This presentation discussed the impact of technology trends on people - their culture, interactions with each other and with the technology. Delivered as an OpenTalk at OpenText Content World 2011. This is not a product pitch!
The presentation discusses using the Raspberry Pi as an information security tool, covering its benefits and limitations for penetration testing, setting up a Glastopf honeypot, and tethering an iPhone to the Pi. The presenter then demonstrates these Pi-based infosec applications.
This document provides an extension activity for evaluating research methods used to investigate a subject. It includes a table to list the advantages and disadvantages of the chosen method, as well as alternative methods in case of problems. Some example methods listed are internet research, telephone calls, traveling, and using books. Considering both benefits and limitations of different approaches can help prepare for issues and ensure the most reliable information is obtained. Thorough evaluation of methods is encouraged to determine the most quick, safe, efficient or reliable option for the task.
The document provides eight rules of thumb for managing telecommuters: [1] Double the amount of time spent in formal performance management conversations; [2] Get good at casual communication and chit-chat; [3] Actively encourage questions, comments, and ideas about the business; [4] Make reaching out part of the telecommuter's formal work plan; [5] Provide extensive initial and regular face-to-face orientation and follow-up; [6] Vary teleconference times to match employees' circadian rhythms; [7] Ask to be copied on outgoing email correspondence initially; [8] Avoid making inferences without full information.
Rita Young Allen discusses the importance of intentional engagement in both business and life. As the world faces unrest and uncertainty, intentional engagement is the only way to navigate through challenges with sanity. In business, leaders must engage employees by giving them freedom, valuing their opinions, and encouraging development. High employee engagement leads to better performance, satisfaction and retention. In life, people must rediscover their passions and intentionally engage with family, friends and careers. Social media can foster engagement if used to connect, build relationships and promote brands in an authentic way. Intentional engagement in both spheres is key to finding meaning and purpose.
Presentation discussing various big hairy problems that relate to content and that the industry yet has to solve. Delivered as a session in though leadership series at OpenText Content World 2010.
ContactListFinder is an application that retrieves a user's contact list from 60+ email providers like Gmail and Yahoo by entering their email address and password. It displays the contacts in a datagrid and automatically detects the email provider. The application does not store any user information and uses a PHP file to interface with the email providers securely. A demo of the working component is available online.
The document discusses why past ECM implementations often failed and argues that integrating ECM with business processes can help overcome these challenges. It notes that ECM projects commonly struggled with user adoption, failed to provide measurable ROI, and lacked strategic importance. However, the document argues that by connecting ECM to "master applications" that drive key business processes, ECM can provide value by supporting important processes, inheriting metadata to improve findability, and delivering a measurable ROI through more efficient processes. Integrating ECM in this way addresses historic challenges and positions ECM as the backbone for managing unstructured content across an organization.
The presentation discusses using the Raspberry Pi as an information security tool, covering its benefits and limitations for penetration testing, setting up a Glastopf honeypot, and tethering an iPhone to the Pi. The presenter then demonstrates these Pi-based infosec applications.
This document provides an extension activity for evaluating research methods used to investigate a subject. It includes a table to list the advantages and disadvantages of the chosen method, as well as alternative methods in case of problems. Some example methods listed are internet research, telephone calls, traveling, and using books. Considering both benefits and limitations of different approaches can help prepare for issues and ensure the most reliable information is obtained. Thorough evaluation of methods is encouraged to determine the most quick, safe, efficient or reliable option for the task.
The document provides eight rules of thumb for managing telecommuters: [1] Double the amount of time spent in formal performance management conversations; [2] Get good at casual communication and chit-chat; [3] Actively encourage questions, comments, and ideas about the business; [4] Make reaching out part of the telecommuter's formal work plan; [5] Provide extensive initial and regular face-to-face orientation and follow-up; [6] Vary teleconference times to match employees' circadian rhythms; [7] Ask to be copied on outgoing email correspondence initially; [8] Avoid making inferences without full information.
