TEST Huddle
EuroSTAR Software Testing Conference 2012 presentation on Test Innovation For Everyone by Alan Page. See more at: http://conference.eurostarsoftwaretesting.com/past-presentations/
Ben McAllister - The Science of Good Design: A Dangerous Ideabolt peters
Ben's article in the Atlantic challenged the notion that design research can be truly objective or quantitative. At URF, he expanded on this theme with additional thoughts for researchers, and open it up for a broad discussion.
Couldn’t make it to SxSW Interactive this year? Don’t worry, the Social Media Club of Fort Worth has you covered! For our April speaker event, several SMCFW members who attended SxSW served as the presenters. Each speaker took five minutes to give their own mini presentation and talk to the group about their favorite SxSW session, speaker or conference experience.
Scaling up is hard and deadly if done wrong. A study by Startup Genome analyzed the results of 3,200 start-ups they found that of the majority of start-ups failed. That shouldn’t come as a surprise to anyone. What is more important is they found, 70% failed because of premature or faulty scaling.
A solution is “Nail it, then scale it” approach to growing your business. To make it easy to remember the approach we have boiled things down to a simple “ABCs” formula:
A = Ask for help
B = Build ideas together
C = Clarify
S = Build in Systems for growth
Startups and Smalltak - Presented at Smalltalks2014 Córdoba, Argentinasebastian sastre
Here are the slides of the talk I gave at Smalltalks2014 in November 2014, in Córdoba, Argentina.
It covers the basics of why startups matter and what they actually are. Then show some opportunities and challenges about them and for Smalltalk in particular. It closes with some questions and suggestions on how to raise the value of the community, hopefully resulting in increasing the chances to see more profitable portfolios.
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceDave LaFontaine
This is the presentation that I delivered at the Colombia 3.0 conference in Bogota, Colombia. It is aimed at entrepreneurs and digital content producers who want to jump-start their social media presence -- or at established businesses who need to systematize the way they work with social media.
Five tricks to grow your audience using social mediaDave LaFontaine
This is a PPT version of my session at the Colombia 3.0 conference in Bogota in September 2015. In it, I lead the audience through five steps to build their audience (i.e. clients), and the 10 best techniques to craft attention-getting headlines, email headers and content.
Effective Presenting with ‘Think, Feel, Do!’Ray Poynter
Effective research needs to result in outcomes, and changes that are beneficial to the organisation commissioning the research.
The ability of the research to help bring about change depends on how it is communicated. In many cases, the only part of the research that has any impact or visibility is the presentation, i.e. the actual presentation and any report / ‘leave behind’/ or 'take-aways'.
In this webinar, Ray Poynter, focuses on how to use the ‘Think, Feel, Do!’ approach to create effective communications, i.e. communications that result in actions.
Twitter Is Dead! Long Live Twitter! Love it or hate it, Twitter is the social media darling of 2009. But why? Learn how Twitter text messages shape brands, improve customer service, reveal insights and capture the collective zeitgeist in 140-characters or less. Used for the past two years by savvy organizations worldwide, Twitter has recently been popularized by celebrities, athletes and mainstream media. Its simplicity and versatility make it the target for both ridicule and adoration – often at the same time. And while the fate of Twitter as the Internet’s next big thing can be debated, learning to become smarter, more efficient and engaging never goes out of style.
This session helps affiliate marketers, networks and merchants recognize the power of adapting and adopting social media platforms into their programs for increased traffic, conversions and profit.
Ethics and IA - seven deadly sins that prevent us from building a better worldEric Reiss
My keynote from World IA Day, 2018
I started working with information architecture long before the term was even known. Over the past 35 years, I’ve encountered many issues that have disturbed me – from creating purposely addictive programs, sites, and apps, to the current zeitgeist for responsive design at the expense of basic usability. I have seen research that is forged, ignored, or twisted by internal company politics and by the cognitive bias of the design team. And I have seen countless dark patterns that serve to suppress accessibility and diversity, and encourage false beliefs and false security.
