Cisco Unified Computing Systems UpdateCisco Canada
The Cisco Unified Computing System represents a radical simplification of traditional architectures, dramatically reducing the number of devices organizations must purchase, deploy, and maintain. Cisco UCS delivers end-to-end optimization for virtualized environments while retaining the ability to support traditional OS and application stacks in physical environments. This session will provide attendees with an update on new features available from both hardware and software perspectives for the Cisco Unified Computing System.
Novell Success Stories: Collaboration in GovernmentNovell
Novell Collaboration benefits are to increase productivity, manage information growth, and leverage investments and skills on Linux.
The California Highway Patrol, Hudiksvall Municipality, Liconsa, Kent Police Authority, The Louisiana Department of Social Services, Texas General Land Office, DRV BW, and the Ministry of Social Development in Bahrain all use Novell Collaboration tools for their IT success.
Cisco Unified Computing Systems UpdateCisco Canada
The Cisco Unified Computing System represents a radical simplification of traditional architectures, dramatically reducing the number of devices organizations must purchase, deploy, and maintain. Cisco UCS delivers end-to-end optimization for virtualized environments while retaining the ability to support traditional OS and application stacks in physical environments. This session will provide attendees with an update on new features available from both hardware and software perspectives for the Cisco Unified Computing System.
Novell Success Stories: Collaboration in GovernmentNovell
Novell Collaboration benefits are to increase productivity, manage information growth, and leverage investments and skills on Linux.
The California Highway Patrol, Hudiksvall Municipality, Liconsa, Kent Police Authority, The Louisiana Department of Social Services, Texas General Land Office, DRV BW, and the Ministry of Social Development in Bahrain all use Novell Collaboration tools for their IT success.
What an Enterprise Should Look for in a Cloud ProviderNovell
This session will address the security and compliance aspects that an enterprise should insist on from a cloud provider. The mechanisms for cloud annexation that provide security and compliance will be described and the architecture of Novell Cloud Security Service will be presented. Presenters will emphasize the contribution that Novell Cloud Security Service makes to intelligent workload management because of cloud security and compliance.
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
This session will help you understand what cloud security is and how to implement it in your enterprise. It will discuss the technical aspects of cloud security and how we can help you secure the cloud while ensuring sensitive information always remains behind the firewall.
Novell Success Stories: Endpoint Management in Retail and ManufacturingNovell
Novell Endpoint Management benefits are to improve user productivity, lower IT costs, and mitigate risks.
This presentation will show you how two retailers and manufacturers in particular- Save Mart Supermarkets, and Richardson- reduced IT costs and benefited from Novell Endpoint Management.
Novell Success Stories: Endpoint Management for NonprofitsNovell
Novell Endpoint Management benefits are to improve user productivity, lower IT costs, and mitigate risks.
This presentation will show you how three nonprofits in particular- The Atlantic Philanthropies, Vancouver Convention Center, and Sesame Workshop- reduced IT costs and benefited from Novell Endpoint Management.
Many white papers describe technically how MPLS works—down to the details of configuration across different Customer Premises Equipment (CPE) types but, before you take a deep dive into the inner workings of the technology, determine if migrating to MPLS is the best decision for your enterprise. Thoroughly investigate the key business reasons your enterprise might consider a private IP network, as well as the issues you must monitor and manage to make MPLS a success.
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...SSA KPI
AACIMP 2010 Summer School lecture. "Information Technologies" stream. "Problems of Contemporary Communication Companies. Ways and Tools for Solving Them" course.
More info at http://summerschool.ssa.org.ua
Implementing Process Controls and Risk Management with Novell Compliance Mana...Novell
Managing processes, automatically testing controls within processes, and proactively managing risk through key performance/risk indicators are significant challenges to establishing GRC/IT-GRC practices and an effective compliance framework. This session will focus on the current and future capabilities of Novell Compliance Management Platform that can assist organizations with implementating process controls and risk management throughout the enterprise. We will provide specific examples with SAP GRC Access Control, Process Control and Risk Management.
