public presentation at <a href="http://ecommmedia.com">EComm2008</a> by Jonathan Christensen, Skype. Posted by <a href="http://SkypeJournal.com">Skype Journal</a>
Light-Fidelity
LI-FI is transmission of data through illumination, sending data through a LED light bulb that varies intensity faster than human eye can follow.
LiFi is a wireless optical networking technology that uses light-emitting diodes (LEDs) for data transmission.
These slides use concepts from my (Jeff Funk) course entitled Biz Models for Hi-Tech Products to analyze the business model for pureLiFi’s LiFi technology. LiFi uses light waves as opposed to radio waves to transmit data wirelessly. While the transmission distances are very short and the light waves cannot penetrate walls as radio waves can do to some extent, LiFi has higher speeds, bandwidth, and security. The slides recommend that pureLiFi target defense company’s first and consumers second. Defense companies have a higher willingness to pay and they are more concerned with security than are consumers. As the cost falls, pureLiFi should begin to target consumers. PureLiFi should provide its technology to systems integrators that are defense contractors.
Light-Fidelity
LI-FI is transmission of data through illumination, sending data through a LED light bulb that varies intensity faster than human eye can follow.
LiFi is a wireless optical networking technology that uses light-emitting diodes (LEDs) for data transmission.
These slides use concepts from my (Jeff Funk) course entitled Biz Models for Hi-Tech Products to analyze the business model for pureLiFi’s LiFi technology. LiFi uses light waves as opposed to radio waves to transmit data wirelessly. While the transmission distances are very short and the light waves cannot penetrate walls as radio waves can do to some extent, LiFi has higher speeds, bandwidth, and security. The slides recommend that pureLiFi target defense company’s first and consumers second. Defense companies have a higher willingness to pay and they are more concerned with security than are consumers. As the cost falls, pureLiFi should begin to target consumers. PureLiFi should provide its technology to systems integrators that are defense contractors.
ZeR0-Connect aka “Z0C”, is a system, a protocol and a technology, developed with the purpose to assist
communication under critical conditions (earthquake, tsunami, war, etc.) where any form of connectivity is
difficult or nearly impossible.
13 Things You Can Do to Help Students Improve Their Writinglaurieputnam
What can SLIS faculty do to help students succeed in their writing assignments? Here are 13 things, from designing clear assignments to setting student expectations to providing thoughtful, constructive feedback. For the companion handout, see http://www.slideshare.net/laurieputnam/helping-students-improve-their-writing.
Presented at the San Jose State University School of Library and Information Science Faculty Institute, May 2010.
ACKNOWLEDGMENTS
Slide 4 (tip #3): See A Brief Guide to Designing Essay Assignments from Harvard College (http://isites.harvard.edu/icb/icb.do?keyword=k24101&pageid=icb.page123718).
Slide 12: Thanks to Anthony Bernier for providing the Term Paper Checklist.
Slide 16 (tip #10): See A Brief Guide to Responding to Student Writing from Harvard College (http://isites.harvard.edu/icb/icb.do?keyword=k24101&pageid=icb.page123718).
Slide 17 (tip #11): See Praising, Questioning, Wishing: An Approach to Responding to Writing from Brian Slusher for the National Writing Project (http://www.nwp.org/cs/public/print/resource/2868).
And general thanks to Bill Burnette for ongoing advice and frequent reality checks.
INVESTIGACIÓN SOBRE CONDUCTAS ADICTIVAS A INTERNET ENTRE LOS ADOLESCENTES EUR...eraser Juan José Calderón
El Proyecto de investigación EU NET ADB q tiene como objetivo dar a conocer los riesgos de la Conducta Adictiva a Internet entre los adolescentes en Europa
Reutilización de información pública y privada en España
Avance de situación para agentes públicos y privados. Una oportunidad para los negocios y el empleo.
ZeR0-Connect aka “Z0C”, is a system, a protocol and a technology, developed with the purpose to assist
communication under critical conditions (earthquake, tsunami, war, etc.) where any form of connectivity is
difficult or nearly impossible.
