This document proposes a talk on "Couriering", which is described as a set of standards that allow devices, applications, and people to securely communicate in a decentralized manner. Some key benefits outlined include the ability to address applications and devices, send encrypted messages, share large files, and maintain anonymity. Examples provided of how Couriering could work include making phone calls between devices, sending messages to groups like social networks, and creating instant messaging applications. Concerns about privacy and security are addressed by the use of public-key cryptography and storing data on individual email providers rather than centralized servers.
Community Memory 1973 was the first public bulletin board system experiment in Berkeley, California. It aimed to understand how people would exchange information via computer.
Online communities have evolved significantly since the 1970s, beginning with Usenet in 1979 and organized into topic-based newsgroups. Multi-user dungeons in the 1980s allowed for text-based virtual worlds. Chat rooms and bulletin board systems hosted on individual systems also emerged. Today, threaded internet forums and social networks facilitate online communities.
Here are some suggestions for addressing the noise level in the break rooms:
- Designate one break room as quiet and one as social. Provide signs to indicate which is which.
- Set a reasonable noise limit. For example, conversations should be at a normal speaking voice, not shouting. Limit loud TVs or music.
- Ask people to be considerate of others who want quiet. Suggest they move conversations elsewhere if the room is full.
- Provide headphones for those who want to listen to audio without disturbing others.
- As a last resort, set specific quiet hours if the problem persists (e.g. 1-2pm for those working on focused tasks).
The goal is to
The document discusses the challenges of email and how it has become a victim of its own success. While email improved communication and collaboration initially, issues like spam, viruses, information overload, and inappropriate uses have arisen. True collaboration requires more than just communication tools like email and incorporating social networking, contextual collaboration through portals, and a culture that values collaboration can help address some of email's challenges.
Rumi was looking for real happiness in college like his peers, but despite being a successful student with money, friends, and a girlfriend, he still felt only temporary happiness. One day, he came across a quote saying that true happiness is found in love, and he realized this was what he was truly seeking.
A short message introduces a slide show by Boris and mentions the writer's friend Damos. The message is brief and does not provide much contextual information to summarize.
The document summarizes a technology summit held in Italy in 2011. It discusses Italy's infrastructure for technology and innovation, noting a divide between northern and southern Italy. University education lags behind other countries, though there are centers of excellence. Broadband penetration and internet usage are lower in Italy than other European nations. Television still dominates advertising spending. Major telecommunications companies are Telecom Italia, Vodafone and Wind. The recession hit the technology sector hard. New opportunities exist in cloud computing, mobile broadband, and social media. However, Italy still lacks a clear digital agenda from its political leadership. Entrepreneurs must bootstrap or seek angel/seed funding. Some notable Italian tech companies mentioned are STMicroelectronics
Rumi was looking for real happiness in college like his peers, but despite being a successful student with money, friends, and a girlfriend, he still felt only temporary and fake happiness. One day while surfing online, he came across a quote by George Sand stating there is only one happiness in life, which is to love and be loved. Rumi realized this is what he was truly looking for.
Community Memory 1973 was the first public bulletin board system experiment in Berkeley, California. It aimed to understand how people would exchange information via computer.
Online communities have evolved significantly since the 1970s, beginning with Usenet in 1979 and organized into topic-based newsgroups. Multi-user dungeons in the 1980s allowed for text-based virtual worlds. Chat rooms and bulletin board systems hosted on individual systems also emerged. Today, threaded internet forums and social networks facilitate online communities.
Here are some suggestions for addressing the noise level in the break rooms:
- Designate one break room as quiet and one as social. Provide signs to indicate which is which.
- Set a reasonable noise limit. For example, conversations should be at a normal speaking voice, not shouting. Limit loud TVs or music.
- Ask people to be considerate of others who want quiet. Suggest they move conversations elsewhere if the room is full.
- Provide headphones for those who want to listen to audio without disturbing others.
- As a last resort, set specific quiet hours if the problem persists (e.g. 1-2pm for those working on focused tasks).
