Powerpoint reflections discusses the accelerating pace of change and whether "death by powerpoint" presentations are as common as political correctness gone mad. It also quotes Socrates saying that he cannot teach anyone, only make them think.
The document is a homework assignment submitted by Đặng Võ Kim Hiếu for BUS 350 on October 14, 2013. It discusses the founding purpose of the World Bank to provide low interest loans to developing countries to build hospitals, schools, and reduce poverty. However, the World Bank faces challenges due to bureaucracy and competition from other aid groups.
The document discusses skills developed working for the prison service that are transferable to other careers, including presentation, administration, literacy, research, teamwork, and communication skills. It describes the roles and responsibilities of prison officers, such as ensuring security, monitoring prisoners, and encouraging rehabilitation. Finally, it outlines the NOMS graduate program for becoming a prison governor, including initial training, progression to management roles, and competitive selection process.
The document outlines a four-stage process for developing a comprehensive approach to employability in higher education. Stage One involves discussion and reflection on what employability means, expectations, and needed support. Stage Two is to review and map out which employability features are currently addressed, how they are audited, and students' awareness. Stage Three is to identify any gaps from Stages One and Two and determine actions needed. Stage Four is to evaluate the effectiveness of the approach and collect evidence, including from alumni, on whether a defined, cohesive employability process was achieved.
This document outlines a lecture and seminar series at UCBC on community challenges. It discusses the evolution of the web from Web 1.0 to Web 2.0 to Web 3.0. It also highlights the large amount of misleading information online and the need for digital abilities like finding accurate information and sharing content appropriately. Key skills for the future are identified as flexibility, resilience, adaptability, teamwork, and lifelong learning. Problem solving and thinking outside the box are emphasized. The document concludes by noting attribution to Steve Wheeler of Plymouth University for most of the slides.
This document discusses a project at Blackburn College where criminology students were assigned to take photographs related to the theme "What is Crime?" and exhibit them publicly. The goals were to encourage learning beyond the classroom, respond to individual needs, and encourage participation in a learning community. Student photographs addressed topics like elder abuse, poverty, and the effects of recession. Evaluations found the exhibition changed viewers' attitudes towards different crimes and types of harm. The method allowed for creativity and insight beyond traditional assessments.
This presentation was produced by participants in the 'Enhancing Employability via Community Challenge' research project at the University Centre at Blackburn College.
This presentation was kindly shared with the Community Challenge research project by Ken Barnsley, Head of Corporate Research, Blackburn with Darwen Council.
The document is a homework assignment submitted by Đặng Võ Kim Hiếu for BUS 350 on October 14, 2013. It discusses the founding purpose of the World Bank to provide low interest loans to developing countries to build hospitals, schools, and reduce poverty. However, the World Bank faces challenges due to bureaucracy and competition from other aid groups.
The document discusses skills developed working for the prison service that are transferable to other careers, including presentation, administration, literacy, research, teamwork, and communication skills. It describes the roles and responsibilities of prison officers, such as ensuring security, monitoring prisoners, and encouraging rehabilitation. Finally, it outlines the NOMS graduate program for becoming a prison governor, including initial training, progression to management roles, and competitive selection process.
The document outlines a four-stage process for developing a comprehensive approach to employability in higher education. Stage One involves discussion and reflection on what employability means, expectations, and needed support. Stage Two is to review and map out which employability features are currently addressed, how they are audited, and students' awareness. Stage Three is to identify any gaps from Stages One and Two and determine actions needed. Stage Four is to evaluate the effectiveness of the approach and collect evidence, including from alumni, on whether a defined, cohesive employability process was achieved.
This document outlines a lecture and seminar series at UCBC on community challenges. It discusses the evolution of the web from Web 1.0 to Web 2.0 to Web 3.0. It also highlights the large amount of misleading information online and the need for digital abilities like finding accurate information and sharing content appropriately. Key skills for the future are identified as flexibility, resilience, adaptability, teamwork, and lifelong learning. Problem solving and thinking outside the box are emphasized. The document concludes by noting attribution to Steve Wheeler of Plymouth University for most of the slides.
This document discusses a project at Blackburn College where criminology students were assigned to take photographs related to the theme "What is Crime?" and exhibit them publicly. The goals were to encourage learning beyond the classroom, respond to individual needs, and encourage participation in a learning community. Student photographs addressed topics like elder abuse, poverty, and the effects of recession. Evaluations found the exhibition changed viewers' attitudes towards different crimes and types of harm. The method allowed for creativity and insight beyond traditional assessments.
This presentation was produced by participants in the 'Enhancing Employability via Community Challenge' research project at the University Centre at Blackburn College.