OSINT Black Magic: Listen who whispers your name in the dark!!!Nutan Kumar Panda
Open Source Intelligence is the art of collecting information which is scattered on publicly available sources. With evolution of social media and digital marketplaces a huge amount of information is constantly generated on the Internet (sometimes even without our conscious consent). This is of great concern for organizations and businesses as chances of confidential data floating in the public domain may seriously harm their business integrity. All recent hacks are related to internal source code disclosure, API keys leakage, known vulnerability in third party plugin, data dump leaks etc. Based on experience and robust research in this domain, for this talk the speakers have created a tool which will help all kind of organizations to monitor cyberspace effectively without much investment. This tool is simple but an effective solution which is capable of hearing digital whispers which are usually missed or ignored but shouldn’t be.
Social Search: A Little Help From My FriendsBrynn Evans
These are the slides from the SxSW'10 panel on social search with Max Ventilla (@ventilla), Ash Rust (@ashrust), Scott Prindle (@prindlescott), Marc Vermut (@mvermut), and me!
Machine Learning for Non-technical Peopleindico data
Machine learning is one of the most promising and most difficult to understand fields of the modern age. Here are the slides from Slater Victoroff's (CEO of indico) talk at General Assembly Boston for non-technical folks on how to separate the signal from the noise -- stay tuned for the next time he speaks:
https://generalassemb.ly/education/machine-learning-for-non-technical-people
A dark pattern is "a user interface that has been carefully crafted to trick users into doing things, such as buying overpriced insurance with their purchase or signing up for recurring bills"
Last week, we focused on the difference between scholarly and popula.docxgauthierleppington
Last week, we focused on the difference between scholarly and popular sources. While popular sources do have an important place in research, there are important considerations for searching for these resources on the Internet. This discussion introduces you to the concept of the “Internet Filter Bubble” and how it can affect your search results when using certain search engines, such as Google. The second discussion this week will examine how to pop the filter bubble.
Prepare:
Watch the Ted Talk
Eli Pariser: Beware Online “Filter Bubbles”
(
transcript
) and read the
How to Pop Your Filter Bubble!
handout.
Reflect:
Consider your reaction to the video and how this topic applies to your own experience researching on the internet. Think about the suggestions from the
How to Pop Your Filter Bubble!
handout and select three that you feel will help you pop your filter bubble.
Write:
Consider your reaction to the video and how this topic applies to your own experience researching on the internet. Think about the suggestions from the
How to Pop Your Filter Bubble!
handout and select three that you feel will help you pop your filter bubble.
Write:
Answer the following questions in your post.
What were your initial thoughts on the filter bubble after watching the Ted Talk?
What are the positive and negative effects of the filter bubble, particularly in relation to ethical issues that may arise?
How could this filter bubble impact the research you conduct online for your Final Paper, the Annotated Bibliography?
Which three suggestions for popping your Internet filter bubble did you select? Explain why you chose those three.
Do you feel popping your filter bubble is important for all of the searches (i.e., professional, academic, personal) you conduct online or only some? Why or why not?
To maximize the opportunity for vigorous discussion, you must respond to at least one classmate. Post to this discussion on at least three separate days of the week. Your posts must total at least 400 words after you address the questions noted above. Your first post must be completed by Day 3 (Thursday) and the remainder of your posts must be completed by Day 7 (Monday). You must answer all aspects of the prompt at some point during the week. Also, be sure to reply to your classmates and instructor.
video transcript
Mark Zuckerberg,
a journalist was asking him a question about the news feed.
And the journalist was
asking him,
"Why is this so important?"
And Zuckerberg said,
"A squirrel dying in your front yard
may be
more relevant to your interests right now
than
people dying in Africa."
And I want to talk about
what a
Web based on that idea of relevance might look like.
0:40
So
when I was growing up
in a really rural area in Maine,
the Internet meant something very
different to me.
It meant a connection to the world.
It meant something that would connect us all
together.
And I was sure that it was going to be great for democracy
and for our society.
.
We focus on Invisible Interfaces and their influence on digital experiences. With the advent of 5G creating the foundation for the increased adoption of ‘invisibility’ in our interaction with technology – we’ll discuss what this could mean for the UX and CX industry.