Rita Young Allen discusses the importance of intentional engagement in both business and life. As the world faces unrest and uncertainty, intentional engagement is the only way to navigate through challenges with sanity. In business, leaders must engage employees by giving them freedom, valuing their opinions, and encouraging development. High employee engagement leads to better performance, satisfaction and retention. In life, people must rediscover their passions and intentionally engage with family, friends and careers. Social media can foster engagement if used to connect, build relationships and promote brands in an authentic way. Intentional engagement in both spheres is key to finding meaning and purpose.
Presentation discussing various big hairy problems that relate to content and that the industry yet has to solve. Delivered as a session in though leadership series at OpenText Content World 2010.
ContactListFinder is an application that retrieves a user's contact list from 60+ email providers like Gmail and Yahoo by entering their email address and password. It displays the contacts in a datagrid and automatically detects the email provider. The application does not store any user information and uses a PHP file to interface with the email providers securely. A demo of the working component is available online.
The document discusses why past ECM implementations often failed and argues that integrating ECM with business processes can help overcome these challenges. It notes that ECM projects commonly struggled with user adoption, failed to provide measurable ROI, and lacked strategic importance. However, the document argues that by connecting ECM to "master applications" that drive key business processes, ECM can provide value by supporting important processes, inheriting metadata to improve findability, and delivering a measurable ROI through more efficient processes. Integrating ECM in this way addresses historic challenges and positions ECM as the backbone for managing unstructured content across an organization.
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
The document summarizes a webinar on ethical hacking and cybersecurity. It introduces the speaker, Mohammed Adam, and his background. It then outlines the 5 stages of ethical hacking that will be covered: reconnaissance, scanning and enumeration, exploitation, post-exploitation, and clearing tracks. It focuses on the reconnaissance stage, explaining the concepts of open-source intelligence (OSINT) and different types of intelligence like human, geospatial, signals, and open-source intelligence. It provides examples of how OSINT is used in ethical hacking and penetration testing as well as examples of traditional and modern OSINT methods and tools.
This document discusses personal identity in online spaces and the importance of media literacy. It notes that people leave a "digital footprint" of everything they upload online, which is used by algorithms for advertising purposes. Over 80% of children under age 2 already have an online identity. The document advises users to check who can see their online content and why, as well as take steps like thinking before posting, checking facts with sites like Snopes, and remembering content can be taken out of context. Users are encouraged to contact the author with any other questions.
This document summarizes key trends and issues discussed at SXSW 2017. The top trends included mobile messaging continuing to evolve as a major marketing channel, the ongoing evolution of video consumption and creation, and virtual and augmented reality still being in the early adoption phase and facing challenges around cost and user experience. Other trends focused on connected digital lives, healthcare innovation, ethics around data use, voice interfaces, artificial intelligence, polarization in public discourse, and concerns about short-term thinking. The document encourages identifying major trends and innovating within those areas while also considering issues like data security, accountability, and serving audience needs with useful and exciting solutions.
The document provides information about using technology tools to enhance world language lessons. It discusses using tools like Poll Everywhere, QR codes, AudioBoo, Voicethread, Animoto, and interactive whiteboards to engage students, allow collaboration outside of class, and provide opportunities for critical thinking. Examples are given for classroom activities using these tools, such as scavenger hunts with QR codes and students introducing themselves in Voicethread.
THoMers Dennis, Inge, Laetitia, Pieter and Thomas attended Web Summit, the largest tech conference in the world, hosted in Lisbon, Portugal. Web Summit equals 22 conferences connecting different industries, from AutoTech and MoneyConf to SaaS Monster and Talk Robot. The keyword across all conferences? Artificial Intelligence!
What will leadership look like in the Age of the Web? A presentation at LeWeb 2008. (The original used lots of animations, so some of the slides look odd.)
This document provides an overview of conversational AI and discusses emerging technologies like general and narrow AI. It begins by discussing the evolution of chatbots and how most current AI chatbots work using data correlation rather than causation. It then distinguishes between narrow AI, which can perform repetitive tasks with limited abilities, and general AI, which does not currently exist but would have unlimited abilities and ability to self-program. The document outlines some examples of how companies are using machine learning and AI to improve business operations. It emphasizes the importance of transparency, explainability, security and predictability for practical narrow AI applications. Finally, it discusses the importance of digital identity and outlines statistics on the potential impacts of good digital identity systems.