Alcatel-Lucent Cloud: Shaping the Future NFV OSS David Amzallag TM Forum 2013Alcatel-Lucent Cloud
Communication service providers have started to re-think the network with the objective to remove the walls between network services and network infrastructure, reduce expenditures and to achieve network elasticity and scalability. This new vision aims to change the way telcos are building and managing their networks and spans Software Defined Networking (SDN) as well as Network Functions Virtualization (NFV). As many network services will be comprised of virtualized network functions together with non-virtualized network functions, the expectations for a new operational model are including, among others, a real-time, zero-touch and fully programmable OSS that will share responsibilities with legacy OSS, Cloud Management/ Orchestration System, SDN Controllers and a new OSS for Applications. Follow David Amzallag on twitter @david_amzallag
How will virtual networks, controlled by software, impact OSS systems?Comarch
Presentation from the OSS side of the story. How will the network change in the futur when entering the Zettabyte era? SDN/NFV explanations for the future of Telcos.
Serverless computing and Function-as-a-Service (FaaS)Moritz Strube
The slides from my Webmonday talk, which I held on on March 27th, 2017. The slides introduce and discuss serverless computing and Function-as-a-Service (FaaS).
Arista Networks - Building the Next Generation Workplace and Data Center Using SDN Architectures
Topics Include:
Enterprise Workplace and Data Center Networking Trend
Arista Networks Introduction
Arista Datacenter Solution
Arista and Aruba joint SDN Solution
What an Enterprise Should Look for in a Cloud ProviderNovell
This session will address the security and compliance aspects that an enterprise should insist on from a cloud provider. The mechanisms for cloud annexation that provide security and compliance will be described and the architecture of Novell Cloud Security Service will be presented. Presenters will emphasize the contribution that Novell Cloud Security Service makes to intelligent workload management because of cloud security and compliance.
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
This session will help you understand what cloud security is and how to implement it in your enterprise. It will discuss the technical aspects of cloud security and how we can help you secure the cloud while ensuring sensitive information always remains behind the firewall.
Novell Success Stories: Endpoint Management in Retail and ManufacturingNovell
Novell Endpoint Management benefits are to improve user productivity, lower IT costs, and mitigate risks.
This presentation will show you how two retailers and manufacturers in particular- Save Mart Supermarkets, and Richardson- reduced IT costs and benefited from Novell Endpoint Management.
Novell Success Stories: Endpoint Management for NonprofitsNovell
Novell Endpoint Management benefits are to improve user productivity, lower IT costs, and mitigate risks.
This presentation will show you how three nonprofits in particular- The Atlantic Philanthropies, Vancouver Convention Center, and Sesame Workshop- reduced IT costs and benefited from Novell Endpoint Management.
Many white papers describe technically how MPLS works—down to the details of configuration across different Customer Premises Equipment (CPE) types but, before you take a deep dive into the inner workings of the technology, determine if migrating to MPLS is the best decision for your enterprise. Thoroughly investigate the key business reasons your enterprise might consider a private IP network, as well as the issues you must monitor and manage to make MPLS a success.
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...SSA KPI
AACIMP 2010 Summer School lecture. "Information Technologies" stream. "Problems of Contemporary Communication Companies. Ways and Tools for Solving Them" course.
More info at http://summerschool.ssa.org.ua
Implementing Process Controls and Risk Management with Novell Compliance Mana...Novell
Managing processes, automatically testing controls within processes, and proactively managing risk through key performance/risk indicators are significant challenges to establishing GRC/IT-GRC practices and an effective compliance framework. This session will focus on the current and future capabilities of Novell Compliance Management Platform that can assist organizations with implementating process controls and risk management throughout the enterprise. We will provide specific examples with SAP GRC Access Control, Process Control and Risk Management.
