A more strategic, high-level version of my normally more technical mobile apps talk. Slides themselves are pretty sparse, so check out the speaker notes for more detail.
Overview of scanable codes used in B2B and B2C solutions. Brief descriptions of codes ability to launch users into internet applications. Warnings for B2b implementation.Contact maestro for more info.
Overview of scanable codes used in B2B and B2C solutions. Brief descriptions of codes ability to launch users into internet applications. Warnings for B2b implementation.Contact maestro for more info.
Road to mobile w/ Sinatra, jQuery Mobile, Spine.js and MustacheBrian Sam-Bodden
Ruby is powerful server-side language with great collection of libraries and frameworks but to create a full mobile offering, Ruby developers need to become masters of many a craft. In this talk we'll walk through the design and development of a full stack HTML5 mobile application using Sinatra to create a robust RESTful API, Spine.js to bring MVC order to the client and jQuery Mobile to style and structure the application for the mobile world.
Mobile is for business. Every firm with a web app must now consider the visibility and sales they are losing by not having a mobile version. Every new business or software product is faced with this same concern. Responsive design only gets us so far before it’s time to build a native app for several platforms. How do we build business apps for Android, iOS, and Windows phones and tablets? Learn about the key considerations when scaling up your company’s mobile presence.
Mobile Applications Development - Lecture 6
Native apps - Web apps - Hybrid apps
Making money with apps
This presentation has been developed in the context of the Mobile Applications Development course at the Computer Science Department of the University of L’Aquila (Italy).
http://www.di.univaq.it/malavolta
You'll find everything you need to know here, from the latest technology and best practice, to surprising statistics.
Mobile marketing is big news for B2B. We've all got around-the-clock internet access at our fingertips now. We can check emails, browse websites and book meetings - at work, at home or on the move. Consequently, PC is no longer the principal business tool. Indeed 70% of today's under-40s consider mobile their primary communication tool. What's more, mobile internet access has overtaken desktop internet access.
Native apps are great, but if you want your app to reach as many people as possible, HTML5 is your ticket. In this session, we'll explore the different ways HTML5 can be used to build and deploy mobile apps, as well as the tools that can make the job easier.
WITI Summit 2013 Mobile Technology Trends & StrategyAmanda McConnell
The complete presentation from the Mobile Technology & Strategy Workshop at the 2013 Women in Technology Summit. Includes slides from Bess Ho and Amanda McConnell.
Hourly billing metastasizes to every area of an expertise-based service business: company culture, service design, employee incentives, and more. If you recognize that hourly billing is killing your firm but don't know how to eradicate it, this session will give you strategies to get on the road to recovery.
Road to mobile w/ Sinatra, jQuery Mobile, Spine.js and MustacheBrian Sam-Bodden
Ruby is powerful server-side language with great collection of libraries and frameworks but to create a full mobile offering, Ruby developers need to become masters of many a craft. In this talk we'll walk through the design and development of a full stack HTML5 mobile application using Sinatra to create a robust RESTful API, Spine.js to bring MVC order to the client and jQuery Mobile to style and structure the application for the mobile world.
Mobile is for business. Every firm with a web app must now consider the visibility and sales they are losing by not having a mobile version. Every new business or software product is faced with this same concern. Responsive design only gets us so far before it’s time to build a native app for several platforms. How do we build business apps for Android, iOS, and Windows phones and tablets? Learn about the key considerations when scaling up your company’s mobile presence.
Mobile Applications Development - Lecture 6
Native apps - Web apps - Hybrid apps
Making money with apps
This presentation has been developed in the context of the Mobile Applications Development course at the Computer Science Department of the University of L’Aquila (Italy).
http://www.di.univaq.it/malavolta
You'll find everything you need to know here, from the latest technology and best practice, to surprising statistics.
Mobile marketing is big news for B2B. We've all got around-the-clock internet access at our fingertips now. We can check emails, browse websites and book meetings - at work, at home or on the move. Consequently, PC is no longer the principal business tool. Indeed 70% of today's under-40s consider mobile their primary communication tool. What's more, mobile internet access has overtaken desktop internet access.
Native apps are great, but if you want your app to reach as many people as possible, HTML5 is your ticket. In this session, we'll explore the different ways HTML5 can be used to build and deploy mobile apps, as well as the tools that can make the job easier.
WITI Summit 2013 Mobile Technology Trends & StrategyAmanda McConnell
The complete presentation from the Mobile Technology & Strategy Workshop at the 2013 Women in Technology Summit. Includes slides from Bess Ho and Amanda McConnell.