Presentation from October 4, 2015: Arts Midwest Orchestras 20/20: Context, Connection, Collaboration. An attempt to lay out the context of audience, competition, technology and strategy - then a set of practical steps to get things done.
Sara illustrates the importance of emotional intelligence to conducting good user research. She shares how to be mindful of your emotional state in a user interview and presents examples and techniques for deepening self-awareness, regulation, and empathy so that you can better read your participants.
Aaron Irizarry - Bootstrapping User Researchbolt peters
Aaron Irizarry addressed the classic problem of organizations that don't support or fund research. He provided ideas and examples for how to get out of the trap, get research done, and get the funding in the end.
Startups and Smalltak - Presented at Smalltalks2014 Córdoba, Argentinasebastian sastre
Here are the slides of the talk I gave at Smalltalks2014 in November 2014, in Córdoba, Argentina.
It covers the basics of why startups matter and what they actually are. Then show some opportunities and challenges about them and for Smalltalk in particular. It closes with some questions and suggestions on how to raise the value of the community, hopefully resulting in increasing the chances to see more profitable portfolios.
Five Social Media Tricks to Grow Your Audience - for Colombia 3.0 ConferenceDave LaFontaine
This is the presentation that I delivered at the Colombia 3.0 conference in Bogota, Colombia. It is aimed at entrepreneurs and digital content producers who want to jump-start their social media presence -- or at established businesses who need to systematize the way they work with social media.
Five tricks to grow your audience using social mediaDave LaFontaine
This is a PPT version of my session at the Colombia 3.0 conference in Bogota in September 2015. In it, I lead the audience through five steps to build their audience (i.e. clients), and the 10 best techniques to craft attention-getting headlines, email headers and content.
Effective Presenting with ‘Think, Feel, Do!’Ray Poynter
Effective research needs to result in outcomes, and changes that are beneficial to the organisation commissioning the research.
The ability of the research to help bring about change depends on how it is communicated. In many cases, the only part of the research that has any impact or visibility is the presentation, i.e. the actual presentation and any report / ‘leave behind’/ or 'take-aways'.
In this webinar, Ray Poynter, focuses on how to use the ‘Think, Feel, Do!’ approach to create effective communications, i.e. communications that result in actions.
Twitter Is Dead! Long Live Twitter! Love it or hate it, Twitter is the social media darling of 2009. But why? Learn how Twitter text messages shape brands, improve customer service, reveal insights and capture the collective zeitgeist in 140-characters or less. Used for the past two years by savvy organizations worldwide, Twitter has recently been popularized by celebrities, athletes and mainstream media. Its simplicity and versatility make it the target for both ridicule and adoration – often at the same time. And while the fate of Twitter as the Internet’s next big thing can be debated, learning to become smarter, more efficient and engaging never goes out of style.
This session helps affiliate marketers, networks and merchants recognize the power of adapting and adopting social media platforms into their programs for increased traffic, conversions and profit.
Ethics and IA - seven deadly sins that prevent us from building a better worldEric Reiss
My keynote from World IA Day, 2018
I started working with information architecture long before the term was even known. Over the past 35 years, I’ve encountered many issues that have disturbed me – from creating purposely addictive programs, sites, and apps, to the current zeitgeist for responsive design at the expense of basic usability. I have seen research that is forged, ignored, or twisted by internal company politics and by the cognitive bias of the design team. And I have seen countless dark patterns that serve to suppress accessibility and diversity, and encourage false beliefs and false security.
OSINT Black Magic: Listen who whispers your name in the dark!!!Nutan Kumar Panda
Open Source Intelligence is the art of collecting information which is scattered on publicly available sources. With evolution of social media and digital marketplaces a huge amount of information is constantly generated on the Internet (sometimes even without our conscious consent). This is of great concern for organizations and businesses as chances of confidential data floating in the public domain may seriously harm their business integrity. All recent hacks are related to internal source code disclosure, API keys leakage, known vulnerability in third party plugin, data dump leaks etc. Based on experience and robust research in this domain, for this talk the speakers have created a tool which will help all kind of organizations to monitor cyberspace effectively without much investment. This tool is simple but an effective solution which is capable of hearing digital whispers which are usually missed or ignored but shouldn’t be.
