This document discusses emerging trends in video communication technology. It begins by reviewing how video calling was initially viewed in 2003 with services like Vonage. It then discusses how views of incorporating video into work life have changed. The document outlines several key shifts in technology, including the rise of services like WebRTC that are making rich video ubiquitous. It discusses how video is becoming integrated into many domains beyond meetings, including education, medicine, law, banking, and startups. Overall, the document argues that video will increasingly become a natural part of communication as the technology simplifies and prices drop.
This document discusses new trends in education with the rise of digital tools and technologies. It notes that today's students are "digital natives" who have grown up with technology like smartphones, tablets, social media and can retrieve information quickly. It also discusses how technologies are changing the ways people communicate, take notes, store files and more. The document concludes that technology is radically transforming the ways we work, learn and play, and that education must teach students digital literacy to thrive in this environment.
Revolution Knowledge Presentation - April 3 2013Deone Zell
This document discusses new trends in education with the rise of digital tools and technologies. It notes that today's students are "digital natives" who have grown up with technology like smartphones, tablets, social media and can retrieve information quickly. It outlines how tools like lecture capture, eTexts, tablets and content creation are being used at CSUN. It also discusses how technologies are changing areas like user interfaces, devices, communications, education and more. The document concludes that technology is radically changing the way we work, learn and play, and that students are demanding more multimedia and mobile options, transforming the role of higher education.
This document provides a non-technical summary of parts of DevOps culture by Jon Hildebrand. It discusses how over-application of rationality in IT has led to forgetting the chaotic nature of systems. It emphasizes the importance of culture change for successful DevOps initiatives, including establishing a just culture that focuses on learning from failures rather than blame. Key aspects of an effective DevOps culture include blameless post-mortems, embracing failures for learning, emphasizing teams over heroes, and fostering collaboration and relationships between groups.
The document discusses how technology has radically changed the world since the creation of the World Wide Web in 1992. It notes how dependent people have become on technology, complaining when devices are slow or have weak signals, yet always wanting more. While technology has enabled progress and connectivity, it also risks distracting people from real-life interactions and experiences in nature. The document urges people to control technology rather than be controlled by it, and to use it wisely without letting it become the center of attention in their lives.
The document discusses trends in social media, video conferencing tools, and best practices for virtual meetings. It provides an overview of:
1. Current social media trends and how behaviors have changed with the rise of digital technologies and social networking.
2. Popular video chat platforms like Facebook Video Chat, Google Hangouts, Skype, and their features.
3. Common virtual meeting/webinar tools such as Adobe Connect, WebEx, GoToMeeting and their pricing structures.
4. Best practices for engaging participants and increasing participation in virtual meetings through techniques like using polls, prompting interaction every 10 minutes, and setting clear ground rules.
This document discusses raising aspirations for young people through building capacity for change. It focuses on changing attitudes, behaviors, and contexts. Key questions are raised about what future challenges may shape opportunities for young people, and what outcomes are wanted for young people, councils, and communities. Changing attitudes of young people, councils, and communities are seen as key to enabling transformation. The document advocates for moving beyond merely meeting legal and political minimums to having a greater focus and awareness. It discusses creating a platform to build productive relationships and shared physical spaces.
The document summarizes a virtual executive forum on big data hosted by Compliance Week. It includes the agenda for the one-hour discussion, with an introduction by Compliance Week editor Matt Kelly and a discussion led by Richard Anderson from Crowe Horwath. The forum will also include a Q&A session and closing remarks. Slides provide background on Richard Anderson and outline the main points of discussion, including defining big data, identifying opportunities it offers, and the steps to get started in using big data.
The Future of Technology in Education (UK)Michell Zappa
Michell Zappa gave a keynote at Northampton University on technology and education. They discussed three main technological drivers that are impacting education: social learning platforms that enable one-to-many and many-to-many learning; personal informatics that allow students to quantify and track their learning; and instant information retrieval through ubiquitous computing and sensors. Literacy and numeracy will need to evolve to skills like programming, privacy, multimedia, and attention as jobs are created that don't exist yet. Students need to be prepared at the edge of existing knowledge.
This document discusses new trends in education with the rise of digital tools and technologies. It notes that today's students are "digital natives" who have grown up with technology like smartphones, tablets, social media and can retrieve information quickly. It also discusses how technologies are changing the ways people communicate, take notes, store files and more. The document concludes that technology is radically transforming the ways we work, learn and play, and that education must teach students digital literacy to thrive in this environment.