This document provides an overview of conversational AI and discusses narrow artificial intelligence. It begins with background on industrial revolutions and the evolution of chatbots. It then explains how most AI chatbots work today and discusses the development behind them. It notes the difference between narrow AI, which performs repetitive tasks with limited abilities, and general AI, which can perform many tasks and self-program. The document outlines keys steps to practical narrow AI, including predictability, explainability, security and transparency. It discusses the importance of good digital identity and its role in facilitating interactions between individuals and institutions.
For millennia people have been travelling to stadia to watch and participate in spectacles of pure brutality and sport sponsored by kings, emperors, states, individuals. Today sport and other entertainment events have become a major global business sector with executive facilities, commercial sponsorship, broadcast and full media coverage. But, in many respects, the crowds and their experience has changed little. However, technology is impacting this situation and looks set to accelerate the rate of change.
In a similar manner to the airline business; the few pay around 80% of the costs, whilst the many fulfil the 20% or so. All the attention is lavished on the few and the many are neglected and remain a latent opportunity. The technologies of communication, networking, apps, Big and Meta Data can change all this by creating a ‘market of one’. Satisfying the needs of every individual and every group should be pursued as it leads to a world of new services and ‘pre-selling’.
The technological opportunities are endless with augmented reality able to furnish a view from every angle to mobile devices and wearables supported by real time details, data and statistics. Clouds and ‘networks without infrastructure’ can overcome the limitations of 3, 4, 5G and wifi systems that will never satisfy the need for growing customer connectivity and bandwidth. They can also help solve entry congestion and simultaneously support security and vending operations. Branded mobile devices with pre-loaded apps are also an obvious step towards the creation of ‘The Club’ identity and ‘belonging’ that goes way beyond the latest strip, scarves and hats etc with far more kudos than a gold card!
“On a grand scale this all involves Big Data, but for a ‘market of one’ it is the Meta Data that counts - that is where the opportunity and the $$$ reside”
All of this comes at a price of management and operational change! Embracing the new takes a positive mind and considerable energy in the face of day to day operations, but the workforce and the customer base is also changing fast with the old and old of mind being replaced by the young and young of mind. The tech savvy are on the move and making up an increasing proportion of society - and the trick is to leverage their knowledge and abilities at every level possible.
“Change is inevitable and accelerating - and you have to decide to be a driver or a victim”
This was my presentation during Future Learning Meetup in Warsaw. It covers emerging technologies like VR/AR/MR, AI, Data Analytics, BlockChain and their current and potential use in education. Many great examples and inspirations.
I've added slides with comments to make it understandable for people not attending the meeting.
The document discusses using wireless cameras and UPS batteries to monitor one's home in case of warrantless searches by law enforcement. It describes setting up an Internet-enabled wireless camera to send email alerts and video recordings. It also discusses using a UPS battery to potentially power the camera and network equipment for many hours if the power is cut off, in order to maintain surveillance of one's property without permission. The tone is somewhat tongue-in-cheek about "fighting crime" with these methods.
The digital revolution and the future 2012Bex Lewis
The document discusses the impact of digital technologies and social media on communication, information sharing, and social practices. It notes how the printing press first enabled widespread access to text and ideas. Similarly, mobile phones and the internet have transformed how people connect and access information globally. While technologies create new opportunities, they also introduce new constraints and can change social behaviors. The future may bring augmented reality, integrated devices as part of the "Internet of Things," and new forms of broadcast and social ministry online. Overall, the document reflects on both the fears and possibilities associated with digital transformation.
1. The document discusses the evolution of social media from its early beginnings to its current widespread global reach and integration across platforms.
2. It notes that social media is now the fourth most popular online activity and examines how organizations are using social media for marketing, communication, and influence.
3. The document suggests that future developments will include further integration across platforms and media, personalized experiences driven by social graphs and user data, and new forms of social search enabled by technologies like the semantic web.
In less than 20 years the Internet has evolved from an academic exercise of interconnected computers, to communication systems that redefine corporate communication. From a few thousand static web pages, to always-on on-demand multimedia news and entertainment channels. From providing simple discussion forums and chat rooms to a hugely popular web of experiences for real-time social interaction. So what comes next? Social media will infiltrate and enhance all of our personal and commercial, private and public endeavors faster than you think.