13 Things You Can Do to Help Students Improve Their Writinglaurieputnam
What can SLIS faculty do to help students succeed in their writing assignments? Here are 13 things, from designing clear assignments to setting student expectations to providing thoughtful, constructive feedback. For the companion handout, see http://www.slideshare.net/laurieputnam/helping-students-improve-their-writing.
Presented at the San Jose State University School of Library and Information Science Faculty Institute, May 2010.
ACKNOWLEDGMENTS
Slide 4 (tip #3): See A Brief Guide to Designing Essay Assignments from Harvard College (http://isites.harvard.edu/icb/icb.do?keyword=k24101&pageid=icb.page123718).
Slide 12: Thanks to Anthony Bernier for providing the Term Paper Checklist.
Slide 16 (tip #10): See A Brief Guide to Responding to Student Writing from Harvard College (http://isites.harvard.edu/icb/icb.do?keyword=k24101&pageid=icb.page123718).
Slide 17 (tip #11): See Praising, Questioning, Wishing: An Approach to Responding to Writing from Brian Slusher for the National Writing Project (http://www.nwp.org/cs/public/print/resource/2868).
And general thanks to Bill Burnette for ongoing advice and frequent reality checks.
INVESTIGACIÓN SOBRE CONDUCTAS ADICTIVAS A INTERNET ENTRE LOS ADOLESCENTES EUR...eraser Juan José Calderón
El Proyecto de investigación EU NET ADB q tiene como objetivo dar a conocer los riesgos de la Conducta Adictiva a Internet entre los adolescentes en Europa
Reutilización de información pública y privada en España
Avance de situación para agentes públicos y privados. Una oportunidad para los negocios y el empleo.
(GAPMIL) FRAMEWORK AND PLAN OF ACTION FOR THE GLOBAL ALLIANCE FOR PARTNERSHIP...eraser Juan José Calderón
FRAMEWORK AND PLAN OF ACTION FOR THE GLOBAL ALLIANCE FOR PARTNERSHIPS ON MEDIA AND INFORMATION LITERACY (GAPMIL)
Promoting Media and Information Literacy (MIL) as a Means to Open and Inclusive Development
What is Intelligent Content
How has content on the internet evolved
Some examples of intelligent content, both online and offline
What do we see on the internet going forward?
A Higher Education Social Network to Share and Promote Teaching Innovation Ex...eraser Juan José Calderón
A Higher Education Social Network to Share and Promote Teaching Innovation Experiences
García-Cabrera, Balsas Almagro, Ruano Ruano.
Universidad de Jaén
This ppt has introduce all types of Mobile Network Generation and Also explain various types of Mobile Marketing to generate a High Speed Transmission.
Head to Head - The Battle between the Bellheads and the Netheads for control ...Pieter Geldenhuys
Part 1: When the infrastructure is ubiquitous and operates as a utility, like water or electricity, we will move beyond the current paradigm of cyberspace. What happens when information and knowledge are accessible to all who choose to look? What happens when eBusiness, eHealth and eLiteracy have become an invisible normality? What happens after the Ubiquitous Internet has irreparably changed our very understanding of the world we live in? A new Digital Value Chain will be required when the Netheads and Bellheads pit their business models against each other in an epic battle where the only winner is bound to be the consumer. Who will find the right balance between the investments required to support the infrastructure and the money that inevitably will flow to edge of the network where the intelligence and power resides?
Do product managers need a code of ethics? What would a code do? How would it affect the profession? Why should we adopt it? What should it include? What's next?
Seven Reasons This Epic Training Should Matter To YouPhil Wolff
Here's my five minute WIIFM deck for a hypothetical Epic systems training course for nurses, doctors, and other hospital clinicians. I used this in my interview with Greythorn. All facts are notional, figures imaginary, and photos used without permission.
14 OpenOakland Leadership Hacks for 2015Phil Wolff
How do you lead software teams where everyone is a volunteer, can't commit for long periods, and new people join all the time? Here are 14 leaderships hacks we use at http://OpenOakland.org at our civic hack nights. We build apps that make the lives of Oaklanders better and help Oakland City Hall innovate. Over pizza.