Revolution Knowledge Presentation - April 3 2013Deone Zell
This document discusses new trends in education with the rise of digital tools and technologies. It notes that today's students are "digital natives" who have grown up with technology like smartphones, tablets, social media and can retrieve information quickly. It outlines how tools like lecture capture, eTexts, tablets and content creation are being used at CSUN. It also discusses how technologies are changing areas like user interfaces, devices, communications, education and more. The document concludes that technology is radically changing the way we work, learn and play, and that students are demanding more multimedia and mobile options, transforming the role of higher education.
This document provides a non-technical summary of parts of DevOps culture by Jon Hildebrand. It discusses how over-application of rationality in IT has led to forgetting the chaotic nature of systems. It emphasizes the importance of culture change for successful DevOps initiatives, including establishing a just culture that focuses on learning from failures rather than blame. Key aspects of an effective DevOps culture include blameless post-mortems, embracing failures for learning, emphasizing teams over heroes, and fostering collaboration and relationships between groups.
The document discusses how technology has radically changed the world since the creation of the World Wide Web in 1992. It notes how dependent people have become on technology, complaining when devices are slow or have weak signals, yet always wanting more. While technology has enabled progress and connectivity, it also risks distracting people from real-life interactions and experiences in nature. The document urges people to control technology rather than be controlled by it, and to use it wisely without letting it become the center of attention in their lives.
The document discusses trends in social media, video conferencing tools, and best practices for virtual meetings. It provides an overview of:
1. Current social media trends and how behaviors have changed with the rise of digital technologies and social networking.
2. Popular video chat platforms like Facebook Video Chat, Google Hangouts, Skype, and their features.
3. Common virtual meeting/webinar tools such as Adobe Connect, WebEx, GoToMeeting and their pricing structures.
4. Best practices for engaging participants and increasing participation in virtual meetings through techniques like using polls, prompting interaction every 10 minutes, and setting clear ground rules.
This document discusses raising aspirations for young people through building capacity for change. It focuses on changing attitudes, behaviors, and contexts. Key questions are raised about what future challenges may shape opportunities for young people, and what outcomes are wanted for young people, councils, and communities. Changing attitudes of young people, councils, and communities are seen as key to enabling transformation. The document advocates for moving beyond merely meeting legal and political minimums to having a greater focus and awareness. It discusses creating a platform to build productive relationships and shared physical spaces.
The document summarizes a virtual executive forum on big data hosted by Compliance Week. It includes the agenda for the one-hour discussion, with an introduction by Compliance Week editor Matt Kelly and a discussion led by Richard Anderson from Crowe Horwath. The forum will also include a Q&A session and closing remarks. Slides provide background on Richard Anderson and outline the main points of discussion, including defining big data, identifying opportunities it offers, and the steps to get started in using big data.
The Future of Technology in Education (UK)Michell Zappa
Michell Zappa gave a keynote at Northampton University on technology and education. They discussed three main technological drivers that are impacting education: social learning platforms that enable one-to-many and many-to-many learning; personal informatics that allow students to quantify and track their learning; and instant information retrieval through ubiquitous computing and sensors. Literacy and numeracy will need to evolve to skills like programming, privacy, multimedia, and attention as jobs are created that don't exist yet. Students need to be prepared at the edge of existing knowledge.
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...Omar Ha-Redeye
Clio cloud conference 2014
Not only is social media a valuable marketing tool, but it also has key implications within the legal process. Find out more about the ethics of using social media and technology in your modern practice.
Not only is social media a valuable marketing tool, but it also has key implications within the legal process. Find out more about the ethics of using social media and technology in your modern practice.
The document discusses how digital marketing and social media have evolved over time from party lines to modern platforms like Facebook and YouTube. It emphasizes that digital marketing is about connecting with customers and understanding what they are looking for. Effective digital marketing embraces short attention spans by creating brief, visual messages and using tools like video and cloud computing to engage audiences.
This document discusses 10 questions that will define the future of television. It outlines how television is facing major challenges and disruption from new technologies and digital media. Key points include television transitioning from traditional channels and networks to on-demand streaming accessed across multiple screens anytime; content being created and shared by both professional producers and users; and television evolving from a passive viewing experience to an interactive and immersive one.
Virtual Engagement Through Videoconferencing by Ted Ritzer June 25, 2015Ted Ritzer
This document discusses using videoconferencing and WebRTC technology for mobile citizen engagement. It proposes a concept called "The World Speaks" which would allow citizens to engage with organizations from their mobile devices using a free open-source WebRTC server and browser. Experts in the field like Google and Cisco employees endorsed using WebRTC due to its ability to conduct audio and video calls from mobile without plugins. The goal is to make engagement convenient and accessible wherever citizens are located.
This document discusses options for providing remote legal services to cover large geographic areas. It summarizes:
1) Three core possibilities for remote services identified: taking services on the road via mobile units, helping people from afar through videoconferencing and text messaging, and providing compelling online resources.
