This document outlines the aims and objectives of a presentation on the network economy. It discusses key concepts like managerial capitalism, distributed capitalism, co-creation, and how the basic rules of business have changed from the industrial to the network economy. Examples are provided for many of the "new rules" of the network economy as outlined by Kevin Kelly, including embracing the swarm, plentitude, exponential value, tipping points, and inverse pricing. The document concludes by considering future scenarios for how significant these changes to the economy may be.
Blizzard Entertainment demonstrates key aspects of the network economy through their massively multiplayer online role-playing game World of Warcraft. Blizzard has over 11 million subscribers globally who are connected through an online network. By integrating third-party websites, games, and other affiliated products and communities, Blizzard expands its network to increase its economic value according to principles of the network economy. Blizzard's network-based model allows it to meet increasing demand through scalability and provides access to cultural experiences rather than ownership of physical products.
The Culture of Brand by Kevin Kelly @ BigBuzz for the Social Media AssocKevin Kelly
The Culture of Brand was presented by Kevin Kelly from BigBuzz and the slides have much left out that were part of the verbal presentation, but Kevin Kelly speaks often and can be reached at kevin@bigbuzz.com or bigbuzz.com re: speaking on the culture of brand and bigbuzz culture design, and digital marketing services.
The document discusses how the network economy has shifted focus from manufacturing to leveraging networks and information. It describes rules of the network economy including continuous innovation and bringing new products to market quickly. It then discusses how Google understands how to monetize internet traffic through targeted advertising, using services like search, YouTube, and applications to learn about user behavior and provide ads. Google aims to become the leading platform for social data and monetize that through network effects and applications that externalize tasks to users.
This document discusses potential future revenue sources for telecommunications companies (telcos) in 2012. It identifies several key decision elements that will define the market, including customer preferences, macroeconomic conditions, regulation, and technology. These elements are interrelated and will influence revenue trends, with a focus shifting from network infrastructure to services at the network edge. The document also analyzes Cisco scenarios for 2012, with telcos focusing on reducing costs through measures like infrastructure sharing while pursuing new revenue from services enabled by technology improvements.
Dimensions of Innovation in EntrepreneurshipChris Evdemon
This document discusses key aspects of innovation and entrepreneurship. It begins by defining three types of innovation: product innovation, process innovation, and business model innovation. Examples are provided for each type. The document then profiles three innovative startups as examples - ECitySky demonstrating product innovation, ECDL Hellas demonstrating process innovation, and Ethos Technologies demonstrating a innovative business model. The final sections discuss principles of preparation for starting a new business, including considering the 5P's - people, product, process, promotion, and profit/funding. Preparation involves strategic planning, understanding the market and customers, developing a business model, and practicing fundraising pitches.
Ian Jindal: Presentation to the "Future of Digital Marketing", June 2008Ian Jindal
My presentation to the e-Consultancy.com FODM conference (http://www.e-consultancy.com/fodm/). See my blog post for more information on references, sites and citations (http://www.innoparticularorder.com/?p=334).
My presentation at Mindtrek 2007 in Tampere. Thanks to many contributors here, especially great thanks to Austria. Amazing how professionals can connect via their slides and thinking through these.
Techies are from Venus, Salespeople are from Mars: Strategies for effective c...MaRS Discovery District
1) Lance Laking presented strategies for improving communication between technical and sales teams at BTI Photonics, a startup that develops optical networking equipment.
2) He emphasized the importance of open communication, sharing customer feedback, rewarding collaboration, and organizing social events to build camaraderie between different departments.
3) Laking also stressed setting clear objectives, transparent compensation, and incentives to motivate all employees and align their efforts with the company's goals.
Blizzard Entertainment demonstrates key aspects of the network economy through their massively multiplayer online role-playing game World of Warcraft. Blizzard has over 11 million subscribers globally who are connected through an online network. By integrating third-party websites, games, and other affiliated products and communities, Blizzard expands its network to increase its economic value according to principles of the network economy. Blizzard's network-based model allows it to meet increasing demand through scalability and provides access to cultural experiences rather than ownership of physical products.