We're starting our 2014 strategy conversations for the local #OpenOakland Code for America volunteer brigade. Here are a few talking points for how to prioritize our strategy offsite.
Code for America Brigade volunteers consider thousands of projects for local civic engagement and innovation apps; we build only a handful in each city. How can we choose better? A little intention could dramatically improve the quality of our project portfolios. I propose we score proposals across four dimensions:
- The value our products will produce. (More users, more usage, building capacity, leaving infrastructure behind)
- Risks of the journey (taking the right level of risks around customer clarity, effort & cost, tech difficulty, political risk)
- Alignment with our values
- Stakeholders engaged and affected
So Your Product Is Going To Die. Here's What Happens Next. Phil Wolff
Here's my walk-through of the generic product retirement project. Set up signals, choose death (or life), choose the shape of the project (how you're going to dispose of the body), plan, prepare, cutover, respond, and wrap things up.
The Things I Don't Know about Product Retirement Could Fill A Slide DeckPhil Wolff
My Ignorance On Display as a Research Agenda. There are millions of consumer apps to kill in the next few years. Perhaps that many enterprise apps too. We do a horrible job of shutting down systems well. It's typically a frenetic, last second, disorganized, incomplete, bridge-burning, costly, career limiting exercise. We don't talk about it and we have little data. I want to start a conversation about product death. In this deck I'm showing how little I know by asking you how to lead product retirement projects, how to design them, current practices, which forces drive success and which risks induce failure.
Proposal: A new City of Oakland Technology Commission Phil Wolff
Many of Oakland's tech challenges could benefit from public-private leadership. This is a rough draft presentation of the text at http://oaklandwiki.org/Technology_Commission_Proposal
Personal Data Economy Action Plan - Get Smart, Get Connected, Get ProofPhil Wolff
The is a rough draft curriculum unit for enterprise pros interested in using personal data, VRM, user-centric digital identity, and privacy to improve operations. The focus is on what to do after the class.
The Cloud Needs An Operating System – Philip J. WindleyPhil Wolff
Because it allows you to act as a peer, a CloudOS orchestrates and coordinates online interactions, enables cooperating networks of products and services, supports intention-driven automation.
Johannes Ernst introduces the first Personal Clouds Community GatheringPhil Wolff
In San Francisco, 29 January 2013, one hundred people came together to talk about personal clouds. Johannes Ernst explained how personal clouds are to big web companies what personal computers were to mainframes. They both gave more personal control over terms, apps, and data.
What could kill NSTIC? A friendly threat assessment in 3 parts.Phil Wolff
At two events 18-months apart, teams of suits, geeks, and wonks (industry experts, technologists, public policy analysts) brainstormed and scored what could lead to failure of NSTIC, an international effort to create an identity ecosystem. The whitepaper at http://pde.cc/nsticrisks recaps the long list of potential threats, a shorter list of preventive strategies, compares the 2011 and 2012 events, and names the two greatest threats: poor user experience (harming trust, adoption, use) and imbalance among the forces tying the identity ecosystem together.
Rough deck for a flash talk for personal cloud designers, entrepreneurs, and investors at http://personalcloud1.eventbrite.com/. The PC-era protections of a personal computer you can hold in your hands or lock up in your home are gone as we move our software and data to personal clouds. We're renting instead of owning but we have no tenant protections. We should aspire to the trust placed on the relationship between doctors and patients, priests and penitents, lawyers and clients, and accountants and trustees. A fiduciary duty puts the "customer" first, even if it means harm to the service provider.
22 Ways Skype's Digital Identity System SucksPhil Wolff
Using Skype as an example, I deconstruct ways in which its user identity system doesn't fit the ways people think about themselves, present themselves in public, or interact in real life.
#Portability4Trust - Personal Data Portability for Trust FrameworksPhil Wolff
We're building on our Portability Policy work to make data portability standards and practices available in a form that the new trust frameworks can use.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP