A look at how our society has evolved to the point where we don't just use technology and social media- we need it. (Film 260 Flipbook Assignment, May 2013)
Ethics in social media - targeted to journalists, but applicable to students and professionals. This was done as a "quiz" to promote discussion - presenter should show the first slide and ask the question - then show the answer on the next slide.
An examination of three traits encouraged by social networks--narcissism, insecurity, and isolation--that lead to negative behaviours among users and, ultimately, unhappiness.
How Much Does Technology Enhance Learning?Anthony Kripps
The pedagogical value of technology-enhanced instruction lies more in its ability to increase the quantity of learner output in the target language rather than the quality, depending upon the skill.
Ethics in social media - targeted to journalists, but applicable to students and professionals. This was done as a "quiz" to promote discussion - presenter should show the first slide and ask the question - then show the answer on the next slide.
An examination of three traits encouraged by social networks--narcissism, insecurity, and isolation--that lead to negative behaviours among users and, ultimately, unhappiness.
How Much Does Technology Enhance Learning?Anthony Kripps
The pedagogical value of technology-enhanced instruction lies more in its ability to increase the quantity of learner output in the target language rather than the quality, depending upon the skill.
An essay about Marie Winn's essay "Television Addiction." I had to put my opinion on whether she is correct or incorrect in saying that Television is a harmful addiction like Drugs and Alcohol.
Using Social Media in Substance Abuse Treatment and RecoveryJennifer Iacovelli
Using Social Media in Substance Abuse Treatment & Recovery was presented at the New England School of Best Practices in Addiction Treatment on September 15, 2011 in Waterville, New Hampshire by Jennifer Barbour of Another Jennifer Writing Lab.
When Twitter, LinkedIn and Facebook aren't enough. Gaining Competitive advant...Rockstar Group
Leveraging enterprise social networking to drive revenue, increase productivity, innovate faster, onboard faster, and do more with fewer people - make everyone as good as your best!
Vietnam Apparel and Clothing - Brand and DesignersJoern Nielsen
Vietnam Fashion Clothing. Vietnamese Apparel and Clothing - Brand and Designers. http://www.asiafashionclothing.com/asia-fashion/vietnam-apparel-clothing-brand-designers/
Vietnamese Garments, Apparel Brands and Designers Online Shopping. Learn about the fashion, apparel and textile industry in Vietnam. Please click on any image or link in the presentation to reach our website. (from slide number 4). Or copy and paste the link http://www.asiafashionclothing.com/asia-fashion/vietnam-apparel-clothing-brand-designers/ to reach our site (Thanks)
Using Social Media in Substance Abuse Prevention, Treatment and RecoveryJennifer Iacovelli
Using Social Media in Substance Abuse Prevention, Treatment and Recovery was presented by Jennifer Barbour of another jennifer writing lab on June 18, 2012 at the New England School of Addiction and Prevention Studies.
Week 4 Mini LectureThis week, you will be studying about the pot.docxcockekeshia
Week 4 Mini Lecture
This week, you will be studying about the potential psychological impact of social media. Specifically, you will be learning about persuasion and influence through advertisements and acts of violence on social media. The article below speaks, in a very “real world” way to the psychological impact of social media. I hope you enjoy it.