The document discusses how market research needs are evolving with advances in AI. It notes that all companies are becoming tech companies and research must move from reactive to proactive using tools like predictive analytics and anomaly detection. It outlines the different data sources, modalities, and skillsets needed. Key points are that research organizations need to externalize their domain expertise so machines can learn, develop capabilities across various data types, and create closed-loop data ecosystems that leverage existing knowledge and surface new insights. This involves building out centralized data lakes, modeling methods, and connecting elements into complex data products and solutions.
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
This training session covers safeguarding children online. It will include understanding the new online reality of social media and web 2.0, the risks children face online and how the internet can amplify vulnerabilities, and foster parents' responsibilities for prevention and response. The session aims to help participants feel more informed, equipped, inspired and empowered to protect children in their care from online threats. It will involve a hands-on demonstration of privacy tools and discussions of challenges, strategies and additional resources.
Personal and social media have become integrated into people's lives and shaped how they interact and participate. The main difference between traditional and personal/social media is digitization. Some controversies around these technologies include whether they encourage superficial thinking, affect social relations, and truly increase productivity. Guidelines for use include consciously managing information flow to avoid overload.
TXO & Komfo - AI: The good, the bad, and the ugly of AIKomfo
The good, the bad, and the ugly of AI - How do you meet the now frontier?
AI has already moved into many areas of business, society, and everyday life. But how do you embrace the now frontier in digital transformation and implement it in your organization? Grimur Fjeldsted, an expert in digital transformation and innovation management, is here to tackle the hard questions and give you a concrete view on the current AI landscape by uncovering all the key aspects.
In Agenda:
- Stay ahead of the AI curve with insights into the current state, future outlook, as well as the ethics of AI.
- Actionable tips into how to turn an allegedly disruptive technology into a major opportunity for business
- Insights into big data and social data integration for business
Location is an important factor that can be used to enhance experiences. It includes elements like physical place, proximity to others, time of day, surrounding context, and digital data about a person's movements. Experiences should celebrate location rather than view it as an obstacle. The most effective experiences consider multiple aspects of location and how they interact. The goal should be to create purposeful experiences that people will want to be a part of.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
The document summarizes a webinar on ethical hacking and cybersecurity. It introduces the speaker, Mohammed Adam, and his background. It then outlines the 5 stages of ethical hacking that will be covered: reconnaissance, scanning and enumeration, exploitation, post-exploitation, and clearing tracks. It focuses on the reconnaissance stage, explaining the concepts of open-source intelligence (OSINT) and different types of intelligence like human, geospatial, signals, and open-source intelligence. It provides examples of how OSINT is used in ethical hacking and penetration testing as well as examples of traditional and modern OSINT methods and tools.
This document discusses personal identity in online spaces and the importance of media literacy. It notes that people leave a "digital footprint" of everything they upload online, which is used by algorithms for advertising purposes. Over 80% of children under age 2 already have an online identity. The document advises users to check who can see their online content and why, as well as take steps like thinking before posting, checking facts with sites like Snopes, and remembering content can be taken out of context. Users are encouraged to contact the author with any other questions.
This document summarizes key trends and issues discussed at SXSW 2017. The top trends included mobile messaging continuing to evolve as a major marketing channel, the ongoing evolution of video consumption and creation, and virtual and augmented reality still being in the early adoption phase and facing challenges around cost and user experience. Other trends focused on connected digital lives, healthcare innovation, ethics around data use, voice interfaces, artificial intelligence, polarization in public discourse, and concerns about short-term thinking. The document encourages identifying major trends and innovating within those areas while also considering issues like data security, accountability, and serving audience needs with useful and exciting solutions.
The document provides information about using technology tools to enhance world language lessons. It discusses using tools like Poll Everywhere, QR codes, AudioBoo, Voicethread, Animoto, and interactive whiteboards to engage students, allow collaboration outside of class, and provide opportunities for critical thinking. Examples are given for classroom activities using these tools, such as scavenger hunts with QR codes and students introducing themselves in Voicethread.