2) Case studies of organizations using these approaches, including legal kiosks, a mobile legal help center, telemedicine services to remote islands, and videos and interactive online trainings.
3) Key themes that emerged around the challenges of remote services, such as costs being higher, the importance of outreach and scheduling, balancing quality and reach, and having contingency plans for technology issues.
Service Beyond Geography: Using Technology to Serve People Remotely-IdealwareIdealware
There’s a movement across many different human services field toward providing services via web conferencing, texting, video, interactive websites and even Skype. How can organizations make the most of these technologies to provide services to geographically distributed constituents? We'll host a discussion of best practices and case studies, including an overview of Montana Legal Services' extensive online legal aid resources, Idealware's recent research in this area, and a number of other innovative but practical examples from health services, family support nonprofits, and more.
Digital Transformation Major tech trends through the customer lens and relati...Larry Smith
Digital Transformation
Major tech trends through the customer lens and relationships to the Insurance Industry
7 core technology trends: Mobility – Data – Social - Bots – Intelligence – Visualization – Things
This document discusses various technologies including social media, mobile technology, and cloud computing. It provides details on the growth of social media platforms and how professionals like accountants can benefit from using social media to build relationships, generate leads, and monitor reputation. Mobile technology is evolving rapidly with new devices like bendable phones and wearable technology. The document discusses how mobile phones can help professionals and be used by accountants to improve efficiency. It also covers emerging technologies like contactless payments and issues around customer relationship management, version control, and data security when working with cloud computing. The key message is that technology is changing rapidly and accountants need to adapt and leverage new technologies to remain relevant.
Data breaches and digital theft are now so frequent in the daily news cycle we have almost become numb to it. Information Security professionals often get asked by friends and family if large companies and government agencies are not able to stop attackers, what chance does an individual or a small business have?
This presentation was made to serve as a guide for Information Security professionals to reference when they are asked “What can the little guy do to be secure?” and for the non-technical to get started with improving their own personal digital security.
It has been said that Mobiles +Cloud + Social + Big Data = Better Run The World. IBM has invested over $20 billion since 2005 to grow its analytics business, many companies will invest more than $120 billion by 2015 on analytics, hardware, software and services critical in almost every industry like ; Healthcare, media, sports, finance, government, etc.
It has been estimated that there is a shortage of 140,000 – 190,000 people with deep analytical skills to fill the demand of jobs in the U.S. by 2018.
Decoding the human genome originally took 10 years to process; now it can be achieved in one week with the power of Analytic and BI (Business Intelligence). This lecture’s Key Messages is that Analytics provide a competitive edge to individuals , companies and institutions and that Analytics and BI are often critical to the success of any organization.
Methodology used is to teach analytic techniques through real world examples and real data with this goal to convince audience of the Analytics Edge and power of BI, and inspire them to use analytics and BI in their career and their life.
The two-day Intelligent Information Symposium in May 2012 in Sydney featured workshops and keynote speakers on topics related to the future of libraries and information professionals. Day 1 included workshops on preparing for multiple futures and disruptive forces that may impact libraries by 2018-2025. Day 2 consisted of keynote speeches on engaging customers online, failing productively to drive learning, and envisioning post-print libraries, as well as intensive sessions on social media strategies and connecting clients to resources. The conference explored challenges and opportunities for the field.
I presented on social media today for the HR group with the Minnesota Department of Transportation. They organized their conference with a Star Trek motif, which caused me to refresh my presentation, encouraging them to boldly go....
Nina Goodwin presented on how to stand out on social media. She discussed listening to conversations on platforms like Twitter using hashtags and searches. She emphasized sharing quality content through influencers and creating content like images, videos and blogs tailored to audiences. Case studies showed how businesses used social media for marketing. Good photography tips included using natural light and composition. Emerging trends for 2015 include more video and interest-based social platforms. The overall message was that quality, engaging content shared through the right channels and influencers can help businesses stand out.
IBM's Watson is a question answering computer system developed by IBM to answer questions posed in natural language. It was named after IBM's founder Thomas J. Watson and was initially created to compete on the game show Jeopardy! where it defeated human champions in 2011. Watson uses advanced natural language processing, semantic analysis, and machine learning to defeat human opponents. It is capable of answering complex questions with nuanced language and is being developed by IBM for commercial applications in fields like healthcare, finance and education.
IBM's Watson is a question answering computer system developed by IBM to answer questions posed in natural language. It was named after IBM's founder Thomas J. Watson and was initially created to compete on the game show Jeopardy! where it defeated human champions in 2011. Watson uses advanced natural language processing, semantic analysis, and machine learning to defeat human opponents. It is capable of answering complex questions with nuanced language and is being developed by IBM for commercial applications in fields like healthcare, finance and education.