Alcatel-Lucent Cloud: Shaping the Future NFV OSS David Amzallag TM Forum 2013Alcatel-Lucent Cloud
Communication service providers have started to re-think the network with the objective to remove the walls between network services and network infrastructure, reduce expenditures and to achieve network elasticity and scalability. This new vision aims to change the way telcos are building and managing their networks and spans Software Defined Networking (SDN) as well as Network Functions Virtualization (NFV). As many network services will be comprised of virtualized network functions together with non-virtualized network functions, the expectations for a new operational model are including, among others, a real-time, zero-touch and fully programmable OSS that will share responsibilities with legacy OSS, Cloud Management/ Orchestration System, SDN Controllers and a new OSS for Applications. Follow David Amzallag on twitter @david_amzallag
How will virtual networks, controlled by software, impact OSS systems?Comarch
Presentation from the OSS side of the story. How will the network change in the futur when entering the Zettabyte era? SDN/NFV explanations for the future of Telcos.
Serverless computing and Function-as-a-Service (FaaS)Moritz Strube
The slides from my Webmonday talk, which I held on on March 27th, 2017. The slides introduce and discuss serverless computing and Function-as-a-Service (FaaS).
Arista Networks - Building the Next Generation Workplace and Data Center Using SDN Architectures
Topics Include:
Enterprise Workplace and Data Center Networking Trend
Arista Networks Introduction
Arista Datacenter Solution
Arista and Aruba joint SDN Solution
Data center interconnect seamlessly through SDNFelecia Fierro
Data Center Interconnect Seamlessly through SDN
Data Center Interconnect, or DCI, has become a hot topic as IT infrastructures transform from islands of connectivity to pools of resources for efficiency purposes. Properly deployed, DCI enables all computing and storage resources to be pooled, regardless of where they physically reside, and it is the quality of this abstraction and the associated visibility that counts.
Enter Pluribus Networks running on Broadcom chipsets
Join us for this On-Demand Webinar where we will discuss why Data Center Interconnect is a key opportunity to simplify any network and how Broadcom chipsets enable this with their industry-leading VXLAN capabilities.
Pluribus Netvisor®-powered switches running on Broadcom include the industry’s most powerful and open DCI technology, VXLAN, which enables all resources across the entire planet to be shared. Along with VXLAN itself, we will explain the role of visibility in a widely distributed VXLAN based environment.
In this On-Demand Webinar, we'll discuss how DCI running on Broadcom VXLAN can:
Share IT resources and increase utilization of those resources
Provide enterprise scale, simplicity and agility – reducing the cost and complexity of IT
Support modern applications including Converged Infrastructure and VDI
Cloud computing surgiu com a proposta de facilitar a gestão de recursos computacionais, reduzir seus custos e possibilitar o amplo acesso a novas tecnologias. A idéia era tornar um modelo de computação que exige investimento de capital, num modelo que exige investimento operacional. Mais que isso, num âmbito de desenvolvimento de produto, possibilitar que se gaste mais com o desenvolvimento da logica do produto do que com a implementação do mesmo. De tudo que vem surgindo em Cloud Computing, FaaS é de longe o serviço de núvem que mais se aproxima desse ideal. Além de hardware, qualquer aplicação precisa de uma pilha de software para executar (SO, frameworks, etc). No modelo FaaS, você desenvolve apenas a lógica da sua aplicação em funções, e todo o resto da "pilha" é oferecido de maneira transparente, como parte do serviço. Neste modelo, a cobrança é feita pelo código executado da sua função, ou seja, você é cobrado apenas pela execução da sua sua lógica de negócio. Isso tudo com garantia de disponibilidade e escalabilidade automática. Veja como essa nova proposta promete revolucionar a maneira com que grande parte das aplicações de negócio serão construídas.
It's common business policy for organizations of a certain size to have two data centers as part of a disaster recovery or business continuity plan. However, most enterprise - applications are not designed for or intended to use systems in two different locations.
Enter the notion of a data center interconnect, which extends an Ethernet network between two physically separate data centers. While the idea is simple, Ethernet wasn't designed to run across a wide area network. Thus, a DCI implementation requires a variety of technological fixes to work around Ethernet's limitations.