The Culture of Brand by Kevin Kelly @ BigBuzz for the Social Media AssocKevin Kelly
The Culture of Brand was presented by Kevin Kelly from BigBuzz and the slides have much left out that were part of the verbal presentation, but Kevin Kelly speaks often and can be reached at kevin@bigbuzz.com or bigbuzz.com re: speaking on the culture of brand and bigbuzz culture design, and digital marketing services.
The document discusses how the network economy has shifted focus from manufacturing to leveraging networks and information. It describes rules of the network economy including continuous innovation and bringing new products to market quickly. It then discusses how Google understands how to monetize internet traffic through targeted advertising, using services like search, YouTube, and applications to learn about user behavior and provide ads. Google aims to become the leading platform for social data and monetize that through network effects and applications that externalize tasks to users.
This document discusses potential future revenue sources for telecommunications companies (telcos) in 2012. It identifies several key decision elements that will define the market, including customer preferences, macroeconomic conditions, regulation, and technology. These elements are interrelated and will influence revenue trends, with a focus shifting from network infrastructure to services at the network edge. The document also analyzes Cisco scenarios for 2012, with telcos focusing on reducing costs through measures like infrastructure sharing while pursuing new revenue from services enabled by technology improvements.
Dimensions of Innovation in EntrepreneurshipChris Evdemon
This document discusses key aspects of innovation and entrepreneurship. It begins by defining three types of innovation: product innovation, process innovation, and business model innovation. Examples are provided for each type. The document then profiles three innovative startups as examples - ECitySky demonstrating product innovation, ECDL Hellas demonstrating process innovation, and Ethos Technologies demonstrating a innovative business model. The final sections discuss principles of preparation for starting a new business, including considering the 5P's - people, product, process, promotion, and profit/funding. Preparation involves strategic planning, understanding the market and customers, developing a business model, and practicing fundraising pitches.
Ian Jindal: Presentation to the "Future of Digital Marketing", June 2008Ian Jindal
My presentation to the e-Consultancy.com FODM conference (http://www.e-consultancy.com/fodm/). See my blog post for more information on references, sites and citations (http://www.innoparticularorder.com/?p=334).
My presentation at Mindtrek 2007 in Tampere. Thanks to many contributors here, especially great thanks to Austria. Amazing how professionals can connect via their slides and thinking through these.
Techies are from Venus, Salespeople are from Mars: Strategies for effective c...MaRS Discovery District
1) Lance Laking presented strategies for improving communication between technical and sales teams at BTI Photonics, a startup that develops optical networking equipment.
2) He emphasized the importance of open communication, sharing customer feedback, rewarding collaboration, and organizing social events to build camaraderie between different departments.
3) Laking also stressed setting clear objectives, transparent compensation, and incentives to motivate all employees and align their efforts with the company's goals.
The document discusses customer-centric business model innovation. It provides the speaker's background in marketing and sales from 1990 to 2003 in traditional roles, and from 2004 to present in business model transformation. It includes a quote about how half of marketing dollars being wasted and not knowing which half, as well as discussing Russ Ackoff's perspective on business models having three layers and three dimensions.
George Buckley, Chairman, President and CEO of 3M Company, will present at the 2008 3M Investor Conference. The presentation will discuss maintaining 3M's long-term business objectives of sales and earnings growth. It will provide overviews of 3M's core businesses and strategies to drive growth, including growing the current core business, complementary acquisitions, and building new businesses with a focus on international expansion. Examples will be given of revitalizing core businesses in areas like occupational health and safety.
GDC '09: Creating Value for Video Game CompaniesMitch Lasky
The document discusses key factors that affect the valuation of video game companies, including:
1) The three main valuation events are raising private money, going public, and selling the company.
2) Valuation methods like discounted cash flow and comparable company analyses are important.
3) Strategic considerations like a company's market position, intellectual property, and growth potential significantly impact valuation.
Robin Wilton gave a keynote presentation on information security and privacy in a recovering economy. He discussed Future Identity's stakeholder engagement strategy and how policymakers, adopters, and regulators must work together. While it is cheaper to share data than protect privacy, current economic conditions may shift this balance as cost-cutting incentives privacy protections. Practical governance measures are needed to ensure privacy as technologies and policies develop. Many problems around identity assurance and privacy management remain to be addressed.
