[Note to the reader: This presentation was given in front of a large technology firm, very active in the defence and security industries]
IT has always been on the side of order AND disorder. These 2 approaches conflict with one another.
The document discusses how major players in the technology and communications industry are positioning themselves to capitalize on new business opportunities created by Voice over Internet Protocol (VoIP). Network equipment vendors are using VoIP to build more multipurpose infrastructure for carriers. The document also briefly mentions how VoIP has the potential to become one of the largest applications on the internet.
Linda Renfro established a new company within Lockheed Martin called Technology Services Information Support Services Company five years ago. Since then, sales have increased tenfold under her leadership. As an "intrapreneur", she created a new enterprise within the existing company structure by identifying a growing niche of selling software incrementally to the government instead of large packages. Her approach was successful and reduced risk for the parent company. Intrapreneurs like Renfro help large firms stay competitive by fostering innovation within instead of losing talented employees to startups. They establish smaller interacting enterprises within the organization like markets in a free nation.
Leveraging the power of collaboration for a technology companyPrequate Advisory
From the year 2000, a massive shift occurred quietly to most, but daringly to a few. A few large organizations saw the change that was occurring. In 2007, when I was consulting with a large $Bn technology bellwether from my alma mater, I remember how this disruption, so new and so unique, was being viewed as the single largest transformation in the industry way before most of the world heard of this disruption. This arrived with the perfect storm co-created by cloud system deployment capabilities and the penetration of high speed internet. With these forces aligned, it created the SaaS disruption. It took 10 years though for its proliferation to be the product of choice for all industries. It uniquely positioned itself to productise systems and frameworks and create workflow environments which were hitherto accessible only toby the big companies at a fraction of the expense. It did something else which was more succinct though. Now companies were suddenly getting familiar with having open systems and integrations and allowing outsiders in – a fundamental shift in thinking which has changed everything.
.
However, blockchains face challenges around governance, volatility, centralization of mining power, and inherent inefficiencies. Their use also needs to be evaluated based on the type of data and transactions
Slash - the future is faster than you think (tech trends, new models and leg...Slash
Talk given in Feb2019 to a law firm in Cambodia about the Future is Faster than you Think. Covering 4 major areas:
1) Our exponential digital future including 4 forces driving the acceleration of the future
2) the Age of AI
3) Industry Case Studies: Legal Tech and FinTech (Digital Assets)
4) New models for Digital Innovation including Venture Building
Veber FinTech Vs Banking consumer reportMarie Johnson
The Veber FinTech Consumer Survey was based on discovering user perceptions of Banking, a once stable and traditional industry landscape, in comparison to what we’re now seeing which is the ever changing innovative FinTech market. The survey focusses on the trends of FinTech and whether the face of traditional banking will change by 2020.
The white paper also includes video extracts from leading FinTech experts and an exclusive interview with
George Huntley, COO The Money Platform. George gives an in depth account of his FinTech startup journey and his views on the Banking industry and the rise of FinTech.
MITRE faces challenges in implementing social tools while supporting sensitive government work, but has found success through reminders about appropriate sharing and controls over content visibility. MITRE's strategy is to build external collaboration systems that control privacy and access based on trust levels, in order to bring more partners to bear on important problems while maintaining security. Doing so opens new possibilities for collaboration, but controlling a trusted environment across organizations is a major challenge.
The document discusses how major players in the technology and communications industry are positioning themselves to capitalize on new business opportunities created by Voice over Internet Protocol (VoIP). Network equipment vendors are using VoIP to build more multipurpose infrastructure for carriers. The document also briefly mentions how VoIP has the potential to become one of the largest applications on the internet.
Linda Renfro established a new company within Lockheed Martin called Technology Services Information Support Services Company five years ago. Since then, sales have increased tenfold under her leadership. As an "intrapreneur", she created a new enterprise within the existing company structure by identifying a growing niche of selling software incrementally to the government instead of large packages. Her approach was successful and reduced risk for the parent company. Intrapreneurs like Renfro help large firms stay competitive by fostering innovation within instead of losing talented employees to startups. They establish smaller interacting enterprises within the organization like markets in a free nation.
Leveraging the power of collaboration for a technology companyPrequate Advisory
From the year 2000, a massive shift occurred quietly to most, but daringly to a few. A few large organizations saw the change that was occurring. In 2007, when I was consulting with a large $Bn technology bellwether from my alma mater, I remember how this disruption, so new and so unique, was being viewed as the single largest transformation in the industry way before most of the world heard of this disruption. This arrived with the perfect storm co-created by cloud system deployment capabilities and the penetration of high speed internet. With these forces aligned, it created the SaaS disruption. It took 10 years though for its proliferation to be the product of choice for all industries. It uniquely positioned itself to productise systems and frameworks and create workflow environments which were hitherto accessible only toby the big companies at a fraction of the expense. It did something else which was more succinct though. Now companies were suddenly getting familiar with having open systems and integrations and allowing outsiders in – a fundamental shift in thinking which has changed everything.
.
However, blockchains face challenges around governance, volatility, centralization of mining power, and inherent inefficiencies. Their use also needs to be evaluated based on the type of data and transactions
Slash - the future is faster than you think (tech trends, new models and leg...Slash
Talk given in Feb2019 to a law firm in Cambodia about the Future is Faster than you Think. Covering 4 major areas:
1) Our exponential digital future including 4 forces driving the acceleration of the future
2) the Age of AI
3) Industry Case Studies: Legal Tech and FinTech (Digital Assets)
4) New models for Digital Innovation including Venture Building
Veber FinTech Vs Banking consumer reportMarie Johnson
The Veber FinTech Consumer Survey was based on discovering user perceptions of Banking, a once stable and traditional industry landscape, in comparison to what we’re now seeing which is the ever changing innovative FinTech market. The survey focusses on the trends of FinTech and whether the face of traditional banking will change by 2020.