The goal is to
The document discusses the challenges of email and how it has become a victim of its own success. While email improved communication and collaboration initially, issues like spam, viruses, information overload, and inappropriate uses have arisen. True collaboration requires more than just communication tools like email and incorporating social networking, contextual collaboration through portals, and a culture that values collaboration can help address some of email's challenges.
Rumi was looking for real happiness in college like his peers, but despite being a successful student with money, friends, and a girlfriend, he still felt only temporary happiness. One day, he came across a quote saying that true happiness is found in love, and he realized this was what he was truly seeking.
A short message introduces a slide show by Boris and mentions the writer's friend Damos. The message is brief and does not provide much contextual information to summarize.
The document summarizes a technology summit held in Italy in 2011. It discusses Italy's infrastructure for technology and innovation, noting a divide between northern and southern Italy. University education lags behind other countries, though there are centers of excellence. Broadband penetration and internet usage are lower in Italy than other European nations. Television still dominates advertising spending. Major telecommunications companies are Telecom Italia, Vodafone and Wind. The recession hit the technology sector hard. New opportunities exist in cloud computing, mobile broadband, and social media. However, Italy still lacks a clear digital agenda from its political leadership. Entrepreneurs must bootstrap or seek angel/seed funding. Some notable Italian tech companies mentioned are STMicroelectronics
Rumi was looking for real happiness in college like his peers, but despite being a successful student with money, friends, and a girlfriend, he still felt only temporary and fake happiness. One day while surfing online, he came across a quote by George Sand stating there is only one happiness in life, which is to love and be loved. Rumi realized this is what he was truly looking for.
Catalyze Webcast With Charlie Kreitzberg - Web 2 And You - 121307Tom Humbarger
This is the presentation from the Catalyze Community (www.mycatalyze.org) monthly webcast feature Charlie Kreitzberg. Charlie spoke on "Web 2 and You" which examined his models for understanding Web 2.0 and explored the vast opportunities for professionals who define and design new software and websites.
"Twitter, Pray, Love" at State Policy Network 2010Cord Blomquist
Cord Blomquist discusses how to create a better new media strategy for your organization. Topics covered include seeking expert advice, accepting sunk costs of past technology choices, assigning ownership of new media within your organization, and embracing innovation.
The document outlines the agenda for a 3 hour workshop on leveraging digital media. The agenda includes introductions to digital media and exercises to understand participants' current digital media use, audiences, and ways to engage audiences on and off their own websites through various digital platforms and social media. The workshop also covers developing a digital media plan and next steps participants can take.
Essay About India Gate In Hindi. Online assignment writing service.Melanie Williams
The document discusses the process for requesting an assignment to be written by a writer on the HelpWriting.net site. It outlines 5 steps: 1) Create an account with an email and password. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, and the company offers refunds for plagiarized work.
Maitland Waters Social Media @ SOHO house_london_june_6_2011Symbio Agency Ltd
The document provides an overview of a presentation on digital strategy and social media. It discusses relationship networks and how social media can benefit businesses. It emphasizes the importance of an omnichannel digital strategy and highlights examples of how to measure return on investment from social media initiatives.
The Benefits and Risks of Using Skype at Darcy’s .docxtodd541
The Benefits and Risks of
Using Skype at Darcy’s:
A Short Report
September 20, 2013
Prepared for:
Darcy’s Department Store
Prepared by:
Student Name
BUS105
2
Background
The East Coast buyers for Darcy’s Department Store are looking for an economical and
efficient way to share information about the deals buyers are getting from various
suppliers and use real-time transmission of that information between one another to
help save money.
There are a number of tools to do this, but Skype has been mentioned as a leading
contender. Skype claims to be an easy to use, online tool that allows users to connect
with any other Skype user around the world for free. A user can make video and voice
calls to other Skype users at no charge. Users can even share files among themselves,
which provides a great asset during a business meeting. However, when there are group
video calls, then Skype begins to charge a fee.
Also, for buyers throughout the East Coast, this tool can be useful if they need to talk
with one another. However, for meetings that require more than two attendees, Skype
is not a useful tool and is not intended to work that way for business.