Social Search: A Little Help From My FriendsBrynn Evans
These are the slides from the SxSW'10 panel on social search with Max Ventilla (@ventilla), Ash Rust (@ashrust), Scott Prindle (@prindlescott), Marc Vermut (@mvermut), and me!
Machine Learning for Non-technical Peopleindico data
Machine learning is one of the most promising and most difficult to understand fields of the modern age. Here are the slides from Slater Victoroff's (CEO of indico) talk at General Assembly Boston for non-technical folks on how to separate the signal from the noise -- stay tuned for the next time he speaks:
https://generalassemb.ly/education/machine-learning-for-non-technical-people
A dark pattern is "a user interface that has been carefully crafted to trick users into doing things, such as buying overpriced insurance with their purchase or signing up for recurring bills"
Last week, we focused on the difference between scholarly and popula.docxgauthierleppington
Last week, we focused on the difference between scholarly and popular sources. While popular sources do have an important place in research, there are important considerations for searching for these resources on the Internet. This discussion introduces you to the concept of the “Internet Filter Bubble” and how it can affect your search results when using certain search engines, such as Google. The second discussion this week will examine how to pop the filter bubble.
Prepare:
Watch the Ted Talk
Eli Pariser: Beware Online “Filter Bubbles”
(
transcript
) and read the
How to Pop Your Filter Bubble!
handout.
Reflect:
Consider your reaction to the video and how this topic applies to your own experience researching on the internet. Think about the suggestions from the
How to Pop Your Filter Bubble!
handout and select three that you feel will help you pop your filter bubble.
Write:
Consider your reaction to the video and how this topic applies to your own experience researching on the internet. Think about the suggestions from the
How to Pop Your Filter Bubble!
handout and select three that you feel will help you pop your filter bubble.
Write:
Answer the following questions in your post.
What were your initial thoughts on the filter bubble after watching the Ted Talk?
What are the positive and negative effects of the filter bubble, particularly in relation to ethical issues that may arise?
How could this filter bubble impact the research you conduct online for your Final Paper, the Annotated Bibliography?
Which three suggestions for popping your Internet filter bubble did you select? Explain why you chose those three.
Do you feel popping your filter bubble is important for all of the searches (i.e., professional, academic, personal) you conduct online or only some? Why or why not?
To maximize the opportunity for vigorous discussion, you must respond to at least one classmate. Post to this discussion on at least three separate days of the week. Your posts must total at least 400 words after you address the questions noted above. Your first post must be completed by Day 3 (Thursday) and the remainder of your posts must be completed by Day 7 (Monday). You must answer all aspects of the prompt at some point during the week. Also, be sure to reply to your classmates and instructor.
video transcript
Mark Zuckerberg,
a journalist was asking him a question about the news feed.
And the journalist was
asking him,
"Why is this so important?"
And Zuckerberg said,
"A squirrel dying in your front yard
may be
more relevant to your interests right now
than
people dying in Africa."
And I want to talk about
what a
Web based on that idea of relevance might look like.
0:40
So
when I was growing up
in a really rural area in Maine,
the Internet meant something very
different to me.
It meant a connection to the world.
It meant something that would connect us all
together.
And I was sure that it was going to be great for democracy
and for our society.
.
We focus on Invisible Interfaces and their influence on digital experiences. With the advent of 5G creating the foundation for the increased adoption of ‘invisibility’ in our interaction with technology – we’ll discuss what this could mean for the UX and CX industry.
Presentation from October 4, 2015: Arts Midwest Orchestras 20/20: Context, Connection, Collaboration. An attempt to lay out the context of audience, competition, technology and strategy - then a set of practical steps to get things done.
Sara illustrates the importance of emotional intelligence to conducting good user research. She shares how to be mindful of your emotional state in a user interview and presents examples and techniques for deepening self-awareness, regulation, and empathy so that you can better read your participants.