The white paper also includes video extracts from leading FinTech experts and an exclusive interview with
George Huntley, COO The Money Platform. George gives an in depth account of his FinTech startup journey and his views on the Banking industry and the rise of FinTech.
MITRE faces challenges in implementing social tools while supporting sensitive government work, but has found success through reminders about appropriate sharing and controls over content visibility. MITRE's strategy is to build external collaboration systems that control privacy and access based on trust levels, in order to bring more partners to bear on important problems while maintaining security. Doing so opens new possibilities for collaboration, but controlling a trusted environment across organizations is a major challenge.
Markets are changing and so are the people who use them! Digital money makes sense as it provides liquidity like cash. Banks will become irrelevant as more boutique providers emerge. Most unlikely companies will provide banking services. We will all be replaced with robots and code?
Blockchain. What is it & why is it importantGerrie Smits
Why non-techies need to get up to speed with Blockchain. Because Blockchain is more than Bitcoin. It can have an impact on transactions, value systems and organisational structures.
This talk was given at Zeronaut meet-up.
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...Bruno Segers
Launch of the Real Deal and the #OYOD (Own Your Own Data) idea during the Computers, Privacy and Data Protection Conference (CPDP) in January 2014 in Brussels
Mark Andreessen believes the current financial system is outdated and can be replaced through new technologies like cryptocurrencies. He argues that financial transactions have become overly complex and don't require huge buildings and staff. New sources of data from online behaviors can better assess creditworthiness. Cryptocurrencies like Bitcoin can radically lower transaction fees and implement the entire financial system in a decentralized way. However, regulators are confused by these new technologies, which provides an opportunity for innovation if the solutions work.
Third & Fourth Industrial Revolution - DalarnaRobin Teigland
My slides from a presentation in Falun, Sweden in June 2016 for a networking event for SMEs from the Dalarna region: http://www.mellansvenskahandelskammaren.se/Events/4201/Valkommen-pa-Supernatverkstraff
GDPR - a real opportunity for a new digital revolution (2018)Marjola Begaj
The document discusses cybersecurity trends, including issues with blockchain design, unsecured smart homes, and the growing threat landscape. It begins by summarizing an editorial that notes while the implementation of GDPR in May led to initial compliance, legal cases related to data breaches are increasing and issues may be revealed in the coming months. It also includes an obituary honoring Romulus Maier, founder of a Romanian IT media group. Finally, an article argues that while GDPR compliance has been challenging for many companies, the regulation ultimately aims to restore trust in the digital world and promote innovation, if its goals of enhancing privacy, security and transparency can be balanced.
Digitalization of Trust in the Sharing EconomyRobin Teigland
The document discusses the concept of trust in the sharing economy. It explores how trust is established between strangers transacting on sharing platforms through reviews, ratings, and reputation systems. It also examines how platforms can enable trust by ensuring privacy, security, and regulation compliance. Emerging technologies like blockchain may allow for trust without a central authority by facilitating peer-to-peer transactions validated through computer networks. The sharing economy and technologies like the Internet of Things and robotics will continue to change how trust is established in economic interactions.
A New Era of Leadership - From Hierarchy to NetworkTeemu Arina
How social media and digital environments are changing management, collaboration and organizations?
A presentation by: Pasi Mäenpää / Elisa at Elisa ICT Forum 2010, Helsinki, Finland.
Presentation consultation and background research: Esko Kilpi & Teemu Arina / dicole.com
Presentation Design: Mikko Kaipio & Markus Koljonen / Dicole.com
See http://www.elisa.com/en/ and http://www.dicole.com for more information.
The presentation also comes with a visually stunning video. Watch and share: "Cloud Company - Change Happens":
http://bit.ly/ChangeHappens
Presented at ORBiT Real Time Day 2015
Panel discussion by:
• Moderator: Christine Haeberlin, IBM
• Brian Bartosh, President, Top O' Michigan Insurance
• Debbie Olsen, ingenie
• Ed Meiering, Aviva Canada
• John Belyea, Moore McLean
To stay relevant, we need a strategy for how to engage with each other and with our customers today and into the future, because the world is a-changing. What does it all mean? What is the right strategy; how do we start down the right path: if we’re already on the path, what is next? Are the metrics for measuring success the same or different than today? The train is leaving the station: will you be on it?
Video recording at https://www.youtube.com/watch?v=kK9fOwDna1A
CES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, AdgetecMark Mueller-Eberstein
Trend you can't miss at #CES2017 in Las Vegas.
Mark Mueller-Eberstein (Advisor to CXOs and CEO of Adgetec), explains how blockchain technology is changing not only #FinTech, but broader industry and why #China has a special opportunity for success leveraging the innovation.
New Industrial Revolution and Implictations for Automobile IndustryRobin Teigland
This document discusses several shifts occurring due to new technologies and business models: from resource control to resource orchestration, from internal optimization to external interaction, and from customer value to ecosystem value. It highlights new technologies like smartphones, cloud computing, and 3D printing that are enabling new forms of collaboration and value creation through platforms and networks. Examples are given of how companies like Uber, Airbnb, and Local Motors are leveraging these shifts and technologies to disrupt existing industries through new business models based on sharing assets and community contributions.
This document discusses the growing demand for cybersecurity talent and leaders. It summarizes:
1) The demand for cybersecurity professionals and leaders is unprecedented due to a growing number of cyber attacks on major companies and the high costs of data breaches.
2) There is a limited pool of qualified candidates with both technical cybersecurity skills as well as business experience to take on strategic leadership roles.
3) Recruiters report intense competition for top cybersecurity talent as companies scramble to improve their defenses, driving up salaries. Many key cybersecurity roles go unfilled.
This document summarizes key aspects of the sharing economy as of October 2015. It describes how technologies like broadband, mobile phones, and cloud computing enable new models of sharing tangible assets like transportation and property through platforms like Uber and AirBnB. It also discusses how these platforms and peer-to-peer transactions are allowing sharing of intangible assets and services. The sharing economy is predicted to grow significantly in coming years and could spawn new forms of capitalism and business models, while also presenting challenges around regulation and trust that developing technologies and societal changes may help address.