Technology Trends for 2019: What it Means for Your BusinessPrecisely
Ninety percent of the world’s data was generated in the past two years, and 2.5 quintillion bytes of data are generated every day. Organizations across industries have an unprecedented opportunity to harness data to move their business forward – but they will need a solid strategy and the right tools to do so.
View this 30-minute webcast on-demand to learn about the technology trends you need to know to use data to your strategic advantage. Syncsort’s CTO, Tendu Yogurtcu, shares insights from our work with data-driven organizations around the world, on the top technology trends for 2019 – and how data governance is key.
The webcast covers opportunities, challenges and best practices for:
• Hybrid Cloud
• IoT
• AI and Machine Learning
• Blockchain
RAB/NAB Digital Mindset Presentation SlidesMark Edwards
Presentation given by Mark Edwards at the NAB Radio Show on April 9, 2013. Topics covered include monetizing digital promotions for radio and being aware of regulatory hurdles.
This document discusses how data and information sharing has increased dramatically in recent years due to advances in technology. In 60 seconds in 2014 over 2.7 million Google searches were performed, over 252 billion emails were sent, and over 975,000 new Facebook likes were generated. This level of data generation and sharing has implications for how people receive and evaluate news and information. Traditional news sources now compete with user-generated content on social media, where personalization algorithms may filter information based on users' preferences and profiles. The rise of mobile technology and apps has also transformed how people access and share information. These changes raise issues around privacy, filtering of information, and determining the validity and trustworthiness of different sources of news and data.
The document summarizes the strengths and cautions of leading UC&C (Unified Communications & Collaboration) vendors based on an annual industry summit. Key highlights include the UC product market becoming more mature with a shift to cloud services continuing. New areas in 2017 included CPaaS (Communications Platform as a Service), workstream messaging, and video conferencing. Individual vendor summaries then covered their strengths, cautions, and market positioning. The document provided an overview of the competitive UC&C landscape and major trends in the industry.
Presentation at the UC Summit 2016 - the rise of continuous productivity is changing the way we work and driving the need for workstream messaging applications.
Legal Process using Social Media: Evidence, Jury Tampering, and the Service o...Omar Ha-Redeye
Clio cloud conference 2014
Not only is social media a valuable marketing tool, but it also has key implications within the legal process. Find out more about the ethics of using social media and technology in your modern practice.
Not only is social media a valuable marketing tool, but it also has key implications within the legal process. Find out more about the ethics of using social media and technology in your modern practice.
The document discusses how digital marketing and social media have evolved over time from party lines to modern platforms like Facebook and YouTube. It emphasizes that digital marketing is about connecting with customers and understanding what they are looking for. Effective digital marketing embraces short attention spans by creating brief, visual messages and using tools like video and cloud computing to engage audiences.
This document discusses 10 questions that will define the future of television. It outlines how television is facing major challenges and disruption from new technologies and digital media. Key points include television transitioning from traditional channels and networks to on-demand streaming accessed across multiple screens anytime; content being created and shared by both professional producers and users; and television evolving from a passive viewing experience to an interactive and immersive one.
Virtual Engagement Through Videoconferencing by Ted Ritzer June 25, 2015Ted Ritzer
This document discusses using videoconferencing and WebRTC technology for mobile citizen engagement. It proposes a concept called "The World Speaks" which would allow citizens to engage with organizations from their mobile devices using a free open-source WebRTC server and browser. Experts in the field like Google and Cisco employees endorsed using WebRTC due to its ability to conduct audio and video calls from mobile without plugins. The goal is to make engagement convenient and accessible wherever citizens are located.
This document discusses options for providing remote legal services to cover large geographic areas. It summarizes:
1) Three core possibilities for remote services identified: taking services on the road via mobile units, helping people from afar through videoconferencing and text messaging, and providing compelling online resources.
2) Case studies of organizations using these approaches, including legal kiosks, a mobile legal help center, telemedicine services to remote islands, and videos and interactive online trainings.
3) Key themes that emerged around the challenges of remote services, such as costs being higher, the importance of outreach and scheduling, balancing quality and reach, and having contingency plans for technology issues.
Service Beyond Geography: Using Technology to Serve People Remotely-IdealwareIdealware
There’s a movement across many different human services field toward providing services via web conferencing, texting, video, interactive websites and even Skype. How can organizations make the most of these technologies to provide services to geographically distributed constituents? We'll host a discussion of best practices and case studies, including an overview of Montana Legal Services' extensive online legal aid resources, Idealware's recent research in this area, and a number of other innovative but practical examples from health services, family support nonprofits, and more.