THoMers Dennis, Inge, Laetitia, Pieter and Thomas attended Web Summit, the largest tech conference in the world, hosted in Lisbon, Portugal. Web Summit equals 22 conferences connecting different industries, from AutoTech and MoneyConf to SaaS Monster and Talk Robot. The keyword across all conferences? Artificial Intelligence!
What will leadership look like in the Age of the Web? A presentation at LeWeb 2008. (The original used lots of animations, so some of the slides look odd.)
This document provides an overview of conversational AI and discusses emerging technologies like general and narrow AI. It begins by discussing the evolution of chatbots and how most current AI chatbots work using data correlation rather than causation. It then distinguishes between narrow AI, which can perform repetitive tasks with limited abilities, and general AI, which does not currently exist but would have unlimited abilities and ability to self-program. The document outlines some examples of how companies are using machine learning and AI to improve business operations. It emphasizes the importance of transparency, explainability, security and predictability for practical narrow AI applications. Finally, it discusses the importance of digital identity and outlines statistics on the potential impacts of good digital identity systems.
This document provides an overview of conversational AI and discusses narrow artificial intelligence. It begins with background on industrial revolutions and the evolution of chatbots. It then explains how most AI chatbots work today and discusses the development behind them. It notes the difference between narrow AI, which performs repetitive tasks with limited abilities, and general AI, which can perform many tasks and self-program. The document outlines keys steps to practical narrow AI, including predictability, explainability, security and transparency. It discusses the importance of good digital identity and its role in facilitating interactions between individuals and institutions.
For millennia people have been travelling to stadia to watch and participate in spectacles of pure brutality and sport sponsored by kings, emperors, states, individuals. Today sport and other entertainment events have become a major global business sector with executive facilities, commercial sponsorship, broadcast and full media coverage. But, in many respects, the crowds and their experience has changed little. However, technology is impacting this situation and looks set to accelerate the rate of change.
In a similar manner to the airline business; the few pay around 80% of the costs, whilst the many fulfil the 20% or so. All the attention is lavished on the few and the many are neglected and remain a latent opportunity. The technologies of communication, networking, apps, Big and Meta Data can change all this by creating a ‘market of one’. Satisfying the needs of every individual and every group should be pursued as it leads to a world of new services and ‘pre-selling’.
The technological opportunities are endless with augmented reality able to furnish a view from every angle to mobile devices and wearables supported by real time details, data and statistics. Clouds and ‘networks without infrastructure’ can overcome the limitations of 3, 4, 5G and wifi systems that will never satisfy the need for growing customer connectivity and bandwidth. They can also help solve entry congestion and simultaneously support security and vending operations. Branded mobile devices with pre-loaded apps are also an obvious step towards the creation of ‘The Club’ identity and ‘belonging’ that goes way beyond the latest strip, scarves and hats etc with far more kudos than a gold card!
“On a grand scale this all involves Big Data, but for a ‘market of one’ it is the Meta Data that counts - that is where the opportunity and the $$$ reside”
All of this comes at a price of management and operational change! Embracing the new takes a positive mind and considerable energy in the face of day to day operations, but the workforce and the customer base is also changing fast with the old and old of mind being replaced by the young and young of mind. The tech savvy are on the move and making up an increasing proportion of society - and the trick is to leverage their knowledge and abilities at every level possible.
“Change is inevitable and accelerating - and you have to decide to be a driver or a victim”
This was my presentation during Future Learning Meetup in Warsaw. It covers emerging technologies like VR/AR/MR, AI, Data Analytics, BlockChain and their current and potential use in education. Many great examples and inspirations.
I've added slides with comments to make it understandable for people not attending the meeting.
The document discusses using wireless cameras and UPS batteries to monitor one's home in case of warrantless searches by law enforcement. It describes setting up an Internet-enabled wireless camera to send email alerts and video recordings. It also discusses using a UPS battery to potentially power the camera and network equipment for many hours if the power is cut off, in order to maintain surveillance of one's property without permission. The tone is somewhat tongue-in-cheek about "fighting crime" with these methods.
The digital revolution and the future 2012Bex Lewis
The document discusses the impact of digital technologies and social media on communication, information sharing, and social practices. It notes how the printing press first enabled widespread access to text and ideas. Similarly, mobile phones and the internet have transformed how people connect and access information globally. While technologies create new opportunities, they also introduce new constraints and can change social behaviors. The future may bring augmented reality, integrated devices as part of the "Internet of Things," and new forms of broadcast and social ministry online. Overall, the document reflects on both the fears and possibilities associated with digital transformation.
1. The document discusses the evolution of social media from its early beginnings to its current widespread global reach and integration across platforms.
2. It notes that social media is now the fourth most popular online activity and examines how organizations are using social media for marketing, communication, and influence.
3. The document suggests that future developments will include further integration across platforms and media, personalized experiences driven by social graphs and user data, and new forms of social search enabled by technologies like the semantic web.
In less than 20 years the Internet has evolved from an academic exercise of interconnected computers, to communication systems that redefine corporate communication. From a few thousand static web pages, to always-on on-demand multimedia news and entertainment channels. From providing simple discussion forums and chat rooms to a hugely popular web of experiences for real-time social interaction. So what comes next? Social media will infiltrate and enhance all of our personal and commercial, private and public endeavors faster than you think.
The document discusses how market research needs are evolving with advances in AI. It notes that all companies are becoming tech companies and research must move from reactive to proactive using tools like predictive analytics and anomaly detection. It outlines the different data sources, modalities, and skillsets needed. Key points are that research organizations need to externalize their domain expertise so machines can learn, develop capabilities across various data types, and create closed-loop data ecosystems that leverage existing knowledge and surface new insights. This involves building out centralized data lakes, modeling methods, and connecting elements into complex data products and solutions.
E safety training for foster carers by stephen carrick-davies jan 2013Stevecd
This training session covers safeguarding children online. It will include understanding the new online reality of social media and web 2.0, the risks children face online and how the internet can amplify vulnerabilities, and foster parents' responsibilities for prevention and response. The session aims to help participants feel more informed, equipped, inspired and empowered to protect children in their care from online threats. It will involve a hands-on demonstration of privacy tools and discussions of challenges, strategies and additional resources.
Personal and social media have become integrated into people's lives and shaped how they interact and participate. The main difference between traditional and personal/social media is digitization. Some controversies around these technologies include whether they encourage superficial thinking, affect social relations, and truly increase productivity. Guidelines for use include consciously managing information flow to avoid overload.
TXO & Komfo - AI: The good, the bad, and the ugly of AIKomfo
The good, the bad, and the ugly of AI - How do you meet the now frontier?
AI has already moved into many areas of business, society, and everyday life. But how do you embrace the now frontier in digital transformation and implement it in your organization? Grimur Fjeldsted, an expert in digital transformation and innovation management, is here to tackle the hard questions and give you a concrete view on the current AI landscape by uncovering all the key aspects.
In Agenda:
- Stay ahead of the AI curve with insights into the current state, future outlook, as well as the ethics of AI.
- Actionable tips into how to turn an allegedly disruptive technology into a major opportunity for business
- Insights into big data and social data integration for business
Location is an important factor that can be used to enhance experiences. It includes elements like physical place, proximity to others, time of day, surrounding context, and digital data about a person's movements. Experiences should celebrate location rather than view it as an obstacle. The most effective experiences consider multiple aspects of location and how they interact. The goal should be to create purposeful experiences that people will want to be a part of.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
3. The Future IS Upon Us… Voice
Recognition
Cloud
Mobility Big Data
Crowd-Sourcing
Social Business
Analytics
Customer Experience
Augmented Reality
…Get Ready!!!
4. Get Ready for Transparency
The future
President
of the United States
is on
Facebook
today
5. We Will Learn to Live with Transparency
Well documented life
Our work is traceable and often public
Personal information
Affiliations, memberships, accomplishments,
etc.
...even without Facebook!
9. The Advantages Must be Considered
Constant authentication with strong security
Data and devices
House, car
Medical records
Safety
Border crossing,
Restricted area access
No more Amber Alerts
Secure transactions
NFC-authorized purchases
12. Abstinence is Not a Solution
Identity theft
You’ll be rated, like it or not
Gaps in history
Peer vouching
You really might be left behind