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
The document discusses how boards should respond to cybersecurity risks. It argues that boards need to make cybersecurity a priority and share responsibility for setting the cybersecurity agenda. The CIO should play a key advisory role to the board on technology implications, and boards may benefit from appointing a technology expert to the board. If the CIO is not board-ready, companies should consider elevating the CIO role or creating a Chief Risk Officer role to address cybersecurity at the board level.
Innovating in a forever recession by Dinis GuardaDinis Guarda
Innovating in a forever recession by Dinis Guarda
This is a presentation I did based in this article http://www.intelligenthq.com/resources/how-to-innovate-in-a-forever-recession-part-1-defining-the-present-as-forever-recession/
Defining the present as “Forever Recession”
The concept of “Forever recession”, coined by Seth Godin, is particularly relevant to the present world climate and the business challenges we face today. In a fast changing economy and society challenged by innovative disruption technologies the sense of continuous crisis and somehow a “forever recession” makes us wonder about stability and for understanding the basis of macroeconomics and business this is a hard concept.
In essence, we are living in a continuous crisis. And if at a first-hand this concept seems dramatic or pessimistic, I would disagree. In fact, I would say that this is very good for business indeed.
Why? Well, simply because when you are in crisis it forces you to change and adapt faster. Similarly, you will invest more effort in upgrading your knowledge, skills, and focus. When forced into a crisis it is imperative for any business to figure out how to do something unique and discover how people will be able to pay for it, or get enough solutions to get what is really necessary. Crisis can make people more innovative, and productive.
“The Forever Recession (and the coming revolution)…
There are actually two recessions: The first is the cyclical one, the one that inevitably comes and then inevitably goes. There’s plenty of evidence that intervention can shorten it, and also indications that overdoing a response to it is a waste or even harmful…The other recession, though, the one with the loss of “good factory jobs” and systemic unemployment…I fear that this recession is here forever”, from The forever recession by Seth Godin
“A recession is an especially good time for entrepreneurs to build loyal followers,” says Thomas Koulopoulos, founder of strategic business consulting firm Delphi Group and author of The Innovation Zone: How Companies Re-Innovate for Amazing Success.
The Innovation Zone demonstrates an important fact, that most dynamic innovations are not a single stroke of brilliance. Koulopoulos states that in order to deliver new and successful products companies and organisations will need a disciplined, easily-learned business process that includes an organizational process, an “incubator” that supports, nurtures and sustains the practice of turning ideas, and aspirations into breakthrough innovations to deliver final products to an audience.
Individuals and big companies are in a uniquely shifting historical spot. Every business and professional is struggling to achieve branding awareness and attention. And often in community building and networking there are huge challenges to face in reaching the key interlocutors.
acuteIQ is an artificial intelligence customer acquisition platform initially targeting the enterprise lending market. It provides an auction-based platform to help brokers predict which merchants might need business loans, based on 2 years of modeling business profitability and transaction data from 24 clients. It has a 4x higher conversion rate than traditional methods.
OpenDataWeek Marseille 2013 : Luca Gerretta -- Harmonising open data policies...Fing
The HOMER project aims to harmonize open data policies across 8 European countries in the Mediterranean region. The project involves 7 regional governments and public agencies who will work to aggregate open data initiatives, establish an effective open data strategy, and set up an interoperable digital market. The main deliverables will be reports on open data requirements, licensing, and socioeconomic impact analysis. A key work package will support the development of open data portals, implement pilot projects, and help harmonize technical and legal aspects of open data across partners to make data more accessible and encourage reuse. The project expects to stimulate data reuse and discovery of new applications, enhance economic growth, and increase awareness of open data policies.
The Crossroads of the Possible is a meeting organized by Fing that brings together digital innovators from various backgrounds to discover new ideas. It has reviewed over 3000 projects since 2002 and exhibited 950 projects through 95 events across 15 French regions. The goal is to connect people with innovative projects and accelerate project development through workshops, events and partnerships between companies, researchers, and public entities.
Markets are changing and so are the people who use them! Digital money makes sense as it provides liquidity like cash. Banks will become irrelevant as more boutique providers emerge. Most unlikely companies will provide banking services. We will all be replaced with robots and code?
Blockchain. What is it & why is it importantGerrie Smits
Why non-techies need to get up to speed with Blockchain. Because Blockchain is more than Bitcoin. It can have an impact on transactions, value systems and organisational structures.
This talk was given at Zeronaut meet-up.
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...Bruno Segers
Launch of the Real Deal and the #OYOD (Own Your Own Data) idea during the Computers, Privacy and Data Protection Conference (CPDP) in January 2014 in Brussels
Mark Andreessen believes the current financial system is outdated and can be replaced through new technologies like cryptocurrencies. He argues that financial transactions have become overly complex and don't require huge buildings and staff. New sources of data from online behaviors can better assess creditworthiness. Cryptocurrencies like Bitcoin can radically lower transaction fees and implement the entire financial system in a decentralized way. However, regulators are confused by these new technologies, which provides an opportunity for innovation if the solutions work.
Third & Fourth Industrial Revolution - DalarnaRobin Teigland
My slides from a presentation in Falun, Sweden in June 2016 for a networking event for SMEs from the Dalarna region: http://www.mellansvenskahandelskammaren.se/Events/4201/Valkommen-pa-Supernatverkstraff
GDPR - a real opportunity for a new digital revolution (2018)Marjola Begaj
The document discusses cybersecurity trends, including issues with blockchain design, unsecured smart homes, and the growing threat landscape. It begins by summarizing an editorial that notes while the implementation of GDPR in May led to initial compliance, legal cases related to data breaches are increasing and issues may be revealed in the coming months. It also includes an obituary honoring Romulus Maier, founder of a Romanian IT media group. Finally, an article argues that while GDPR compliance has been challenging for many companies, the regulation ultimately aims to restore trust in the digital world and promote innovation, if its goals of enhancing privacy, security and transparency can be balanced.