Digital Transformation Major tech trends through the customer lens and relati...Larry Smith
Digital Transformation
Major tech trends through the customer lens and relationships to the Insurance Industry
7 core technology trends: Mobility – Data – Social - Bots – Intelligence – Visualization – Things
This document discusses various technologies including social media, mobile technology, and cloud computing. It provides details on the growth of social media platforms and how professionals like accountants can benefit from using social media to build relationships, generate leads, and monitor reputation. Mobile technology is evolving rapidly with new devices like bendable phones and wearable technology. The document discusses how mobile phones can help professionals and be used by accountants to improve efficiency. It also covers emerging technologies like contactless payments and issues around customer relationship management, version control, and data security when working with cloud computing. The key message is that technology is changing rapidly and accountants need to adapt and leverage new technologies to remain relevant.
Data breaches and digital theft are now so frequent in the daily news cycle we have almost become numb to it. Information Security professionals often get asked by friends and family if large companies and government agencies are not able to stop attackers, what chance does an individual or a small business have?
This presentation was made to serve as a guide for Information Security professionals to reference when they are asked “What can the little guy do to be secure?” and for the non-technical to get started with improving their own personal digital security.
It has been said that Mobiles +Cloud + Social + Big Data = Better Run The World. IBM has invested over $20 billion since 2005 to grow its analytics business, many companies will invest more than $120 billion by 2015 on analytics, hardware, software and services critical in almost every industry like ; Healthcare, media, sports, finance, government, etc.
It has been estimated that there is a shortage of 140,000 – 190,000 people with deep analytical skills to fill the demand of jobs in the U.S. by 2018.
Decoding the human genome originally took 10 years to process; now it can be achieved in one week with the power of Analytic and BI (Business Intelligence). This lecture’s Key Messages is that Analytics provide a competitive edge to individuals , companies and institutions and that Analytics and BI are often critical to the success of any organization.
Methodology used is to teach analytic techniques through real world examples and real data with this goal to convince audience of the Analytics Edge and power of BI, and inspire them to use analytics and BI in their career and their life.
The two-day Intelligent Information Symposium in May 2012 in Sydney featured workshops and keynote speakers on topics related to the future of libraries and information professionals. Day 1 included workshops on preparing for multiple futures and disruptive forces that may impact libraries by 2018-2025. Day 2 consisted of keynote speeches on engaging customers online, failing productively to drive learning, and envisioning post-print libraries, as well as intensive sessions on social media strategies and connecting clients to resources. The conference explored challenges and opportunities for the field.
I presented on social media today for the HR group with the Minnesota Department of Transportation. They organized their conference with a Star Trek motif, which caused me to refresh my presentation, encouraging them to boldly go....
Nina Goodwin presented on how to stand out on social media. She discussed listening to conversations on platforms like Twitter using hashtags and searches. She emphasized sharing quality content through influencers and creating content like images, videos and blogs tailored to audiences. Case studies showed how businesses used social media for marketing. Good photography tips included using natural light and composition. Emerging trends for 2015 include more video and interest-based social platforms. The overall message was that quality, engaging content shared through the right channels and influencers can help businesses stand out.
IBM's Watson is a question answering computer system developed by IBM to answer questions posed in natural language. It was named after IBM's founder Thomas J. Watson and was initially created to compete on the game show Jeopardy! where it defeated human champions in 2011. Watson uses advanced natural language processing, semantic analysis, and machine learning to defeat human opponents. It is capable of answering complex questions with nuanced language and is being developed by IBM for commercial applications in fields like healthcare, finance and education.
IBM's Watson is a question answering computer system developed by IBM to answer questions posed in natural language. It was named after IBM's founder Thomas J. Watson and was initially created to compete on the game show Jeopardy! where it defeated human champions in 2011. Watson uses advanced natural language processing, semantic analysis, and machine learning to defeat human opponents. It is capable of answering complex questions with nuanced language and is being developed by IBM for commercial applications in fields like healthcare, finance and education.
Technology Trends for 2019: What it Means for Your BusinessPrecisely
Ninety percent of the world’s data was generated in the past two years, and 2.5 quintillion bytes of data are generated every day. Organizations across industries have an unprecedented opportunity to harness data to move their business forward – but they will need a solid strategy and the right tools to do so.
View this 30-minute webcast on-demand to learn about the technology trends you need to know to use data to your strategic advantage. Syncsort’s CTO, Tendu Yogurtcu, shares insights from our work with data-driven organizations around the world, on the top technology trends for 2019 – and how data governance is key.