This report outlines the issues that complicate DCIs, such as loops that can bring down networks and traffic trombones that eat up bandwidth. It also examines the variety of options companies have to connect two or more data centers, including dark fiber, MPLS services and MLAG, as well as vendor specific options such as Cisco OTV and HP EVI. The report looks at the pros and cons of each option.
This whitepaper features the transition from traditional networking to software-defined networking or SDN. Find outlines of next-generation architectures.
A quick summary of my observations and notes about the top five myths about the NFV sales stories from vendors and market research firms. I have been working with major service providers (with them and as a contractor/consultant) for 15+ years and last two years on emerging technologies.
How to adopt SDN/NFV Technology into the BSS & OSS stack and shorten the time...Comarch
Network Virtualization can change the operations of Telecoms, but what does it really mean? How can new Telecom services be introduced faster to the market and how can customers benefit from them as quickly and as efficient as possible?
Five best practices for ensuring uptime with Data Center Infrastructure Manag...CA Nimsoft
Five best practices for ensuring uptime with Data Center Infrastructure Management
For more information on DCIM and Nimsoft, visit: http://nimsoft.com/solutions/nimsoft-monitor/dcim.html.
Core Banking Transformation: Solutions to Standardize Processes and Cut CostsIBM Banking
IBM Banking Industry Framework for Core Banking Transformation (CBTF) has many assets, tools, methods and accelerators to help banks standardize and link core processes seamlessly and reduce point-to-point interfaces to cut cost and complexity.
The Enterprise Business Case for Cloud Transformation: Introducing Everest Gr...Everest Group
Everest Group is committed to helping leading enterprises navigate the opportunities and challenges associated with transformation and cloud migration. Based on extensive work with leading enterprises and cloud vendors, Everest Group has developed the first comprehensive set of analytics, frameworks and fact-based economic models for enterprise IT transformation and cloud migration. In this webinar, learn how Everest Group’s new Next Generation IT advisory services leverage these capabilities to help you.
Software-Defined Networking (SDN): Unleashing the Power of the NetworkRobert Keahey
It goes without saying that cloud computing has dramatically reshaped the information technology services landscape. Virtualization is unleashing the power of commodity-based technology and open source communities are building new applications and services at an astonishing rate, but networking has lagged behind compute and storage in virtualization and automation. We’ve become accustomed to specialized networking silicon, complex operating systems and highly distributed control planes. For the most part, we’ve accepted the model along with its high costs.
All that is changing! New protocols such as OpenFlow are freeing the network control plane from proprietary operating systems and hardware platforms. We are entering a new era where customers control the features – and release schedules – of new, open networking applications that address the needs of the mega-scale world.
A lot of work is required to realize the potential of Software-Defined Networking (SDN), where we can enjoy the benefits derived from “software automating software.” This talk will examine some of the history that led us to the point where current networking architectures are no longer viable for cloud computing at mega-scale. We’ll take a look at the basics of SDN and some of its key elements – OpenFlow, network virtualization, and orchestration – along with some of the initiatives and companies that are setting the stage for the next generation of networking.
The Cloud Computing China Congress (CCCC http://www.cloudcomputingchina.org ) is specially designed for senior IT and line of business executives evaluating and making purchasing decisions in the areas of on-demand infrastructure and software services.
The Cloud Computing China Congress (CCCC http://www.cloudcomputingchina.org ) is specially designed for senior IT and line of business executives evaluating and making purchasing decisions in the areas of on-demand infrastructure and software services.
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks
A presentation shared by Stefan Dyckerhoff, Juniper’s EVP of Platform Systems Division, and Bob Muglia, EVP of Software Solutions Division during Mobile World Congress in Barcelona, Spain.
Investments in information technology have a direct and fundamental impact on the success of an organization's revenue-generating activities. As a consequence, the business' financial leadership has a crucial stake in understanding and influencing IT decisions.
The presentation content focuses on a three-stage approach geared toward building profit models around well-planned cloud implementations. Discover how CFOs are in a unique position to lead this effort and make the IT organization aware of its impact on revenue and profitability
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
While the rest of the industry has started to copy our AIOps Client to Cloud message recently, we understand that others are nowhere close to delivering on the promise of the AI-Driven Enterprise, both in terms of depth of features and breadth of portfolio. Take a look at this SlideShare to truly understand why Juniper, driven by Mist AI, leads the market.