Randomness, the new naturalism and the new altruismHaydn Shaughnessy
The document discusses how brands need to adapt to an age of customer empowerment driven by new trends. It summarizes key trends like the new naturalism, randomness, new altruism, democratization, and individualization that are empowering customers. It outlines response strategies for brands like consumer brand advocacy, positioning the brand as a movement, facilitating peering markets, enabling product configuration, and allowing for customer-managed vendors. The document argues that brands need to embrace openness, understand diverse customer motivations, plan for different market models, disaggregate their brand identity, and reverse their data culture to adapt to rising customer empowerment.
This document discusses common investment challenges such as randomness of returns, picking winning stocks, timing the market, picking active managers, and the costs of indexing. It then outlines an investment approach focused on strategic partnerships with institutional managers, academically sound portfolio construction, keeping costs low, and HonorVise portfolios. Key points include reviewing evidence that stock returns are random, individual stock picking is difficult, market timing rarely works, and costs are lower with index funds. The approach focuses on dimensions of expected returns including size, value, and market factors.
TXU's fundamental business strategy is to transform into an industrial energy company focused on delivering top quartile financial performance across its three structurally advantaged businesses: generation, transmission & distribution, and retail. TXU has significant exposure to natural gas prices and heat rates due to its large baseload coal generation fleet, but this exposure is partially offset by its integrated retail business. TXU sees opportunities for mid and long term growth by improving operational excellence, implementing performance management, and optimizing its risk/return profile.
TXU's fundamental business strategy is to transform into an industrial energy company focused on delivering top quartile financial performance across its three structurally advantaged businesses: generation, transmission & distribution, and retail.
TXU has significant exposure to natural gas prices and heat rates due to its large baseload coal generation fleet, which produces power at a lower marginal cost than gas plants. However, the integration of its generation and retail businesses helps reduce volatility as the businesses' margins move in opposite directions with changing gas prices.
In the mid to long term, TXU aims to continue improving operational excellence across its businesses to enhance financial performance and total returns for shareholders.
1. The document discusses the economics of cloud computing and how cloud represents both a technological and economic shift compared to traditional computing models like mainframes and client-server architectures.
2. Cloud benefits from strong economies of scale in areas like data center costs, server utilization, and multi-tenancy. Larger cloud providers have significantly lower costs per server.
3. Over time, more organizations will shift workloads to public clouds due to the advantages of scale, lower costs, and flexibility compared to private clouds or on-premises infrastructure.
Enterprise in the Cloud, the Emergence of Anywhere ITYankee Group
The information communications and technology (ICT) marketplace is on the verge of its most significant transformation yet and is poised to hit the $4 trillion mark worldwide by 2016. This transformation is shifting IT complexity into the network cloud, making it possible for the corporate experience to more closely reflect the consumer experience.
Yankee Group predicts that Anywhere IT will change the way people work, and dramatically reshape the enterprise vendor landscape. Even amid the current economic turmoil, Yankee Group analysts advise organizations to begin exploiting Anywhere IT now or risk losing a competitive edge.
Yankee Group analysts Sheryl Kingstone and Zeus Kerravala present how Anywhere IT is energizing the enterprise as services move to the non-traditional, and cloud computing, application mobility and social media fuse.
Regulating Credit Default Swaps Preview For Presscatelong
Presentation of Mr. Gary Kopff for the PRMIA Conference on Reforming Markets for Credit Default Swaps & Collateralized Debt Obligations held in Washington, DC. June 10th, 2009.
A presentation to the Bazaarvoice "Social Commerce Summit" (http://www.socialcommercesummit.co.uk) in London, November 2008.
This presentation built upon my address to the e-consultancy.com "Future of Digital Marketing" conference, taking a particular look at how data and data exchange underpin not only social commerce on the web, but lead to greater insights as the 'network effect' takes over.
The 'data evolution' is outlined as:
• Data evolution
– accurate
– enriched
– meta
– actionable
– mashed
– semantic
– autonomous &
- predictive
(Slide 6).