Benefits
Among the most attractive benefits of Skype is that it is free and you can see the person
you are talking with. To purchase a software license for 20 buyers that is compatible to
what Skype can do will cost Darcy’s roughly $1,500 per month. There are no hidden
charges with Skype. According to Skype’s web page, users get video and voice calls to
other Skype users and “instant messaging and file sharing” all at no charge.
The video sharing feature of Skype will allow the buyers to see products in real time.
For example, if two buyers are looking at similar merchandise from two different
suppliers who are offering different pricing, then they can quickly Skype one another
and compare the product to see if it is the same and to then get the best pricing for it.
Two business writers for the Auburn Citizen in NY, state that there are business users
“who can save time and money in scheduling and holding conferences or training
sessions, demonstrate products or services for potential customers, and extend
customer service by showing customers how to get the most from your product” (Leon
and Leon).
Downsides
Despite the benefits mentioned above, there are clear downsides to this product. I
tested Skype over a one-week period by calling various Skype users throughout the East
Coast and tried to simulate a conversation that a buyer might have.
First, using Skype takes getting used to. During my five-day test, I never mastered the
connection stage. This is when one Skype user “calls” another Skype user. Skype makes
3
a distinctive sound that lets the user know it is making a call. However, once you
connect to whom you are calling, the picture shows, but it takes abo.
The document discusses open social networks and how to make money through them. It outlines that everyone will use social networks, and members use them for communication. It then discusses how to monetize social networks by creating currency and exchanging value through good content, building links and brands, and exchanging the created value for money. However, it also notes challenges in monetizing social networks like low click-through rates, too many players crowding the market, privacy concerns, and potential fatigue from overuse.
0325 subway wom proposal by communication plusjackxu1125
The document proposes a word-of-mouth marketing communication framework to improve brand awareness of Subway in China. It involves using junk mail, social media, and online forums to generate buzz around Subway. Key tactics include using influencers on social media to spread content, hosting contests on mini-sites for sandwiches, and monitoring online brand discussions. The goal is to drive huge email forwards, millions of social impressions, many forum topics, and substantial website traffic to upgrade Subway's brand awareness.
This document provides details about the design and development of a proposed social media product called ScreenShare. It includes mockups of the homepage, profile pages, and chat features. It also outlines the business model, which involves generating revenue from advertisements and optional member payments for extra features. The document discusses following web standards and guidelines to ensure accessibility. It proposes a launch date of January 2017 and includes a production plan to develop the site by a December 2016 deadline.
Online Communication on a Shoestring - for Nonprofitslscheirer
Websites, email blasting, and social media can provide small nonprofit organizations with big benefits without a huge investment. In this seminar, we talk through the best practices and the low cost tools that can help you take advantage of the internet to better serve your mission – without breaking your budget.
The document summarizes a discussion on various social networking and communication tools for healthcare professionals. It provides overviews and examples of using MySpace, Facebook, LinkedIn, Twitter, blogging, Skype, instant messaging tools and having one's own website for networking and marketing purposes. Pros and cons of each tool are mentioned.
Social Media Convergence - The ARF/Adweek 2009Lynne d Johnson
Social media is a critical part of progressive marketing thinking. The consumer, with the rise of social media, has been able to drive the conversation with or without input from the brands. This change in who controls the dialogue has transformational impact:
1. Social media creates a brand/consumer conversation that will transform organizations.
2. Social media blends brand communications, PR, customer care, research and insights as all happen simultaneously via the conversation.
3. Most marketers are still struggling to find a coherent social media strategy.
4. Social media produces naturally occurring conversation and behavior that offers incredibly rich insights, but companies are still learning how to mine this continual stream.
The ARF launched its new Social Media Council with a panel of industry experts explaining how social media creates convergence among the advertising, marketing, public relations, customer care and consumer insights spheres.
The document discusses how technology and information availability is changing behaviors and decision making processes. It provides examples of how planning a trip or purchasing a washing machine in the 1990s involved more steps and friction compared to today where information is readily available. It also discusses trends around the internet becoming more integrated and dominated by chat platforms where information comes to users implicitly. The key points are that technology changes behaviors, the information revolution will continue, and skills like conversational interfaces will be important for the future.
