Slides presented at a keynote at the Bayer Innovation Fair in Singapore.
The slides give a high-level introduction into the concepts and motivations of the Semantic Web, including lots of examples.
A large part was shown live during the keynote and thus is not properly rendered in the slides.
See <a></a> for more details.
Part of the Midwest Archives Conference panel session, "Seeing the Details in the Big Picture: Getting a Handle on Processing" presented April 30, 2016 in Milwaukee, WI.
Details a method of conducting a pre-archival processing survey that can be useful through all processing stages, as well as some additional tips on handling archival materials. The PowerPoint includes notes with the slides. Please contact me if you have questions or would like a copy of the template.
These are the slides from a presentation I gave about Open Library at the California Association of Museums conference earlier this year. It outlines the general approach I took to redesigning the catalog of Open Library.
- http://www.calmuseums.org/index.cfm?fuseaction=Page.ViewPage&pageId=493
- http://openlibrary.org
There comes a time in your social media adventure where you have to measure your work. That can be quite a task. Let me share what little I've learned about the topic!
TravelAlberta 2010 - Practical Strategies for Using Social Media in Your Tour...Stephen Joyce
Have wondered why social media works the way it does and why it has penetrated almost every aspect of our on-line lives. In this presentation I demystify social media, show you the fallacies and the hype but also present you with a clear and simple to use strategy for starting or improving your social media strategy. In order to success you must L.E.A.D. (Listen, Engage, Articulate, and Demonstrate).
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
Video killed the radiostar, but will Web 3.0 kill the teacher?Carsten Ullrich
Slides from a presentation given at Spark09.
Technology disrupts. The WWW makes established business models and institutions obsolete, often almost overnight. Nobody foresaw that the proud Encyclopaedia Britannica would be replaced by Wikipedia, a Website to which everyone can contribute.
But what about schools and education? Will teachers by succeeded by avatars living in virtual worlds? Or will their role change, from an instructor to a moderator, from a know-it-all to a mediator of knowledge?
Web technology, from the collaborative and user-driven world of the Web 2.0 to the Web 3.0, the machine-understandable Semantic Web transforms education.
Describing Everything - Open Web standards and classificationDan Brickley
Original title: Open Web standards and classification: Foundations for a hybrid approach
Keynote address, UDC Seminar:
Classification at a Crossroads
30 October 2009 Koninklijke Bibliotheek, The Hague
Dan Brickley, Vrije University Amsterdam
English Twelfth Night Essay | Twelfth Night | Free 30-day Trial | Scribd. Twelfth Night Essay - GCSE English - Marked by Teachers.com. Twelfth night essays characters. ᐅ Essays On Twelfth Night
essay examples: the american dream essay. Marvelous American Dream Argumentative Essay ~ Thatsnotus. AMERICAN DREAM ESSAY PROMPTS. Argumentative essay: American dream essay. American Dream Essay Exemplar.
ENGL 123 Informative and Surprising Essay Instructions (1014) .docxYASHU40
ENGL 123 Informative and Surprising Essay Instructions (1014)
The Informative and Surprising Essay
This assignment requires you to write an essay that follows the surprising reversal pattern.
Keep in mind that, although your purpose is to change the reader’s view, you are not writing a
persuasive argument. You are not trying to convince a resisting reader that a particular value or
policy is wrong. Instead, you are trying to expand the view of an open-minded reader by
providing new information.
You must do four things to get full credit for the assignment:
1. Write an informative essay of 500-550 words.
2. Give the common view or, if you ask a question, give the expected answer to your
question.
3. Present your surprising reversal.
4. Use specific details to make your ideas clear and concrete.
In addition, if you use outside sources, you must give credit to your sources. However, since
we have not yet covered APA-style documentation in class, no deductions will be made for
violations of format. You must, however, name the source of your information in your paper
and list the source at the end of your paper. Deductions will be made if no attempt is made to
cite the source.
If you use your own experiences as support for your thesis, this is fine—and you may use first-
person words (I, me, my, mine). This tone is appropriate, since you do not want to refer to
yourself in the third person.
This assignment may be revised.
English 1130READING FOR RHETORICAL CONTEXTCritical Readers have a keen interest in the rhetorical context of the text. When we speak of rhetoric, we mean the author’s use for language for an intended effect. An important word here is intended. Both writing and reading are intentional. They are deliberate actions, guided by a purpose.