Enjoy this article by Hannah Schacter on Psychology in Action – Retrieved from https://www.psychologyinaction.org/psychology-in-action-1/2015/09/07/me-myselfie-and-i-the-psychological-impact-of-social-media-activity
Me, Myselfie, and I: The Psychological Impact of Social Media Activity
Not too long ago, I relentlessly teased my 21-year-old sister when she revealed her strategies for achieving maximal positive feedback on Facebook photos. There were timing basics—don’t post on Friday or Saturday nights because no one is checking. She also recommended sensitivity to time zones so as to avoid an entire coast being asleep when your picture is posted. There was even attention to Facebook’s sharing algorithms. Rather than posting and tagging other people in the photo simultaneously, it was wise to wait on the tagging. That way, once several hours had passed and the photo filtered into the depths of everyone’s news feeds, a new tag would prompt it to resurface front and center, in turn receiving a fresh wave of "likes". And wait, there's more--after almost 10 years on the site, she could even report back to me her most liked Facebook post ever. It all sounded…ridiculous. I chalked it all up to our (whopping) three-year age difference—kids these days and their all-consuming social media obsessions. Back when I was in college…
And then several months later I sent my sister the most shameful text message of all time (for the record, I was only allowed to publish Emily Schacter’s Facebook Strategy Tell-All under the condition that I owned up to my own social media low-point). One morning last month, I posted what I thought to be quite an entertaining picture on Facebook. But, to my surprise, twenty minutes passed by and I had zero likes on the photo. Forty minutes, still nothing. Maybe I accidentally posted it with extra privacy restrictions? Nope. An hour. And still, even my two most loyal Facebook like-ers (I’m looking at you, Mom and Dad) hadn’t given my picture some love. Desperation took over.
I had cracked, and in doing so I lost my privileges to ever mock Emily for her Facebook posting habits again. Why in the world did I care so much about an un-liked photo? Was it really a lack of likes, rather than the four hours a week I dedicate to watching Bachelor in Paradise, that I was concerned made me look like a loser? When and how did Facebook likes become such a valuable social currency? For better or for worse, I am hardly alone in my experience. Recent research has documented how technology, and social networking sites (SNS; e.g., Facebook, Instagram) in particular, have given rise to a grow.
A brief insight from a Queen's University FILM260 student about how human interaction is affected every day by technologies such as texting and facebook.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
The iHigh: Recognizing the Emerging Addiction Our World Has to Technology
1. Photo via Flickr commons by philcampbell
The iHIgh:
Recognizing
the
emerging
addiction
our world
has to
technology
By: Meghan
Froebelius
2. One reason people use Facebook, Twitter, and
other social networking websites regularly is
“because of an addiction to endorphins released
in the body during the process of posting.”
Photo via Flickr commons by
idovermani Source: Anthony Carpio, Social Networking Sites Creates High for Users
3. Photo via Flickr commons by west.m
Every notification
could mean
something exciting.
This results in a hit
of dopamine. Source: Facebook Psychology: Is Addiction
Affecting Our Minds? (Infographic) presented by Best Masters in Psychology
4. “Each ‘hit’ feeds our social
media addiction.”
Photo via Flickr commons by west.m
Source: Facebook Psychology: Is Addiction
Affecting Our Minds? (Infographic) presented by Best Masters in Psychology
5. The chemicals give
us a feeling of
REWARD that
rushes through
the brain and body
with every
notification.This
reward becomes
something we
CRAVE.
Photo via Flickr commons by LawPrieR
Source: Anthony Carpio, Social Networking Sites Creates High for Users
6. Repeatedly checking social media creates an
addiction similar to using coke, meth, or other
abusive substances.This creates
the iHigh.
Photo via Flickr commons by Steve Snodgrass
7. Actually, Internet
Addiction Disorder (IAD)
is now an accepted
psychological diagnosis in
China, Taiwan, and South
Korea.
Source: Lorenzo Franceschi-Bicchierai, How is Facebook Addiction Affecting Our Minds? Photo via Flickr commons by perpetualplum
8. America will follow in 2013.
Photo via Flickr commons by Steve Snodgrass Source: Lorenzo Franceschi-Bicchierai, How is Facebook Addiction Affecting Our Minds?
9. Someone with IAD will be
constantly preoccupied with
the internet and will have an
increasingly higher tolerance
against the ‘high’.
Photo via Flickr commons by kamshots Source: Alice G. Walton, Internet Addiction: The New Mental Disorder?
10. Source: Alice G. Walton, Internet Addiction: The New Mental Disorder?
They will also use the internet to
boost their mood.
Photo via Flickr commons by Johan Larsson
11. Some “argue that their
dependence is
actually beneficial,
since it lets them be more
productive professionally.”