Augmenting your Technical Documentation with User-Generated ContentScott Abel
Presented by Scott Abel at the Society for Technical Communication Summit, June 2, 2008 in Philadelphia.
Your user community can be an invaluable source of information about your product or service. Using Web 2.0 technologies, you can augment your existing technical documentation with user-generated content. The presentation will explore the possibilities, as well as the perils, of leveraging this often-overlooked resource.
A presentation advocating the implementation of unobtrusive badges when distributing your content to blogs and social networks held at webwatch at ebay UK in August 2007.
There are an estimated 600-800 million metric tons of spiders in the world. While not literally true, the factoid that you are always within a few feet of a spider could be accurate when near outdoor or wooded areas where spider populations tend to be higher. Exact global spider population numbers are difficult to determine, but studies have estimated their total biomass. Some areas have significantly more spider activity and populations than others.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
More Related Content
Similar to SXSW - A plea for f#%king relevant communications.
Catalyze Webcast With Charlie Kreitzberg - Web 2 And You - 121307Tom Humbarger
This is the presentation from the Catalyze Community (www.mycatalyze.org) monthly webcast feature Charlie Kreitzberg. Charlie spoke on "Web 2 and You" which examined his models for understanding Web 2.0 and explored the vast opportunities for professionals who define and design new software and websites.
"Twitter, Pray, Love" at State Policy Network 2010Cord Blomquist
Cord Blomquist discusses how to create a better new media strategy for your organization. Topics covered include seeking expert advice, accepting sunk costs of past technology choices, assigning ownership of new media within your organization, and embracing innovation.
The document outlines the agenda for a 3 hour workshop on leveraging digital media. The agenda includes introductions to digital media and exercises to understand participants' current digital media use, audiences, and ways to engage audiences on and off their own websites through various digital platforms and social media. The workshop also covers developing a digital media plan and next steps participants can take.
Essay About India Gate In Hindi. Online assignment writing service.Melanie Williams
The document discusses the process for requesting an assignment to be written by a writer on the HelpWriting.net site. It outlines 5 steps: 1) Create an account with an email and password. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, and the company offers refunds for plagiarized work.
Maitland Waters Social Media @ SOHO house_london_june_6_2011Symbio Agency Ltd
The document provides an overview of a presentation on digital strategy and social media. It discusses relationship networks and how social media can benefit businesses. It emphasizes the importance of an omnichannel digital strategy and highlights examples of how to measure return on investment from social media initiatives.
The Benefits and Risks of Using Skype at Darcy’s .docxtodd541
The Benefits and Risks of
Using Skype at Darcy’s:
A Short Report
September 20, 2013
Prepared for:
Darcy’s Department Store
Prepared by:
Student Name
BUS105
2
Background
The East Coast buyers for Darcy’s Department Store are looking for an economical and
efficient way to share information about the deals buyers are getting from various
suppliers and use real-time transmission of that information between one another to
help save money.
There are a number of tools to do this, but Skype has been mentioned as a leading
contender. Skype claims to be an easy to use, online tool that allows users to connect
with any other Skype user around the world for free. A user can make video and voice
calls to other Skype users at no charge. Users can even share files among themselves,
which provides a great asset during a business meeting. However, when there are group
video calls, then Skype begins to charge a fee.
Also, for buyers throughout the East Coast, this tool can be useful if they need to talk
with one another. However, for meetings that require more than two attendees, Skype
is not a useful tool and is not intended to work that way for business.
Benefits
Among the most attractive benefits of Skype is that it is free and you can see the person
you are talking with. To purchase a software license for 20 buyers that is compatible to
what Skype can do will cost Darcy’s roughly $1,500 per month. There are no hidden
charges with Skype. According to Skype’s web page, users get video and voice calls to
other Skype users and “instant messaging and file sharing” all at no charge.
The video sharing feature of Skype will allow the buyers to see products in real time.
For example, if two buyers are looking at similar merchandise from two different
suppliers who are offering different pricing, then they can quickly Skype one another
and compare the product to see if it is the same and to then get the best pricing for it.