This presentation was kindly shared with the Community Challenge research project by Ken Barnsley, Head of Corporate Research, Blackburn with Darwen Council.
The document provides information for studying criminology and criminal justice courses, including defining key concepts in criminology and criminal justice, describing the criminal justice sector and module streams within criminology degrees, and emphasizing the importance of being an effective, engaged, and employable student through strategic learning. It also discusses measuring crime and challenges within the probation and prison systems.
This document provides an overview of criminology and criminal justice studies for undergraduate students. It discusses different types of learning in criminology, including strategic, deep, and surface learning. It also notes that violent crime in the US has fallen 51% and property crime 43% since 1991, though accurate measurements are debated. The document outlines various career paths in the public, private and third sectors related to criminology and criminal justice. It provides examples of criminology coursework and introduces some prominent criminology academics and their areas of expertise.
The document discusses tutorials aimed at developing students' understanding of key concepts like the water cycle and using search engines. It describes the tutorials as involving students preparing explanations of the concepts using source materials, presenting to their peers, defending against questions, and revising their explanations based on the tutor's subsequent summary of the discussion.
Modern Criminal Justice: Introduction to Visual StatementsPhil302
This resource aims to provoke critical thinking for visual images and introduce the concept of visual statements for students on the module, Modern Criminal Justice at UCBC.
This document provides guidance on becoming employable, focusing on understanding yourself, the target sector, and what steps to take. It advises developing a personal brand by identifying attributes, benefits, personality, and values/motivators. Understanding the sector involves researching target employers and the skills/values they seek. The document also recommends using the STAR framework to evidence how one's brand fits an organization when discussing experiences. The overall message is to understand yourself, understand the sector, and take steps like developing stories using STAR to effectively market your skills and qualifications.
This document discusses positive youth justice (PYJ) and the Children First, Offenders Second (CFOS) approach. PYJ moves beyond risk assessment models to a more progressive, principled approach that treats children as children first. The CFOS principles focus on being child-friendly, promoting inclusion, diversion, and relationship-based partnerships. The document highlights examples of PYJ/CFOS in practice in Swansea and Surrey, emphasizing diversion, restorative approaches, and integrating youth services. It argues for a national shift towards prioritizing children's needs over systems, integrating youth justice into children's services, and adopting children-first policing approaches.
Peter Joyce “Policing Protest Since 1945: Publishing Academic Textbooks”Phil302
Dr Peter Joyce, Principal Lecturer in Criminology, Manchester Metropolitan University delivered this guest lecture in the UCBC Lecture Theatre on Monday 14th November 2016 (5-6pm).
Critical Criminology and the ABC for Critical Pedagogy?Phil302
Provided for the ‘Critical Pedagogies Power & Possibilities’ workshop at the University Centre at Blackburn College (18th-20th May, 2016) for the Cultural Difference and Social Solidarity Network.
This document discusses undergraduate studies in the social sciences, specifically criminology and criminal justice. It notes that the justice sector now encompasses over 3.5 million workers or 13% of the UK workforce, spread across public, private, and third sectors. It outlines some of the defining features of a criminology graduate as critically evaluating research and evidence. Finally, it lists some module streams within criminology and criminal justice degrees related to policing, probation, prisons, and criminal psychology.
“Changing the ‘game’ of criminal justice through the use of Police and Crime ...Phil302
Dr Peter Joyce, Principal Lecturer in Criminology, Manchester Metropolitan University delivered this guest lecture in the UCBC Lecture Theatre on Thursday 5th November 2015 (3-4pm).
This document discusses how employers now use social networking sites to research candidates for graduate recruitment. It notes that employers look for a sense of intellectual humility, curiosity, and giving others the benefit of the doubt. It provides tips for using social media to build one's professional brand and profile online. Tags and URLs are included for relevant social media groups and links to employability resources. The document advises approaching job applications and one's graduate career with the same diligence as academic assignments.
Higher Education Academy Enhancement Series, Developing disciplinary communit...Phil302
This presentation was my contribution to the "Employability and the role of active and experiential learning in the social sciences" section of the event.
This document discusses the progression from fire and emergency services to careers in the justice sector. It notes that the justice sector now encompasses over 3.5 million workers or 13% of the UK workforce across public, private, and third sectors. This includes roles in police, courts, probation, prisons, and forensic services. The document then outlines some of the module streams covered in criminology degrees related to police, probation, and prisons. It promotes collaborative academic work and engaging with the academic community.