Digitalization of Trust in the Sharing EconomyRobin Teigland
The document discusses the concept of trust in the sharing economy. It explores how trust is established between strangers transacting on sharing platforms through reviews, ratings, and reputation systems. It also examines how platforms can enable trust by ensuring privacy, security, and regulation compliance. Emerging technologies like blockchain may allow for trust without a central authority by facilitating peer-to-peer transactions validated through computer networks. The sharing economy and technologies like the Internet of Things and robotics will continue to change how trust is established in economic interactions.
A New Era of Leadership - From Hierarchy to NetworkTeemu Arina
How social media and digital environments are changing management, collaboration and organizations?
A presentation by: Pasi Mäenpää / Elisa at Elisa ICT Forum 2010, Helsinki, Finland.
Presentation consultation and background research: Esko Kilpi & Teemu Arina / dicole.com
Presentation Design: Mikko Kaipio & Markus Koljonen / Dicole.com
See http://www.elisa.com/en/ and http://www.dicole.com for more information.
The presentation also comes with a visually stunning video. Watch and share: "Cloud Company - Change Happens":
http://bit.ly/ChangeHappens
Presented at ORBiT Real Time Day 2015
Panel discussion by:
• Moderator: Christine Haeberlin, IBM
• Brian Bartosh, President, Top O' Michigan Insurance
• Debbie Olsen, ingenie
• Ed Meiering, Aviva Canada
• John Belyea, Moore McLean
To stay relevant, we need a strategy for how to engage with each other and with our customers today and into the future, because the world is a-changing. What does it all mean? What is the right strategy; how do we start down the right path: if we’re already on the path, what is next? Are the metrics for measuring success the same or different than today? The train is leaving the station: will you be on it?
Video recording at https://www.youtube.com/watch?v=kK9fOwDna1A
CES 2017 FinTech trend: Blockchain Technology by Mark Mueller-Eberstein, AdgetecMark Mueller-Eberstein
Trend you can't miss at #CES2017 in Las Vegas.
Mark Mueller-Eberstein (Advisor to CXOs and CEO of Adgetec), explains how blockchain technology is changing not only #FinTech, but broader industry and why #China has a special opportunity for success leveraging the innovation.
New Industrial Revolution and Implictations for Automobile IndustryRobin Teigland
This document discusses several shifts occurring due to new technologies and business models: from resource control to resource orchestration, from internal optimization to external interaction, and from customer value to ecosystem value. It highlights new technologies like smartphones, cloud computing, and 3D printing that are enabling new forms of collaboration and value creation through platforms and networks. Examples are given of how companies like Uber, Airbnb, and Local Motors are leveraging these shifts and technologies to disrupt existing industries through new business models based on sharing assets and community contributions.
This document discusses the growing demand for cybersecurity talent and leaders. It summarizes:
1) The demand for cybersecurity professionals and leaders is unprecedented due to a growing number of cyber attacks on major companies and the high costs of data breaches.
2) There is a limited pool of qualified candidates with both technical cybersecurity skills as well as business experience to take on strategic leadership roles.
3) Recruiters report intense competition for top cybersecurity talent as companies scramble to improve their defenses, driving up salaries. Many key cybersecurity roles go unfilled.
This document summarizes key aspects of the sharing economy as of October 2015. It describes how technologies like broadband, mobile phones, and cloud computing enable new models of sharing tangible assets like transportation and property through platforms like Uber and AirBnB. It also discusses how these platforms and peer-to-peer transactions are allowing sharing of intangible assets and services. The sharing economy is predicted to grow significantly in coming years and could spawn new forms of capitalism and business models, while also presenting challenges around regulation and trust that developing technologies and societal changes may help address.
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
The document discusses how boards should respond to cybersecurity risks. It argues that boards need to make cybersecurity a priority and share responsibility for setting the cybersecurity agenda. The CIO should play a key advisory role to the board on technology implications, and boards may benefit from appointing a technology expert to the board. If the CIO is not board-ready, companies should consider elevating the CIO role or creating a Chief Risk Officer role to address cybersecurity at the board level.
Innovating in a forever recession by Dinis GuardaDinis Guarda
Innovating in a forever recession by Dinis Guarda
This is a presentation I did based in this article http://www.intelligenthq.com/resources/how-to-innovate-in-a-forever-recession-part-1-defining-the-present-as-forever-recession/
Defining the present as “Forever Recession”
The concept of “Forever recession”, coined by Seth Godin, is particularly relevant to the present world climate and the business challenges we face today. In a fast changing economy and society challenged by innovative disruption technologies the sense of continuous crisis and somehow a “forever recession” makes us wonder about stability and for understanding the basis of macroeconomics and business this is a hard concept.
In essence, we are living in a continuous crisis. And if at a first-hand this concept seems dramatic or pessimistic, I would disagree. In fact, I would say that this is very good for business indeed.
Why? Well, simply because when you are in crisis it forces you to change and adapt faster. Similarly, you will invest more effort in upgrading your knowledge, skills, and focus. When forced into a crisis it is imperative for any business to figure out how to do something unique and discover how people will be able to pay for it, or get enough solutions to get what is really necessary. Crisis can make people more innovative, and productive.
“The Forever Recession (and the coming revolution)…
There are actually two recessions: The first is the cyclical one, the one that inevitably comes and then inevitably goes. There’s plenty of evidence that intervention can shorten it, and also indications that overdoing a response to it is a waste or even harmful…The other recession, though, the one with the loss of “good factory jobs” and systemic unemployment…I fear that this recession is here forever”, from The forever recession by Seth Godin
“A recession is an especially good time for entrepreneurs to build loyal followers,” says Thomas Koulopoulos, founder of strategic business consulting firm Delphi Group and author of The Innovation Zone: How Companies Re-Innovate for Amazing Success.