Two business writers for the Auburn Citizen in NY, state that there are business users
“who can save time and money in scheduling and holding conferences or training
sessions, demonstrate products or services for potential customers, and extend
customer service by showing customers how to get the most from your product” (Leon
and Leon).
Downsides
Despite the benefits mentioned above, there are clear downsides to this product. I
tested Skype over a one-week period by calling various Skype users throughout the East
Coast and tried to simulate a conversation that a buyer might have.
First, using Skype takes getting used to. During my five-day test, I never mastered the
connection stage. This is when one Skype user “calls” another Skype user. Skype makes
3
a distinctive sound that lets the user know it is making a call. However, once you
connect to whom you are calling, the picture shows, but it takes abo.
The document discusses open social networks and how to make money through them. It outlines that everyone will use social networks, and members use them for communication. It then discusses how to monetize social networks by creating currency and exchanging value through good content, building links and brands, and exchanging the created value for money. However, it also notes challenges in monetizing social networks like low click-through rates, too many players crowding the market, privacy concerns, and potential fatigue from overuse.
0325 subway wom proposal by communication plusjackxu1125
The document proposes a word-of-mouth marketing communication framework to improve brand awareness of Subway in China. It involves using junk mail, social media, and online forums to generate buzz around Subway. Key tactics include using influencers on social media to spread content, hosting contests on mini-sites for sandwiches, and monitoring online brand discussions. The goal is to drive huge email forwards, millions of social impressions, many forum topics, and substantial website traffic to upgrade Subway's brand awareness.
This document provides details about the design and development of a proposed social media product called ScreenShare. It includes mockups of the homepage, profile pages, and chat features. It also outlines the business model, which involves generating revenue from advertisements and optional member payments for extra features. The document discusses following web standards and guidelines to ensure accessibility. It proposes a launch date of January 2017 and includes a production plan to develop the site by a December 2016 deadline.
Online Communication on a Shoestring - for Nonprofitslscheirer
Websites, email blasting, and social media can provide small nonprofit organizations with big benefits without a huge investment. In this seminar, we talk through the best practices and the low cost tools that can help you take advantage of the internet to better serve your mission – without breaking your budget.
The document summarizes a discussion on various social networking and communication tools for healthcare professionals. It provides overviews and examples of using MySpace, Facebook, LinkedIn, Twitter, blogging, Skype, instant messaging tools and having one's own website for networking and marketing purposes. Pros and cons of each tool are mentioned.
Social Media Convergence - The ARF/Adweek 2009Lynne d Johnson
Social media is a critical part of progressive marketing thinking. The consumer, with the rise of social media, has been able to drive the conversation with or without input from the brands. This change in who controls the dialogue has transformational impact:
1. Social media creates a brand/consumer conversation that will transform organizations.
2. Social media blends brand communications, PR, customer care, research and insights as all happen simultaneously via the conversation.
3. Most marketers are still struggling to find a coherent social media strategy.
4. Social media produces naturally occurring conversation and behavior that offers incredibly rich insights, but companies are still learning how to mine this continual stream.
The ARF launched its new Social Media Council with a panel of industry experts explaining how social media creates convergence among the advertising, marketing, public relations, customer care and consumer insights spheres.
The document discusses how technology and information availability is changing behaviors and decision making processes. It provides examples of how planning a trip or purchasing a washing machine in the 1990s involved more steps and friction compared to today where information is readily available. It also discusses trends around the internet becoming more integrated and dominated by chat platforms where information comes to users implicitly. The key points are that technology changes behaviors, the information revolution will continue, and skills like conversational interfaces will be important for the future.
Augmenting your Technical Documentation with User-Generated ContentScott Abel
Presented by Scott Abel at the Society for Technical Communication Summit, June 2, 2008 in Philadelphia.
Your user community can be an invaluable source of information about your product or service. Using Web 2.0 technologies, you can augment your existing technical documentation with user-generated content. The presentation will explore the possibilities, as well as the perils, of leveraging this often-overlooked resource.
A presentation advocating the implementation of unobtrusive badges when distributing your content to blogs and social networks held at webwatch at ebay UK in August 2007.