Two trends come together:
1) better data (eg behavioural and attention/behavioural profiling), and
2) freer exchange (eg via standard like APML and microformats).
The implications from these trends are that:
- you only see part of the picture
- the _customer_ only ever sees part of the picture
- the complete picture is both 'in the network', modal and contextual
- this openness and exchange at a data level also requires new business approaches
- the battle for businesses is to get the maximal share of (qualified, appropriate, profitable) attention.
Please contact me if you've any questions on this, or the links to sites/services cited are not clear.
The document discusses the attention economy and new approaches for engagement. It notes that the limiting factor is now time and attention, rather than the ability to interrupt. It explores how data exchange can enable new forms of engagement through personalization, participation, and predictive modeling. Metadata and semantic data are becoming more important for enabling increased relevance and capturing behavior. This shifts the focus from outbound marketing to making networks more transactional and enabling users to "do" rather than just "view".
This document contains legal disclaimers for any presentations made by Intel. It states that any forward-looking statements are subject to risks and uncertainties, and actual results may differ from expectations. It also notes where to find reconciliations for any non-GAAP financial measures used and disclaims any warranties or intellectual property claims. Finally, it says performance tests were conducted on specific systems and components, and results may vary depending on hardware and software configuration.
Using data intelligently has already been around for decades …
So are the related issues…
The analytics market is offering an abundance of solutions to gear up your data abilities…
And customers/companies are increasingly more willing to deploy data in some way…
But are they really ready to turn their minds to data ?
This presentation provides the view of The House of Marketing on how companies should gradually structure their analytical perspectives and pace the required transformation in the organization.
Shep Parke has over 27 years of experience in enterprise information services, helping companies implement innovative data solutions to drive business results. His background includes senior roles at Accenture, KPMG, and several technology startups. The document provides examples of projects he led that delivered substantial cost savings and revenue increases for clients across various industries.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
The document discusses customer-centric business model innovation. It provides the speaker's background in marketing and sales from 1990 to 2003 in traditional roles, and from 2004 to present in business model transformation. It includes a quote about how half of marketing dollars being wasted and not knowing which half, as well as discussing Russ Ackoff's perspective on business models having three layers and three dimensions.
George Buckley, Chairman, President and CEO of 3M Company, will present at the 2008 3M Investor Conference. The presentation will discuss maintaining 3M's long-term business objectives of sales and earnings growth. It will provide overviews of 3M's core businesses and strategies to drive growth, including growing the current core business, complementary acquisitions, and building new businesses with a focus on international expansion. Examples will be given of revitalizing core businesses in areas like occupational health and safety.
GDC '09: Creating Value for Video Game CompaniesMitch Lasky
The document discusses key factors that affect the valuation of video game companies, including:
1) The three main valuation events are raising private money, going public, and selling the company.
2) Valuation methods like discounted cash flow and comparable company analyses are important.
3) Strategic considerations like a company's market position, intellectual property, and growth potential significantly impact valuation.
Robin Wilton gave a keynote presentation on information security and privacy in a recovering economy. He discussed Future Identity's stakeholder engagement strategy and how policymakers, adopters, and regulators must work together. While it is cheaper to share data than protect privacy, current economic conditions may shift this balance as cost-cutting incentives privacy protections. Practical governance measures are needed to ensure privacy as technologies and policies develop. Many problems around identity assurance and privacy management remain to be addressed.
Randomness, the new naturalism and the new altruismHaydn Shaughnessy
The document discusses how brands need to adapt to an age of customer empowerment driven by new trends. It summarizes key trends like the new naturalism, randomness, new altruism, democratization, and individualization that are empowering customers. It outlines response strategies for brands like consumer brand advocacy, positioning the brand as a movement, facilitating peering markets, enabling product configuration, and allowing for customer-managed vendors. The document argues that brands need to embrace openness, understand diverse customer motivations, plan for different market models, disaggregate their brand identity, and reverse their data culture to adapt to rising customer empowerment.