The Innovation Zone demonstrates an important fact, that most dynamic innovations are not a single stroke of brilliance. Koulopoulos states that in order to deliver new and successful products companies and organisations will need a disciplined, easily-learned business process that includes an organizational process, an “incubator” that supports, nurtures and sustains the practice of turning ideas, and aspirations into breakthrough innovations to deliver final products to an audience.
Individuals and big companies are in a uniquely shifting historical spot. Every business and professional is struggling to achieve branding awareness and attention. And often in community building and networking there are huge challenges to face in reaching the key interlocutors.
acuteIQ is an artificial intelligence customer acquisition platform initially targeting the enterprise lending market. It provides an auction-based platform to help brokers predict which merchants might need business loans, based on 2 years of modeling business profitability and transaction data from 24 clients. It has a 4x higher conversion rate than traditional methods.
OpenDataWeek Marseille 2013 : Luca Gerretta -- Harmonising open data policies...Fing
The HOMER project aims to harmonize open data policies across 8 European countries in the Mediterranean region. The project involves 7 regional governments and public agencies who will work to aggregate open data initiatives, establish an effective open data strategy, and set up an interoperable digital market. The main deliverables will be reports on open data requirements, licensing, and socioeconomic impact analysis. A key work package will support the development of open data portals, implement pilot projects, and help harmonize technical and legal aspects of open data across partners to make data more accessible and encourage reuse. The project expects to stimulate data reuse and discovery of new applications, enhance economic growth, and increase awareness of open data policies.
The Crossroads of the Possible is a meeting organized by Fing that brings together digital innovators from various backgrounds to discover new ideas. It has reviewed over 3000 projects since 2002 and exhibited 950 projects through 95 events across 15 French regions. The goal is to connect people with innovative projects and accelerate project development through workshops, events and partnerships between companies, researchers, and public entities.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against developing mental illness and improve symptoms for those who already have a condition.
Nigel thrift presentation for the lift france 12 conferenceFing
The document discusses the future of cities and settlement as sentient entities. It covers topics like new ways of conceptualizing instinct in sentient settlements, the possibility of "fast forward cities" that develop extremely rapidly, and how cities themselves could become "ontographs" or representations of being. It concludes by considering how humans may interact with and even control sentient cities like gods.
This document discusses the changing nature of personal data and privacy in the digital age. It notes that personal data is now ubiquitous, from many scattered sources, and stored in distributed locations. While regulation is needed, "data frugality" and new tools are also important to empower users and protect their autonomy over personal data. These could include features that build forgetting, error and uncertainty into data systems. The document advocates for exploring ideas like heteronyms, data markets that share benefits with consumers, and making digital identity management a skill.
The document discusses how information and communication technologies (ICT) could enable dematerialization by reducing resource use and environmental impacts, but are currently being used in a way that increases these effects. It provides three key arguments: 1) Despite increasing efficiency, more materials are used in ICT hardware; 2) Energy use of ICT services is rising despite efficiency gains; and 3) Total material needs are not decreasing despite growth in less material-intensive sectors. The document advocates visions of more sustainable ICT, such as self-sufficient networks, virtual collaboration replacing travel, and recycling robots powered by renewable energy.
This document provides an agenda for the Spotlight on Technology (#SOT17) event. The agenda includes times for registration, exhibitor meet and greets, presentations from various technology companies (including SmartSTEMs, Pure Storage, ZoneFox, Lenovo, and Trend Micro), panels on threats and how to manage them, and a customer panel with Q&A. Presentation topics include GDPR compliance, ransomware attacks, and user behavior analytics for insider threat detection. The event aims to inform attendees about new technologies through demonstrations and discussions of current issues.
Trustable Technology Mark: Public LaunchPeter Bihr
The document introduces the Trustable Technology Mark, a trustmark for connected devices and IoT products. It aims to provide consumers with information to make informed decisions about connected products and enable companies to prove their products are trustworthy. The trustmark evaluates products on dimensions like privacy, transparency, security, stability and openness. Companies can apply by completing a self-assessment, which is then reviewed by experts. The goal is to establish best practices and raise standards in the IoT industry. Applications are now open to the public on the trustabletech.org website.
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
This document summarizes an article from Deloitte CIO discussing how cybersecurity professionals can improve the user experience of security tools and features. The article argues that cybersecurity is becoming everyone's concern, not just professionals. It suggests learning from other industries like meteorology, pharmaceuticals, entertainment, and more to develop security tools that are simple, reliable, pleasurable to use, and provide users visibility into threats and control over their data. The goal is to "sweeten the security pill" and make security less of a negative experience for users.
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
This document is an article from Deloitte CIO Journal that discusses how cyber security interfaces can be improved to provide a better user experience. It suggests taking lessons from other industries, such as using maps to visualize security threats like meteorology, adding tracking tags to data like pharmaceuticals use on drugs, and making security features more automatic and enjoyable to use like entertainment venues that use wristbands. The goal is to address users' desire to avoid thinking about risks while still protecting their information by improving the user interface of cyber security systems.
Operational space of digital (r)evolution requires an instantaneous reaction. Seeking knowledge has brought me far beyond my personal horizons of discernment.
With hope to create and scale globally an inclusive ‘authors-publisher-readers’ circle of wisdom and expertise; with channeled determination to gain understanding by carefully selecting the best information sources (Dis moi où cherche! Mais où?) and reading between the lines, I invited the Cyber Warriors ‘Men and Women on the Arena’ with hope to “Raise the Cybersecurity Curtain”.
A central topic of these thoughts is cybersecurity. A fundamental and delicate question at the heart of my work is: how to inspire readers' thirst for knowledge, for learning.
I hope readers will gain insights into how they can guide their career path to the success they desire and benefit the global security community through their unique contributions.
1. New technologies like social media, mobile devices, and cheap bandwidth caused users to demand more intuitive applications that allowed real-time connectivity and sharing of content like photos and video.