The webcast covers opportunities, challenges and best practices for:
• Hybrid Cloud
• IoT
• AI and Machine Learning
• Blockchain
RAB/NAB Digital Mindset Presentation SlidesMark Edwards
Presentation given by Mark Edwards at the NAB Radio Show on April 9, 2013. Topics covered include monetizing digital promotions for radio and being aware of regulatory hurdles.
This document discusses how data and information sharing has increased dramatically in recent years due to advances in technology. In 60 seconds in 2014 over 2.7 million Google searches were performed, over 252 billion emails were sent, and over 975,000 new Facebook likes were generated. This level of data generation and sharing has implications for how people receive and evaluate news and information. Traditional news sources now compete with user-generated content on social media, where personalization algorithms may filter information based on users' preferences and profiles. The rise of mobile technology and apps has also transformed how people access and share information. These changes raise issues around privacy, filtering of information, and determining the validity and trustworthiness of different sources of news and data.
The document summarizes the strengths and cautions of leading UC&C (Unified Communications & Collaboration) vendors based on an annual industry summit. Key highlights include the UC product market becoming more mature with a shift to cloud services continuing. New areas in 2017 included CPaaS (Communications Platform as a Service), workstream messaging, and video conferencing. Individual vendor summaries then covered their strengths, cautions, and market positioning. The document provided an overview of the competitive UC&C landscape and major trends in the industry.
Presentation at the UC Summit 2016 - the rise of continuous productivity is changing the way we work and driving the need for workstream messaging applications.
Uc summit michels pleasant parker vendor landscape review 29 april 14Dave Michels
This document summarizes the 2014 UC vendor landscape. It provides details on the strengths, challenges, and new developments for major UC vendors such as Avaya, Cisco, Microsoft, and Mitel. Overall trends include a movement toward cloud/managed services, increased focus on video and mobility, and simpler bundling of UC features. Cloud offerings are expanding and becoming more strategic for both SMBs and large enterprises.
This document summarizes a presentation on software defined networking (SDN). It discusses how SDN virtualizes networks in the same way server and desktops have been virtualized. SDN decouples the control plane from the data plane, allowing centralized control of network behavior and dynamic infrastructure provisioning. OpenFlow is presented as one approach to enable SDN by allowing communication between the network control and network devices. Potential benefits of SDN include flexibility, provisioning speed, improved security, efficiency and cost savings.
Same Time Last Year - Year of UC 13-14Dave Michels
This document provides a summary of notable events in the unified communications industry from March 2013 to February 2014. It covers leadership changes, mergers and acquisitions, key product launches, and emerging trends. Major topics discussed include the growth of cloud, mobile, and video technologies as well as privacy issues stemming from NSA surveillance revelations.
NEC iExpo 2013 took place in Tokyo, Japan over two days. The expo showcased NEC's latest technologies across 125 booths, including infrared cameras for disaster response, sensors for improving crop yields, robots for assisted living, and 4K laser projectors. Key areas of focus included cloud computing, software defined networking, renewable energy, aerospace, and carbon nanotubes. The event highlighted NEC's vision for using technology to build a more sustainable society and accommodate a growing global population.
AT&T Park, Giants and Dodgers, and ShoreTelDave Michels
Two of ShorTel's customers decided to play a game of baseball - a perfect reason for a party. Quick trip to AT&T Park, behind the scenes from a Telecom point of view.
The document provides an overview of vendors in the unified communications landscape in 2012, categorizing them based on their product offerings such as telephony/switching, messaging/presence, applications and portals, conferencing and collaboration, mobility solutions, and hosted/cloud offerings. It then provides brief summaries of the strengths and challenges for some of the major vendors.
This document discusses opportunities for value-added resellers (VARs) and systems integrators (SIs) in the unified communications industry. It notes that UC features are becoming commoditized but that VARs can optimize profits by adding value through customized designs, specialized methodologies, interoperability solutions, and communications applications that improve business processes. It provides examples of how applications can accelerate transactions, increase notification precision, improve contact success, and more. The document advocates that VARs focus on guiding customers towards proven applications or creating new apps tailored to specific customer needs.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
5. The Jetson’s
Star Trek and Star Wars
2001 Space Odyssey
@DaveMichels
6. The Jetson’s
Star Trek and Star Wars
2001 Space Odyssey
@DaveMichels
7. In 2003 VoIP was New
• I can remember explaining VoIP that is was
kind of like Vonage.
• I can remember explaining the benefit of a “work phone” at
Home
• “Yech!”
• “Why Would I Want that?”
• Two Weeks Ago: Yahoo Ordered Employees Back to the
Office
• “Yech!”
• “Why Would I Want that?”
@DaveMichels
8. Technology Shifts
• Two Kinds
• Super Fast – blink of the eye (speeds/feeds/models)
• Slow creeping, transformative changes (trends, usage)
It is time to
re-assess video
@DaveMichels
9. Is Video Important?
Twice as many people are afraid of going blind as are afraid of
premature death or heart disease.