This document discusses common investment challenges such as randomness of returns, picking winning stocks, timing the market, picking active managers, and the costs of indexing. It then outlines an investment approach focused on strategic partnerships with institutional managers, academically sound portfolio construction, keeping costs low, and HonorVise portfolios. Key points include reviewing evidence that stock returns are random, individual stock picking is difficult, market timing rarely works, and costs are lower with index funds. The approach focuses on dimensions of expected returns including size, value, and market factors.
TXU's fundamental business strategy is to transform into an industrial energy company focused on delivering top quartile financial performance across its three structurally advantaged businesses: generation, transmission & distribution, and retail. TXU has significant exposure to natural gas prices and heat rates due to its large baseload coal generation fleet, but this exposure is partially offset by its integrated retail business. TXU sees opportunities for mid and long term growth by improving operational excellence, implementing performance management, and optimizing its risk/return profile.
TXU's fundamental business strategy is to transform into an industrial energy company focused on delivering top quartile financial performance across its three structurally advantaged businesses: generation, transmission & distribution, and retail.
TXU has significant exposure to natural gas prices and heat rates due to its large baseload coal generation fleet, which produces power at a lower marginal cost than gas plants. However, the integration of its generation and retail businesses helps reduce volatility as the businesses' margins move in opposite directions with changing gas prices.
In the mid to long term, TXU aims to continue improving operational excellence across its businesses to enhance financial performance and total returns for shareholders.
1. The document discusses the economics of cloud computing and how cloud represents both a technological and economic shift compared to traditional computing models like mainframes and client-server architectures.
2. Cloud benefits from strong economies of scale in areas like data center costs, server utilization, and multi-tenancy. Larger cloud providers have significantly lower costs per server.
3. Over time, more organizations will shift workloads to public clouds due to the advantages of scale, lower costs, and flexibility compared to private clouds or on-premises infrastructure.
Enterprise in the Cloud, the Emergence of Anywhere ITYankee Group
The information communications and technology (ICT) marketplace is on the verge of its most significant transformation yet and is poised to hit the $4 trillion mark worldwide by 2016. This transformation is shifting IT complexity into the network cloud, making it possible for the corporate experience to more closely reflect the consumer experience.
Yankee Group predicts that Anywhere IT will change the way people work, and dramatically reshape the enterprise vendor landscape. Even amid the current economic turmoil, Yankee Group analysts advise organizations to begin exploiting Anywhere IT now or risk losing a competitive edge.
Yankee Group analysts Sheryl Kingstone and Zeus Kerravala present how Anywhere IT is energizing the enterprise as services move to the non-traditional, and cloud computing, application mobility and social media fuse.
Regulating Credit Default Swaps Preview For Presscatelong
Presentation of Mr. Gary Kopff for the PRMIA Conference on Reforming Markets for Credit Default Swaps & Collateralized Debt Obligations held in Washington, DC. June 10th, 2009.
A presentation to the Bazaarvoice "Social Commerce Summit" (http://www.socialcommercesummit.co.uk) in London, November 2008.
This presentation built upon my address to the e-consultancy.com "Future of Digital Marketing" conference, taking a particular look at how data and data exchange underpin not only social commerce on the web, but lead to greater insights as the 'network effect' takes over.
The 'data evolution' is outlined as:
• Data evolution
– accurate
– enriched
– meta
– actionable
– mashed
– semantic
– autonomous &
- predictive
(Slide 6).
Two trends come together:
1) better data (eg behavioural and attention/behavioural profiling), and
2) freer exchange (eg via standard like APML and microformats).
The implications from these trends are that:
- you only see part of the picture
- the _customer_ only ever sees part of the picture
- the complete picture is both 'in the network', modal and contextual
- this openness and exchange at a data level also requires new business approaches
- the battle for businesses is to get the maximal share of (qualified, appropriate, profitable) attention.
Please contact me if you've any questions on this, or the links to sites/services cited are not clear.
The document discusses the attention economy and new approaches for engagement. It notes that the limiting factor is now time and attention, rather than the ability to interrupt. It explores how data exchange can enable new forms of engagement through personalization, participation, and predictive modeling. Metadata and semantic data are becoming more important for enabling increased relevance and capturing behavior. This shifts the focus from outbound marketing to making networks more transactional and enabling users to "do" rather than just "view".