2. This led to the rise of "systems of engagement" outside the enterprise, which differed from traditional transaction-oriented "systems of record" inside enterprises.
3. Content management systems evolved to integrate these new styles of working and types of content, in order to remain relevant and help IT gain control over the consumer technologies entering enterprises. This included supporting social features, rich media, and open standards.
Crime Scene Investigation: Content – Who killed Enterprise Content Management? As consumer technology takes more attention, enterprise content management seems to have disappeared, particularly ECM. Presentation by John Newton was made at the Technology Services Group led by Dave Giordano at the University of Chicago Gleacher Center on 8 June 2011.
AIIM New England Social Networking PresentationDoug Cornelius
This document discusses social networking for business use. It defines social networks and their value in allowing analysis of relationships rather than just individual attributes. It then covers various aspects of implementing social networking in a business context, including available functionality, ensuring a culture of trust among users, integrating different systems rather than having information silos, establishing appropriate governance, and the infrastructure required. Recommendations focus on taking an iterative approach and balancing controls with allowing open sharing of information.
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
This document provides a review and outlook on cybersecurity in 2015 and emerging trends. It summarizes major hacks in 2015, such as the OPM hack, and discusses how politicians are increasingly focused on cybersecurity issues. It notes challenges such as the lack of cybersecurity talent and discusses trends like the growing importance of privacy, mobile security risks, and the use of deception techniques in cyber defenses. The document outlines both ongoing issues like phishing and areas that are improving, such as increased awareness and funding for cybersecurity. It explores emerging trends including managed security services, cloud-based security tools, cyber insurance, threat intelligence sharing, and the potential of machine learning and behavioral analysis.
Trends that will transform business in 2011 and beyondStephen Debruyn
The document discusses key trends that will transform the corporate environment over the next decade including a shift to renewable energy sources, economic power moving to Asia and Latin America, the convergence of online and offline worlds, increased use of portable devices, demands for transparency and collaboration from stakeholders, widespread use of sensors capturing data, the need to make sense of vast amounts of data, and increased uncertainty requiring adaptability. It also provides recommendations for businesses to capitalize on these trends such as focusing on transparency, social media integration, customization, collaboration tools, data management, and thought leadership programs.
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
This document presents a maturity model for artificial intelligence adoption in enterprises. It outlines four stages of maturity: exploring, experimenting, formalizing, and integrating. It also discusses four macro trends affecting AI success: the shift from screen-based to sensory interactions; from rules-based to probabilistic decision making; from data analytics to data engineering; and from expertise-driven to data-driven leadership. Key aspects of maturity include having a data strategy, using AI in product development, establishing ethics principles, and integrating AI throughout the organization.
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
Throughout history we've seen opposing forces skillfully pit strengths against weaknesses until, ultimately, one side succumbs. Holding a position takes considerably more effort than does a single, offensive surge, and attackers are counting on it. The very nature of the cybersecurity attacks we face today are in direct response to the shortcomings of the available tools, knowledge and approaches. The only problem is that we must evolve our defenses as fast as (or faster) than their offenses, and the odds are greatly in their favor. Imagine a football game – with no time limits – determined by your opponent’s first undefended scoring play. Game over. Hmmm…I wonder how that one ends?
Facing next-generation challenges requires a next-generation approach – preferably one that requires no change to your current production environment, never tires, continually evolves, doesn't rely on humans and is 99%+ accurate regardless of Internet connectivity. We'll discuss a solution that shifts the balance in your favor by leveraging artificial intelligence to predict and prevent against malware-born threats so you don't have to.
- Around 23 million people in the UK have experienced a life shock such as illness, job loss, or relationship breakdown in the past two years, and those who experienced a life shock were three times as likely to be in problem debt.
- Current support mechanisms are insufficient, as many people, even those still employed, cannot build financial protections against common life shocks.
- There is a need for policymakers to prioritize this issue and work with organizations to identify how to improve support and break the link between life shocks and problem debt.
This document discusses the erosion of trust and privacy in the digital age. As technology becomes more integrated into our lives, collecting and monetizing vast amounts of personal data, incidents of data breaches and privacy violations are increasing. While consumers say they care about privacy and trust, their behaviors online do not always reflect this. Moving forward, societies will need to negotiate new regulations and norms around data use to find a balance between privacy, transparency, and a functioning digital economy.
This document provides an overview of 5 technology trends to watch in 2015 according to the Consumer Electronics Association (CEA). It summarizes each trend in 1-2 sentences:
1. Big Data Analytics - With the rise of sensors, devices and digital connectivity, massive amounts of data are being collected and analyzed to provide predictive insights.
2. Digital Health and the Quantified Self - Technologies like wearables, apps and remote monitoring devices allow people to quantify biological metrics to track health and fitness.
3. Entertainment and Immersive Content - Advances in displays, processing power and connectivity enable new immersive entertainment experiences through virtual and augmented reality.
4. The Rise of the Machines - Robot
Social Computing – The Promise And The Perils FinalKannan Subbiah
Social media promises increased reach, engagement, and opportunities through connections with others. However, it also poses risks like privacy issues, data leaks, addiction, and cyber threats from phishing, malware, and state-sponsored attacks. While companies can benefit from social media, they must also address challenges of managing bandwidth, filtering inappropriate content, and ensuring employee productivity is not impacted. Organizations should have guidelines for safe social media use without compromising operations or security.
Staying Ahead in the Cybersecurity Game: What Matters NowCapgemini
This essential book gives you the most recent and relevant topics on cybersecurity. It focuses on the organization, management and governance dimensions of security, whilst staying away from over-technical discussions. Each chapter highlights one of the most recent developments, what it means and why you should consider doing things differently as a result.
Co-written with IBM and Sogeti, read their latest publication on cybersecurity to arm yourself with the necessary knowledge to protect your enterprise.