There are an estimated 600-800 million metric tons of spiders in the world. While not literally true, the factoid that you are always within a few feet of a spider could be accurate when near outdoor or wooded areas where spider populations tend to be higher. Exact global spider population numbers are difficult to determine, but studies have estimated their total biomass. Some areas have significantly more spider activity and populations than others.
Similar to SXSW - A plea for f#%king relevant communications. (20)
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
SXSW - A plea for f#%king relevant communications.
1. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
A modest proposal for f#%king relevant
communications online
Trevor Linton
trevor.linton@mrmmccann.com
http://www.linkedin.com/pub/trevor-linton/28/619/a4a/
@trevorlinton
2. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
DISCLAIMER
This presentation has not been condoned, approved, or sanctioned
by IPG, its subsidiaries (MRM, McCann Erickson, etc.) or its clients.
The opinions and ideas (and especially my language) in this
presentation do not represent or reflect the views of IPG, MRM,
McCann Erickson or its management.
In-fact, I’m curious how my co-workers may respond.
3. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
This proposal has no other purpose than to try and
convince you to vote for me to speak at SXSW in 2014.
So if you like it, please, make sure to vote at:
http://panelpicker.sxsw.com/vote/19775
4. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
As an individual, when it comes to privacy and
personalized advertising, you could say I’m not a big fan.
While writing this the NSA was accused of spying on its
citizens, Apple faced a “nuclear” scale hack, and NBC
reported the largest breach in history that resulted in
160 million credit cards and customers data stolen.
5. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
With new technology, comes new data. With new data
comes new concerns. It’s reasonable to wonder whether
new technology is even worth the risks.
Even if you don’t mind annoying ads, spying, and privacy
leaks you should know these stem from a much larger
systematic problem.
6. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
It’s actually a pretty fundamental problem.
Digital communications hasn’t seen any new
features in over a decade. Seriously, when was
the last time you saw a new feature to email?
7. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
I admit, throwing email under the bus is a bit harsh.
What I mean is for the past decade we’ve relied and have
come to expect that if we want more sophisticated ways
of communicating we have to use centralized services
(such as Facebook).
8. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
But centralized services have some problems. They are
expensive to maintain. Start-ups are crushed by their
costs. Developers spend too much of their time working
on server systems, with on no visible features. And
businesses spend billions each year on compromises.
And users end up with no privacy, limited features, lost
opportunities, higher costs, and little control over their
identity. But the worst part?
Ten million passwords to remember.
9. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
And even with hundreds of thousands of centralized
services that allow you to communicate in more
effective ways we still find ourselves using a decade old
standard as our main method of communicating online.
10. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Email’s usefulness is really in its ability to
control information and in its transparency.
People trust it.
It also may help explain why people can be
very hesitant to adopt new technologies.
11. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
This even affects marketing. Marketers use data
collected in these centralized services to target or
personalize ads. Unfortunately, more often than not they
end up being more creepy than convenient.
Bad digital marketing is like trying to figure out what
food you eat by watching what restaurants you go to and
smelling your burps afterwards.
It’s awkward and unpleasant for everyone.
12. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Privacy blunders, annoying ads, pop-ups, banner ads,
identity theft and data leaks won’t go away without a
better decentralized method for communicating digitally.
And with new decentralized communication technologies
we can do some really amazing things.
13. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
I could spend the rest of this presentation complaining,
but I’ll stop and and propose a solution.
This would be a pretty terrible SXSW proposal if all I do
is b#%ch and moan.
14. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
INTRODUCING:
Couriering!
15. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Couriering is a set of standards that let you, or an
application, pull and push messages to people,
applications or devices across a decentralized network.
Sounds familiar? It should. That’s sort of what email
does. Couriering just takes email a bit further.
16. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
You can almost think of Couriering as a latter-day
version of email with a few kicks and twists. Calling it a
new version of email is a bit of an oversimplification. So
lets reframe from using any words like email 2.0.
Lets look at some benefits.
17. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
#1 People, applications and devices can be addressed
using couriers. So applications can send messages to
other apps, on a specific device, instead of just an inbox.