Hourly billing metastasizes to every area of an expertise-based service business: company culture, service design, employee incentives, and more. If you recognize that hourly billing is killing your firm but don't know how to eradicate it, this session will give you strategies to get on the road to recovery.
Are You Caught In The Hourly Trap?
https://www.crowdcast.io/e/jstark6
Ask yourself:
- Would your clients head for the hills if you doubled your hourly rate?
- Has a client ever asked you to explain why a task "took so long"?
- Do your projects often end up costing more than you estimated?
- Have you ever had to eat hours on a project?
- Have you ever had a client refuse to send your last payment?
- Has anyone ever been fired because your project went horribly wrong?
If you answered Yes to any (or all!) of these questions, you should check out this talk.
What You'll Learn:
- The only three numbers that matter when quoting a project
- The four project ROI models (and which is the good one!)
- How hourly billing artificially limits your income
- The simple math that can 10x your profits
How To Write Proposals That Close Without Lowering Your PricesJonathan Stark
How To Write Proposals That Close Without Lowering Your Prices
https://www.crowdcast.io/e/jstark3
Do you spend too many hours writing proposals, only to have them fall through after endless negotiations? You’re not alone – and you can do something about it.
In this talk, Jonathan will explain step-by-step how to significantly increase your odds of having your proposals accepted without question - and without lowering your prices.
Do you spend too many hours writing proposals, only to have them fall through after endless negotiations? You’re not alone – and you can do something about it.
In this talk, Jonathan will explain step-by-step how to significantly increase your odds of having your proposals accepted without question - and without lowering your prices.
How To Increase Your Income Without Hiring Junior DevelopersJonathan Stark
How To Increase Your Income Without Hiring Junior Developers
https://www.crowdcast.io/e/jstark1
If you’re like most freelancers, solo consultants, or boutique firm owners, you bill yourself out on an hourly basis. This is a terrible practice and is bad for everyone involved. It holds your business back, damages your client relationships, and prevents you from doing your best work. In this talk, Jonathan will explain why these things are true, he’ll describe an alternative method called value pricing, and will give you a few ways to transition your business from hourly billing to value pricing.
In this talk, you’ll learn:
* How hourly billing limits the growth of your business
* How hourly billing damages your relationships with clients
* How value pricing works
* How value pricing differs from hourly billing
* How value pricing differs from fixed bids
* How to transition from hourly billing to value pricing
Thinking Outside The Little Black Box: Interaction Design in The Post-Mobile EraJonathan Stark
It will soon be economically feasible to put chips, sensors, actuators, and radios into a wide range of previously “dumb” everyday items. The resulting explosion of connected objects will have profound effects on art, culture, and design.
Decades of designing and developing for the distributed architecture of the web has uniquely positioned web professionals to thrive the connected future that is fast approaching.
Please join Jonathan for an eye-opening look at the challenges and opportunities that will be created for web professionals in the post-mobile computing era.
1. Likely winners —and losers— in the coming networked society
2. How to transition web skills to broader application space
3. What the web might look like in 3D virtual space
4. Approaches to designing front-ends for screenless devices
5. Implications of extending back-end code into physical space
The Path To Value Pricing: How to Remove Your Self-Imposed Income Limits
If you’re like most consultants, you bill yourself out on an hourly basis. This process effectively devalues your services and puts a cap on your income. In this session, Jonathan talks about how hourly billing holds your business back, prevents you from doing your best work, and can even damage your relationships with clients. Jonathan will describe an alternative method called value pricing and will give you a few ways to transition your business from hourly billing to value pricing.
No one likes the idea of being pigeonholed by others. Pigeonholing yourself, on the other hand, is one of the best things you can do for your business. Follow along as Jonathan teaches attendees how to create a laser-focused positioning statement and how to use that statement to attract better clients, close more deals, and ultimately make more money.
The Revolution Will Not Be Televised: Managing Content and Experience in the ...Jonathan Stark
Mobile computing as we know it today is just one application of wireless technology, and a fairly limited one at that. The iPhone - perhaps the most advanced piece of consumer electronics ever created - is going to look like a fax machine compared to what's coming. Mobile is a warning shot - the coming wireless wave will profoundly change every aspect of society and potentially redefine what it means to be human. Please join mobile consultant Jonathan Stark for a look at the past, present, and future - and what we can do to prepare for the revolution.
No one likes the idea of being pigeonholed by others. Pigeonholing yourself, on the other hand, is one of the best things you can do for your business. Follow along as Jonathan teaches attendees how to create a laser-focused positioning statement and how to use that statement to attract better clients, close more deals, and ultimately make more money.