This document provides an introduction to scenario planning as a foresight methodology to help make better decisions. Scenario planning involves listing driving forces, ranking their importance, creating a scenario grid with different outcomes, and imagining possible future worlds. It is used to identify risks and opportunities and stimulate innovation. The goal is not to predict the future but provide structure to think about possible long-term implications. The document outlines the steps to scenario planning and provides an example scenario grid around issues of personal data and privacy in the year 2020. It concludes by encouraging the reader to try scenario planning.
Guide methodologique Innovation Facteur 4 by La FingFing
Cette méthodologie simple s'adresse aux innovateurs qui visent explicitement à produire un impact écologique positif et significatif ainsi qu'à ceux qui les accompagnent.
En effet, Pprendre en compte l’impact écologique de l’innovation est difficile : parce que les questions écologiques sont systémiques ; parce que chaque innovation produit également des impacts négatifs directs et des "effets rebond" ; parce que l’innovation est par essence incertaine, mais aussi multi-formes produisant des effets complexes pour lesquels il est difficile d’appliquer une méthode toute faite.
La méthode "Innovation Facteur 4" laisse justement l’innovateur dire sur quoi il veut avoir un impact, et comment il le mesure, sans imposer ses propres critères, indicateurs et méthodes de mesure. À ce titre, elle est complémentaire des indicateurs et méthodes existantes de mesure d’impact.
L'agenda pour un futur numérique et écologique (Fing, 2019)Fing
Le numérique (mais pas n’importe quel numérique) peut et doit apporter une contribution plus décisive, plus puissante, plus partagée à la transition écologique. Et si nous (re-)construisions l’“agenda" du numérique au service de la planète ? Cette publication propose plus de 50 pistes neuves pour mieuxr leire les transitions numérique et écologique.
"L'agenda pour un futur numérique et écologique" s’adresse à la fois aux innovateurs, aux acteurs publics, aux entreprises et aux organismes de recherche et ambitionne d’inspirer leurs propre agendas d’innovation, de recherche, de R&D ou d’action publique.
Publié en mars 2019 par la Fing et ses partenaires (l’ADEME, l’Iddri, Inria, GreenIT.fr, le Conseil National du Numérique et Explor’ables), ce document propose plus de 50 pistes neuves pour engager l'action.
Dans le cadre de travaux du groupe de travail NosSystèmes de la Fing, cette présentation montre le travail spéculatif d'étudiants de l'école Boulle et de l'ENS Cachan sur le projet EIG "Signaux Faibles".
Nos Systèmes by Fing : "Kit d'auto-évaluation des algorithmes"Fing
Dans le cadre de travaux du groupe de travail NosSystèmes de la Fing, cette présentation montre le travail spéculatif d'étudiants de l'école Boulle sur un kit d'auto-évaluation des algorithmes.
Dans le cadre de travaux du groupe de travail NosSystèmes de la Fing, cette présentation montre le travail spéculatif d'étudiants de l'école Boulle sur la Taxe d'habitation, afin d'améliorer sa compréhension et lui adjoindre un simulateur pour améliorer le calcul de la valeur locative de critères écologiques.
Présentation donnée par Fabrice Flipo, Philisophe à l'Institut des Mines-Télécom, à l'occasion de la 5e journée Open Conférence de Transitions² sur la sobriété numérique.
L'Agenda pour le Futur de Transitions² / 3 juillet 2018, Paris, Le SquareFing
L'agenda pour le Futur de Transitions² propose des feuilles de routes alternatives (d'innovation, de recherche, d'action publique...) pour mettre le numérique au service de la transition écologique.
www.transitions2.net / Un projet porté par la Fing, l'Iddri, Inria, l'ADEME et bien d'autres !
Kit AgirLocal, le numérique au service des démarches environnementales de nos...Fing
2e édition augmentée et enrichie du Kit AgirLocal issu du programme Transitions² de la Fing.
Et si les dispositifs numériques s’avéraient utiles pour outiller et renforcer les dynamiques locales, les aider à se relier, faciliter la participation et l’efficacité ? Qu’il s’agisse d’énergie, de mobilité, de circuits courts alimentaires, de fabrication/réparation, d’Open Data, les exemples sont nombreux de potentiels encore insuffisamment exploités.
Ce kit partage la connaissance d’expériences locales dans différents domaines environnementaux et d’aider à la construction de démarches : formuler les enjeux, repérer les acteurs, identifier les écueils, trouver un chemin.
Les Transformations du travail à l'ère numérique - Fing Fing
Synthèse du programme Digiwork (mené entre 2013 et 2015) par Amandine Brugière et Aurialie sur les transformations du travail (invidivu, collectif, temps, espace, valeur).
Si on connaît bien la puissance et les limites du « Big », pour ce cycle Questions Numériques, nous proposons de nous intéresser à celles du « Small » : à la petite échelle et à son potentiel de grande transition. Prendre au sérieux la puissance transformatrice de la petite échelle, tel est donc le propos de ce Cahier d'enjeux et prospective de la Fing.
L’expérience utilisateur des systèmes numériques pose la question de l’attention de ceux qui sont amenés à les utiliser.
La seule réponse aujourd’hui est de renvoyer l’usager à sa propre responsabilité : déconnexion, gestion des notifications, etc...
Des milliers de designers agencent toujours plus finement la frontière entre l'incitation et la manipulation, en façonnant chaque boucle de rétroaction du moindre de nos outils.
L'angle du design pour observer la façon dont est captée l’attention des utilisateurs permettrait-il de trouver un levier pour comprendre ce qui est en jeu et proposer des alternatives ?
Présentation de la Musette numérique de l'actif (juillet 2017)Fing
La "Musette numérique de l'actif" est un concept imaginé par la Fing, dans le cadre de son programme Digiwork. La Musette est un support quotidien réflexif et proactif, permettant aux individus de reprendre la main sur leur devenir professionnel. Il a émergé en partant des constats suivants : Les trajectoires professionnelles sont en pleine mutation. La discontinuité et l’individualisation des parcours, la pluriactivité sont aujourd’hui une réalité pour tous. Ces nouvelles formes appellent des instruments nouveaux pour évoluer sur le marché du travail. Le CV ne suffit plus. L’ePortfolio n’a pas pris. La VAE balbutie. La portabilité des droits débute….
