The document discusses how technology can create social isolation and neurosis. It provides statistics showing that technology reduces in-person interactions and lowers reliance on spouses for discussions. While technology has benefits like convenience and access to information, overuse can be problematic as it replaces face-to-face social interactions. Different technologies are examined like smartphones, video games, social media, television, and self-serve machines, with both pros and cons discussed for each. The conclusion is that technology overuse and addiction can lead to isolation and mental health issues, so moderation and balance is important.
This powerpoint illustrates my view on how technology is affecting individuals, and how changes need to be made in the education system to keep up with our rapidly advancing innovations and use them to the advantage of the teachers and students.
The Next IT: A Preview of Tomorrows Innovations and Challengesnbelarbi
This article discusses possible future Information Technology innovations based on current trends. We present three concepts that will likely shape future services and impact corporations, markets and societies: Hyper-Connectivity, Social/Semantic Web, Saas/Cloud computing and Micro-eEconomy.
Dave Taylor, MSc, MBCS, Programme Lead, Virtual Worlds, Medical Media and Design Lab, Imperial College, London. Presentation at Handheld Learning 2008 - Virtual Worlds and Social Networks session
This powerpoint illustrates my view on how technology is affecting individuals, and how changes need to be made in the education system to keep up with our rapidly advancing innovations and use them to the advantage of the teachers and students.
The Next IT: A Preview of Tomorrows Innovations and Challengesnbelarbi
This article discusses possible future Information Technology innovations based on current trends. We present three concepts that will likely shape future services and impact corporations, markets and societies: Hyper-Connectivity, Social/Semantic Web, Saas/Cloud computing and Micro-eEconomy.
Dave Taylor, MSc, MBCS, Programme Lead, Virtual Worlds, Medical Media and Design Lab, Imperial College, London. Presentation at Handheld Learning 2008 - Virtual Worlds and Social Networks session
Social Media With Brand Management- Integration For Small BusinessSyed Aiyaz
In today's world of technology every business whether small or medium should have it's own social media and brand management system. The presentation is just a over view how we can integrate and run the social media with brand management tools for free.
3 Idiots is a 2009 Indian coming-of-age comedy-drama film directed by Rajkumar Hirani, with a screenplay by Abhijat Joshi, and produced by Vidhu Vinod Chopra. It was loosely adapted from the novel Five Point Someone by Chetan Bhagat
White Paper Part 2 Interactive Dooh ExperienceStephen Randall
Building an Interactive Digital Out of Home Experience - Basic Considerations for Mobile & Social Interactivity on Digital Out of Home Networks, August 2009
Executive Summary
Simple text-to-screen and photo-to-screen applications are commonplace at pop concerts. Twitter feeds are springing up in conferences. It can't be too hard to add an engaging mobile and social interactive applications to digital out of home ("DOOH") networks, right? Wrong. A capable interactive DOOH network supports real-time user engagement. Engagement might come from a user at the location or via the web (e.g. via a social network connected to the location through the affinity of a brand). Engagement might be sporadic or frequent, but whenever it happens, it creates an enhanced user experience as well as a measurable "mobile click." The resulting "pulse" for the location can then be used to help the location or advertiser improve services and/or messaging.
Before implementing any of these distance learning technologies it’s important to consider what they can do for your organization and what content can realistically be taught and how with each technology. Successful implementation of these distance learning technologies requires careful planning and design.
Is it time to beef up your organizations\'s distance learning paradigm? Implementing distance learning technologies like web/video conferencing, e-learning and live interactive broadcasting might be the answer. Before implementing any of these distance learning technologies it’s important to consider what they can do for your organization and what content can realistically be taught and how with each technology.
"Social Media" is best considered, not in isolation, but as part of much larger technical and social movements (Trend Currents). Welcome to The New Normal: Networked Communications.
http://bit.ly/SMStartHere
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
3. Statistics
Approximately 95% of people have said
something through a form of technology that they
would not say in person
“Internet users are 38% less likely to rely
exclusively on their spouses as discussion
confidents” (Rainie, 2009).
“Physically being with others can lead to a
release of the 'feel good' hormone oxytocin,
which is an anti-inflammatory” (Morgan, 2011).
4. What is Social Isolation?
As defined by an online source, “it is a state or
process in which persons, groups, or cultures
lose or do not have communication or
cooperation with one another, often resulting in
open conflict” (dictionary.reference.com,
2012).