This document contains legal disclaimers for any presentations made by Intel. It states that any forward-looking statements are subject to risks and uncertainties, and actual results may differ from expectations. It also notes where to find reconciliations for any non-GAAP financial measures used and disclaims any warranties or intellectual property claims. Finally, it says performance tests were conducted on specific systems and components, and results may vary depending on hardware and software configuration.
Using data intelligently has already been around for decades …
So are the related issues…
The analytics market is offering an abundance of solutions to gear up your data abilities…
And customers/companies are increasingly more willing to deploy data in some way…
But are they really ready to turn their minds to data ?
This presentation provides the view of The House of Marketing on how companies should gradually structure their analytical perspectives and pace the required transformation in the organization.
Shep Parke has over 27 years of experience in enterprise information services, helping companies implement innovative data solutions to drive business results. His background includes senior roles at Accenture, KPMG, and several technology startups. The document provides examples of projects he led that delivered substantial cost savings and revenue increases for clients across various industries.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
The Network Economy Rules
1. 10/9/08
Aims and Objectives
The Network Economy: Provide definitions and relevant examples
Structure presentation using chapterʼs framework
New Rules of the Game
Conclude with our individual critiques
Alexander Horre
Grant Austin
Colin de Mello
Aussiegall - flickr
Managerial Capitalism
Economic transformation
➪
Industrial Network Economy = E-Business
What is managerial capitalism?
(Zuboff, 2005)
How is value obtained?
“New” Firm before the customer
Support
What are these transaction costs?
Information
Knowledge The “value chasm”
“Kevin [Kelly] argued that the era of computation is over, we are
entering the age of communication.” (Li, 55) “The company centric value system no longer works. Customers have
more choices and less satisfaction.” (Pradalad, Ramaswamy 2004)
1
2. 10/9/08
Distributed Capitalism
Co-Creation
(Zuboff, Maxmin 2002)
(Prahalad, Ramaswamy 2004)
What is distributed capitalism?
Co-creating unique value
“Brewing of a perfect storm of 3 forces”
Customers now define and create value
Itʼs about the intangibles
Connect customers than isolate
“Value is realized through advocacy and trust”
Stems through five forces
Managerial capitalism is transaction economics, and it’s replaced
with relationship economics, dependent not on optimization, but
on the individuals paying for deep support. (Carter, 2004)
Co-creation: D.A.R.T. Model
Migrating to co-creation diagram
Dialogue
Transparency Access
Risk assessment
(Prahalad, Ramaswamy 2004)
2
3. 10/9/08
What are these transaction costs?
So…have basic rules changed?
Industrial economy
Network economy
Ronald Coase
high transaction costs
lowering of transaction costs
Discovered 1937
high vertical integration
high horizontal integration
Due to market inefficiency
ownership of value chain
specialized partner value chain
Firms organized to reduce
physical assets = value
intangible assets = value
law of diminishing returns
law of increasing returns
costs in value / supply
high market entry barriers
low market entry barriers
chain
information asymmetry
information symmetry
The market is improving
ICT Proliferation: “Itʼs Everywhere!”
The World Wide Web became the ʻkiller appʼ
“Today the market is improving its efficiency at the speed of
Moore’s Law and Metcalfe’s Law.” (Downes, Mui 1998: 7)
“The pervasive diffusion of new ICTs into many
“Due to Moore’s Law making digital devices cheaper and
areas of economic and social activity is enabling
powerful, a new way was found to share their content. [A] more extensive flows of information.”
project called the internet.” (Downes, Mui 1998: 6) (Roberts, Andersen, Hull, 2000: 28)
3
4. 10/9/08
Twelve new rules (but now ten)
Kevin Kelly
Information or network?
Discontinuities
Profound implications
New rules must be applied
Axes of the New Rules
Rule 1: Embrace the Swarm
Jelly beans
What about computers?