Coffeemat Challenge and Enterprise - Nick Hall, Business Engagement Manager, ...Phil302
Enterprise education combines creativity, ideas development, problem solving and practical skills to apply abilities across all areas of education. It enhances one's capacity to generate ideas and implement them. The document discusses enterprise and entrepreneurship education, providing context about Blackburn College and the local area. It then outlines Blackburn College's Coffeemat Challenge, a competition to engage students in social enterprise where over 300 business ideas were generated and several projects received funding. The challenge highlighted that students need ongoing support to develop ideas and some lessons learned.
This document provides an overview of research methods and key concepts in selecting literature, understanding research designs, and differentiating between quantitative and qualitative research approaches. It discusses that selecting literature requires being organized and adjusting search criteria if there are too few or many texts. It also outlines that understanding research literature requires a basic knowledge of research design, sampling, data collection techniques, and data analysis techniques. Further, it describes quantitative research as objective, relying on measurable hard data and statistics, while qualitative research searches for meanings through words and inductive approaches. Both methods have benefits and a mixed methods or triangulation approach can provide stronger verification.
This presentation was for the workshop: "Everything starts with an e: employability or ‘empowerability’ for the Social Sciences?"
The workshop was part of the Higher Education Academy's Social Sciences workshop and seminar series 2013-14.
This slideshow is the result of student work for the module SS11006 Criminal Justice Environment 1 on the FdA Criminology & Criminal Justice programme at the University Centre at Blackburn College.
The "What is Zemiology?" research project seeks to benefit local communities by improving levels of public awareness of the kind of harms investigated by the criminal justice system. The project aims to challenge conventional representations of 'crime' by mass media such as newspapers and television.
Please see http://youtu.be/8QIILcct6Ik for more.
The document summarizes four newsagent's hoardings along a street in Lancashire, England on September 3, 2013. Three of the four hoardings displayed headlines about a "CHILD SEX BEAST GETS 16 YEARS" while the other discussed transfer news for a local football team. The document then discusses the public fascination with infamous murderers Myra Hindley and Ian Brady and how their crimes have been commercialized and sensationalized.
Producing students without boundaries through degrees of edupunkPhil302
Delivered at ‘Letting the Students be, Responsibly: Learning, Experience and Standardization in Higher Education’ for the HEA at Bangor University, 16 May 2013
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
The document provides information for studying criminology and criminal justice courses, including defining key concepts in criminology and criminal justice, describing the criminal justice sector and module streams within criminology degrees, and emphasizing the importance of being an effective, engaged, and employable student through strategic learning. It also discusses measuring crime and challenges within the probation and prison systems.
This document provides an overview of criminology and criminal justice studies for undergraduate students. It discusses different types of learning in criminology, including strategic, deep, and surface learning. It also notes that violent crime in the US has fallen 51% and property crime 43% since 1991, though accurate measurements are debated. The document outlines various career paths in the public, private and third sectors related to criminology and criminal justice. It provides examples of criminology coursework and introduces some prominent criminology academics and their areas of expertise.
The document discusses tutorials aimed at developing students' understanding of key concepts like the water cycle and using search engines. It describes the tutorials as involving students preparing explanations of the concepts using source materials, presenting to their peers, defending against questions, and revising their explanations based on the tutor's subsequent summary of the discussion.
Modern Criminal Justice: Introduction to Visual StatementsPhil302
This resource aims to provoke critical thinking for visual images and introduce the concept of visual statements for students on the module, Modern Criminal Justice at UCBC.
This document provides guidance on becoming employable, focusing on understanding yourself, the target sector, and what steps to take. It advises developing a personal brand by identifying attributes, benefits, personality, and values/motivators. Understanding the sector involves researching target employers and the skills/values they seek. The document also recommends using the STAR framework to evidence how one's brand fits an organization when discussing experiences. The overall message is to understand yourself, understand the sector, and take steps like developing stories using STAR to effectively market your skills and qualifications.
This document discusses positive youth justice (PYJ) and the Children First, Offenders Second (CFOS) approach. PYJ moves beyond risk assessment models to a more progressive, principled approach that treats children as children first. The CFOS principles focus on being child-friendly, promoting inclusion, diversion, and relationship-based partnerships. The document highlights examples of PYJ/CFOS in practice in Swansea and Surrey, emphasizing diversion, restorative approaches, and integrating youth services. It argues for a national shift towards prioritizing children's needs over systems, integrating youth justice into children's services, and adopting children-first policing approaches.
Peter Joyce “Policing Protest Since 1945: Publishing Academic Textbooks”Phil302
Dr Peter Joyce, Principal Lecturer in Criminology, Manchester Metropolitan University delivered this guest lecture in the UCBC Lecture Theatre on Monday 14th November 2016 (5-6pm).