Being constantly
connected lets you
respond quickly to things
such as “work emails,
making you a more
valuable employee
than your non-addicted
colleague.”
Source: Alice G. Walton, Internet Addiction: The New Mental Disorder?Photo via Flickr commons by sean_hickin
12. But a chemical reaction isn’t the only reason
for an online addiction.
Photo via Flickr commons by katerha
13. One reason for
online indulgence is
because of the need for
VALIDATION
in our lives.
Photo via Flickr commons by Denis Dervisevic
14. Photo via Flickr commons by owenwbrown
“The world of social media has allowed platforms like
Facebook and Twitter to play on the HUMAN NEED for
reinforcement and validation. It’s game mechanics for
“Likes” and “Comments” are those bits of validation.”
-Hessie Jones
Source: Hessie Jones, Teaching Our Kids Not to Treat the Internet as a Private Diary
15. “I like ... my voice being heard
somewhere where people care, so I make it
heard in an environment with users who will ...
read what I have to say solely out of interest.
Doing so brings me ... joy, that people care
or agree with the things I say, that I really
can’t get anywhere else.”
-Anonymous Internet User
Photo via Flickr commons by Johan Larsson Source: Jami Oetting, Smells Like Teen Spirit: Schooling Marketers on Tumblr
16. But, regardless of the
reason for it, like any
addiction the iHigh will
eventually have negative
repercussions.
Photo via Flickr commons from OSU Special Collections
17. “I get that kids need validation but this world of social has
created an environment that eventually strings them
along a path to a point where the very information they
created can be their greatest demise.”
-Hessie Jones
Photo via Flickr commons by Patrick Feller
Source: Hessie Jones, Teaching Our Kids Not to Treat the Internet as a Private Diary
18. Source: Facebook Psychology: Is Addiction
Affecting Our Minds? (Infographic) presented by Best Masters in Psychology
“Internet
addicts
have
10-20%
smaller
brain areas
responsible for
speech,
memory,
motor
control,
emotion,
sensory, and
other
information.”
Photo via Flickr commons by auxesis
19. The more connected we become with our
virtual reality, the less connected we
become to our actual reality.
Photo via Flickr commons by Susan NYC
20. “The problem is that
internet is too
much a part of
business, society,
and education to
quit cold turkey
for most people.”
Photo via Flickr commons by Johan Larsson
Source: Facebook Psychology: Is Addiction Affecting Our Minds? (Infographic)
presented by Best Masters in Psychology
21. We need to start educating about the reality of this addiction
and start preaching how just like most things,
TECHNOLOGY IS BEST USED IN MODERATION.
Photo via Flickr commons by betsyweber
22. “When it starts to intrude
on your overall well-being,
or sanity, or it takes
precedence over time
with your kids or
spouse, then it
might be time to
CUT BACK.”
Photo via Flickr by Giuseppe BognanniSource: Alice G. Walton, Internet Addiction: The New Mental Disorder?
-Alice G.Walton
23. Articles & Images Sourced
(Slideshow made May 17, 2013)
Anthony Carpio, Social Networking Sites Creates High for Users http://
sundial.csun.edu/2011/08/social-networking-sites-creates-high-for-users/
Alice G. Walton, Internet Addiction: The New Mental Disorder? http://
www.forbes.com/sites/alicegwalton/2012/10/02/the-new-mental-health-disorder-internet-
addiction/
Hessie Jones, Teaching Our Kids Not to Treat the Internet as a Private
Diary http://www.huffingtonpost.ca/hessie-jones/teens-oversharing-
internet_b_2923694.html
Jami Oetting, Smells Like Teen Spirit: Schooling Marketers on Tumblr
http://www.agencypost.com/smells-like-teen-spirit-schooling-marketers-on-tumblr/
Facebook Psychology: Is Addiction Affecting Our Minds? (Infographic)
presented by Best Masters in Psychology http://mashable.com/2012/11/03/
facebook-addiction/
All images sourced via Flickr Creative Commons and have an Attributions license