Agility
The pervasive net; complexity from simplicity
Strategy: move technology to invisibility
Wealth Undo
Quicker “No one is as smart as everyone.” (Keely cited by Kelly, 1998)
1
4
5. 10/9/08
(Gordon) Mooreʼs Law
Example: Embrace the Swarm
1965 paper
Transistors double every two years
Powerful, cheaper
Embrace dumb power?
Nanotechnology?
Dave Ward - flickr
Projectarchive.net - flickr
“We are connecting everything to
everything.” (Kelly, 1998)
Itʼs about invisibility
Or….Embrace the Swarm
“Information is easily accessible to anyone, and knowledge
consumers can make informed decisions.”
“Advances in the internet and in messaging and mobile phone
technologies mean that consumers can easily communicate
with one another in various communities…”
(Li, 53)
Todbot - flicker Sk3 - flicker
5
6. 10/9/08
How do politics fit into this?
Kevin Kelly says…
Political Blog: Barack Obama
Internet fundraisers
“As technology becomes ubiquitous it
also becomes invisible. The more chips $5.01
proliferate, the less we will notice them. Blog posts, widgets, e-mail,
The more networking succeeds, the less
youtube videos, facebook pages,
we’ll be aware of it.” (1998)
Twitter, digg links, flickr photos!
Google images
Kevin Kelly
Embrace Dumb Power: Politics!
Rule 2: Plentitude
Metcalfeʼs Law: n(n-1)/2
Value: abundance, not scarcity
“We're going to do it the right way, with small
donations from people like you…” (Plouffe, 2008) N2 is actually not fast enough
Reedʼs law: 2n - n - 1
“Like Kelly for the economy…lobbyists pale in
comparison to the power brought by an organised
voter constituency.” (Rosenblatt, 2000)
Google images
Robert Metcalfe
6
7. 10/9/08
Example: Plentitude
Rule 2: Plentitude
Fax Machine
“Once a standard reaches critical mass, its value to
everyone multiples exponentially…1993 critical mass was
reached…since then the value of each additional node and
user was so great it began to exert something like a
?
gravitational pull…” (Downes, Mui 1998: 5-6)
Does this remind you of anything today? ….
Why?
Plentitude: Social Networks
7
8. 10/9/08
Rule 3: Exponential Value
Rule 3: Exponential Value
Itʼs about Metcalfeʼs law
“…industrial economies of scale increase value gradually and
Itʼs also about Mooreʼs law
linearly. Small efforts yield small results; large efforts give large
Increasing returns
results. Networks…increase value exponentially—small efforts
reinforce one another so that results can quickly snowball into
quot;The value of Windows increases exponentially as its
an avalanche.” (Kelly, 1998)
users increase arithmetically” (Kelly, 1998)
“Networks encourage the successful to be yet
more successful.” (Arthur cited by Kelly, 1998)
Example: Exponential Value
Rule 4: Tipping Points
Industrial vs. Network Economy
“Moore’s Law makes it possible, while Metcalfe’s
Lower tipping points to the “knee”
law makes it profitable.” (Downes, Mui 1998: 12)
The famous ʻlily pondʼ example
“How long can you hold out not having a phone?” (Li, 57)
8
9. 10/9/08
Example: Tipping Points
The knee
Luv to travel - flickr
(Kelly, 1998)
Marketplace vs. Marketspace
Rule 5: Increasing returns
Economist Brian Arthur: Law of Increasing returns
Law of diminishing returns
Marketplace vs. marketspace (Rayport, Sviokla 1994)
Virtuous circle
“It’s a non-zero sum game.” (Anderson, 2006)
(Rayport, Sviokla 1994)
9
10. 10/9/08
Example: Virtuous Circle
Rule 6: Inverse pricing
…with Bit Torrents
Inverse pricing
Moore, Metcalfe, Gilder
Membership Value Is this bad news for profit?