…. Et tout cela ne suffit plus. L’individu est aujourd’hui en charge d’un véritable "écosystème d’activités", à la fois informationnel, cognitif, relationnel, technique. En plus de ses différents outils de travail, en constante évolution, il gère différents projets simultanés ; différents réseaux avec lesquels il collabore, auprès desquels il se forme et trouve des opportunités ; différents registres de compétences, leurs évolutions, leurs valorisations…
Comment apporter aux individus la réflexivité nécessaire à une meilleure construction de leur trajectoire ? Comment renforcer leurs capacités d’analyse, d’anticipation et de rebond ? Comment replacer l’individualisation de la trajectoire au cœur d’un faisceau riches de relations collectives ?
Daniel Kaplan - Transitions² / "Agenda pour le Futur" - Open Conference, 23 m...Fing
Intervention de Daniel Kaplan (Fing, Imaginizing The Future) dans le cadre du programme Transitions², le 23 mrs 2017 à Paris : intégrer ou dépasser les limites de la transition écologique ?
Projet Open Source Ecology - Transitions² / "Agenda pour le Futur" - Open Con...Fing
OpenSourceEcologie :
- Etablir une économie Open Source
- Appropriation citoyenne de la technique
- Contre l'obsolescence, la durabilité programmée
- Parvenir à l'autonomie soutenable au sein d'un écosystème
Nos actions visent à offrir aux citoyens la documentation mais aussi les savoirs et les compétences nécessaires à l’appropriation de certains outils productifs et des énergies qui les meuvent. Nous souhaitons ainsi contribuer à l’émergence d’un nouvel ordre économique fondé sur un accès facilité et généralisé aux outils productifs.
L’association française est indépendante mais elle s’inscrit dans les pas du mouvement Open Source Ecology (OSE) né aux États-Unis en 2003. Elle partage les motivations à l’origine de ce mouvement.
Nous voulons donc contribuer aux 50 projets définis dans le GVCS et les adapter aux spécificités françaises et européennes. Nous souhaitons aussi traduire les documentations associées à ces projets pour que les communautés OSE francophones et anglophones puissent profiter mutuellement de leurs travaux.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
The other world of it
1. The Other World of IT Daniel Kaplan www.fing.org www.internetactu.net Another take on how digital innovation interacts with societal change, and what opportunities it spells for all of us.
2. I come from a world where… Information flows freely… … Or leaks … Social networks feed revolutions
3. I come from a world of… DIY tasers… … Or $500 drones … Desktop DNA sequencing … Open Source Cars
4. A world that's always been there in IT Rationalize Optimize Fluidify Simplify Secure Connect Liberate Invent Transform Redistribute Open up
5. This can be a scary world… … But yours is scary too… … However what's even scarier… … Is that the 2 hardly talk to one another… [Note to the reader: This presentation was given in front of a large technology firm, very active in the defence and security industries]
7. Take Security, Trust and Privacy Security Privacy Trust "In the next 10 years, the traditional definition of IT security will undergo a radical shift. Instead of protecting you from the bad guys, it will increasingly protect businesses and their business models from you." - Bruce Schneier, CTO, BT
8. "Me" Reaching out , connecting, showing off, marketing myself Control over my visibility, presence, reputation… Convenience , simplicity, savings, personalization… Self-identity building * individuals, vendors, institutions, communities… Analysis, evaluation Others * Solving the privacy paradox
11. Because protection and projection are inseparable, we need a new set of tools Empower Protect Educate information tools skills Vendor Relationship Management ePortfolios Personal Datastores Heteronyms Privacy by Design PETs Anonymous Personalization Identity Federation Obfuscation Memory Leaks Digital Identity Know-How … Self-Analytics Self-Marketing Collaboration
12. Revisiting Digital trust Where is the value? Value to whom? What unexplored territories? What unsatisfied needs? Suppose individuals had the same level of information and processing capabilities as organizations? How and to what level can P2P trust extend to other areas, scale, endure…? How to recreate mutual trust? How could organizations learn to trust again? Individuals Organi- zations Trusted (?) 3rd Parties Peer to Peer Trust Spaces
13. Another kind of R&D agenda for trust Empowerment P2P Trust Relationship Trusted 3rd Parties 3rd Parties for a really mutual trust Build up personal capacities to store and use personal data The market's "conversation" as an asset for trust Trust transitivity Attach "human" back to "relationship" Default to Transparency as a means to differenciate Build up information as you build uo the relationship Learn to trust again and gain from it Extend and strengthen P2P Trust
14. I.T. can do one or the other But these 2 ways are in conflict Efficiency Process-Oriented Safety Authority Information sharing Codesign & coproduction Empowerment Blurring of boundaries
15. Like a nagging doubt "For the younger generations, IT symbolizes what is most outdated in corporate organizations!" Philippe Lemoine, LaSer "For the last 15 years, IT Has been the main obstacle to corporate innovation!" Jean-Pierre Corniou, former Renault CIO "Studies of corporate IT spending consistently show that greater expenditures rarely translate into superior financial results. In fact, the opposite is usually true." Nicholas Carr, IT Doesn't Matter
17. 1- Emergence Connect everything Facilitate interactions See what happens Exploit insights
18. 2- From "Open" to "Broadly open" innovation Henry Chesbrough, UC Berkeley: Open Innovation: Renewing Growth from Industrial R&D, 2004
20. 3- Things people do together Coproduction Innovation Mass relationships Participation
21. 4- "Good enough and tinkerable" vs. "Perfectly Engineered" Folksonomies All-End to End-IP Messy machines
22. This is not a better agenda. It's an alternative one. It starts from what drives people. It responds to challenges you face. It creates challenges you will help face. These worlds need to talk.