Rhetorical context: author’s purpose, author’s intended audience, circumstances of production, author’s position toward other texts, the larger conversation.
When you do a close reading of the text focusing on its content, genre, organization, and stylistic features, you perform a textual analysis. Another type of analysis is also important: rhetorical analysis. Rhetorical analysis examines the author’s purpose and motivation for writing the text, the intended audience, the circumstances surrounding the text’s production, the author’s position toward other writers and other texts, and the larger conversation of which the text is part. It also explores how the author’s choice of genre, organizational structure, and stylistic features advances his/her purpose. To perform a rhetorical analysis, ask yourself the questions in the box below.
QUESTIONS FOR ANALYZING THE RHETORICAL CONTEXT OF TEXTS
· What is the author’s purpose? What do I perceive as the effect the author intends to have on the audience? What role does the author assume in relation to the audience?
· What do I know about the author’s credibility and background?
· How does th ...
Part of the Midwest Archives Conference panel session, "Seeing the Details in the Big Picture: Getting a Handle on Processing" presented April 30, 2016 in Milwaukee, WI.
Details a method of conducting a pre-archival processing survey that can be useful through all processing stages, as well as some additional tips on handling archival materials. The PowerPoint includes notes with the slides. Please contact me if you have questions or would like a copy of the template.
These are the slides from a presentation I gave about Open Library at the California Association of Museums conference earlier this year. It outlines the general approach I took to redesigning the catalog of Open Library.
- http://www.calmuseums.org/index.cfm?fuseaction=Page.ViewPage&pageId=493
- http://openlibrary.org
There comes a time in your social media adventure where you have to measure your work. That can be quite a task. Let me share what little I've learned about the topic!
TravelAlberta 2010 - Practical Strategies for Using Social Media in Your Tour...Stephen Joyce
Have wondered why social media works the way it does and why it has penetrated almost every aspect of our on-line lives. In this presentation I demystify social media, show you the fallacies and the hype but also present you with a clear and simple to use strategy for starting or improving your social media strategy. In order to success you must L.E.A.D. (Listen, Engage, Articulate, and Demonstrate).
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
Video killed the radiostar, but will Web 3.0 kill the teacher?Carsten Ullrich
Slides from a presentation given at Spark09.
Technology disrupts. The WWW makes established business models and institutions obsolete, often almost overnight. Nobody foresaw that the proud Encyclopaedia Britannica would be replaced by Wikipedia, a Website to which everyone can contribute.
But what about schools and education? Will teachers by succeeded by avatars living in virtual worlds? Or will their role change, from an instructor to a moderator, from a know-it-all to a mediator of knowledge?
Web technology, from the collaborative and user-driven world of the Web 2.0 to the Web 3.0, the machine-understandable Semantic Web transforms education.
Describing Everything - Open Web standards and classificationDan Brickley
Original title: Open Web standards and classification: Foundations for a hybrid approach
Keynote address, UDC Seminar:
Classification at a Crossroads
30 October 2009 Koninklijke Bibliotheek, The Hague
Dan Brickley, Vrije University Amsterdam
English Twelfth Night Essay | Twelfth Night | Free 30-day Trial | Scribd. Twelfth Night Essay - GCSE English - Marked by Teachers.com. Twelfth night essays characters. ᐅ Essays On Twelfth Night
essay examples: the american dream essay. Marvelous American Dream Argumentative Essay ~ Thatsnotus. AMERICAN DREAM ESSAY PROMPTS. Argumentative essay: American dream essay. American Dream Essay Exemplar.
ENGL 123 Informative and Surprising Essay Instructions (1014) .docxYASHU40
ENGL 123 Informative and Surprising Essay Instructions (1014)
The Informative and Surprising Essay
This assignment requires you to write an essay that follows the surprising reversal pattern.
Keep in mind that, although your purpose is to change the reader’s view, you are not writing a
persuasive argument. You are not trying to convince a resisting reader that a particular value or
policy is wrong. Instead, you are trying to expand the view of an open-minded reader by
providing new information.
You must do four things to get full credit for the assignment:
1. Write an informative essay of 500-550 words.
2. Give the common view or, if you ask a question, give the expected answer to your
question.
3. Present your surprising reversal.
4. Use specific details to make your ideas clear and concrete.
In addition, if you use outside sources, you must give credit to your sources. However, since
we have not yet covered APA-style documentation in class, no deductions will be made for
violations of format. You must, however, name the source of your information in your paper
and list the source at the end of your paper. Deductions will be made if no attempt is made to
cite the source.