Aaron Irizarry - Bootstrapping User Researchbolt peters
Aaron Irizarry addressed the classic problem of organizations that don't support or fund research. He provided ideas and examples for how to get out of the trap, get research done, and get the funding in the end.
Gini Keating - Getting Out There: Research for Mobile Augmented Realitybolt peters
Gini Keating presented a case study on researching mobile augmented reality applications in the field. Attendees at User Research Friday San Diego were the first researchers outside of Qualcomm to hear about this very futuristic work and the challenges and insights it created.
It used to take days to set up a single day of product usability research. Between the manual labor of finding and qualifying users, organizing the process, and finally moderating and analyzing sessions, it was one of the most time-consuming and expensive tasks in interface development. With the creation of web-based tools for user research, there is now an abundance of ways to quickly observe and gather real-world behavioral data from users. Unfortunately, there is also an abundance of ways to collect garbage. We'll cover a lightning fast overview of the tools and methods that are worthwhile, and the five basic categories all UX research tools fall into.
Mark Trammell and Karina Van Schaardenburg - Research Behind The New Twitter ...bolt peters
Most everything built at Twitter is designed by watching how people use the service in new and interesting ways and incorporating those ideas. #NewTwitter, Twitter.com's biggest change in its four-year history, called for iterative research that allowed designers and developers to quickly experiment with wide-ranging changes. Trammell & Karina will share how existing patterns affected the current design of Twitter, what worked (and what didn't work) with #NewTwitter's early research methodology, and what they're doing to better understand how folks discover what's happening.
Derek Pearcy - Reading Users' Minds For Fun And Profitbolt peters
What users say will generally be different from what they do -- this is true, but what's a good strategy when you can't get to enough of your users? What if you could answer some really big questions by performing simple research on ALL of your users? This is the same style of approach taken by companies like Google and Zynga, to target user research efforts which have made them what they are today. Log analysis, done well, can seem like mind-reading. If you haven't done it before: there's nothing to fear.
Brian Krausz - The SaaSification of User Researchbolt peters
A/B testing, interrupt studies, and similar tests are shifting from in-house software to more general, and increasingly powerful, online solutions. This talk will explore the surge in UX tools being offered as online services. Brian will discuss the advantages of this trend as more UX research tasks and tools are offloaded to external companies.
Nick Finck, The Director of User Experience for Blink Interactive, will talk about his process for field user research through user interviews, contextual inquires, and moderated guerilla usability testing. The presentation will cover examples from his work on Fandango, First Tech Credit Union, University of Washington, and Oprah.com along the way.
Susan Dybbs - Picking Your Neurosurgeon's Brainbolt peters
When designing complex systems for highly specialized users, traditional research methods may not do the best job uncovering details of the user's mental model and related information. In this talk, I'll discuss how I used participatory design methods with surgeons to design an inter-operative telemedicine system. I'll highlight best practices and offer a healthy dose of blood, guts and gore (rated PG 13).
Jono Xia - Rolling your own tool: test pilotbolt peters
Test Pilot is a research program launched in 2009 by Mozilla Labs to learn about how people use Firefox. It's strictly anonymous, opt-in, and unlike most data-collection programs, it gives users the chance to see exactly what data has been collected before they choose whether to upload it. Aggregated and sanitized data samples are released to the public under a Creative Commons license to encourage community participation in analysis. Over half a million users have submitted log data about how they use tabs, menus, toolbars, bookmarks, searches, and other browser features. Jono will talk about how Test Pilot works, share interesting and surprising things we've learned so far, and answer questions about our methodology.
Slides from Nate's IxDA & UPA & SVA talks in Los Angeles and New York in May and June of 2010. Most of these won't make any damn sense but more information is in the actual book here: http://bit.ly/ZlDoQ and on our site http://remoteusability.com.
Researching Spore: A New Approach to Player Testingbolt peters
This is from Nate's Meaningful Play presentation on the B|P player experience research on Spore for EA. More info here: http://boltpeters.com/blog/?p=95
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.