Mobile computing as we know it today is just one application of wireless technology, and a fairly limited one at that. The iPhone - perhaps the most advanced piece of consumer electronics ever created - is going to look like a fax machine compared to what's coming. Mobile is a warning shot - the coming wireless wave will profoundly change every aspect of society and potentially redefine what it means to be human. Please join Jonathan for a look at the past, present, and future - and what we can do to prepare for the revolution.
Free Coffee, Bad Apples, and the Future of CurrencyJonathan Stark
What would happen if the entire world could share a single Starbucks card? For a week in the summer of 2011, Jonathan's Card attracted international attention attempting to find out.
Join Jonathan for a behind the scenes look at how it worked, what actually happened, and the long term implications of an experiment in radical sharing of physical goods using digital currency on mobile phones.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
20. Future of Mobile
• Unprecedented fragmentation
• Thin clients accessing cloud services
• Real-time data
Editor's Notes
Hi I’m Jonathan Stark and I am obsessed with mobile computing :)
Probably stating the obvious, but I want to start with the big picture. Mobile is huge and its growth is accelerating:
- Cell phone subscriptions to hit 5 billion on 2010
- 15% of phones sold in 2009 were smart phones
- 56% of public Wi‑Fi connections in 2009 were from mobile devices
What’s significant about this is that in our lifetimes we’re going from virtually no one having access to information, to virtually everyone having access to the biggest repository of human knowledge that has ever existed.
As Google CEO Eric Schmidt says, “this is an enormous achievement for humanity.”
Unless you’re a telco or handset manufacturer, your entry point into the mobile space is apps.
There are three types of mobile apps that I think will remain relevant for a long time:
- Native apps (e.g. WebEx, SalesForce)
- Web apps (e.g. Gmail, Google Calendar)
- Command line apps (e.g. Google SMS, Twitter, Aardvark)
Developers love endlessly debating the pros and cons of each of these approaches, but ultimately, each has one glaring achilles heel.
The right one for you depends on your situation:
- Selling iPhone cases in U.S.? Native app
- Selling office supplies in North America? Web app
- Providing banking services in rural China? SMS app
I typically work with corporate clients who are trying to reach a really broad market with their apps. They want to be on iPhone, Android, and Blackberry at least.
- Platform is easy to learn, most orgs have web talent in house already.
- Web is a proven, stabile platform that works reasonably well across the widest range of devices.
- Host your app and email out the links.
- No approval process, no multiple app stores, no delay on bug fixes.
BOTTOM LINE:
It’s easier to produce quality content and services for the largest available market with web apps.
I want to drill down on a native vs web for a second because I know that there is a lot of confusion there.
Point out that web apps can run 100% offline using HTML5.
Actually, you don’t have to really pick between native and web. Single code base that can be deployed as a standalone web app AND deployed with addition functionality through the various app stores.
I think this is the most pragmatic development approach. If nothing else, it’s the most flexible. And the way things are growing at this point, flexibility is of the utmost importance.
Regardless of the development approach you take, you need to make a useful app.
Mobile apps must be:
- Fast: Useful in line at the ATM
- Launch fast
- Save state on quit
- Very responsive; lots of feedback
- Mirrors in the elevator story: The problem isn’t that your app is slow; the problem is that *people think* your app is slow. Solution is to make them think it’s fast, one way or another.
- Simple: Be laser focused on primary use case
- Tell the “large american office supply store RPF” story
- Smart: Leverage sensor data and personal info
- Basically a subset of Fast
- User input options are still pretty bad; try to minimize need for manual input
If you love your UI, set it free :)
Device fragmentation is necessitating custom interfaces. It doesn’t make sense to render content and services the same way on a phone, a tablet, a laptop, etc.
Not only are the form factors significantly different, but the context in which these devices are used varies widely.
Why is sync bad?
- It’s expensive to write
- It implies “occasional”
- There is no “expected behavior”
You need to be thinking real-time, all the time.
I am NOT a security expert, but I do want to call out some concerns specific to mobile computing.
It’s highly unlikely that one of your employees is going to accidentally leave his PC in a bar one night. As Steve Jobs knows all too well, the same is not true for mobile computing devices ;)
Despite their small size, the data on a smartphone is intensely sensitive. Gaining access to someone’s smartphone allows a hacker to easily impersonate you.
Think about what a hacker could do with access to your email account - it’s chilling.
Of course, this isn’t a security concern that is limited to mobile, but there are two things that exacerbate the issue:
- Phone is easier to lose than desktop
- Passwords are more annoying on phone than desktop
Side note on iPad not supporting multiple user accounts.
We are going to be inundated with internet-enabled, touchscreen interfaces of all shapes and sizes.
Clients will be thin and the heavy lifting will be done in the cloud.
Real-time, all the time.