• Can lead to forms of
depression and other
mental illnesses
5. Technology that plays a
role in isolation and
neurosis
The Smartphone
Video games
The Internet & Social Networks
The Television
Google Glass
Self-Serve
6. The Smartphone
PROS CONS
Communication is Losing concept of how to
much more convenient verbally communicate –
several people text or
Allows access to World email bad new rather
Wide Web at any time than in person
Generation that has a
lowered attention level
Wrong use of technology,
society has a loss of
privacy
7. Video Games
Pros Cons
Hand eye co-ordination Highly addictive form of
technology
Currently used as a
training tool in some Potentially ruins
industries such as the relationships due to
addiction and lack of
military intimacy
Gain motor skills Fall into a state of
mental illness from lack
of personal interaction
8. Internet* Social Networks
Pros Cons
Access to virtually Networking sites are starting to
become a breading grounds for
millions of databases cyber bullying
full of information
Loss of personal communication
E-commerce cuts skills – therefore potentially leading
costs for several to a form of isolation
businesses Less interaction while shopping
due to online stores and shipping
Easy to keep in to our door step
contact with those far
Online banking and other online
away services creates easy and
convenient service; however some
people that use ALL forms of online
services will begin to lose their
social interaction skills
9. The Television
Pros Cons
Enables us to keep in Deceiving for some, such
as the perfection of those
touch with real world in the media– Feel for the
current events need of perfection can
lead to negative self
Great learning image thoughts which
can lead to depression
experiences for all (ie. and neurosis
For kids- Bill Nye or
There are those who
Magic School Bus) abuse the television, with
various things such as
addiction or pornography
– which can ruin
relationships and lead to
isolation
10. Google Glass
Pros Cons
Hands-free phone– Distraction- the data is placed in
phone calls safer while your line of site, therefore the
driving user may be concentrated more
on the data then the
Access to world wide environment around them
web, camera, phone all (Baldwin, 2012)
with voice/ one-touch Privacy issues- this may work
activation backwards and cause those not
using the glasses to isolate
themselves more due to privacy
issues of the camera on the
glasses, not knowing when a
11. Self-serve
Pros Cons
Fast easy way to pay Less interaction with
sale associates,
Convenience for therefore reducing
customers and social interaction
employees is the main The issue with self serve machines is that
idea they are everywhere. We can literally go to
the bank machine to get money, the gas
station to fill up, the grocery store to get
food, they even have movie dispenser
rentals in some stores now. It was okay
when there was just an ATM to do banking
fast, however now that every industry
almost has some form of self serve
machinery, it may have more of an impact
on our society’s social interaction level.
Majority of these services can be done
online as well from the comfort of your
home, however some people that is all
12. Conclusion
Overall technology has impacted us immensely psychologically.
Not only is it an addictive distraction for several, it consumes a large
amount of our time and we become so dependent on it. As a result we no
longer feel the need to interact as much with others. Technology is in a
way driving our society into a state of isolation with online shopping, self
serve machines and smartphones that can do just about anything. Part of
the problem is majority of the technology is addictive, therefore leading to
isolation which can result in neurosis and depression. However as you
can see in this presentation there are several good aspects of each
technology, therefore people need to learn how to respect the usage of
technology and use it appropriately.
13. On a more positive note..
As stated in an online article, “In this fast pace of
life where people don’t have time for their own,
technology helps every person to save time and
can spend that leisure time on other creative
things, passions and other
activities”(Speedupyourlife, 2010).
Technology may not be the problem, I believe the
users are the problem. If society learns to
respect the limits of appropriate technology
usage, this may not become a situation of
isolation and neurosis.
14. Reference List
Baldwin, H. (2012). Google’s project glass eyewear. PCWorld
Retrieved from
http://www.pcworld.com/article/253259/googles_project_glass_
eyewear_next_big_google_flop_or_hit_.html
Morgan, B. (2011). Is Technology making us lonely? The Pulse:
ABC Health and Wellbeing. Retrieved from
http://www.abc.net.au/health/thepulse/stories/2011/11/03/33531
84.htm#.UWH9IUI2_lI
N/A. (2010). The impact of technology in your life.
Speedupyourlife. Retrieved from
http://www.speedupyourlife.com/the-impact-of-technology-in-
your-life/
Rainie, L. (2009). How the internet and mobile phones impact
Americans’ social networks. Pew Internet & American Life
Project Retrieved from
http://www.site.uottawa.ca/stan.csi2911/Pew.pdf