• We have become numb to video – accepting voice only
communications
• Imagine meetings where everyone has a blindfold
• How much would you pay to take the blindfolds off?
• Price is dropping
• Video is voice Plus More
• Consider the difference between movies and books, or
TV and Radio
• Internet is transitioning from text to video (Youtube, Netflix)
@DaveMichels
10. Myths about Video
Revisit Assumptions About Video Communications.
• Video is Skype
• Peaked
• Intimidating
• Expensive
• Not Important
• Luxury
• Complex User Experience
• Poor Substitute for Meetings
@DaveMichels
11. I Learned Everything from TV
• The TV Boom
• 1949: 940,000 homes had TVs
• 1953: 20 Million homes had TVs
• Initially TV imitated Radio
• Sports and Wars changed the model
• TV discovered it was more than radio
@DaveMichels
12. Prepare for BIG VIDEO
• Video Is moving out of the boardroom…into our
lives
• Video is more than meetings and conferences
• Video meetings are just getting started
• The revolution Is upon us
@DaveMichels
14. Simple Video Appliances
• Biscotti
• Tely
• Aver
• Creative Labs InPerson HD
• Logitech TVCam HD
• Nintendo Wii U
@DaveMichels
15. Big Video
• Democratization of Video
• Rich Video
• HD
• Content Sharing
• Good Sound
Don’t Get Marooned!
• Lighting and Acoustics
• Recording
• Analytics
• Ubiquity
• Prices Dropping
@DaveMichels
16. Video is not a technology
• Think of video as an application
• Move away from codecs, signaling, speeds, and feeds
• Move toward connecting people
This happened with mobility
• Mobile first
• Mobile strategies
• Mobility
@DaveMichels
17. Video Usage Shifting
• Consumer/Prosumer
• Distributed Teams
• Beyond Departmental Meetings
• Job Interviews
• Across Corporate Boundaries
• Friends and Families
• Ambient Video
Video is becoming natural, not the exception
@DaveMichels
18. Big Video Goes Beyond Conferencing
• Education
• Medical
• Judicial
• Banking
• Innovative Startups
The value of video is not in the technology, but
the application and use.
@DaveMichels
19. Big Video Common Themes
Reliability Integration
Security Support
APIs
@DaveMichels
20. Education
• Khan Academy is just the beginning
• Massive Online Open Courses will disrupt higher education
• 1000 randomly selected higher education students
• Subtract out the students at UC News’ Top 100 Liberal Arts Colleges
and universities
• Subtract out the Ivy Leagues (Stanford, MIT, Emory, Rice, Vanderbilt,
Clemson, Drexel
• Subtract the famous state schools (UMass, Virginia, the California
universities)
• You still have 900 students left Source: Clay Shirky
• Plus corporate training, self-help programs, and hobby oriented
education
• For millions the institutions in which they enroll are more reliable
producers of debt than a career path
@DaveMichels
21. The Education Fantasy
“We know that effective learning is best achieved
through the engagement of other deeply attentive
human beings. The learning might occur in a
traditional classroom, but it might happen in a
different space: a lab, a mountain stream, an
international campus, a cafeteria, a residence
hall, a basketball court.”
Daryl Tippens, the Provost of Pepperdine
@DaveMichels
22. The Education Reality
Pepperdine University offers online degrees
• Masters and Doctorate
• 85% of the courses can be taken remotely
Classroom in the Mountains
@DaveMichels
25. Medical
• Ripe for Disruption
• Evan as an Outsider, Terrible Waste is Visible
• How Much Time to allow for a 15 minute
appointment?
• Docs are struggling
• The Association of American Medical Colleges forecasts
a 130,000 physician shortage by 2025
@DaveMichels
26. Personal Medical Lab
• An iPhone case that does a cardiogram for
$199
• Smartphone accessories that can test urine,
sweat, saliva, and blood
• Smartphones can do real-time passive
monitoring of certain human conditions
with a skin mounted sensor
• What happens with the smartphone has
more diagnostic capabilities than the
doctor’s office?
• If the lab work can be done at home, why
not the consult?
@DaveMichels
27. Judicial
• The concept that the prosecutor, defendant, judge, jury, and
witnesses all meet at the same time and place is obsolete
• Prisoner transport/security
• Rising cost of travel
@DaveMichels
28. Video Justice
“In a perfect world, one with enough money
available for all who need legal
representation to afford it, I would prefer all
parties, witnesses and attorney to be
physically present in my courtroom.