Critical Criminology and the ABC for Critical Pedagogy?Phil302
Provided for the ‘Critical Pedagogies Power & Possibilities’ workshop at the University Centre at Blackburn College (18th-20th May, 2016) for the Cultural Difference and Social Solidarity Network.
This document discusses undergraduate studies in the social sciences, specifically criminology and criminal justice. It notes that the justice sector now encompasses over 3.5 million workers or 13% of the UK workforce, spread across public, private, and third sectors. It outlines some of the defining features of a criminology graduate as critically evaluating research and evidence. Finally, it lists some module streams within criminology and criminal justice degrees related to policing, probation, prisons, and criminal psychology.
“Changing the ‘game’ of criminal justice through the use of Police and Crime ...Phil302
Dr Peter Joyce, Principal Lecturer in Criminology, Manchester Metropolitan University delivered this guest lecture in the UCBC Lecture Theatre on Thursday 5th November 2015 (3-4pm).
This document discusses how employers now use social networking sites to research candidates for graduate recruitment. It notes that employers look for a sense of intellectual humility, curiosity, and giving others the benefit of the doubt. It provides tips for using social media to build one's professional brand and profile online. Tags and URLs are included for relevant social media groups and links to employability resources. The document advises approaching job applications and one's graduate career with the same diligence as academic assignments.
Higher Education Academy Enhancement Series, Developing disciplinary communit...Phil302
This presentation was my contribution to the "Employability and the role of active and experiential learning in the social sciences" section of the event.
This document discusses the progression from fire and emergency services to careers in the justice sector. It notes that the justice sector now encompasses over 3.5 million workers or 13% of the UK workforce across public, private, and third sectors. This includes roles in police, courts, probation, prisons, and forensic services. The document then outlines some of the module streams covered in criminology degrees related to police, probation, and prisons. It promotes collaborative academic work and engaging with the academic community.
Coffeemat Challenge and Enterprise - Nick Hall, Business Engagement Manager, ...Phil302
Enterprise education combines creativity, ideas development, problem solving and practical skills to apply abilities across all areas of education. It enhances one's capacity to generate ideas and implement them. The document discusses enterprise and entrepreneurship education, providing context about Blackburn College and the local area. It then outlines Blackburn College's Coffeemat Challenge, a competition to engage students in social enterprise where over 300 business ideas were generated and several projects received funding. The challenge highlighted that students need ongoing support to develop ideas and some lessons learned.
This document provides an overview of research methods and key concepts in selecting literature, understanding research designs, and differentiating between quantitative and qualitative research approaches. It discusses that selecting literature requires being organized and adjusting search criteria if there are too few or many texts. It also outlines that understanding research literature requires a basic knowledge of research design, sampling, data collection techniques, and data analysis techniques. Further, it describes quantitative research as objective, relying on measurable hard data and statistics, while qualitative research searches for meanings through words and inductive approaches. Both methods have benefits and a mixed methods or triangulation approach can provide stronger verification.
This presentation was for the workshop: "Everything starts with an e: employability or ‘empowerability’ for the Social Sciences?"
The workshop was part of the Higher Education Academy's Social Sciences workshop and seminar series 2013-14.
This slideshow is the result of student work for the module SS11006 Criminal Justice Environment 1 on the FdA Criminology & Criminal Justice programme at the University Centre at Blackburn College.
The "What is Zemiology?" research project seeks to benefit local communities by improving levels of public awareness of the kind of harms investigated by the criminal justice system. The project aims to challenge conventional representations of 'crime' by mass media such as newspapers and television.
Please see http://youtu.be/8QIILcct6Ik for more.
The document summarizes four newsagent's hoardings along a street in Lancashire, England on September 3, 2013. Three of the four hoardings displayed headlines about a "CHILD SEX BEAST GETS 16 YEARS" while the other discussed transfer news for a local football team. The document then discusses the public fascination with infamous murderers Myra Hindley and Ian Brady and how their crimes have been commercialized and sensationalized.
Producing students without boundaries through degrees of edupunkPhil302
Delivered at ‘Letting the Students be, Responsibly: Learning, Experience and Standardization in Higher Education’ for the HEA at Bangor University, 16 May 2013
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
1. Powerpoint
reflections
Terry McDonough
UCBC
www.enterprisebuilder.us
2. The pace of
cc Steve Wheeler, University of Plymouth, 2010
change is
accelerating
‘Death by powerpoint’ as
common as ‘political
correctness gone mad’?
3. “I cannot teach
anyone, all I can do is
make them think.”
cc Steve Wheeler, University of Plymouth, 2010
~ Socrates
http://commarts.edgewood.edu/socrates.jpg