#2 There’s more functionality with pull messages. You
can address large audiences. Literally, *@*.com is a valid
courier address. Pull messages are picked up instead of
delivered. So people can “follow” you.
#3 All communications are encrypted. The validity of the
recipient, and protecting your data is done using public-
key cryptography, signing and trust chains (“vouching”).
18. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
#4 Messages don’t necessarily need to end up in your
email box. The message can delivered to an application
with information on how to use the message.
#5 Messages can be very large, in-fact up to 4GB, so it’s
possible to share all those home movies with your
family without the need for YouTube.
#6 It’s decentralized, transparent and backwards
compatible with email. You pick your provider and who
you trust. By opening your sent box you can see exactly
what’s been done with your data.
19. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Couriers believe in standards.
They don’t require new servers and are compatible with
existing email (IMAP/SMTP) systems. They add features
without having to add infrastructure, augmenting
systems, confusing software or new security policies.
No new nightmare IT setups.
20. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Couriers believe in being independent.
Servers are unnecessary with pull and push messages,
interactions between you and your social network are
just that. Messages between you and your contacts.
Information goes only to where you say it should.
21. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Couriers believe in being anonymous.
Messages can be placed online anonymously with
routing methods to reply back to the origin without
disclosing the actual person behind the mask. Want to
sign up for a coupon online for $10 off chocolate fudge
cookies? You don’t have to give away your email address
anymore.
22. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Couriers believe in security.
Couriers validate identity and its trust level for every
message that arrives. In addition they protect messages
with public-key cryptography. Trust is established by
certificate chains that allow you to vouch for people and
control how they can communicate with you.
23. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Couriers believe in simplicity.
Couriers allow people, their devices and their
applications to seamlessly talk to one another, even if
they’re not on the same network. Any device associated
with your identity can find all your other devices.
This simplifies development. Developers can use
functional messages to find all the devices associated
with your identity, discover their capabilities and send
and receive messages.
24. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Some real life examples: Streaming.
You and your brother want to watch a home movie. He
lives in New York. You live in Salt Lake City.
You have two options: A) figure out a way to send a large
file, most likely that won’t be supported. B) upload it to a
video sharing site, but if it happens to be a video of the
birth of your daughter, you may not want the world to
see it.
25. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Some real life examples: Streaming.
With couriers an application can easily stream videos to
your brother. The application takes the video and asks
the courier to deliver it to a media player associated
with the identity yourbrother@newyork.com.
This doesn’t go to his inbox, but goes to every device he
owns. The devices negotiate who should handle the
request and how. Ultimately it may ask your brother if
the TV is the best option to start streaming.
26. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Bull. Prove it.
Couriers are services installed on your devices (phones,
laptops, televisions, desktops, etc.) then associated with
your identity (email address).
Courier That crazy internet.Your devices and apps.
27. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Bull. Prove it.
Specifically, they sit in-between your email and devices.
They can send or receive messages hidden in email
meta data and a few other things. When the couriers
receive a message it’s filtered, so you never notice them.
Since it’s based on email and other open standards, we
already have a lot built.
Courier
That crazy internet & email.
Yourdevicesandapps.
28. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Couriers can send and receive to an app, person, or
device. Messages come in different flavors:
• Short messages
• App-to-app messages
• Pull messages
• Large-data messages
• Time-to-live messages
• Anonymous messages
• Urgent messages
• Functional message
• Identity messages
• Discover messages
29. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
You have questions…
“Yes, many.”
30. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
“Some other real life uses?” Telephone Calls.
Their Courier
Their
Phone
App
Your friend makes a call.
Their phone app tells the
courier who, how, when, why and
what it wants to do.
The courier on their device prepares
the request into a “courier message”
Your Courier
The courier on the receiving device
sees the message, checks preferences,
security and requests and decided to
inform its devices.
Your
Phone
App
Your phone app negotiates with
the requester for a Voice connection
depending on the network and notifies
you of an incoming phone call.
You answer. Or not.
VOIP telephone calls are nothing new,
but simple to implement with couriers.
By adding meta data the process,
couriers can make some intelligent
decisions about whether to accept calls.
Your phone app rings on any devices
you have a phone app installed on and
associated with that identity.
Only you and your friend have any logs
of It happening. In addition messages
sent from any device goes through one
source that you choose, your email
provider.
31. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
“So what’s some real life uses?” Telephone Calls.
So this is new.
A lot of information can be stored
in the meta data. Telemarketers
can provide information such as
the offering, intent, brand, etc.
A user can specify what types of
marketing they want to receive.
They can even set the courier to
auto reply with alternative contact
methods or better times to reach
them if they’re interested but don’t
wish to be bothered right now.
VOIP telephone calls are nothing new,
but simple to implement with couriers.
By adding meta data the process,
couriers can make some intelligent
decisions about whether to accept calls.
Your phone app rings on any devices
you have a phone app installed on and
associated with that identity.
Only you and your friend have any logs
of It happening. In addition messages
sent from any device goes through one
source that you choose, your email
provider.
32. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
“So what’s some real life uses?” Telephone Calls.
This is a crucial part.
Couriers are reliant on one server,
your email provider. This means
only you, the receiver and your
email provider have any record of
anything happening.
No one holds your personal data
on their servers.
Don’t like your email providers
policies? You can easily switch
to one that you like.
VOIP telephone calls are nothing new,
but simple to implement with couriers.
By adding meta data the process,
couriers can make some intelligent
decisions about whether to accept calls.
Your phone app rings on any devices
you have a phone app installed on and
associated with that identity.
Only you and your friend have any logs
of It happening. In addition messages
sent from any device goes through one
source that you choose, your email
provider.
33. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
“What happens when someone doesn’t have a courier?”
You would sit for a bit until your courier decided it
couldn’t get a hold of their courier.
It would inform the phone app that it failed and the
phone app could backup to the regular ole’ telephone
network system. In addition, an optional message can be
sent as a backup that goes directly to their email inbox.
34. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
“Hm, another example please.” Ok.
Making an instant message or text message application
is easy. Couriers can send urgent, time-to-live or short
messages to one or many identities that will be
delivered to their favorite IM app on their phone.
35. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
“One more example please.”, OK.
Couriers can send messages not only to people, but
groups of people for a specific application. And with both
push and pull capabilities. This reproduces the vast
majority of the functionality and features of LinkedIn,
Facebook and Twitter without anyone having to register
for anything or investing in servers.
36. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
“This, does not seem safe. How can I control my data?”
Since it’s based on public-key cryptography all your
messages can only be decrypted by the intended
recipients, and no one can send a message pretending to
be you without knowing both your private key and your
email password. If your email is hacked, your messages
are still secured.
(Sorry NSA)
37. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
“This, does not seem safe. How can I trust couriers?”
Validating that a message actually came from a trusted
place is done with public-key cryptography and ensures
that a message received can be trusted.
You can also browse through your sent folder to find
what messages applications have been.
38. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
“Why hasn’t someone already done this?”
There’s no profit in establishing a cooperative standard.
So don’t expect large companies to embrace it any time
soon. It also makes some websites unnecessary and
irrelevant.
Most of this is knitting together existing standards to do
a lot more than what people would expect. I think no one
has done it because we haven’t had the need for it yet.
39. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
“What other features do couriers have?”
A lot more than I have time to go over in this proposal.
40. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
“So. What’s in your SXSW presentation?”
1. Overview of couriers, messages and digital communications
2. How messages work, their capabilities and challenges
3. How developers can program them (JavaScript/C++/C examples)
4. How to provide better User Experiences with messages
5. How to integrate them into existing apps
6. How marketers can use them as a new channel
7. Security, privacy and policy implications
8. Sub-standards for a proposed standard
9. Business possibilities and opportunities
10. Implications to existing IT and systems
11. How to contribute (RFC)
12. Demo of applications using it
13. How to start using couriers
14. Cookies. I’ll bring some cookies.
41. Vote for this talk: http://panelpicker.sxsw.com/vote/19775
Thank you!
If you want to learn more, contact me. And remember
to vote for me at SXSW’s Panel Picker website.
Otherwise this may not see the light of day.
Vote: http://panelpicker.sxsw.com/vote/19775