However, given the realities of funding for
legal services corporations, pro bono
difficulties and the demographic realities
facing residents [in rural areas], video
conferencing provides the best method of
improving access to justice since the
invention of the telephone.” Link
Honorable Gary L. Day (District Judge,
Sixteenth Judicial District, Montana)
@DaveMichels
29. American Well
• Get interactive medical advice from a doctor (not a website) from home
• Follow-ups
• Third World/Haiti
• Not a replacement
• Being Deployed by United Healthcare and Aetna
@DaveMichels
31. Banking – PTM: Personal Teller Machines
• Defense Bank in Australia established a video call centre at its
Melbourne head office, to service customers in their homes
• Remote staff handle account openings and loans. Teller in a call
center can operate the machine remotely
• Expanding its Partnership: In January 2013 NCR bought uGenius
Technology
"For one thing, we're seeing such incredible
demand from our customers in North
America…The other part where we see the
timing is right is internationally, where
there is a lot of market interest "
Brian Bailey, VP and GM of Branch
@DaveMichels Transformation at NCR
32. Banking – PTM: Personal Teller
Machines
• Defense Bank in Australia established a video call centre at its
Melbourne head office, to service customers in their homes.
• Most Coastal Federal Credit Union branches in North Carolina have
no tellers. Remote staff handle account openings and loans. Teller
in a call center can operate the machine remotely.
• Expanding its Partnership: In January 2013 NCR bought uGenius
Technology
"For one thing, we're seeing such incredible
demand from our customers in North
America…The other part where we see the
timing is right is internationally, where
there is a lot of market interest "
Brian Bailey, VP and GM of Branch
@DaveMichels Transformation at NCR
33. WebRTC: Game Changer?
• What if every desktop web browser becomes a rich
client?
• Voice
• Video
• IM
• Desktop Sharing
• WebRTC is the big democratizer
• Free? (Codec, Camera, Audio gear)
• Expected to spread
• Appliances (TVs)
• Mobile Devices
@DaveMichels
34. WebRTC Debate
• There is SOME debate over when it
changes the game
• There is NO DEBATE if it will change the
game
• WebRTC will create applications and
opportunities previously unimagined
• Watch this space closely
Read: BlogGeek.me
@DaveMichels
36. Video as a Cloud Service
• Direct and obvious proposition
• Simplify the process
• Seamless Interop as a Service
• Scheduling
• Firewall
• MCU as a Service (MaaS)
• Lower Cost
• Channel Opportunities
@DaveMichels
37. ChatRoulette.com
Five Reasons why Chat Roulette is Addictive – Wired Magazine
1. Inner Internet exhibitionist unleashed
• Elsewhere there are consequences for uploading antics to the web
• Act crazy, remain anonymous
2. Next Button
3. Throwback to Unpoliced Internet Era
• Return to days of IRC, Usenet, old school AOL chat rooms
• Unsupervised Shock Value
4. Interesting
• Talk to [interesting] people you otherwise never would
• Intelligent discourse does happen
5. It is Fun!
@DaveMichels
39. Nexistant
• Video Kiosk Reception
• One receptionist to many lobbies
• Hardware optimized:
scanner and printer
for Visitor Badge
@DaveMichels
40. QuicklyChat
• Push to Talk Video
• More like IM
• Instead of persistent
video connection
• Auto Answers – like IM
• Less intrusive
@DaveMichels
41. Live Ninja
Video Chat with experts (all in one)
• Finding the right person (Search)
• Logistics to meet
• Payment system
• Video chat
@DaveMichels
42. Take Aways
• Video Is Growing: Big Video is upon us!
• Needs to be Simpler
• Think of video as an application/solution, not a
technology
• Dialing and connecting needs to be simple
• The vendors will only solve this via Islands
• Opportunity exists!
• Tremendous opportunities for solutions that enable
simple video that is integrated into applications – that
solve problems
@DaveMichels
43. Strategies
AUDIO CONFERENCING PROVIDERS
• Leapfrog
• Mid Market Cloud Services
• Ignore Consumer
• Specialize
VIDEO CONFERENCING VARs
• Service focus
• Wean off hardware margins
• Tely will sell more units than Polycom
• Integrate – APIs (WebRTC)
@DaveMichels
44. Strategies
VoIP SERVICE PROVIDERS
• Integrate video services into the solution
• Video phones/clients
• iPad clients
• Focus on software based solutions
• Find the space between consumer/free and Room
Systems/Premium
HARDWARE MANUFACTURERS
• Eat your young [before someone else does]
• Wean off the hardware margins
• Think Volume
@DaveMichels
46. Tomorrow is Friday
• Fantasy is moving to reality
• The Fantasy/Science Fiction view of Video
was not bold enough
It’s time to take the blindfold off
@DaveMichels