Experiences are everything and Juniper knows this. From when a user engages with an app on their smartphone to when a workload is generated in the cloud to pick up the request, we know that every point of contact along the way impacts the user’s experience, from client to cloud. Learn more about what Juniper has recently announced in this SlideShare!
As much the workforce continues to work remotely, The COVID-19 Pandemic has taught us that the WAN is more important than ever, and troubleshooting it couldn’t be more difficult. Learn how MARVIS & Mist AI simplify the burdensome process of troubleshooting the WAN.
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
See what Juniper customers have to say about how Mist AI has statistically improved the way they run their business. For more information on how Mist AI can improve your network, join us for Transformation Thursdays at: https://www.juniper.net/us/en/forms/ai-driven-demo/
Juniper Networks is introducing the fourth expansion of the AI-driven enterprise to bring artificial intelligence to the LAN, WLAN and now WAN for end-to-end optimization of user experiences and proactive troubleshooting driven by Mist AI.
With the new Juniper Mist WAN Assurance service, customers will receive even better automation and insight in branch locations with AI-driven service level expectations, client-to-cloud event correlation for rapid fault resolution, anomaly detection, and proactive support.
Are you able to deliver reliable experiences for connected devicesJuniper Networks
Here are 5 things you can do with Mist Wired Assurance. With Wired Assurance, you can leverage Juniper EX switch telemetry to enable simpler operations, shorter mean time to repair, and better visibility into end-user experiences for your connected devices, including access points, servers, and IoT endpoints.
It's time to scale way back on those support tickets from your branch users. Security shouldn’t come at the cost of performance. Register now to attend a live demo. You may be eligible to receive a free SRX!
https://www.juniper.net/sdwan-thursdays
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
Enterprises are moving from small IoT pilots to large-scale
implementations. What are the biggest security
concerns, and how can you overcome them?
Juniper partnered with the IoT Institute to find out. We surveyed 176 technology decision makers and
influencers who have been personally involved in their IoT security strategy and implementations. Here's what the survey found:
We recently conducted a 16-country survey to gauge the appetite for Digital Cohesion. The results suggest business and consumer users see Digital Cohesion as an inevitable, positive societal development.
SDN and NFV: Transforming the Service Provider OrganizationJuniper Networks
As competition increases, service providers must be able to respond quickly to competitive pressures and rapidly evolving customer demands. Learn how NFV and SDN allows service providers to embrace a holistic approach to their business transformation and maximize existing capabilities: http://juni.pr/1JQZYOl
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
Service providers are facing more and more pressure as customers demand immediacy. Learn how adopting a carrier-grade, open network platform closes the innovation gap to create value for your network. http://juni.pr/1JQZYOl
Network service providers—those with access networks like DSL, cable, or mobile—continue
to face a dual threat: rising operating expenses associated with explosive bandwidth growth
and declining revenues driven by commoditization. A true Telco cloud, featuring automation
and dynamic scalability, becomes a comprehensive delivery platform enabling network service
providers to offer differentiated services that solve their customer’s business demands.
With mobile subscriptions expected to reach 8.5 billion users by the end of 2016, mobile attack surfaces are growing at an alarming rate. Juniper’s SRX5800 is primed for this increase - with speeds up to 2 Tbps the SRX5800 enables customers to inspect more traffic faster. Mobile has met its match. http://juni.pr/1MKBQDu
High performance data center computing using manageable distributed computingJuniper Networks
Terrapin Trading Show Chicago, Thursday, June 4
Andy Bach, FSI Architect, Juniper Networks
Distributed computing concepts (QFX5100-AA)
Scale and performance enhancements (QFX10000 Series)
Automation capabilities (tie in QFX-PFA)
Larry Van Deusen, Director of the Network Integration Business Unit, Dimension Data
Automation
Value Added Partner Services
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.