If you use your own experiences as support for your thesis, this is fine—and you may use first-
person words (I, me, my, mine). This tone is appropriate, since you do not want to refer to
yourself in the third person.
This assignment may be revised.
English 1130READING FOR RHETORICAL CONTEXTCritical Readers have a keen interest in the rhetorical context of the text. When we speak of rhetoric, we mean the author’s use for language for an intended effect. An important word here is intended. Both writing and reading are intentional. They are deliberate actions, guided by a purpose.
Rhetorical context: author’s purpose, author’s intended audience, circumstances of production, author’s position toward other texts, the larger conversation.
When you do a close reading of the text focusing on its content, genre, organization, and stylistic features, you perform a textual analysis. Another type of analysis is also important: rhetorical analysis. Rhetorical analysis examines the author’s purpose and motivation for writing the text, the intended audience, the circumstances surrounding the text’s production, the author’s position toward other writers and other texts, and the larger conversation of which the text is part. It also explores how the author’s choice of genre, organizational structure, and stylistic features advances his/her purpose. To perform a rhetorical analysis, ask yourself the questions in the box below.
QUESTIONS FOR ANALYZING THE RHETORICAL CONTEXT OF TEXTS
· What is the author’s purpose? What do I perceive as the effect the author intends to have on the audience? What role does the author assume in relation to the audience?
· What do I know about the author’s credibility and background?
· How does th ...
National Merit Essay – Telegraph. Narrative essay: National merit scholarship essay examples. How to write a national merit scholarship essay - How to Write a .... An Introduction To The Personal Statement For The National Merit .... National Merit Finalist Essay - The best expert's estimate | Essay .... National Merit Scholarship | The University Network | Elemental diet .... National merit essay 2015 - National merit essay examples 2015. Definition essay: National merit scholarship essay. National merit scholarship essay word count. National Merit Essay Importance. National Merit Scholarship Essay Help. National merit essay prompt 2012 - mfacourses887.web.fc2.com. 2023 National Merit Scholarship Winners - Chappaqua Central School District. national merit scholarship essay. Applying to Merit Scholarships: Writing Your Essays. 2020-21 National Merit Scholar Commended Students. National Merit Scholarship | Horizon Worldwide. Introduction to the National Merit Scholarship Program | National merit .... Nursing essay: Merit based scholarship essay examples. Understanding the National Merit Scholarship Program - Spark Admissions. National merit essay - assignmentsabroadtimescombank.web.fc2.com. Scholarships: merit or need Essay Example | Topics and Well Written .... High merit level essay. Certificate of merit shakespeare school essay competition. Merit Based Scholarship Examples. National merit scholarship essay - copyeditingservices.x.fc2.com. National merit scholarship essay word limit 2013 - rpolibraryutoronto .... What is the national merit scholarship, and how do I apply?. National Merit Finalist Essay - The best expert's estimate | Writing a ... National Merit Essay
The scarlet letter Free Essay Example. Honors English 11 The Scarlet Letter. The Scarlet Letter Essay Test Chapter 1. The Scarlet Letter Essay Prompts Chapters 3&4 by Chelsea Guell | TpT. The Scarlet Letter EssaySP2013.docx | Psychoanalysis | Id. ⭐ The scarlet letter critical essay. Critical Essay: “The Scarlet Sin ....
The scarlet letter Free Essay Example. Honors English 11 The Scarlet Letter. The Scarlet Letter Essay Test Chapter 1. The Scarlet Letter Essay Prompts Chapters 3&4 by Chelsea Guell | TpT. The Scarlet Letter EssaySP2013.docx | Psychoanalysis | Id. ⭐ The scarlet letter critical essay. Critical Essay: “The Scarlet Sin ....
Defrosting the Digital Library: A survey of bibliographic tools for the next ...Duncan Hull
After centuries with little change, scientific libraries have recently experienced massive upheaval. From being almost entirely paper-based, most libraries are now almost completely digital. This information revolution has all happened in less than 20 years and has created many novel opportunities and threats for scientists, publishers and libraries.
Today, we are struggling with an embarassing wealth of digital knowledge on the Web. Most scientists access this knowledge through some kind of digital library, however these places can be cold, impersonal, isolated, and inaccessible places. Many libraries are still clinging to obsolete models of identity, attribution, contribution, citation and publication.
Based on a review published in PLoS Computational Biology, http://pubmed.gov/18974831 this talk will discuss the current chilly state of digital libraries for biologists, chemists and informaticians, including PubMed and Google Scholar. We highlight problems and solutions to the coupling and decoupling of publication data and metadata, with a tool called http://www.citeulike.org. This software tool exploits the Web to make digital libraries “warmer”: more personal, sociable, integrated, and accessible places.
Finally issues that will help or hinder the continued warming of libraries in the future, particularly the accurate identity of authors and their publications, are briefly introduced. These are discussed in the context of the BBSRC funded REFINE project, at the National Centre for Text Mining (NaCTeM.ac.uk), which is linking biochemical pathway data with evidence for pathways from the PubMed database.
Lecture at the advanced course on Data Science of the SIKS research school, May 20, 2016, Vught, The Netherlands.
Contents
-Why do we create Linked Open Data? Example questions from the Humanities and Social Sciences
-Introduction into Linked Open Data
-Lessons learned about the creation of Linked Open Data (link discovery, knowledge representation, evaluation).
-Accessing Linked Open Data
Workplace-based Learning in Industry 4.0 -- Multi-perspective approaches and ...Carsten Ullrich
Keynote at the 3rd Annual International Conference of the Immersive Learning Research Network, iLRN 2017
Today’s shop floor, the area of a factory where operatives assemble products, is a complex and demanding work environment. The employed and produced technology becomes ever more complex, and employees are responsible for an increasing amount of tasks. As a consequence, the employee is under constant pressure to solve problems occurring on the shop floor as fast as possible, and simultaneously to improve his work-related knowledge, skills, and capabilities. This keynotes presents the outcome of the APPsist project, which investigated how adaptive technology can support the employee on the shop floor in this challenging environment.
An Ontology for Learning Services on the Shop FloorCarsten Ullrich
An ontology expresses a common understanding of a domain that serves as a basis of communication between people or systems, and enables knowledge sharing, reuse of domain knowledge, reasoning and thus problem solving. In Technology-Enhanced Learning, especially in Intelligent Tutoring Systems and Adaptive Learning Environments, ontologies serve as the basis of adaptivity and personalization. For mathematics learning and similarly structured domains, ontologies and their usage for adaptive learning are well understood and established. This contribution presents an ontology for the industrial shop floor (the area of a factory where operatives assemble products) and illustrates its usage in several learning services.
Rules for Adaptive Learning and Assistance on the Shop FloorCarsten Ullrich
Today’s shop floor, the area of a factory where operatives assemble products, is a complex and demanding work environment. The employed and produced technology becomes ever more complex, and employees are responsible for an increasing amount of tasks. As a consequence, the employee is under constant pressure to solve problems occurring on the shop floor as fast as possible, and simultaneously to improve his work-related knowledge, skills, and capabilities.
This paper gives an account how adaptive technology can support the employee on the shop floor in these respects. It describes the organizational requirements to take into consideration and describes a set of rules that support the employee in problem solving and knowledge acquisition.
Assistance- and Knowledge-Services for Smart ProductionCarsten Ullrich
The transformation towards Smart Manufacturing results in machines that are increasingly complex to use and to maintain, as well as in ever-complicated production processes. Coupled with a continuing reduction of staff, this leads to an increasing demand for information needs and work expertise. At the same time, these challenges offer the opportunity to enhance the employee’s leeway with respect to designing and organizing their work. The project APPsist focuses on how this transformation can be supported technically and organizationally. This paper presents the technical approach: an architecture for intelligent-adaptive assistance and knowledge services. The paper describes how process mapping identified the requirements of the APPsist system, and presents the identified services and their communication, as well as the intelligent-adaptive functionality of the services.
A description of work done by our lab for the seminar "Sharing Inspiration in Higher Education" at the Finland Pavilion on the World Expo site in Shanghai.
Slides for our talk at Barcamp Shanghai 2009. The talk was mostly a discussion between us, our Australian partner and the audience, so you won't get much from the slides :(
Opportunities for AI in Intelligent Web-based Technology-Supported LearningCarsten Ullrich
Talk I gave at WISM’09-AICI'09 (2009 International Conference on Web Information Systems and Mining and the 2009 International Conference on Artificial Intelligence and Computational Intelligence) where I describe research opportunities offered by today's Web 2.0 and Semantic Web.