The driving force behind this transformation is Moore’s law,
Gilder’s law and Metcalfe’s law. (Downes, Mui 1998: 5)
Value Membership
Example: Inverse Pricing
Rule 7: Follow the free
…with Gilder’s Law
Netscape vs. Microsoft
XBOX 360
Printers and ink
Java - $10,000 manual
Openness
“Only factor becoming scarce in a world of
abundance is human attention …” (Li, 59)
George Gilder
10
11. 10/9/08
Example: “Open Enterprise”
Example: “Open Enterprise” chart
Active Dumb
Capture Discover
Smart
value value
Destroy X
“The Web is Agreement” (Downey, 2008) Dumb value
Open Source Awareness Day, 2007
Rule 8: Allegiance - feed the web
Example: feeding the web
Web Strategy
Value is in the network, not the firm!
Transaction costs, again!
VS.
“The perpetual beta” (Downey, 2008)
“walled garden”
Google images
John Hagel III
“Feed the web first to establish and grow
“Sony…controlled the music business.
the market.” (Li, 60)”
They paid scant attention to
mp3…” (Tapscott and Williams, 2007: Google images
57)
11
12. 10/9/08
Rule 9: Law of Devolution
Example: Fast Company
Abandon what is profitable today for what will be
profitable tomorrow.
Rule 10: Law of Displacement
Example: Oil, Music, Automobiles
“…[the] displacement of materials by information.” (Li, 60)
“In the Network Economy, the net wins. All transactions and
objects will tend to obey network logic.” (Kelly, 1998)
12
13. 10/9/08
Rule 11: Sustain disequilibrium
Example: Google
Whatʼs the unifying business strategy
behind these services?
Maintain a delicate balance of order with
disorder
“Innovation is a disruption; constant innovation is a perpetual
disruption; and the goal of a well-made network is to sustain a
perpetual disequilibrium.” (Li, 61)
Rule 12: Inefficiencies
Example: StandoutJobs
The right job is more critical than improving
established processes.
Solving problems is investing in weakness; seeking
opportunity is relying on the network.
“Stop Losing Out on Great Talent”
13
14. 10/9/08
Future scenario? … Probably not.
What is the future scenario?
Jhhwild - flickr
digg
Network Economy: future scenarios
Closing comments
It this an evolution or revolution?
Future scenarios:
1. Yes, this is a new economy
2. Sort of…incremental changes
3. Itʼs an illusion - productivity?
4. Itʼs all hype! Crash and burn!
14
15. 10/9/08
Any questions?
References
Anderson, B., Hull, R., & Roberts, J. et al. (2000)
We recommend the following books:
Knowledge and Innovation in the New
Wikinomics (2007) - Tapscott & Williams
Economy, Camberley: Edward Elgar
Service
The Long Tail (2006) - Chris Anderson
Publishing Ltd
Unleashing the Killer App (1998) - Downes & Mui
Anderson, Chris. (2006) The Long Tail: Why Future
Business is Selling Less of More, New
York: Hyperion
Carter, Locke. (2007) The Support Economy: Why
Corporations Are Failing Individuals
and the Next Episode of Capitalism, by Zuboff, S. &
Maxmin, J. Reviewed in: Technical Communications
Quarterly 3:365
References
References
Downes, L., & Mui, C. (1998) Unleashing the Killer Prahalad, C.K. & Ramaswmay Venkat. (2004) Co-creating
App, Boston: Harvard Press value with customers, Strategy & Leadership, 3, 4-9
Downey, Paul. & Codeworks Connect. (2008) Web 2.0
Rayport, J. & Sviokia J. (1994) Managing in the
Conference. Life Center Conference
Marketspace, Harvard Business Review, 141-150
Center, Newcastle upon Tyne, 7 Feb.
Rosenblatt, Alan J. (2000) Techno-Cultural integration,
Kelly, Kevin. (1999) New Rules for the New Economy,
GeoPolitics, 5:3, 177-184
http://kk.org/newrules/contents.php
Accessed 12 Feb
Li, Feng. (2007) What is E-Business? How the
Internet Transforms
Organizations, Oxford: Blackwell Publishing
15
16. 10/9/08
References
Tapscott, Don & Williams, Anthony. (2007)
Wikinomics: How Mass
Collaboration Changes Everything, London:
Atlantic Books
Zuboff, Shoshana. (2005) Moving into the Support
Economy,
http://www.thesupporteconomy.com/admin/assets/
GDI_Impuls_1_05.pdf Accessed: 13 Feb
16