Microblogging for Language Learning: Using Twitter to Train Communicative and...Carsten Ullrich
Our work analyzes the usefulness of microblogging in second language learning using the example of the social network Twitter. Most learners of English do not require even more passive input in form of texts, lectures or videos, etc. This input is readily available in numerous forms on the Internet. What learners of English need is the chance to actively produce language and the chance to use English as tool of communication. This calls for instructional methods and tools promoting ‘active’ learning that present opportunities for students to express themselves and interact in the target language. In this paper we describe how we used Twitter with students of English at the Distant College of Shanghai Jiao Tong University. We analyze the students’ messages and show how the usage of Twitter trained communicative and cultural competence.
Paper: http://www.carstenullrich.net/pubs/Borau09Microblogging.pdf
Supporting Active Learning and Education by Artificial Intelligence and Web 2.0Carsten Ullrich
At lecture for fresh(wo)men on learning theories, learning theories and language learning, using Twitter for language learning, building a personal learning environment in 10 minutes, building a personal learning environment in 10 seconds, Artificial Intelligence for learning support.
At lecture for fresh(wo)men on learning theories, learning theories and language learning, using Twitter for language learning, building a personal learning environment in 10 minutes, building a personal learning environment in 10 seconds, Artificial Intelligence for learning support.
In this version, there are problems with the images. Please use the pdf version for online viewing
http://www.slideshare.net/ullrich/sjtu221107-176532
The ppt download is better for the animations, though.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
19. Sacks Oliver Oliver Sacks The Man Who Mistook His Wife for a Hat : And Other Clinical Tales by In his most extraordinary book, "one of the great clinical writers of the 20th century" ( The New York Times ) recounts the case histories of patients lost in the bizarre, apparently inescapable world of neurological disorders. Oliver Sacks's The Man Who Mistook His Wife for a Hat tells the stories of individuals afflicted with fantastic perceptual and intellectual aberrations: patients who have lost their memories and with them the greater part of their pasts; who are no longer able to recognize people and common objects; who are stricken with violent tics and grimaces or who shout involuntary obscenities; whose limbs have become alien; who have been dismissed as retarded yet are gifted with uncanny artistic or mathematical talents. If inconceivably strange, these brilliant tales remain, in Dr. Sacks's splendid and sympathetic telling, deeply human. They are studies of life struggling against incredible adversity, and they enable us to enter the world of the neurologically impaired, to imagine with our hearts what it must be to live and feel as they do. A great healer, Sacks never loses sight of medicine's ultimate responsibility: "the suffering, afflicted, fighting human subject." Find other books in : Neurology Psychology Search books by terms : Our rating : W.
22. Data(base) is there, but hard to access! http://www.flickr.com/photos/squeakywheel/
23. Difficult to extract process plot combine information http://www.flickr.com/photos/fotoosvanrobin/
24. Combining Sacks Oliver Oliver Sacks Oliver Sacks The Man Who Mistook His Wife for a Hat : And Other Clinical Tales by In his most extraordinary book, "one of the great clinical writers of the 20th century" ( The New York Times ) recounts the case histories of patients lost in the bizarre, apparently inescapable world of neurological disorders. Oliver Sacks's The Man Who Mistook His Wife for a Hat tells the stories of individuals afflicted with fantastic perceptual and intellectual aberrations: patients who have lost their memories and with them the greater part of their pasts; who are no longer able to recognize people and common objects; who are stricken with violent tics and grimaces or who shout involuntary obscenities; whose limbs have become alien; who have been dismissed as retarded yet are gifted with uncanny artistic or mathematical talents. If inconceivably strange, these brilliant tales remain, in Dr. Sacks's splendid and sympathetic telling, deeply human. They are studies of life struggling against incredible adversity, and they enable us to enter the world of the neurologically impaired, to imagine with our hearts what it must be to live and feel as they do. A great healer, Sacks never loses sight of medicine's ultimate responsibility: "the suffering, afflicted, fighting human subject." Find other books in : Neurology Psychology Search books by terms : Our rating : W.
103. Carsten Ullrich Shanghai Jiao Tong University Department of Computer Science +86 13917966707 [email_address] http://twitter.com/ullrich InnovationFair 2010 Singapore E-Mail: [email_address] Intranet: http://innovationfair.bbs.cnb
Editor's Notes
To innovate difficult thing to do. Look beyond what you are currently doing, beyond the methods you are applying. Understand what technology offers you, apply it in a new way.
publish data as you would documents not directly for human consumption, just like the databases